![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Blood Christopher G.
Publisher: Military Operations Research Society
ISSN: 2163-2758
Source: Military Operations Research, Vol.2, Iss.3, 1996-09, pp. : 35-43
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Ethics, Law and Military Operations
Journal of Military Ethics, Vol. 10, Iss. 2, 2011-06 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Is There a Military Utility to Information Operations?
By J.N. Ager
Defense Analysis, Vol. 16, Iss. 3, 2000-12 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Net-centric or Networked Military Operations?
By Moon Terry
Defense and Security Analysis, Vol. 23, Iss. 1, 2007-03 ,pp. :