Vol 2 No 1-2 (2019)

Conceptualization of Information Operations in Modelling the Understanding of a Security Environment

Tomislav Dokman
Ministry of interior
Dario Malnar
Published December 28, 2019
  • information operations,
  • security environment,
  • security policies
How to Cite
Dokman, T., & Malnar, D. (2019). Conceptualization of Information Operations in Modelling the Understanding of a Security Environment. Annals of Disaster Risk Sciences, 2(1-2). Retrieved from https://ojs.vvg.hr/index.php/adrs/article/view/20


Defining the security environment, which is a prerequisite for the process of defining security policies, is based on gathering and evaluating information on the political, economic, military, security, social and other characteristics of a given environment. The process of gathering and evaluating information is increasingly susceptible to external influences and manipulations via information operations of state and non-state actors, particularly with the development of information technologies. The hypothesis of this paper is that information operations influence the understanding of a security environment and as a consequence, the process of defining security policies. Based on the described hypothesis, the paper conceptualizes information operations in the modelling of the understanding of a security environment and consequently the determination of security policies, using an analysis of certain aspects of information operations and their influence on the information and information systems of the adversary.


  1. Allen, Greg and Chan Taniel (2017): Artificial Intelligence and National Security. Belfer Center for Science and International Affairs. Harvard Kennedy School.
  2. Argenti, Paul A., Howell Robert A. and Karen A. Beck (2015): The Strategic Communication Imperative, 61-67. In MIT Sloan Sloanselect Collection (eds.), Top 10 Lessons on Strategy.
  3. Boghardt, Thomas (2009): Soviet Bloc Intelligence and Its AIDS Disinformation Campaign, Studies in Intelligence Vol. 53 No. 4 December 2009.
  4. Cull, Nicholas J. (2009): Public Diplomacy: Lessons from the Past. USC Center on Public Diplomacy at the Annenberg School University of Southern California.
  5. Damjanović, Dragan Z. (2017): Types of information warfare and examples of malicious programs of information warfare. Military technical courier, 2017 65 (4): 1044-1059.
  6. Darczewska, Jolanta (2014): The anatomy of Russian information warfare: The Crimean operation, a case study. Point of view. Number 42. Centre for Eastern Studies. Warsavw.
  7. Department od Homeland Security (2010): DHS Risk Lexicon 2010 Edition, September 2010, Risk Steering Committee.
  8. Dearth, Douglas (2001), Implications and Challenges of applied Information Operations. Journal of Information Warfare Volume 1 (3:): 7-15.
  9. Domović, Roman (2015). Metodologija provođenja informacijskih operacija. National security and the future, 16 (2-3): 95-120.
  10. Đorđević, Ivica (2007): Bezbednosna arhitektura u uslovima globalizacije, Univerzitet u Beogradu – Fakultet bezbednosti i Službeni glasnik, Beograd, 2007.
  11. Fallis, Don (2015): What is disinformation? Library Trends,Volume 63 Issue number 3: 401–426, Exploring Philosophies of Information edited by Ken Herold.The Board of Trustees, University of Illinois.
  12. Ferrara, Emilio (2017): Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday, Peer-Reviewed Journal of the Internet, Volume 22 Number 8 – 7 August 2017.
  13. Giles, Keir (2016): NATO Handbook of Russian Information warfare. Followship Monograph. Research Divison NATO Defense College 9, November 2016.
  14. Hallahan, Kirk, Holtzhausen Derina, van Ruler Betteke, B., Verčić Dejan and Sriramesh Krishnamurthy (2007): Defining Strategic Communication. International Journa od Strategic Communication, 1(1): 3–35.
  15. ISO/TMB WG on Risk management N 066, ISO/IEC Guide 73, Risk management — Vocabulary, 2008.
  16. Joint Chiefs of Staff (1998): Joint Publication 3-13 Joint Doctrine for Information Operations. Joint Pub 3-13, 1998. United States. Joint Chiefs of Staff.
  17. Joint Chiefs of Staff (2006): Joint Publication 3-13 Information Operations. Joint Pub 3-13, 2006. United States. Joint Chiefs of Staff
  18. Joint Chiefs of Staff (2016): Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms. United States. Joint Chiefs of Staff.
  19. Joint Vision 2020 (2000): America‘s Military: Preparing for tomorrow. Washington, D.C., US Government Printing Office, June 2000.
  20. Kuzelj, Maja, Dokman Tomislav and Katalinić Josip (2017): Kibernetički napadi i krizno komuniciranje - izvještavanje novinskih portala. MIPRO 2018: 41. međunarodni skup za informacijsku i komunikacijsku tehnologiju, elektroniku i mikroelektroniku Opatija.
  21. Larson, Eric V., Darilek Richard E., Gibran Daniel, Nichiporuk Brian, Richardson Amy, Schwartz Lowell H. and Thurston Cathryn Quantic (2009): Foundations of Effective Influence Operations: A Framework for Enhancing Army Capabilities. Santa Monica, RAND.
  22. Lasswell, Harold D. (1938): Propaganda Technique in the World War. Chatham: Mackays.
  23. Lazer, David M. J., Baum Matthew A., Benkler Yochai, Berinsky Adam J., Greenhill Kelly M., Menczer Filippo, Metzger Miriam J., Nyhan Brendan, Pennycook Gordon, Rothschild David, Schudson Michael, Sloman Steven A., Sunstein Cass R., Thorson Emily A., Watts Duncan J., Zittrain Jonathan L. (2018.): The science of fake news. Science. Volume 359 Issue 6380: 1094-1096.
  24. Malnar, Dario (2009): Diplomacia publike dhe imazhi ndërkombëtar I Kosovës. Revistë Shkencore: Institute for Security and Integrations Studies, Prishtine, p. 69 – 78.
  25. NATO (2009): NATO Strategic Communication Policy. PO(2009)0141 29 September 2009.
  26. NATO Allied Command Transformation (2017). Strategic Foresight Analysis. 2017 Report.
  27. Perry, Robert L. (2008): Principles of Strategic Communication for a new global commons. Naval War college, Newport, RI.
  28. Reding, Anais, Weed Kristin and Ghez Jeremy (2010): NATO’s Strategic Communications concept and its relevance for France. RAND Corporation.
  29. Tatalović, Siniša, Grizold Anton and Cvrtila Vlatko (2008): Suvremene sigurnosne politike. Golden marketing i Tehnička knjiga, Zagreb, 2008.
  30. Taylor, Philip M. (2003a): We know where you are: Psychological operations Media During Enduring Freedom. In Daya Kishan Thusu and Des Freedman (eds.), War and Media. Reporting Conflict 24/7., 101-113. SAGE Publications.
  31. Taylor, Philip M. (2003b): Munitions of the mind: A history of propaganda from the ancient world to the present day. Thir Edition. Manchester University Press.
  32. Tuđman, Miroslav (2009): Informacijske operacije i mediji ili kako osigurati informacijsku superiornost. National security and the future 10 (3-4): 25-45.
  33. U.S. Army War College (2006): Information Operations Primer. AY07 Edition, November 2006, Carlisle.
  34. Waltzman, Rand (2017): The Weaponization od Information: The Need for Cognitive Security. The RAND Corporation.
  35. Weedon, Jen, Nuland Willian and Stamos Alex (2017): Information Operations and Facebook, April 27, 2017 Version 1.0.
  36. Wolfers, Arnold (1962): Discord and Collaboration: Essays on International Politics. Baltimore: Johns Hopkins University Press.
  37. Sources
  38. BBC News (2017): Russian military admits significant cyber-war effort. Accesible at https://www.bbc.com/news/world-europe-39062663 12. 11. 2018.
  39. Blair, Bruce G. (2017): Why Our Nuclear Weapons Can Be Hacked. The New York Times. Accesible at https://www.nytimes.com/2017/03/14/opinion/why-our-nuclear-weapons-can-be-hacked.html?mcubz=1&_r=0 , 30. 11. 2018.
  40. Cambridge Dictionary (2017): Propaganda. Accesible at https://dictionary.cambridge.org/dictionary/english/propaganda, 29. 11. 2018.
  41. DiResta, Renee, Little John, Morgan Jonathan, Neudert Lisa Maria and Nimmo Ben (2017):The Bots That Are Changing Politics. Motherboard. Accesible at https://motherboard.vice.com/en_us/article/mb37k4/twitter-facebook-google-bots-misinformation-changing-politics, 23. 11. 2018.
  42. Ferraro, Francesa (2013): Attacks against information systems. Library Briefing Library of the European Parliament. Accesible at http://www.europarl.europa.eu/RegData/bibliotheque/briefing/2013/130571/LDM_BRI(2013)130571_REV1_EN.pdf, 29. 11. 2018.
  43. Goldman, Emily (2008): Strategic Communication Theory and Application. II.10.2018. Accesible at http://www.naylornetwork.com/jed-nxt/Goldman_Plenary.pdf, 2. 10. 2018.
  44. Joint Warfare Publication 3-80 (2002): Information operations. Ministry of Defence UK. Director General, Joint Doctrine and Concept. Accesible at http://www.stratcomhellas.weebly.com/uploads/5/1/6/5/51658901/jwp3_80_uk_info_ops_doctrine.pdf, 8. 10. 2018.
  45. Keeley, Greg (2018): The Hill: Combatting Russian information warfare — in the Baltics. Accesible at https://thehill.com/opinion/technology/382245-combatting-russian-information-warfare-in-the-baltics, 20. 11. 2018.
  46. Ministry of Defence odf Russian Federation (2011): Conceptual views on activity of the armed forces of the Russian Federation in information space. Accesible at http://pircenter.org/media/content/files/9/13480921870.pdf, 11. 10. 2018.
  47. Nye, Joseph S. (2017): Information Warfare Versus Soft Power. Belfer Center for Science and International Affairs. Harvard Kennedy School. Accesible at https://www.belfercenter.org/publication/information-warfare-versus-soft-power, 27. 11. 2018.
  48. Wang, Lu, Kisling Whitney and Lam Eric (2013): Fake Post Erasing $136 Billion Shows Markets Need Humans. Bloomberg. Accesible at https://www.bloomberg.com/news/articles/2013-04-23/fake-report-erasing-136-billion-shows-market-s-fragility 30. 11. 2018.