Volume 4, Issue 2

Volume 4, Issue 2 Editorial

Stylized Image of the Word Editorial

SEPTEMBER 2005

Welcome to the 11th issue of JIW. I must apologize for the delay in this issue. Factors beyond our control contributed to this. However, this issue addresses a variety of topics and come from authors in a number of nations (the UK, Finland, and Australia). The first from Darnton looks at the use of content analysis in information warfare, whilst Jormakka and Molsa examine the more mathematically base game theory as a tool in information warfare. Rowlingson looks at the ever present threat from insiders as a threat to information security. Hutchinson looks at information and its changing nature and use by governments, and finally Jones, Mee, Meyler, and Gooch examine the security threat from the casual disposal of data storage media.

Content Analysis as a Tool of Information Warfare

ABSTRACT

This paper presents a discussion of content analysis and its application as part of the information warfare armoury. The term content analysis has been in use much longer than the term information warfare, but the tool, even if known by other names, has been used for several decades as a tool of warfare. This paper proposes research to merge epidemiological theory with content analysis. It is likely that a tool such as content analysis introduces a new dimension to information warfare whereby a home population, and not just an 'enemy' may also be a target of information operations.

Modelling Information Warfare as a Game

ABSTRACT

Game theory is one of the possible ways to study information warfare with mathematical models. This paper presents four example games which illustrate the different requirements for an effective playing strategy in information warfare. These games study, how a bold playing strategy can lead to domination, how a mixed playing strategy can reduce domination, how it can be useful to play a dominating strategy only part of the time, and how excessive domination can lead to rebels where all playing parties lose. This paper also describes meta-strategies whose goal is to modify the perceived costs and conditions of a game. This kind of perception management is closely related to the Observe-Orient-Decide-Act (OODA) loop.

Inside and Out? The information Security Threat from Insiders

ABSTRACT

A ‘broad’ definition of insider is proposed: someone who has skills, knowledge, resources or access, considered privileged to, or under the control of, an organization. This extends the traditional ‘narrow’ definition of insider as someone who just has privileged access to IT systems. This broad definition allows a detailed analysis of the strategy and modus operandi of insiders using threat susceptibility factors such as catalysts, inhibitors and amplifiers. This analysis is then used as a basis for a review of insider threat counter-measures.

The ‘Flexibility’ of Official Information During Contemporary Conflicts

ABSTRACT

This paper examines perception management as practiced by governments and the militaries of Western nations since 1980. It examines this topic using the framework of a simple model of information. Basically, it defines information as that product formed when data meets cognition. Contemporary conflicts and their associated information campaigns are examined. It postulates about the impact these practices will have on the democratic process in these nations.

Analysis of Data Recovered from Computer Disks released for Resale by Organisations

ABSTRACT

Public and private sector organisations frequently use computer storage media to hold information relating to their business or services, their employees and customers. Private individuals make use of personal computers in their home and frequently store personal information relating to both themselves and their families.  This raises questions about privacy and the need to dispose of data thoroughly and securely. Most organisations and individuals are probably blissfully unaware of what actually happens to the storage media in the form of the hard disk drives that are fitted into the computers, after they have disposed of old equipment.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com