Volume 10, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2011

Welcome to the third issue of JIW for 2011 and the 30th issue overall. The Journal of Information Warfare is committed to an involvement in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to security and risk within the broad frame of Information Warfare.

This issue has three papers. The paper by Saara Jantunen and Aki-Mauri Huhtinen examines cyber discourse within the framework of Information Warfare. It concludes that cyber is a synonym to threat and that from an American perspective the internet is seen more as a battle field than a medium for information sharing.

The paper by Anthonie Ruighaver, Matt Warren and Atif Ahmad presents an alternative view to the existing traditional method of risk assessment for information security. The paper examines the traditional risk assessment process, and then proposes a split assessment in order to show a more practical way of applicable risk assessment at the organisational level. The resulting framework places a significantly greater emphasis upon situational awareness, thus allowing more clarity in prioritising and decision-making.

The third paper by Richard Overill and Jantje Silomon looks at cyber crime through the examination of a range of computer crime surveys. The examination specifically looks at whether there is a power law relationship in terms of computer crime. The paper reveals a distinction between opportunistic cyber-crime and serious organised cyber crime of significant proportions.

As this is the last issue for this year my thanks goes out to all the authors, advisors and reviewers (who take on the task voluntarily) who have responded to my many editorial requests. Your timely responses were highly appreciated. I would also like to put in a special mention for Laima Croft who is particularly flexible and generous with her contributions in getting the Journal’s issues prepared and readied.

David Cook
Coordinating Editor
d.cook@ecu.edu.au


AUTHORS

Photo of David Cook

School of Computer and Security Science, and ECU Security Research Institute Edith Cowan University
Australia

David Cook is a researcher in the Edith Cowan University Security Research Institute (ECUSRI) and is also a lecturer in security in the School of Computer and Security Science. He obtained an MBA from Murdoch University and is completing his doctoral studies in e-Governance and Human Computer Interactions. David lecturers in security and specialises in e-Governance, Cyber Ethics, Cyber resilience, Counter Terrorism, Money Laundering, and CIP. David was formerly the Manager of the SECAU Security Research Centre and is currently the Chair of the Australian Computer Society.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com