Network Operations and Warfare: Employing Effective Paradigms across Different Environments

Abstract

Network Centric approaches feature strongly in the tactics of modern warfare. While the military have refined these paradigms into effective, applicable models, there is a scarcity of resources to assist enterprises employing these models in the commercial sphere. In the battle for information superiority, many competitive enterprises are struggling to adapt military models to achieve information superiority in a competitive business context.


AUTHORS

School of Computer and Information Science Edith Cowan University, 
Australia

Caroline Leming completed her Master of Information Security and Intelligence in 2010 from Edith Cowan University in Western Australia. She currently resides in Zurich, Switzerland and is working towards her Bachelor of Information Technology (Honours).

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com