Information Influence Operations: Application of National Instruments of Power
Abstract:
National Instruments of power are means for a nation to exert influence on other nations to achieve certain ends. This paper examines how Ukraine used its national instruments of power during the first months of the Russo-Ukrainian War of 2022 to conduct information influence operations. First, information influencing as a concept is described and then the framework of the paper is constructed by describing instruments of power and the basic elements of a strategy. This framework is then used to analyse how Ukraine used its instruments of power. Finally, this paper sums up the results with discussion and conclusions.
AUTHORS
Finnish National Defence University
Helsinki, Finland
Teemu Saressalo, (LTC [GS]) has studied information operations and strategic communications at the Finnish National Defence University and is currently preparing his doctoral thesis at the Department of Leadership Studies and Military Pedagogy in the Finnish National Defence University. He has over 20 years of experience in the Finnish Defence Forces in operational, educational, and research and development branches along with experience from NATO and United Nations.
Finnish National Defence University Helsinki
Finland
Dr. Aki-Mauri Huhtinen, (LTC [GS]) is a military professor at the Finnish National Defence University in the Department of Leadership and Military Pedagogy. His areas of expertise are military leadership, command and control, information warfare, the philosophy of science in military organizational research, and the philosophy of war. He has published peer-reviewed journal articles, a book chapter and books on information warfare and non-kinetic influence in the battle space. He has also organized and led several research and development projects in the Finnish Defence Forces during 2005-22.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive