Volume 11, Issue 1 Editorial

Stylized Image of the Word Editorial

JUNE 2012

Welcome to the 31st Issue of the Journal of Information Warfare (JIW). The Journal is committed to engaging in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to security and risk within the broad frame of Information Warfare.
This issue has four papers. The paper by Matthew Warren and Shona Leitch looks at Web 2.0 and its potential use by terrorist organizations. It considers a variety of real-life case studies that indicate that although less sophisticated than other organizations, terrorist movements in Ireland demonstrate a strategic approach to social media.

The paper by Jantje Silomon and Richard Overill reflects on existing security frameworks and examines why many approaches do not feature cyber-security in the same way as other security elements. In doing so, the authors put forward an alternative model that incorporates cyber-security in a more integral manner.

The third paper by Ma, Chen and Krings examines a problem with strategic information warfare (SIW) by considering how information and related perceptions can be exaggerated. The authors use the recent allegations of Chinese hackers to demonstrate the potential for these exaggerations using a ‘cheap-talk’ model based on the 1982 Crawford and Sobel model.
The fourth paper by Peter James considers how the Silicon Data Vault (SDV), a secure PAD, can be considered to provide a secure environment for execution and storage. The paper specifically looks at the manner in which the SDV’s characteristics are supportive of Network Centric Organisational theory.

David Cook
Coordinating Editor
June 2012
d.cook@ecu.edu.au


AUTHORS

Photo of David Cook

School of Computer and Security Science, and ECU Security Research Institute Edith Cowan University
Australia

David Cook is a researcher in the Edith Cowan University Security Research Institute (ECUSRI) and is also a lecturer in security in the School of Computer and Security Science. He obtained an MBA from Murdoch University and is completing his doctoral studies in e-Governance and Human Computer Interactions. David lecturers in security and specialises in e-Governance, Cyber Ethics, Cyber resilience, Counter Terrorism, Money Laundering, and CIP. David was formerly the Manager of the SECAU Security Research Centre and is currently the Chair of the Australian Computer Society.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com