(internet OR "world wide web" OR communicat*) AND (millitary OR "armed forces") AND (strateg* OR tactic* ) AND (secret OR covert)
and came up with 8787 results, this is a bit much, but a lot more than I was finding before, so I am going to run with this group for the homework :)
The popular magazine:
Derene, Glenn. "The Coming Digital War." Popular Mechanics 2008: 72,n/a. ProQuest Research Library. Web. 9 Nov. 2012 .
This article was interesting in that it went all the way back to military tactics used in the civil war to interrupt communications and befuddle the enemy. There is much to learn from how we sabotage our own system. This is where "the concept of network information warfare was born." The article also talks briefly about specific possible cyber attacks and how they would manifest along with our countermeasures. It appears to be a well-written and informed article that would give me a lot of other ideas to incorporate or even to change my original direction.
Scholarly journal:
Roger, W. Barnett. "Information Operations, Deterrence, and the use of Force." Naval War College Review 51.2 (1998): 7-19. ProQuest Research Library. Web. 9 Nov. 2012.
I chose this article because it talks about information warfare (IW) being both defensive and offensive. It allows me to delve into another aspect of my topic in that we are not just trying to protect our information, but the same technology also allows us to look at other countries secrets. It also talks about the different kind of programs that would facilitate our protections.
1. This article also shows the authors credentials and affiliations which all lend credibility to his ability to speak authoritatively on this subject.
2. There is a footnote page which details where he got his information and provides additional details not covered in the text.
3. The journal is published by a Navy college, which lends it instant credibility and authority.
Newspaper:
James, W. C. "Pentagon Brass Take Aim
at Armed Forces Internet Sites | New Rules Intended to Preserve Security
by Reducing Content." The San Diego Union - Tribune: 0. Dec 15 1998. Western Newsstand. Web. 9 Nov. 2012 .
This article is a little bit old, but it was updated in 2010. I was not able to get much information from the abstract so I had to use Find It! There isn't an article available online; I even went to the web page for The San Diego UT, but they did not have it either. Irregardless, it promises to give me some valid data on some actual IW and the suggestion that internet security could fall under the heading of The War On Terrorism, so I would request the article to be mailed to me.
Summary:
There were several other articles that I would definitely pursue if I was actually writing this paper; so, the new information I have collected from this class, ie. how to write out my question using Boolean, has given me a considerable advantage. This is evident from my first uninformed attempts at writing a search statement and the considerable frustration I felt when it appeared that I would not have an easy time finding the information I needed...I foresaw many long nights of reading over useless search results trying to gleam a little bit of information that I could spin for my use.
Hi, Amber:
ReplyDeleteI'm glad your search was successful. It seems very relevant as I've heard recent reports out of the pentagon about the possibility of a cyber attack/virus being the next terrorist act to strike the US. Your articles are credible and relevant for your topic and you evaluated the scholarly article using ASPECT. Most often selecting an academic article is enough but it's important to be able to evaluate the citation information to know you are looking at a reliable research article.
Thanks for your efforts,
Andrea