Volume 9, Issue 1

Volume 9, Issue 1 Editorial

Stylized Image of the Word Editorial

April, 2010

Welcome to the first issue of JIW for 2010 and the 25th issue overall. Professor Bill Hutchinson formally retired in January 2010, and without his tireless efforts the journal would not have established itself as such a strong contributor to the research field that we broadly refer to as Information Warfare. In his place, the Journal now boasts a team of three academics (Professor Matthew Warren, Professor Craig Valli, and Dr Leigh Armistead) who will directly guide me into producing future issues of JIW.

Organisational Security Requirements: An Agile Approach to Ubiquitous Information Security

Abstract

This paper proposes to address the need for more innovation in organisational information security by adding a security requirement engineering focus. Based on the belief that any heavyweight security requirements process in organisational security will be doomed to fail, we developed a security requirement approach with three dimensions.

Twitter as a Vector for Disinformation

Abstract

Twitter is a social network that represents a powerful information channel with the potential to be a useful vector for disinformation. This paper examines the structure of the Twitter social network and how this structure has facilitated the passing of disinformation both accidental and deliberate. Examples of the use of Twitter as an information channel are examined from recent events. The possible effects of Twitter disinformation on the information sphere are explored as well as the defensive responses users are developing to protect against tainted information.

Command, Influence and Information in 3D Tactics

Abstract

This paper has three objectives. Firstly, critically examine the triatic relationship between ‘Command’, ‘Influence’ and ‘Information’ in three dimensional (3D) tactics. Secondly, explain how this relationship enables the 3D tactics of rhizome manoeuvre.

Information Warfare, Globalism, and the Curious Case of Music

Abstract

The concept of globalism can be traced back thousands of years, most remarkably, to ancient Babylonia. Information warfare has enabled this enchanting concept to survive into the present Age.

Tactics of Attack and Defense in Physical and Digital Environments: An Asymmetric Warfare Approach

Abstract

Asymmetric warfare is frequently described as a conflict between two parties where the ‘weaker’ party aims to offset its comparatively fewer resources by making use of particular tactical advantages. This paper develops a concept model that captures the leverage available to the ‘weaker’ party over the ‘stronger’ party simply because the former is attacking rather than defending.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com