{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T20:10:01Z","timestamp":1716667801988},"reference-count":30,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>The rapid development of informatization worldwide, specifically in the USA, China and Russia, and its penetration into all spheres of the vital interests of an individual, society and the state, have caused, besides doubtless advantages, the emergence of a number of significant problems. The urgent necessity to protect the information along with being protected from it has become one of them. The geopolitical confrontation and information warfare between the United States and China will be a major factor in world politics in the twenty-first century. This increasing tendency is pushing Russia towards further increasing the development of information warfare along with ensuring national security; the formation of an open dialogue between civilizations; and resistance to the threat of conflict in the field of information. Exhaustion of natural resources of the planet, their consumption and growth of the population do not contribute to the reduction of information warfare. Therefore, the positions of Russia, the United States and China will be strengthened due to deeper integration into the world information space. This paper has highlighted the quintessence of what causes the great thirst towards reaching information comfort and leadership, along with information warfare terrifying serious threats and modern global geopolitical tendencies.<\/p>","DOI":"10.4018\/ijcwt.2013100101","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T14:26:13Z","timestamp":1397053573000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["The Value of Interaction for Russia, the USA and China Facing the Information Warfare"],"prefix":"10.4018","volume":"3","author":[{"given":"Vasilyeva","family":"Inna","sequence":"first","affiliation":[{"name":"Kuban State University of Technology, Krasnodar, Russia"}]}],"member":"2432","reference":[{"key":"ijcwt.2013100101-0","author":"J.Adams","year":"1998","journal-title":"The next world war"},{"key":"ijcwt.2013100101-1","author":"D. S.Alberts","year":"1999","journal-title":"Network centric warfare: Developing and leveraging information superiority"},{"key":"ijcwt.2013100101-2","doi-asserted-by":"publisher","DOI":"10.4324\/9780203945636"},{"key":"ijcwt.2013100101-3","author":"J.Arquilla","year":"1996","journal-title":"The advent of Netwar"},{"key":"ijcwt.2013100101-4","author":"J.Arquilla","year":"1997","journal-title":"In Athena\u2019s camp: Preparing for conflict in the Information Age"},{"key":"ijcwt.2013100101-5","unstructured":"Campen, A. D., & Dearth, D. H. (Eds.). (1998). Cyberwar 2.0: Myths, mysteries and reality. AFCEA International Press, Fairfax."},{"key":"ijcwt.2013100101-6","author":"A. D.Campen","year":"1996","journal-title":"Cyberwar: Security, strategy, and conflict in the Information Age"},{"key":"ijcwt.2013100101-7","author":"J.Carr","year":"2011","journal-title":"Inside cyber warfare"},{"key":"ijcwt.2013100101-8","author":"P.Christopher","year":"2008","journal-title":"Information operations: Doctrine and practice: A reference handbook"},{"key":"ijcwt.2013100101-9","unstructured":"Clarke, R. A. (n.d.). How China steals our secrets. The New York Times. Retrieved from http:\/\/www.nytimes.com\/2012\/04\/03\/opinion\/how-china-steals-our-secrets.html?_r=2&scp=2&sq=richard%20a%20clarke&st=cse&"},{"key":"ijcwt.2013100101-10","unstructured":"Clarke, R. A., & Knake, R. K. (2012). Cyber war: The next threat to national security and what to do about it. ECCO Press. Retrieved from http:\/\/www.scrf.gov.ru\/documents\/6\/114.html"},{"key":"ijcwt.2013100101-11","author":"D. E.Denning","year":"1999","journal-title":"Information warfare and security"},{"key":"ijcwt.2013100101-12","author":"R.Forno","year":"1999","journal-title":"The art of information warfare"},{"key":"ijcwt.2013100101-13","author":"A.Gauntlett","year":"1999","journal-title":"Net spies"},{"key":"ijcwt.2013100101-14","unstructured":"Graham, B. (n.d.). Hackers attack via Chinese web sites. Washington Post."},{"key":"ijcwt.2013100101-15","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctt5hh5nz","author":"W.Hagestad","year":"2012","journal-title":"21st century Chinese cyberwarfare"},{"issue":"2","key":"ijcwt.2013100101-16","first-page":"31","article-title":"Cyber security: An economic and national security crisis. The Intelligencer","volume":"16","author":"M. E.Hathaway","year":"2008","journal-title":"Journal of U.S. Intelligence Studies"},{"key":"ijcwt.2013100101-17","author":"M.Libicki","year":"1996","journal-title":"What is information warfare?"},{"key":"ijcwt.2013100101-18","unstructured":"Libicki, M. (2009). Cyberdeterrence and cyberwar. RAND.org. Retrieved from http:\/\/www.rand.org\/pubs\/monographs\/2009\/RAND_MG877.pdf"},{"key":"ijcwt.2013100101-19","unstructured":"Libicki, M. (2011). Chinese use of cyberwar as an anti-access strategy. Santa Monica, CA: RAND Corporation. Retrieved from http:\/\/www.rand.org\/content\/dam\/rand\/pubs\/testimonies\/2011\/RAND_CT355.pdf"},{"key":"ijcwt.2013100101-20","article-title":"Use of cyber warfare will limit U.S freedom of action says intelligence.","author":"J.Racicot","journal-title":"Cyberwarfare Magazine."},{"key":"ijcwt.2013100101-21","author":"S.Rastorguev","year":"2000","journal-title":"Information warfare formula, radio and communication"},{"key":"ijcwt.2013100101-22","author":"W.Schwartau","year":"1996","journal-title":"Information warfare"},{"key":"ijcwt.2013100101-23","article-title":"Russia setting up cyber warfare unit under military.","author":"V.Sridharan","journal-title":"International Business Times."},{"key":"ijcwt.2013100101-24","unstructured":"Talbot, D. (n.d.). Russia's cyber security plans. MIT Technology Review. Retrieved from http:\/\/www.technologyreview.com\/view\/418495\/russias-cyber-security-plans\/"},{"key":"ijcwt.2013100101-25","article-title":"Inside the Chinese hack attack.","author":"N.Thornburgh","journal-title":"Times (London, England)"},{"key":"ijcwt.2013100101-26","author":"A.Toffler","year":"1993","journal-title":"War and anti-war"},{"key":"ijcwt.2013100101-27","unstructured":"Vasilyeva, I., & Vasilyeva, Y. (2013). Thirst for information: The growing pace of information warfare and strengthening positions of Russia, the USA and China. In Proceedings of the 8th International Conference on Information Warfare and Security, Denver, CO (pp. 215-220). Reading, UK: Academic Conferences and Publishing International Limited."},{"key":"ijcwt.2013100101-28","author":"E.Waltz","year":"1998","journal-title":"Information warfare \u2013 Principles and operations"},{"key":"ijcwt.2013100101-29","author":"I.Winkler","year":"1997","journal-title":"Corporate espionage"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=105187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T19:52:24Z","timestamp":1716666744000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013100101","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}