Information Technology Reference
In-Depth Information
audience, especially the target audience or the victims, is not so important as they are
quoted as saying. A cleric said that even the Muslims will be killed for the cause if it is
worthwhile, because they will be victims of a justified operation. And last but not least is
symbolic value, which can be a kind of symbolic target for the enemy or a tactical
outcome when there will be a combination of a regular bombing attack somewhere and a
cyber attack to cause confusion and chaos and hit the emergency and other services in the
surroundings. So in my opinion, at a crossroads of course, the main question is whether
cyberterrorism is really a kind of non-conventional weapon and whether terrorism is a
kind of war. Shall we see such operations that can seriously affect national interest?
Handy : The force of my question was whether we can use the intelligence model that
was presented to detect the asymmetric type of threat that falls below the threshhold that
our current intelligence models would normally pick up.
Vellone : It depends if you mean as a technical means or a low-level instrument.
Handy : I really had not defined it either way. I guess technical is what I am really
looking for. Do you see a way to use it from a technical means?
Vellone : From a technical point of view, of course the system can give some answer
to this requirement. Dr. Amaral raised a very important question about tacit and implicit
knowledge, but when you go into this field, you go out of the system. This is the reason
we consider human beings very important in conjunction with technical systems, because
there are some things that must be achieved outside of the system. But the system can
give instruments and tools, to ease the way that people work. If we start to make some
difference within the different aspects of knowledge we will lose the main way of
understanding all the system. As Dr. Amaral has explained, there is a circulation inside
knowledge. We can take this knowledge as all-embracing and consider it like a one-way
intelligence system. This is very important. It means that things come from outside and
inside, but everything has to go in another direction. With these assumptions, all the
discussion about the tacit and explicit knowledge goes down, but practically this is also a
little bit impossible because the system itself needs a certain feedback, so the direct
channel must have something coming back as the system must update itself to give the
right answers. We mentioned that this system must provide ad-hoc answers to ad-hoc
questions. We must verify the hypothesis. Once people create a new hypothesis, this
hypothesis comes back to the system and the system must provide a new answer for this
new hypothesis and this can delay all the other hypotheses. If you consider part of the
technical system also as this requirement you will in this case enter a very complex
system and be unable to find a practical solution, but if you leave this problem outside of
the technical, you can have the answer.
Mounier : I have some experience in the information field. We can see from the last
presentations that there is a common word in the titles, which is strategy. And so we can
sum this up by the fact that it was the strategy of a new technology. I think that if we
believe this, we will want to analyse quite precisely what is meant by strategy.
Information technology means a study of what the history of information activities was in
the past. Maybe this could be interesting, not forgetting some aspects or adding maybe
creative imagination to the study of the strategy of information from Julius Caesar,
Search WWH ::




Custom Search