UDC 327.8-042.4:004
DOI 10.20339/AM.02-26.108
Javlon A. Abdurasulov,
Research fellow
University of World Economy and Diplomacy, Uzbekistan
https://orcid.org/0009-0006-1553-1471
e-mail: abdurasulovj1402@gmail.com
Dinora Ruzimboyeva,
Student
University of World Economy and Diplomacy, Uzbekistan
https://orcid.org/0009-0002-4282-3673
e-mail: rozimboyevadinora268@gmail.com
This article examines the emergence of the concept of information warfare within the context of globalization processes and analyzes its role in international relations. As one of the key instruments of geopolitical competition in the 21st century, information warfare is gaining increasing significance in the political, economic, and military strategies of states. The article explores the fundamental features of modern information warfare through the example of the informational rivalry between the United States and the People’s Republic of China (PRC). In particular, it analyzes the cyber strategies of these states and their interactions in the international arena. Furthermore, the study focuses on the forms and methods of information operations conducted through cybersecurity measures, disinformation campaigns, artificial intelligence, and media platforms. The research employs comparative, analytical, analogical, and retrospective methods to evaluate the strategic approaches of both countries toward achieving ‘information superiority’ from various perspectives.
Keywords: information warfare, cybersecurity, artificial intelligence, information environment , globalization, information security, cyberattack, information manipulation, strategic communication, geopolitics, cyberspace, military technologies, sovereignty, media control
References
1. Wendt, Alexander. Social theory of International Politics. (1999). URL: https://www.guillaumenicaise.com/wp-content/uploads/2013/10/Wendt-Social...
2. Gafarov, I. Zamonaviy AQSH-Hindiston munosabatlarining konstruktivsit jihatlari. 2024 b. 8.
3. Abdurasulov, J. Internal and external geopolitical factors affecting the formation of international relations in central Asia (case study of transport corridors and water resources usage). URL: https://almavest.ru/ru/archive/4230/5823
4.Nye, J.S. (2002) Why military power is no longer enough. The Guardian, 2002, March 31.
5. DemTech / Oxford Internet Institute. “China’s Public Diplomacy Operations: Understanding Engagement and Inauthentic Amplification of PRC Diplomats on Facebook and Twitter.” Ishchi qogʻoz, 2021. P. 15.
6. NATO ACT (2021) Decision‑Making in the Age of Big Data and Artificial Intelligence (AC‑2020 Final Report), sah. 47. URL: https://www.act.nato.int/wp-content/uploads/2024/07/20210301
7. U.S. Department of Defense. (2023) Department of Defense Cyber Strategy. URL: https://media.defense.gov/2023/Sep/12/2003299076/-1/-1/1/2023_DOD_Cyber_...
8. Nye, J.S. (2011) The Future of Power. Carnegie Council. 10 February 2011. URL: https://www.carnegiecouncil.org/media/series/39/20110210-the-future-of-p...
9. CNBC. (2020, August 13). FCC declares Huawei, ZTE national security threats. URL: https://www.cnbc.com/2020/07/01/fcc-huawei-zte-officially-designated-nat...
10. U.S. – China Economic and Security Review Commission (USCC). 2022 Annual Report to Congress — Chapter 3, Section 2: China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States. USCC. URL: https://www.uscc.gov/annual-report/2022-annual-report-congress
11. Foundation for Defense of Democracies (FDD). American Confidence in Elections: Prohibiting Foreign Interference. 18 December 2024. URL: https://www.fdd.org/analysis/2024/12/18/american-confidence-in-elections...
12. Rid, T. (2020) Active Measures: The Secret History of Disinformation and Political Warfare. Review in International Affairs, 97 (1): 244–258. Oxford University Press. URL: https://academic.oup.com/ia/article-abstract/97/1/244/6041478
13. Kott, A., Alberts, D.S., Wang, C. (2015) War of 2050: a Battle for Information, Communications, and Computer Security. arXiv preprint. URL: https://www.emergentmind.com/papers/1512.00360?utm_source
14. Drinhausen, S., Legarda, H. (2025) Reconfiguring International Security — The Strategic Evolution of Modern Warfare. Zeitschrift für Außen- und Sicherheitspolitik.URL: https://link.springer.com/article/10.1007/s12399-025-01018-9?utm_source
15. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, editors Michael N. Schmitt, Liis Vihul.












.png)






