Belief Systems, Information Warfare, and Counter Terrorism

ABSTRACT

This paper defines Counter Terrorism within a risk management and information warfare framework, using risk analyses based upon an understanding of Belief Systems.  An understanding of how people make crucial (life threatening) ethical decisions is important to reducing the likelihood and the impact of terrorist acts.  This understanding can come from analyzing and modeling the complex systems that make up the Belief Systems of terrorists and of the targets of terrorists. Counter Terrorism analysts can use these Belief Systems Models to identify key influences or relationships in Belief Networks and apply information warfare strategies to exploit or prevent events arising from crucial ethical decisions made by terrorist organizations, creating immunity in targeted societies.


AUTHORS

School of Information Technology and Electrical Engineering,
University College, University of New South Wales;
Australian Defence Force Academy, Canberra
Australia

Cecilia Andrews lectures in Information Systems at the Australian Defence Force Academy in Canberra and has 10 years experience in Public and Private enterprise as a senior consultant in systems viability and strategy. Cecilia has published award winning papers in Belief Systems, Ethical Decision Making and Counter Terrorism internationally and within Australia and has authored a chapter in the upcoming book Applications of Information Systems to Homeland Security and Defense available in 2005. Her research, community work, advocacy and consultancy focus on ways to identify, prevent and resolve conflict and systemic violence against innocent peoples.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com