Relationships between Cyberspace Operations and Information Operations


  • Zsolt Haig National University of Public Service



Today thanks to the wireless networking technologies and social networks, the inter-pretation of cyberspace has expanded. According to the three-layered structure of cyberspace, not only logical effects can be induced in this domain, e.g. by malwares, but physical and cognitive effects also appear in the physical and cyber-persona lay-ers, e.g. electronic jamming the wireless communications of network or influencing and manipulating users. This approach provides an opportunity to interpret cyberspace operations in a more complex way and to apply integrated technical and cognitive information capabilities that exploit each others effects. Accordingly, this study pre-sents an expanded interpretation of cyberspace, a novel and complex approach to cyberspace operations, as well as the information capabilities that can be used in these operations.

Author Biography

Zsolt Haig, National University of Public Service

Department of Electronic Wafare, colonel, professor


Number of Internet of Things (IoT) Connected Devices Worldwide in 2018, 2025 and 2030 [online]. January 2021 [viewed 2021-01-27]. Available from:

FULLER, J.R. The 4 Stages of an IoT Architecture [online]. May 2016 [viewed 2021-01-29] Available from:

Forecast Number of Mobile 5G Subscriptions Worldwide by Region from 2019 to 2026 [online]. January 2021 [viewed 2021-01-17]. Available from:

DARPA Wants to Militarise the IoT [online]. [viewed 2021-01-21]. Available from:

Military Applications of Internet of Things [online]. NATO Science and Technolo-gy Organization, 2016 [viewed 2021-01-21]. Available from:

RELIA, S. Cyber Warfare: Its Implications on National Security. New Delhi: Vij Books India, 2015. ISBN 978-93-84464-82-0.

Overview of Cybersecurity [online]. April 2008 [viewed 2020-12-06]. Available from:!!PDF-E&type=items

DoD Dictionary of Military and Associated Terms [online]. June 2020 [viewed 2020-12-06]. Available from:

KE X., Q. YI and Y. KUN. A Tutorial on Internet of Things: From A Heterogeneous Network Integration Perspective. IEEE Network, 2016, 30(2), pp. 102-108. DOI 10.1109/MNET.2016.7437031.

Cyberspace and Electronic Warfare Operations [online]. April 2017 [viewed 2020-12-06] Available from:

Cyberspace Operations [online]. June 2018 [viewed 2020-12-06]. Available from:

PORCHE III, I.R., C. PAUL, C.C. SERENA, C.P. CLARKE, E.-E. JOHNSON and D. HERRICK. Tactical Cyber. Building a Strategy for Cyber Support to Corps and Below. Santa Monica: RAND, 2017. ISBN 978-0-8330-9608-1.

Cyber Primer [online]. 2nd ed. Swindon: Ministry of Defence, 2016 [viewed 2020-12-06]. Available from:

Aspects and Pillars of Cyber Security [online]. [viewed 2020-12-06]. Available from:

Terms & Definitions of Interest for DoD Counterintelligence Professionals [online]. May 2011 [viewed 2020-12-06]. Available from:

Joint Doctrine Note 2/13 Information Superiority [online]. Swindon: Ministry of Defence, 2013. [viewed 2020-12-05]. Available from:

HAIG, Zs. Information Operations in the Cyberspace (in Hungarian). Budapest: Dialog Campus, 2018. ISBN 978-615-5945-04-5.

LIPOVSKY, R. and A. CHEREPANOV. Black Energy Trojan Strikes Again: At-tacks Ukrainian Electric Power Industry [online]. January 2016 [viewed 2020-12-06]. Available from:




How to Cite

Haig, Z. (2021). Relationships between Cyberspace Operations and Information Operations. Advances in Military Technology, 16(1), 91–105.



Technical Information