Book contents
- Frontmatter
- Contents
- List of Figures
- Acknowledgments
- 1 Introduction
- 2 Hostile Conquest as Information Warfare
- 3 Information Warfare as Noise
- 4 Can Information Warfare Be Strategic?
- 5 Information Warfare Against Command and Control
- 6 Friendly Conquest in Cyberspace
- 7 Friendly Conquest Using Global Systems
- 8 Retail Conquest in Cyberspace
- 9 From Intimacy, Vulnerability
- 10 Talking Conquest in Cyberspace
- 11 Managing Conquest in Cyberspace
- Appendix A Why Cyberspace Is Likely to Gain Consequence
- Index
10 - Talking Conquest in Cyberspace
Published online by Cambridge University Press: 05 June 2012
- Frontmatter
- Contents
- List of Figures
- Acknowledgments
- 1 Introduction
- 2 Hostile Conquest as Information Warfare
- 3 Information Warfare as Noise
- 4 Can Information Warfare Be Strategic?
- 5 Information Warfare Against Command and Control
- 6 Friendly Conquest in Cyberspace
- 7 Friendly Conquest Using Global Systems
- 8 Retail Conquest in Cyberspace
- 9 From Intimacy, Vulnerability
- 10 Talking Conquest in Cyberspace
- 11 Managing Conquest in Cyberspace
- Appendix A Why Cyberspace Is Likely to Gain Consequence
- Index
Summary
Early computer systems were machines used as tools to perform given tasks in repeatable and predictable ways. Networking, as such, did not kill that metaphor. A distributed system is one with its components here and there; inputs may come from hither and outputs may go to yon. But the system retained its machinelike functionality, structure, and process.
Cyberspace, though, is harder to liken to a machine. Its components are not only distributed but also often independently controlled, especially when they interact. At first, cyberspace was a medium through which people alone exchanged information, a phone system as it were but one where the content that people traded – text, image, audio, video – was all turned into bits. But people also interacted with the system and its artifacts, such as files or programs. Increasingly, processes (such as shopping bots), nodes, servers, computer-controlled machinery, and so on, entered cyberspace to exchange information with each other.
Cyberspace is thus less of a passive medium and more like a stage that both supports and interacts with billions of entities, humans among them, which themselves pursue billions of purposes in conjunction with one another, with all assertions, comparisons, judgments, challenges, and the presentation of bona fides one expects in conversation.
What does it say about conquest in cyberspace if systems loss their machinelike character and cyberspace is seen as an enormous conversation?
- Type
- Chapter
- Information
- Conquest in CyberspaceNational Security and Information Warfare, pp. 231 - 255Publisher: Cambridge University PressPrint publication year: 2007
- 1
- Cited by