PL EN
Information and modern technologies as an asymmetric threat to state security. Philosophical perspective.
 
More details
Hide details
1
Military University of Technology
 
 
Submission date: 2023-06-01
 
 
Acceptance date: 2023-11-20
 
 
Publication date: 2023-12-30
 
 
Corresponding author
Arnold Warchał   

Military University of Technology
 
 
JoMS 2023;53(4):578-591
 
KEYWORDS
TOPICS
ABSTRACT
Objectives:
Rapid evolution and progress in computer sciences present new determinants for informational technologies. The universal knowledge based on Mathematics and Computer science exploring processes in information dissemination, should be persistently analyzed. Its focus on practical applicability presents various problems and new possibilities for the field of Security Studies, adding new categories to its research interests, that should be constantly defined and redefined. And what is the objective of the article.

Material and methods:
The descriptive methodology used in the article is limited to a presentation of philosophical categories, as it allows for defining of chosen problems that correspond, upon analysis, to asymmetric threats mounting from IT evolution.

Results:
The predicaments of technological evolution in view o the categories arising through philosophical focus, presented here by authors and as applied in Security studies, point to definitions and associated categories of potential dangers that IT progress may entail. Hence, the presentation of three categories analyzed – information, communication, asymmetric threat, and the following analysis of categories of threats with asymmetric values, as a potential nuisance and danger to state security, related to those categories.

Conclusions:
And as is concluded, the new developments, as discussed in the article, present challenges for state security and are presently evolving. Hence, those should be constantly categorized and associated with security predicaments – active and potential.

REFERENCES (24)
1.
Adriaans, P. (2020). Information, The Stanford Encyclopedia of Philosophy (Fall 2020 Edition), Edward N. Zalta (ed.); https://plato.stanford.edu/arc....
 
2.
Bennett, B. W. (2003). et al. Responding to asymmetric threats. New Challenges, New Tools for Defense Decision-making, 1st ed., RAND Corporation, pp. 33–66. JSTOR, http://www.jstor.org/stable/10....
 
3.
Carpenter, P. (2020). The dangerous art of media and messaging manipulation, Forbes, Int. ed., 2020/08/03, https://www.forbes.com/sites/f....
 
4.
CHM – Computer History Museum, https://www.computerhistory.or....
 
5.
Ćurčić, M. (2018). Asymmetric Threats in Security Studies, In: Stojanovic, Stanislav, ed., Asymmetry and Strategy. Thematic Collection of Articles, Strategic Research Institute & National Defence School.
 
7.
Van Dijk, J. A.G.M. (2019). The Digital Divide, Polly Press, https://www.researchgate.net/p....
 
8.
Drew, C. (2022). 22 Disruptive Technology Examples. Helpful Professor. https://helpfulprofessor.com/d....
 
9.
Dzambic, M. (2023). NATO’s New Strategic Concept: Non-Traditional Threats and Bridging Military Capability Gaps. Connections, vol. 10, no. 3, 2011, pp. 14–36. JSTOR, http://www.jstor.org/stable/26.... Accessed 30 May 2023.
 
10.
Dziwa, A. A. (2021). The Invisible Enemy Within: Insider Threats, 21 October 2021, https://www.isaca.org/resource....
 
11.
Euler, L. (1822). Elements of Algebra, ed. 1822,https://archive.org/details/in....
 
12.
Floridi, L. (2009). The Information Society and Its Philosophy: Introduction to the Special Issue on The Philosophy of Information, Its Nature, and Future Developments, May 2009, The Information Society 25(3):153-158; https://www.researchgate.net/p....
 
13.
Haughey, C. J. (2021). Cyber Warfare: What To Expect in 2022 Dec. 22, 2021.
 
15.
Jesseph, D. (2016). Ratios, Quotients, And the Language of Nature. The Language of Nature: Reassessing the Mathematization of Natural Philosophy in the Seventeenth Century, edited by Geoffrey Gorham et al., University of Minnesota Press, pp. 160–77. JSTOR, https://doi.org/10.5749/j.ctt1....
 
16.
Johnson, S.E. (2003). et al. New Challenges, New Tools for Defense Decisionmaking. 1st ed., RAND Corporation, 2003. JSTOR, http://www.jstor.org/stable/10.... Accessed 29 May 2023.
 
17.
Kshetri, N. (2010). Information and Communications Technologies, Cyberattacks, and Strategic Asymmetry. In: The Global Cybercrime Industry. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-....
 
18.
Navala, K. (2022). Addressing Information Imbalances, Big Data Quarterly, Sept. 29, 2022, https://www.dbta.com/BigDataQu....
 
19.
Reid, I.D., Gozna, L.F., Boon, J.CW. (2017). From Tactical to Strategic Deception Detection: Application of Psychological Synthesis. Journal of Strategic Security 10, no. 1 (2017) : 81-101. Available at: https://digitalcommons.usf.edu....
 
20.
Russell, B. (1945). History of Western Philosophy, Simon & Schuster, New York, https://ia803200.us.archive.or....
 
21.
Shannon, C.E. (1948). A Mathematical Theory of Communication, The Bell System Technical Journal, Vol. 27, pp. 379–423, 623–656, July, October, 1948. https://people.math.harvard.ed....
 
22.
Stavroulakis, P., Stamp, M. (2010). Handbook of Information and Communication Security, https://www.researchgate.net/p....
 
23.
Stojanovic, S., ed. (2018). Asymmetry and Strategy. Thematic Collection of Articles, Strategic Research Institute & National Defence School, Belgrade, http://www.isi.mod.gov.rs/mult....
 
24.
Stone, J.V. (2018). Information Theory: A Tutorial Introduction, 2018/02/16, https://www.researchgate.net/p....
 
eISSN:2391-789X
ISSN:1734-2031
Journals System - logo
Scroll to top