Cognitive Attacks in Russian Hybrid Warfare

@article{Pocheptsov2018CognitiveAI,
  title={Cognitive Attacks in Russian Hybrid Warfare},
  author={G. Pocheptsov},
  journal={Information \& Security: An International Journal},
  year={2018},
  volume={41},
  pages={37-43}
}
  • G. Pocheptsov
  • Published 2018
  • Computer Science
  • Information & Security: An International Journal
A cognitive attack aims to change the interpretation of the situation by an individual and in mass consciousness. Cognitive attacks are actively using cognitive biases as automatic shortcuts for the mass consciousness. This article provides analysis of the following media instruments used by the Russian Federation: changing the concepts for describing the situation by adapting older negative images and myths for the current context, creating fake events and objects to help keeping the intended… Expand
Rhetoric on Service of Russia’s Information Warfare
The primary purpose of the article is to indicate the increasing role of “the war of ideas” in modern conflicts of a different kind. A brief historical overview has been given to draw a certainExpand
Macro to Micro Trigger: Model of the Mental State as a Moderating Variable in Organizational Conflict Management
This article emphasizes the importance of states in testing for information seeking and leadership style (Tidwell & Sias, 2005). Emphasis on states can work to the advantage of women and marginalizedExpand
Порівняльна характеристика програмно-інституційної бази цифрової дипломатії Словацької Республіки та Угорщини.
In terms of the modern diffusion and global deployment of network technologies and online platforms around the world, as well as their growing role and impact on different spheres of life, includingExpand
Main Considerations in Elaborating Organizational Information Security Policies
TLDR
This paper elaborate and structure the main areas of an information security policy, the main implementation challenges, and the need to review and amend the policy in a continuous cycle and comprehensive risk management framework. Expand
Computationally Intensive Functions in Designing and Operating Distributed Cyber Secure and Resilient Systems
TLDR
Six highlevel, computationally demanding functions related to the formulation and implementation of cybersecurity policy: understanding risk; planning and implementing cybersecurity measures; and continuous adaptation to the changing technological, threat and policy landscape are outlined. Expand

References

SHOWING 1-2 OF 2 REFERENCES
Competitive Engagement: Upgrading America's Influence
Abstract America's instruments of foreign policy are weak. As a result, Washington depends much more on its military power than it should. The militarization of foreign policy is neither good forExpand