Information-psychological counteraction of China: a retrospective analysis
https://doi.org/10.20913/2618-7515-2021-1-21
Abstract
About the Author
V. V. SobolnikovRussian Federation
Valery V. Sobolnikov – Doctor of Psychology, Professor at the Chair of General Psychology and History of Psychology
28 Viluyskaya str., 630126, Novosibirsk
References
1. Sobol’nikov V. V. Informational impact in the modern world: a socio-psychological aspect. Novosibirsk, 1999, 166 p. (In Russ.).
2. Cheng D. Winning without fighting: Chinese public opinion warfare and the need for a robust American response. The Heritage Foundation, 2012, no. 2745, pp. 1–8. URL: https://www.heritage.org/asia/report/winning-without- fighting-chinese-public-opinion-warfare-and-the-need- robust-american (accessed 15.12.2020).
3. Yoshihara T. China information warfare: a phantom threat or an emerging threat? Carlisle, 2001, 42 p.
4. Farris K. Chinese views of information warfare. Defense Intelligence Journal, 2001, vol. 10, no. 1, p. 38.
5. Uzhkenov E. M., Yesnazarov T. M. The nature of modern information warfare. View of Chinese researchers. Bulletin of Kazakh National University. Series "Oriental Studies", 2013, no. 1, pp. 49–53. (In Russ.).
6. Bergsten F., Gill B., Lardy N., Mitchell D. China. What should you know about the new superpower. 2nd ed. Moscow, Inst. of Complex Strategic Research, 2007, 256 p. (In Russ.).
7. Johnson M. D. Propaganda and sovereignty in wartime, China: morale operations and psychological warfare under the office of war information. Modern Asian Studies, 2011, vol. 45, no. 2, pp. 303–304. DOI: 10.1017/ S0026749X11000023.
8. Makarenko S. I. Information confrontation and electronic warfare in network wars at the beginning of the XXI century. Saint Petersburg, Science-intensive technologies, 2017, 546 p. (In Russ.).
9. Yurchenko G. Opportunities of China for computer network operations and cyber espionage. Military-Political Review, 2012, Apr. 20. URL: http://www.belvpo.com/9984. html (accessed 01.12.2020). (In Russ.).
10. Krekel B., Adams P., Bakos G. Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage. Northrop Grumman Corp. [S. l.], 2012, 136 p. URL: http://www.uscc.gov/RFP/2012/USCC%20Report_Chinese_CapabilitiesforComputer_NetworkOperationsandCyberEspionage.pdf (accessed 21.11.2020).
11. Avramenko A., Starunsky A. Psychological operations of the People’s Liberation Army of China. Foreign military review, 2005, no. 4, pp. 14–19. (In Russ.).
12. Sobol’nikov V. V. Mentality, mentality and ethnopsychological characteristics of the Chinese people. Moscow, INFRA-M, 2017, 160 p. (In Russ.).
13. Sawyer R. D. The seven military classics of ancient China. New York, Basic Books, 2007, 592 p.
14. Sun T. A treatise on the art of war: with commentaries and explanations. Moscow, AST, 2017, 320 p. (In Russ.).
15. Shutsky Y. K. Chinese classical "Book of changes". Saint Petersburg, Alethea, 1992, 474 p. (In Russ.).
16. Von Senger H. Stratagems. On the Chinese art of living and surviving. Moscow, Eksmo, 2004, 364 p. (In Russ.).
17. Mao Z. Strategic issues of the revolutionary war in China (December 1936). Selected works. Moscow, 1952, vol. 1, pp. 305–430. (In Russ.).
18. Thirty-six stratagems. Chinese secrets of success. Moscow, White Alves, 2000, 92 p. (In Russ.).
19. Ilyushechkin V. P. Secret societies in old China: coll. of art. Moscow, Science, 1970, 205 p. (In Russ.).
20. Lobanova T. N. Discrediting as a discourse strategy in Chinese political media discourse. Bulletin of Moscow State Regional University, 2016, no. 2, pp. 1–11. URL: www. evestnik-mgou.ru (accessed 05.12.2020). (In Russ.).
21. Aitakaeva T. Chinese People Republic: concepts of information operations. Foreign military review, 2008, no. 6, pp. 30–31. (In Russ.).
Supplementary files
For citation: Sobolnikov V.V. Information-psychological counteraction of China: a retrospective analysis. Professional education in the modern world. 2021;11(1):236-246. https://doi.org/10.20913/2618-7515-2021-1-21
Refbacks
- There are currently no refbacks.