Volume 8, Issue 1

Volume 8, Issue 1 Editorial

Stylized Image of the Word Editorial

APRIL 2009

Welcome to the first issue of JIW for 2009. Firstly, Yin looks at the use of the Internet in the 2000-2008 Intifada. This is followed by Baines who examines the use of fear in information operations campaigns and compares this with research on marketing communications. Next Sentse and Jansen examine the use of fusion cells in counter-insurgency. Finally, Veerasamy proposes a high level framework for contextualising cyber-terrorism.

The Electronic Intifada: The Palestinian Online Resistance in the 2nd Intifada


This paper examines the utility of the Internet in the war of ideas in the Al-Aqsa Intifada in the period from 2000-2008. It tests the hypothesis that the internet is a ‘force-multiplier’ and ‘equalizer’ for the Palestinians to counter a more militarily superior State of Israel. The prognosis offered in this paper is that the empowering characteristics of the internet have transformed the Palestinian struggle into ‘asymmetric warfare’ akin to Mao’s ‘People’s War’ fought on cyberspace. Empirical findings largely confirmed the hypothesis, but with reservations about the ‘equalizer’ effect. The effectiveness of the Palestinian’s online resistance is attributable to their assimilation into the NGO/IO community and achieving traction with the news media. However, decades of Israeli influence on US media and audiences continue to present a significant barrier. 

Evaluating the Effect of the Fear Appeal in Advertising: Implications for Information Operation Campaigns


Assuming the use of the fear appeal is dominant in Information Operations (IO), to undermine the will of the adversary, this paper critically evaluates five decades of research in marketing communications on the effectiveness of fear appeals. An attempt is made to determine how these findings might relate to the IO context, given the special circumstances of these campaigns. A discussion of how market research might be used to determine the effectiveness of fear appeals used in IO campaigns follows, given the special contexts in which they are undertaken (for example, Afghanistan). Implications for how practitioners apply and modify marketing research techniques are also discussed.

Fusion: A Behavioural Approach to Counterinsurgency


This article examines the way in which military operations abroad are organised to combine efforts. It will seek to illustrate where the current organisations involved would tend to work separately, thus enhancing the chance for missed opportunities, wrong assessment of situations or counter-productive action. To achieve flexibility there has been a great deal of emphasis on the network perspective to organisation, causing concepts such as network enabled capability and network centric warfare to become common good.

A High-level Conceptual Framework of Cyber-terrorism


Uneasiness arises from the possibility of random cyber attacks.  In the global information and network warfare battle, cyber-terrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak havoc due to dependency on networked communications. However, much misconception exists over what exactly cyber-terrorism entails and the role of cyber crime and hacking.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.
















Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455