Volume 17, Issue 1

Volume 17, Issue 1 Editorial

Styled jiw editorial image

Winter 2018

A sovereign nation is often defined by its geographical boundaries—a line on a map—that delineates the limits of its territory. Over time, those definitions have expanded into the sea and air, as technology has enabled militaries to defend these domains from foreign intrusion.

Operating in the Dark: Cyber Decision-Making from First Principles

Abstract:

The future of cyber conflict will present an uncertain, insecure, and rapidly changing environment. Cyber security will prove to be increasingly important for the defence community, and cyber literacy will be necessary for an increasing number of decision-makers. To continue to achieve its mission, the defence community should rally around a doctrinal set of first principles.

Strategic-Intelligence Analysis: Contributions from an Operational-Design Orientation

Abstract:

To ensure actions are ‘purposeful’—that is, that they achieve the intended outcome— planners rely on sound intelligence to develop courses of action. Intelligence requirements and subsequent collection in support of any planning effort should be informed by an appreciation of what that effort is seeking to achieve and specifications of what should be collected.

A Taxonomy of Norms in Cyberconflict for Government Policymakers

Abstract:

Cyberconflict provides a new set of challenges to the Law of Armed Conflict. The proposals in the recent Tallinn Manual 2.0 provide a good start, but they are incomplete and do not address important issues. Where laws are lacking, states adopt norms to provide consistency and deterrence. This article provides a broad taxonomy of cyberconflict norms for use by government policymakers, including norms for low-level cyberconflict, norms for starting cyberconflict, norms for conducting it, and norms for post-conflict operations. It also introduces the concept of ‘metanorms’, norms for handling other norms.

Towards a Reconceptualisation of Cyber Risk: An Empirical and Ontological Study

Abstract:

The prominence and use of the concept of cyber risk has been rising in recent years. This paper presents empirical investigations focused on two important and distinct groups within the broad community of cyber-defence professionals and researchers: (1) cyber practitioners and (2) developers of cyber ontologies.

Uncertain Security Community: Building Western Cyber-Security Order

Abstract:

Leading NATO countries (such as the United States, the United Kingdom, Germany, and France) are rather like-minded when it comes to cyber-threat assessments and cyber-security policy priorities. They share common security values and norms and identify common cyber threats. In this regard, they can be identified as members of the same security community. However, when it comes to strategies for building cyber security, there is disparity among them.

Cyber Apprenticeship: A Traditional Solution to a Vexing New Problem

Abstract:

This paper proposes a new approach to a relatively new and often vexing problem facing many businesses today: meeting the growing demands for a trained and certified cyber-security workforce. The proposed approach uses the traditional apprenticeship model, combined with the targeting of rural candidates as a mechanism to develop a greater loyalty to any firm making the investment.

Cyber Security in the Context of Armenia-NATO Cooperation

Abstract:

NATO is one of the main actors in the development and modernisation of the national security architecture of Armenia. One of the main research goals of the authors is to understand the qualitative and quantitative framework of Armenia-NATO cooperation. From this perspective, the authors of this article analyse cyber-security cooperation between Armenia and NATO based on DOTMLPF II components.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com