The Journal of
Information Warfare

A primary subscription resource for professionals with an interest in Information Warfare. Access the latest thinking in Information Operations from the military, government, industry and educational perspective.

LATEST EDITION SUBSCRIPTIONS

Information Operations and Cyber Warfare

The aim of the Journal is to provide a definitive publication that makes available the latest thinking and research in the critical area of information warfare, information operations, cyber crime and cyber warfare. It is published four times a year in traditional hard copy and in electronic format via this web site. The first full publication occurred in September 2001. It is the intention that this journal will present the very best and latest thinking in the information warfare and information operations arena.

 

 

  • Volume 13, Issue 1 Editorial

    I would like to wish all of our readers a Happy New Year. This is my fourth issue as the new Chief Editor of the Journal of Information Warfare, which gives me a chance to look back over the last 12 months to reflect on what we have done … and more importantly to think about where we want to ...

    Read Abstract
  • Educating and Training Soldiers for Information Operations

    Abstract: Military Training and Education is evolving because of the growing influence of Information Operations (IO) and Information Warfare (IW). This influence has grown from the tremendous changes in both technology and social issues. While military technology has changed from stones to cannons to silicon-based weapons, the basic curriculum for soldiers in some cases has not changed for centuries. Traditional ...

    Read Abstract
  • Twitter Deception and Influence: Issues of Identity, Slacktivism, and Puppetry

    Abstract: There is a lack of clarity within the social media domain about the number of discrete participants. Influence and measurement within new media is skewed towards the biggest numbers, resulting in fake tweets, sock puppets, and a range of force multipliers such as botnets, application programming interfaces (APIs), and cyborgs. Social media metrics are sufficiently manipulated away from authentic ...

    Read Abstract
  • Global Influence and Cyber Macht

    Abstract: This paper focuses on Global Influence and investigates the phenomena that the ability to influence events no longer resides primarily at the national or governmental level. Instead, small groups of people and even individuals with a potent message and a well-chosen audience are now able to broadcast their message, excite a population, and even initiate an attack.  No overall ...

    Read Abstract
  • YouTube Wars: In and Out of Control

    Abstract: Communication technology has altered the ways states and people communicate in peace and war. This article uses Manuel Castells’ theory of communication power to analyse the nature of control in social media communication. Particular focus lies on studying how virtual and physical violence are created and controlled in a communication environment that includes mass self-communication alongside traditional media. The ...

    Read Abstract
  • Volume 12, Issue 3 Editorial

    The staff of the Journal of Information Warfare (JIW) is very excited about this edition. The majority of these papers came from the 12th annual European Conference of Cyber Warfare and Security (ECCWS) held in July 2013 at the University of Jyvaskyla in Finland. This was an exciting event with a tremendous turnout of IW professionals meeting in a great ...

    Read Abstract
  • Critical Infrastructure Protection Policy: The Israeli Experience

    Abstract: This article presents the Critical Infrastructure Protection (CIP) policy in Israel and analyses its evolution. Israel established a centralist national critical infrastructure protection system in late 2002, which was implemented rather harmoniously. However, the evolving cyber-environment has led to renewed discussions. After years of discontent, a comprehensive review of national cyber-posture was conducted in 2011. Significant policy changes, fostering ...

    Read Abstract
  • Cyberspace from the Hybrid Threat Perspective

    Abstract: Hybrid threats use conventional and unconventional means to achieve their goals. This paper explores the cyber threats as one possible aspect of hybrid threats. It describes three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploiting non-military systems, and exploring the opportunities provided by this environment. In particular, it highlights the aspects that are ...

    Read Abstract

 

The Journal of Information Warfare is a primary, and rapidly expanding, source of cyber security research, thinking and insight.

Read the Latest Editorial or Subscribe to JIW