Volume 2, Issue 1 Editorial

Stylized Image of the Word Editorial

OCTOBER 2002

Welcome to the second volume of JIW. The journal was launched a year ago in September 2001 and has gone from strength to strength. The quality of the papers presented for review has generally been excellent. This issue not only reflects this high standard but also the variety of topics covered by the Information Warfare area. They range from the technologically oriented to those more concerned with social aspects.

The first paper is by Anchor et al who describe their research into detecting network attacks. The next six papers were first presented at the 1st European Information Warfare and Security Conference in London during July, 2002. These amended papers were chosen out of those presented at the conference. Bigelow discusses the future of information warfare in the military context, whilst Davey and Armstrong examine the application of counter-intelligence and intelligence to cyber-warfare. Valli looks at the vulnerability of Internet connected appliances in the home to information and physical attack. Slay introduces a cultural framework for coalition operations, whilst Huhtinen and Ranatpelkonen look at the Finnish military perception management from the Russia-Finnish War to the present day. Xenitellis takes us back into the technical realm by examining the vulnerability of event driven systems to attack.

The next three papers are technically oriented. Aslan looks at the specialist area of encryption. Ghosh describes some research carried out last year on the vulnerability of networks to cyber-criminals. Finally, Papadaki et al describe their study into the enhancement of intrusion detection systems.

This diversity is the strength is this journal, so please contribute and encourage your colleagues to do the same. The editors welcome papers from both practitioners and academics. The emphasis is on quality, interest and relevance. As a reader, we hope you find the papers of significance to your employment, research, or just general curiosity.

Bill Hutchinson

 


AUTHORS

Photo of William (Bill) Hutchinson

Security Research Institute Edith Cowan University 
Perth, Australia.

Professor Bill Hutchinson was Foundation IBM Chair in Information Security at Edith Cowan University in Western Australia. He was Director of SECAU (Security Research Centre) and was coordinator of the Information Operations and Security programmes. From 2000 to 2010, he was the Chief Editor and founder of the Journal of Information Warfare.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com