SlideShare una empresa de Scribd logo
1 de 27
INFORMATION WARFARE (IW)
Dibyendu Paul
JU UGC_RC
01.09.2011
01-09-2011 JU_UGC-RC/Information_Warfare2
Stealing intelligent information…
01-09-2011 JU_UGC-RC/Information_Warfare3
IW weapons……
01-09-2011 JU_UGC-RC/Information_Warfare4
IW Tool: Social Media…
01-09-2011 JU_UGC-RC/Information_Warfare5
Media IW…….
01-09-2011 JU_UGC-RC/Information_Warfare6
Countering stronger foe…
01-09-2011 JU_UGC-RC/Information_Warfare7
WikiLeaks exposed IW…
01-09-2011 JU_UGC-RC/Information_Warfare8
WikiLeaks had to happened…
01-09-2011 JU_UGC-RC/Information_Warfare9
WikiLeaks has happened…
01-09-2011 JU_UGC-RC/Information_Warfare10
2 understanding of information…
 Information-as-data understanding, which largely
sees information as a quantity or commodity to
be stored, transmitted, used, and of course defended.
 Information-as-perception/image view, which
largely sees information in terms of its value for
shaping beliefs, perceptions, and images.
Elgin Brunner and Myriam Dunn
01-09-2011 JU_UGC-RC/Information_Warfare11
Warfare: origin….!
01-09-2011 JU_UGC-RC/Information_Warfare12
Warfare: just boom….!
01-09-2011 JU_UGC-RC/Information_Warfare13
IW: when there were no…
01-09-2011 JU_UGC-RC/Information_Warfare14
The electronic warfare…
01-09-2011 JU_UGC-RC/Information_Warfare15
Information Warfare…
From Wikipedia
 IW is a concept involving the use and management of IT in pursuit of a competitive
advantage over an opponent.
 May involve collection of tactical information, assurance(s) that one's own
information is valid, spreading of propaganda or disinformation to demoralize or
manipulate the enemy and the public, undermining the quality of opposing force
information and denial of information-collection opportunities to opposing forces.
Information warfare is closely linked to psychological warfare.
 Tends to extend into the realms of Electronic Warfare, Cyber Warfare,
Information Assurance and Computer Network Operations / Attack / Defense.
 The much broader term is "Information Operations" which, although making use of
technology, focuses on the more human-related aspects of information use,
including social network analysis, decision analysis and the human aspects of
Command and Control.
01-09-2011 JU_UGC-RC/Information_Warfare16
A journalist’s perception…
 “His dig was
directed at the
government
which introduced
the Bengali
primer in the
school curricula
recently”
01-09-2011 JU_UGC-RC/Information_Warfare17
Peoples’ perception….
01-09-2011 JU_UGC-RC/Information_Warfare18
A researcher’s perception…
01-09-2011 JU_UGC-RC/Information_Warfare19
Information from
01-09-2011 JU_UGC-RC/Information_Warfare20
Fact and perception differs…
In the IW context,
‘data’ is associated with a thing, and discriminates between
different states of the thing it describes. It consists of
attributes of the events or objects it describes.
‘knowledge’ is an attribute of a human. Knowledge is a set of
interacting mindsets about data activated by an event.
Information is the set of data filtered by the human within
the bounds of the knowledge held by that human (or
group of humans); it establishes a link between cognition
and data.
Boisot (1998)
01-09-2011 JU_UGC-RC/Information_Warfare21
Manipulation to build perception…
01-09-2011 JU_UGC-RC/Information_Warfare22
Shifting role of media…
Media is moving from sources
of information to place of
action
Clay Shirky
01-09-2011 JU_UGC-RC/Information_Warfare23
From planning to action…
Planning
Offensive Defensive
Information
Systems
Media
Other
Infrastructures
Perceptions
Actions
Human
Influance
Society
Influance
01-09-2011 JU_UGC-RC/Information_Warfare24
3 classes of Media effect….
 Agenda setting –
the ability of the media to define the significant issues
of the day.
 Priming –
the relationship between patterns of news coverage
and the criteria with which the public evaluated
politicians and celebrities.
 Framing –
the connection between qualitative features of the news
and public opinion.
01-09-2011 JU_UGC-RC/Information_Warfare25
Controlling infosphere….
 IW in the Information Age is about controlling the
‘infosphere’. It includes perceptions and information
flows at the tactical, operational and strategic level in
times of peace, tension, and war. As such, it means
controlling sources and the dissemination of
information.
 Controlling perceptions held by those in the
infosphere implies that information must be created
that favors the dominant party. As such, that
information may or may not represent physical
reality.
01-09-2011 JU_UGC-RC/Information_Warfare26
Now?…
 Librarians have long been took responsibility for the reliability of
information and protected their users from the consequences caused
by inaccurate information.
 The problem is one of verifiability, the users may not have a way to
verify whether information is accurate or inaccurate. The
verification is even more difficult with disinformation.
01-09-2011 JU_UGC-RC/Information_Warfare27
T H A N K S

Más contenido relacionado

La actualidad más candente

The Concept of Network Centric Warfare feat. India
The Concept of Network Centric Warfare feat. IndiaThe Concept of Network Centric Warfare feat. India
The Concept of Network Centric Warfare feat. IndiaSubhasis Hazra
 
5th Generation Warfare
5th Generation Warfare5th Generation Warfare
5th Generation Warfareusman1159
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCapri Insurance
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
strategic studies and international relations
strategic studies and international relationsstrategic studies and international relations
strategic studies and international relationsTallat Satti
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyKenny Huang Ph.D.
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It MattersJeffrey Malone
 
National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...Carl B. Forkner, Ph.D.
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysisatrantham
 
History of warfare
History of warfareHistory of warfare
History of warfareHamza Abbasi
 

La actualidad más candente (20)

The Concept of Network Centric Warfare feat. India
The Concept of Network Centric Warfare feat. IndiaThe Concept of Network Centric Warfare feat. India
The Concept of Network Centric Warfare feat. India
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Modern War lecture
Modern War lectureModern War lecture
Modern War lecture
 
5th Generation Warfare
5th Generation Warfare5th Generation Warfare
5th Generation Warfare
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
strategic studies and international relations
strategic studies and international relationsstrategic studies and international relations
strategic studies and international relations
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It Matters
 
National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
History of warfare
History of warfareHistory of warfare
History of warfare
 

Similar a Information Warfare

Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesNora A. Rahim
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligencehfrancob
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...
Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...
Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...Haluk Demirkan
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform MovementJennifer Reither
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalyticsDaniel John
 
Creating complex information systems
Creating complex information systemsCreating complex information systems
Creating complex information systemsAnahi Iacucci
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxloganta
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Jeffrey Malone
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
Applying citizen science model to disaster management
Applying citizen science model to disaster managementApplying citizen science model to disaster management
Applying citizen science model to disaster managementW. David Stephenson
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
SocialmediapublicsavetyFrank Smilda
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information PolicyNiamh Walker-Headon
 
Social Media and Emergency Management: Integrating SM
Social Media and Emergency Management:  Integrating SMSocial Media and Emergency Management:  Integrating SM
Social Media and Emergency Management: Integrating SMDavid Merrick II
 

Similar a Information Warfare (20)

Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)
 
Intelligence Analysis
Intelligence AnalysisIntelligence Analysis
Intelligence Analysis
 
Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...
Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...
Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics
 
Creating complex information systems
Creating complex information systemsCreating complex information systems
Creating complex information systems
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
 
ADA531590
ADA531590ADA531590
ADA531590
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Applying citizen science model to disaster management
Applying citizen science model to disaster managementApplying citizen science model to disaster management
Applying citizen science model to disaster management
 
Sais.34.1
Sais.34.1Sais.34.1
Sais.34.1
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
Social Media and Emergency Management: Integrating SM
Social Media and Emergency Management:  Integrating SMSocial Media and Emergency Management:  Integrating SM
Social Media and Emergency Management: Integrating SM
 

Último

Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxthusosetemere
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxLions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxlionnarsimharajumjf
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxlionnarsimharajumjf
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNtntlai16
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20rejz122017
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiPriya Reddy
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESfuthumetsaneliswa
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathphntsoaki
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 

Último (20)

Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxLions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 

Information Warfare