skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 200852 Find in a Library
Title: Controlling Computer Network Operations
Journal: Studies in Conflict and Terrorism  Volume:26  Issue:3  Dated:May-June 2003  Pages:215-232
Author(s): Andrew Rathmell
Date Published: May 2003
Page Count: 18
Type: Report (Study/Research)
Format: Article
Language: English
Country: United States of America
Annotation: This article profiles the relationship between computer network operations and the security environment.
Abstract: It is becoming increasingly important for an international regime for the control of Computer Network Operations (CNOs) to be developed in order to control malicious computer-mediated activities. A strategic dilemma exists of how to characterize and approach the control of CNOs, allowing CNOs to be used advantageously in the military while simultaneously protecting the global information environment. Following a discussion of the various threats against CNOs is such as organized crime, electronic vandalism, corporate espionage, and sub-state terrorism, the article discusses the ways in which the United States is leading the way in publishing doctrines on how to protect information operations while maintaining the usefulness of CNOs for military personnel. Europe is following the United States’ lead and NATO is striving to develop Information Operations policies. The events of September 11, 2001, have illustrated both the importance of protecting cyberspace and the need for parallel developments to occur in the military's offense and defense spheres. Following a discussion of the need for well-developed global environment paradigms in this interdependent world, the article details the increased role in CNOs played by businesses in the private sector. The proliferation and routinization of military CNOs pose a danger to the information society and suggests, that the adoption of multilateral norms and codes of conduct are essential in developing a secure information environment. 60 Notes
Main Term(s): Computer privacy and security; Computer related crime
Index Term(s): Computer privacy and security laws; Computer security training; Computer software; Computer-related crime legislation; Military crime
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.