Le hacking comme opération spéciale permanente des guerres de l’information (notice n° 1043724)
[ vue normale ]
000 -LEADER | |
---|---|
fixed length control field | 02866cam a2200337 4500500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250125180256.0 |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | fre |
042 ## - AUTHENTICATION CODE | |
Authentication code | dc |
100 10 - MAIN ENTRY--PERSONAL NAME | |
Personal name | Pech, Yannick |
Relator term | author |
245 00 - TITLE STATEMENT | |
Title | Le hacking comme opération spéciale permanente des guerres de l’information |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Date of publication, distribution, etc. | 2021.<br/> |
500 ## - GENERAL NOTE | |
General note | 89 |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Technique de détournement fonctionnel de dispositifs matériels, immatériels et humains, le hacking est devenu une arme au service de la guerre de l’information. Parent pauvre de la recherche académique, le phénomène appelle une approche multiscalaire faisant écho aux strates du cyberespace. L’étude de trois cas emblématiques (Triton, SolarWinds et Cambridge Analytica) au prisme d’un triple cadre d’analyse révélant un contexte de guerres réticulaire, économique et cognitive, permet de tester l’hypothèse du hacking comme fer de lance de la lutte par (manipulation), pour (appropriation) et contre (interdiction) l’information. En effet, d’une part, son usage égalise certainement les rapports de puissance-influence. D’autre part, le hacking constitue l’instrument privilégié des acteurs pour dissimuler leurs manœuvres stratégiques sur fond de transparence internationale. C’est l’opération spéciale permanente des guerres de l’information. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | As a technique for the hijack of material and immaterial, human devices, hacking has become a weapon at the service of information warfare. Hacking is the forgotten object of academic research which needs a multiscale approach that echoes the layers of cyberspace. The study of three emblematic cases (Triton, SolarWinds and Cambridge Analytica) through the prism of a triple analytical grid revealing a context of reticular, economic, and cognitive wars, allows us to test the hypothesis of hacking as the spearhead of the fight by (manipulation), for (appropriation) and against (interdiction) information. Indeed, on the one hand, its use certainly equalizes the power-influence relationships. On the other hand, hacking constitutes the privileged instrument of the actors to dissimulate their strategic manoeuvres in the context of international transparency. It is the permanent special operation of the information warfares. |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | encerclement |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | réticulaire |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | systémique |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | manipulation |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | Hacking |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | OODA |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | infoguerre |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | deception |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | infowar |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | reticular |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | encirclement |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | Hacking |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | OODA |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | systemic |
786 0# - DATA SOURCE ENTRY | |
Note | Revue internationale d'intelligence économique | 13 | 1 | 2021-12-17 | p. 93-118 | 2101-647X |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://shs.cairn.info/revue-internationale-d-intelligence-economique-2021-1-page-93?lang=fr&redirect-ssocas=7080">https://shs.cairn.info/revue-internationale-d-intelligence-economique-2021-1-page-93?lang=fr&redirect-ssocas=7080</a> |
Pas d'exemplaire disponible.
Réseaux sociaux