Impeding insurgent attacks: The information management agenda

Kevin C. Desouza, Ting Yen Wang

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

Recent confrontations in Iraq between coalition forces and insurgents have caused much havoc in the way of economic and political reforms. Insurgents use a wide range of tactics, from suicide bombings to kidnappings, to cause tension between the local factions and the Iraqi populace, and between the locals and the coalition forces. The strength of the insurgent strategy emerges from the nature of their attacks: highly erratic, yet potent. All-out-assault on these insurgents is impossible as they cloak themselves and exploit the advantages of guerrilla warfare tactics. In this paper, we will highlight the informational issues that the coalition forces must appreciate in order to curb and curtail these insurgent attacks. While we do not aim to propose any grand strategy to eradicate all insurgent attacks, we do believe that the true weapon that needs to used optimally (effectively and efficiently) against such attacks is information. Whether the insurgents or the coalition forces, the side that is more successful at managing and deploying information potently and with intent will ultimately prevail.

Original languageEnglish (US)
Pages (from-to)211-229
Number of pages19
JournalTechnological Forecasting and Social Change
Volume74
Issue number2
DOIs
StatePublished - Feb 2007
Externally publishedYes

Fingerprint

Bombing
Curbs
Iraq
Information Management
Weapons
Military operations
Crime
Information management
Suicide
Economics
Warfare
Attack
Agenda
Tactics

Keywords

  • Emergence
  • Guerrilla warfare
  • Information management
  • Semiotics
  • Suicide bombings
  • Terrorism

ASJC Scopus subject areas

  • Business and International Management
  • Management of Technology and Innovation
  • Applied Psychology

Cite this

Impeding insurgent attacks : The information management agenda. / Desouza, Kevin C.; Wang, Ting Yen.

In: Technological Forecasting and Social Change, Vol. 74, No. 2, 02.2007, p. 211-229.

Research output: Contribution to journalArticle

Desouza, Kevin C. ; Wang, Ting Yen. / Impeding insurgent attacks : The information management agenda. In: Technological Forecasting and Social Change. 2007 ; Vol. 74, No. 2. pp. 211-229.
@article{d9292d30a22c4fc7b9ee89c64506114d,
title = "Impeding insurgent attacks: The information management agenda",
abstract = "Recent confrontations in Iraq between coalition forces and insurgents have caused much havoc in the way of economic and political reforms. Insurgents use a wide range of tactics, from suicide bombings to kidnappings, to cause tension between the local factions and the Iraqi populace, and between the locals and the coalition forces. The strength of the insurgent strategy emerges from the nature of their attacks: highly erratic, yet potent. All-out-assault on these insurgents is impossible as they cloak themselves and exploit the advantages of guerrilla warfare tactics. In this paper, we will highlight the informational issues that the coalition forces must appreciate in order to curb and curtail these insurgent attacks. While we do not aim to propose any grand strategy to eradicate all insurgent attacks, we do believe that the true weapon that needs to used optimally (effectively and efficiently) against such attacks is information. Whether the insurgents or the coalition forces, the side that is more successful at managing and deploying information potently and with intent will ultimately prevail.",
keywords = "Emergence, Guerrilla warfare, Information management, Semiotics, Suicide bombings, Terrorism",
author = "Desouza, {Kevin C.} and Wang, {Ting Yen}",
year = "2007",
month = "2",
doi = "10.1016/j.techfore.2006.07.004",
language = "English (US)",
volume = "74",
pages = "211--229",
journal = "Technological Forecasting and Social Change",
issn = "0040-1625",
publisher = "Elsevier Inc.",
number = "2",

}

TY - JOUR

T1 - Impeding insurgent attacks

T2 - The information management agenda

AU - Desouza, Kevin C.

AU - Wang, Ting Yen

PY - 2007/2

Y1 - 2007/2

N2 - Recent confrontations in Iraq between coalition forces and insurgents have caused much havoc in the way of economic and political reforms. Insurgents use a wide range of tactics, from suicide bombings to kidnappings, to cause tension between the local factions and the Iraqi populace, and between the locals and the coalition forces. The strength of the insurgent strategy emerges from the nature of their attacks: highly erratic, yet potent. All-out-assault on these insurgents is impossible as they cloak themselves and exploit the advantages of guerrilla warfare tactics. In this paper, we will highlight the informational issues that the coalition forces must appreciate in order to curb and curtail these insurgent attacks. While we do not aim to propose any grand strategy to eradicate all insurgent attacks, we do believe that the true weapon that needs to used optimally (effectively and efficiently) against such attacks is information. Whether the insurgents or the coalition forces, the side that is more successful at managing and deploying information potently and with intent will ultimately prevail.

AB - Recent confrontations in Iraq between coalition forces and insurgents have caused much havoc in the way of economic and political reforms. Insurgents use a wide range of tactics, from suicide bombings to kidnappings, to cause tension between the local factions and the Iraqi populace, and between the locals and the coalition forces. The strength of the insurgent strategy emerges from the nature of their attacks: highly erratic, yet potent. All-out-assault on these insurgents is impossible as they cloak themselves and exploit the advantages of guerrilla warfare tactics. In this paper, we will highlight the informational issues that the coalition forces must appreciate in order to curb and curtail these insurgent attacks. While we do not aim to propose any grand strategy to eradicate all insurgent attacks, we do believe that the true weapon that needs to used optimally (effectively and efficiently) against such attacks is information. Whether the insurgents or the coalition forces, the side that is more successful at managing and deploying information potently and with intent will ultimately prevail.

KW - Emergence

KW - Guerrilla warfare

KW - Information management

KW - Semiotics

KW - Suicide bombings

KW - Terrorism

UR - http://www.scopus.com/inward/record.url?scp=33846795745&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33846795745&partnerID=8YFLogxK

U2 - 10.1016/j.techfore.2006.07.004

DO - 10.1016/j.techfore.2006.07.004

M3 - Article

AN - SCOPUS:33846795745

VL - 74

SP - 211

EP - 229

JO - Technological Forecasting and Social Change

JF - Technological Forecasting and Social Change

SN - 0040-1625

IS - 2

ER -