Volume 10, Issue 1 Editorial

Stylized Image of the Word Editorial

April 2011

Welcome to the first issue of JIW for 2011 and the 28th issue overall. The Journal of Information Warfare is committed to an involvement in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to Information Warfare. 

Volume 15, Issue 1 Editorial

Stylized Image of the Word Editorial

March 2016

Information Warfare is a term that means many things to many people. The Journal of Information Warfare (JIW) strives to be as inclusive as possible to bring in all different aspects of this important capability, from the “softer” topics, such as perception management and strategic communications, to the “harder” areas, such as computer network defense and electronic warfare.

Volume 14, Issue 4 Editorial

Stylized Image of the Word Editorial

FALL 2015

I want to thank all subscribers and authors for your support of the Journal of Information Warfare (JIW). The number of papers submitted has increased dramatically; and, as always, we welcome new submissions. Our rigorous double-blind peer-review process remains unchanged: through this process, we are able to collect objective feedback for all submissions. In addition to our regular issues, we continue to produce a special edition each April with the National Security Agency (NSA). In 2016, we will also be collaborating with USCYBERCOM for this special edition.

Volume 4, Issue 1 Editorial

Stylized Image of the Word Editorial

February 2005

The fourth volume of the JIW has seven papers that reflect the variety of topics in the Information Warfare (Operations) discipline. The first by Geoffrey Darton explores the relationship of International Law and Information Warfare. Next Montgomery McFate takes us into the mysterious world of North Korea and examines the American perspective on the issues that could help influence operations with that state. Cecilia Andrews investigates belief systems and how belief networks can assist in Information Warfare strategies. Cameron Wells examines the differences between the US and Australian concepts of Network Centric Warfare.

Volume 4, Issue 2 Editorial

Stylized Image of the Word Editorial


Welcome to the 11th issue of JIW. I must apologize for the delay in this issue. Factors beyond our control contributed to this. However, this issue addresses a variety of topics and come from authors in a number of nations (the UK, Finland, and Australia). The first from Darnton looks at the use of content analysis in information warfare, whilst Jormakka and Molsa examine the more mathematically base game theory as a tool in information warfare. Rowlingson looks at the ever present threat from insiders as a threat to information security. Hutchinson looks at information and its changing nature and use by governments, and finally Jones, Mee, Meyler, and Gooch examine the security threat from the casual disposal of data storage media.

Volume 3, Issue 3 Editorial

Stylized Image of the Word Editorial


This issue of JIW consists of papers predominantly from Australian contributors. There has been a special issue from the Naval Postgraduate School at Monterey, and the intention is that further issues will highlight research in the United Kingdom, and the National Defense University in Washington. Most issues are generic but special issues do give a forum to display research from specific sources.

Volume 3, Issue 2 Editorial

Stylized Image of the Word Editorial


Last November, the Editor-in-Chief of JIW, William Hutchinson, invited the Naval Postgraduate School in Monterey, California to put together a special issue of papers representing some of the research at NPS. We agreed and offer the five papers included in this issue. All of the papers underwent the normal JIW review process before final acceptance and publication.

The papers reflect but a small sample of the IW-related research at NPS. There are approximately 40 permanent faculty and research staff at NPS working in some area of IW, and an even larger number of graduate students who have passed through our programs and completed theses. Many of these people are affiliated with the Center for Information Systems Security Studies and Research (CISR), which was among the first federally designated Centers of Academic Excellence in Information Assurance Education and participants in the Scholarship for Service Program. Others are affiliated with the Cryptologic Research Center, which enjoys significant participation by members of the Department of Electrical and Computer Engineering, the Information Warfare program, the Center for Homeland Defense and Security, or the Center for Terrorism and Irregular Warfare (CTIW). NPS is also in the process of establishing the new Department of Defense Center of Excellence in Information Operations. The new IO center will join CISR and CTIW as components of the Cebrowski Institute for Information Innovation and Superiority. For more information about our programs, we invite the reader to visit the NPS website at www.nps.edu.

Volume 3, Issue 1 Editorial

Stylized Image of the Word Editorial


Welcome to first issue of volume three of the journal. Many excellent articles have been published since the journal was first introduced at InfoWarCon in Washington a week before that fateful day on September 11th, 2001. The range of papers presented in the previous issues illustrates the holistic nature of information warfare and information operations disciplines. This issue is no exception with topics as diverse as data mining, propaganda, critical infrastructure protection, and mobile and network security being represented.

Volume 4, Issue 3 Editorial

Stylized Image of the Word Editorial

December 2005

The final issue of JIW for 2005 includes four very different papers.  The first by Duczynski investigates the application of Effects Based Operations and uses a technique called Field Anomaly Relaxation to illustrate the issues involved.  Pierce, Warren and Corray have written a more technology based paper that examines penetration testing. In the third paper, Lubbers has written an interesting case study of that examines a real world corporate espionage case in which she was personally involved.  The last paper is slightly unusual for JIW in that it covers ground that is not directly within the scope of the journal. However, the reviewers were quite enthusiastic about this opinion piece, and as it was thought it would interest the readership, it was included.

Volume 5, Issue 1 Editorial

Stylized Image of the Word Editorial

May 2006

Volume 5 starts with a special series on the network security topic of digital security. There are three special papers on this topic. Valli examines the ability of malicious attackers to control machines remotely, Bhuyan examines how honeypots can be use to identify botnets, whilst Yek examines the use of fingerprinting by honeypots.

Volume 2, Issue 3 Editorial

Stylized Image of the Word Editorial


This issue is slightly different than normal. The papers have been selected from those submitted to the Third World Information Security Education Conference held at the Naval Postgraduate School, Monterey, California in late June, 2003. The papers were chosen by the conference organizers – Cynthia Irvine (Naval Postgraduate School, Monterey, California) and Helen Armstrong (Curtin University, Western Australia), and were re-written for the journal. The theme for this edition of JIW is Information Security Education.

Volume 5, Issue 2 Editorial

Stylized Image of the Word Editorial

August 2006

Welcome to the fourteenth issue of JIW. It starts with Ryan’s paper on the use of information sharing as a weapon, and then leads to three technical papers. Clarke and Furnell discuss authentications for mobile devices, whilst Kamel et al examine the use of profiling in psychological operations; lastly Lim et al consider the tracking of criminal and terrorist activity using visualisation tools. Finally, Williams and Mahncke examine the important topic of security in medical records systems.

Volume 2, Issue 2 Editorial

Stylized Image of the Word Editorial


In many modern business environments, even the short-term, temporary interruption of Internet / e-mail connectivity can have a significantly disruptive effect, forcing people to revert to other forms of communication that are now viewed as less convenient. Imagine, then, the effect if the denial of service was over the longer term and also affected the IT infrastructure in general.

Volume 2, Issue 1 Editorial

Stylized Image of the Word Editorial


Welcome to the second volume of JIW. The journal was launched a year ago in September 2001 and has gone from strength to strength. The quality of the papers presented for review has generally been excellent. This issue not only reflects this high standard but also the variety of topics covered by the Information Warfare area. They range from the technologically oriented to those more concerned with social aspects.

Volume 5, Issue 3 Editorial

Stylized Image of the Word Editorial

November 2006

The last issue for 2006 includes a paper on propaganda, two on deception and another on the state of Belgian intelligence agencies. Taylor starts by outlining and critiquing the West’s propaganda effort after illustrating its past. A renowned expert in this area, it would be interesting to see some comments about his assertions from readers. In the first paper on deception Yuill, Denning, and Feer posit a model for deceptive hiding. The second paper on this topic is by Brumley, Kopp, and Korb who examine the orientation stage of the OODA loop and its relationship to deception and self-deception. Vanhorenbeeck closes this issue with an evaluation of Belgian and European intelligence services.

Volume 6, Issue 1 Editorial

Stylized Image of the Word Editorial

MARCH 2007

Welcome to the first issue in the sixth year of JIW. As in previous issues, there are a variety of issues examined. The first paper by Hutchinson, Huhtinen and Rantapelkonen explores the idea that the perspective taken of a particular problem or conflict fundamentally effects the tactics and strategies used in it, and so the consequent outputs. Gray and Martin explain the consequences of actions in terms of an interesting concept ‘backfires’ and their relationships to types of propaganda.

Volume 6, Issue 2 Editorial

Stylized Image of the Word Editorial


Welcome to the second issue in the sixth volume of JIW. The papers show the depth and variety if the Information Operations discipline. The first paper by Shorer-Zeltser and Ben-Israel examines the web presence of three Diasporas, whilst Webb examines the equally modern phenomenon of Information Operations by terrorist groups. Edge et al. then examine the concept of ‘protection trees’ on the risk analysis of a system. The next paper by Kuusisto et al. looks at the implications of information flow priorities for inter-organizational crisis management. Al Mannai and Lewis propose a new definition of network risk, and this issue concludes with Maule and Gallup illustrating a simulation of the US Department of Defense supporting civilian authorities in time of crisis.

Volume 6, Issue 3 Editorial

Stylized Image of the Word Editorial


Welcome to the last issue of 2007. Next year will be the seventh year of publication for JIW so any suggestions to improve the service to the readers will be gratefully received. We are always looking for quality papers so if you feel you want to contribute please send your work in. Most papers are of an academic nature and follow the rigorous process of peer review and need to stick to accepted practice. However, we also welcome papers with opinions on relevant topics from knowledgeable persons – these do not require such rigorous analysis by peers.

Volume 7, Issue 1 Editorial

Stylized Image of the Word Editorial

APRIL 2008

Welcome to the first edition of JIW for 2008. This year, as Bill Hutchinson is on leave, I have taken on the editorship and I wish to thank Bill for his continuing guidance and valuable advice.

Volume 7, Issue 2 Editorial

Stylized Image of the Word Editorial


William Sousan and his colleagues from the KEWI Research Group at the University of Nebraska investigate open source intelligence using a tailored information delivery service system, whilst Andy Luse, Anthony Townsend and Kevin Scheibe from Iowa State University present a new method for secure message transmission. In addition, we have three papers from authors who presented at the 7th European Conference on Information Warfare in Plymouth, UK, in June of this year. The first of these papers by Andrea Cullen and Ian Mann presents an interesting industry/academic perspective on balancing a layered approached in security to counteract social engineering. Linda Finch and Richard Vaughan from General Dynamics UK Limited then propose an engineering ‘fit for purpose’ security system which seeks to create flexibility in adapting to changing resource and information sharing requirements in the military. Lastly, Chris Flaherty argues that information deception is a core component of three dimensional tactics, which seeks to develop spherical security protection, particularly in the context of terrorist attacks.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.










Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
  • 757.871.3949
  • jiw@gbpts.com