Show simple item record

dc.contributor.authorSartonen, Miika
dc.contributor.authorHuhtinen, Aki-Mauri
dc.contributor.authorLehto, Martti
dc.date.accessioned2022-08-19T09:23:49Z
dc.date.available2022-08-19T09:23:49Z
dc.date.issued2016
dc.identifier.citationSartonen, M., Huhtinen, A.-M., & Lehto, M. (2016). Rhizomatic Target Audiences of the Cyber Domain. <i>Journal of Information Warfare</i>, <i>15</i>(4), 1-13. <a href="https://www.jinfowar.com/subscribers/journal/volume-15-issue-4/rhizomatic-target-audiences-cyber-domain" target="_blank">https://www.jinfowar.com/subscribers/journal/volume-15-issue-4/rhizomatic-target-audiences-cyber-domain</a>
dc.identifier.otherCONVID_26531553
dc.identifier.otherTUTKAID_72893
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/82722
dc.description.abstractTarget Audience Analysis (TAA) is a process of finding suitable target audiences for psychological operations (PSYOPS). Typically, a TAA is a one-way process with some kind of a feedback system. The cyber domain presents a challenge to this type of sequential, linear process by refusing to stay still while the process is being executed, possibly leading to results from yesterday’s data in an environment that no longer exists today. Another challenge is that identifiable human beings—the traditional targets of PSYOPS—are not the only inhabitants of the cyber domain. Physical devices, nicknames, IP addresses, networks, and a vast amount of data populate this environment, in which there are no human beings, only their presentations and behavioural residue in a multitude of forms. The authors argue that while the psychological theories behind influence operations still form the basis for PSYOPS as a whole, a re-thinking of methods is necessary for the cyber domain. To conceptualize the cyber domain as a platform for influence operations, the authors suggest a five-layer structure based on Martin C. Libicki’s model. In each of these five layers, the target audiences are present in different forms. Thus, all information between humans is filtered through all of the layers with their own rules and causalities. In order to be successful in any influence attempt, one must understand and utilize the characteristics of each layer. The authors also propose that the rhizome theory is the most effective theoretical approach for understanding the complex interactions within the cyber domain.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherPeregrine Technical Solutions, LLC
dc.relation.ispartofseriesJournal of Information Warfare
dc.relation.urihttps://www.jinfowar.com/subscribers/journal/volume-15-issue-4/rhizomatic-target-audiences-cyber-domain
dc.rightsIn Copyright
dc.subject.otherCyber Domain
dc.subject.otherPsychological Operations
dc.subject.otherRhizome
dc.subject.otherSocial Media
dc.subject.otherTarget Audience
dc.titleRhizomatic Target Audiences of the Cyber Domain
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202208194261
dc.contributor.laitosTietotekniikan laitosfi
dc.contributor.laitosDepartment of Mathematical Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.description.reviewstatuspeerReviewed
dc.format.pagerange1-13
dc.relation.issn1445-3312
dc.relation.numberinseries4
dc.relation.volume15
dc.type.versionpublishedVersion
dc.rights.copyright© Peregrine Technical Solutions, LLC, 2016
dc.rights.accesslevelopenAccessfi
dc.subject.ysososiaalinen media
dc.subject.ysoinformaatiosodankäynti
dc.subject.ysoInternet
dc.subject.ysokyberavaruus
dc.subject.ysoverkkotunnukset
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p20774
jyx.subject.urihttp://www.yso.fi/onto/yso/p8874
jyx.subject.urihttp://www.yso.fi/onto/yso/p20405
jyx.subject.urihttp://www.yso.fi/onto/yso/p7989
jyx.subject.urihttp://www.yso.fi/onto/yso/p10186
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright