Issues of Resilience to Cyber-Enabled Psychological and Information Operations
This article discusses the transformation of the information environment, which allows an adversary to exploit cyber-enabled psychological and information operations.It presents the options currently available here to an adversary to exploit the vulnerability of the information environment, chiefly the cognitive vulnerabilities of target groups.Thu