Editorial

Volume 2, Issue 2 Editorial

Stylized Image of the Word Editorial

FEBRUARY 2003

In many modern business environments, even the short-term, temporary interruption of Internet / e-mail connectivity can have a significantly disruptive effect, forcing people to revert to other forms of communication that are now viewed as less convenient. Imagine, then, the effect if the denial of service was over the longer term and also affected the IT infrastructure in general.

Volume 2, Issue 1 Editorial

Stylized Image of the Word Editorial

OCTOBER 2002

Welcome to the second volume of JIW. The journal was launched a year ago in September 2001 and has gone from strength to strength. The quality of the papers presented for review has generally been excellent. This issue not only reflects this high standard but also the variety of topics covered by the Information Warfare area. They range from the technologically oriented to those more concerned with social aspects.

Volume 5, Issue 3 Editorial

Stylized Image of the Word Editorial

November 2006

The last issue for 2006 includes a paper on propaganda, two on deception and another on the state of Belgian intelligence agencies. Taylor starts by outlining and critiquing the West’s propaganda effort after illustrating its past. A renowned expert in this area, it would be interesting to see some comments about his assertions from readers. In the first paper on deception Yuill, Denning, and Feer posit a model for deceptive hiding. The second paper on this topic is by Brumley, Kopp, and Korb who examine the orientation stage of the OODA loop and its relationship to deception and self-deception. Vanhorenbeeck closes this issue with an evaluation of Belgian and European intelligence services.

Volume 6, Issue 1 Editorial

Stylized Image of the Word Editorial

MARCH 2007

Welcome to the first issue in the sixth year of JIW. As in previous issues, there are a variety of issues examined. The first paper by Hutchinson, Huhtinen and Rantapelkonen explores the idea that the perspective taken of a particular problem or conflict fundamentally effects the tactics and strategies used in it, and so the consequent outputs. Gray and Martin explain the consequences of actions in terms of an interesting concept ‘backfires’ and their relationships to types of propaganda.

Volume 6, Issue 2 Editorial

Stylized Image of the Word Editorial

AUGUST 2007

Welcome to the second issue in the sixth volume of JIW. The papers show the depth and variety if the Information Operations discipline. The first paper by Shorer-Zeltser and Ben-Israel examines the web presence of three Diasporas, whilst Webb examines the equally modern phenomenon of Information Operations by terrorist groups. Edge et al. then examine the concept of ‘protection trees’ on the risk analysis of a system. The next paper by Kuusisto et al. looks at the implications of information flow priorities for inter-organizational crisis management. Al Mannai and Lewis propose a new definition of network risk, and this issue concludes with Maule and Gallup illustrating a simulation of the US Department of Defense supporting civilian authorities in time of crisis.

Volume 6, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2007

Welcome to the last issue of 2007. Next year will be the seventh year of publication for JIW so any suggestions to improve the service to the readers will be gratefully received. We are always looking for quality papers so if you feel you want to contribute please send your work in. Most papers are of an academic nature and follow the rigorous process of peer review and need to stick to accepted practice. However, we also welcome papers with opinions on relevant topics from knowledgeable persons – these do not require such rigorous analysis by peers.

Volume 7, Issue 1 Editorial

Stylized Image of the Word Editorial

APRIL 2008

Welcome to the first edition of JIW for 2008. This year, as Bill Hutchinson is on leave, I have taken on the editorship and I wish to thank Bill for his continuing guidance and valuable advice.

Volume 7, Issue 2 Editorial

Stylized Image of the Word Editorial

SEPTEMBER 2008

William Sousan and his colleagues from the KEWI Research Group at the University of Nebraska investigate open source intelligence using a tailored information delivery service system, whilst Andy Luse, Anthony Townsend and Kevin Scheibe from Iowa State University present a new method for secure message transmission. In addition, we have three papers from authors who presented at the 7th European Conference on Information Warfare in Plymouth, UK, in June of this year. The first of these papers by Andrea Cullen and Ian Mann presents an interesting industry/academic perspective on balancing a layered approached in security to counteract social engineering. Linda Finch and Richard Vaughan from General Dynamics UK Limited then propose an engineering ‘fit for purpose’ security system which seeks to create flexibility in adapting to changing resource and information sharing requirements in the military. Lastly, Chris Flaherty argues that information deception is a core component of three dimensional tactics, which seeks to develop spherical security protection, particularly in the context of terrorist attacks.

Volume 1, Issue 2 Editorial

Stylized Image of the Word Editorial

DECEMBER 2001

Welcome to the second issue of JIW. The journal was launched at InfoWarCon in Washington early in September, despite some problems with the delivery of the hard copies.

This issue contains eleven papers. Four of them (Armstrong; Furnell; Fawcett and Sowerbutts; Busuttil and Warren) were selected from those presented at the 2nd Australian Information Warfare and Security conference in Perth, Western Australia (November, 2001). We are also privileged to have three eminent information warfare experts (Schwartau; Dearth; Tyrell) offer position papers. Another excellent paper from Noel et al examines anomaly detection, Chirathamjaree and Gururajan look at threat to wireless systems. Broucek and Turner delve into the expanding area of Forensic Computing whilst Davey and Armstrong give us an approach to teaching cyber warfare. I hope you find this a diverse and interesting issue.

Volume 1, Issue 1 Editorial

Stylized Image of the Word Editorial

SEPTEMBER 2001

It is with great pleasure that we present the first issue of the Journal of Information Warfare (JIW). It is an international journal created to share quality information to researchers and practitioners in the field. We hope that you will contribute as well as read this publication. The journal will cover the broad spectrum of issues associated with Information Warfare such as military, government, commerce, and education. Over the last decade, as the Information Society has evolved, the discipline has grown from purely being the concern of those in defence, to the whole of society. JIW will address this phenomenon, and intends to become the first point of call for contemporary commentary for Information Warfare. The editors of JIW intend to maintain a level of excellence in the papers presented. Each paper is blind-refereed by two people experienced in the field. Some contributions will be academic in nature, some statements of opinion, some experiential from practitioners. All are welcome. Standards will be kept high, but it is recognised that each type of paper has different means of assessing its value and significance. Also, we welcome letters to the editor. Please send them to my e-mail address below, as well as any suggestions for improvement to JIW.

Volume 1, Issue 3 Editorial

Stylized Image of the Word Editorial

WINTER 2002

Chief Editor Bill Hutchinson asked us some months ago to lead the effort to produce a special issue of this Journal dedicated to the overarching topic of Perception Management. As members of the Journal’s Advisory Board, we were happy to do so, despite the fact that major new projects rarely arise at the most opportune times. In addition to our own contributions, we have assembled an international team of exceptional theorists and practitioners from the United Kingdom, the United States, Australia, and Sweden.

Volume 7, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2008

This final edition of JIW for 2008 covers vulnerability in IPSec tunnels, malware analysis, wireless deployment in the defence forces, and a discussion of the lessons that could be learnt from modern military conflict.

Volume 8, Issue 1 Editorial

Stylized Image of the Word Editorial

APRIL 2009

Welcome to the first issue of JIW for 2009. Firstly, Yin looks at the use of the Internet in the 2000-2008 Intifada. This is followed by Baines who examines the use of fear in information operations campaigns and compares this with research on marketing communications. Next Sentse and Jansen examine the use of fusion cells in counter-insurgency. Finally, Veerasamy proposes a high level framework for contextualising cyber-terrorism.

Volume 8, Issue 2 Editorial

Stylized Image of the Word Editorial

AUGUST 2009

Welcome to the 23rd edition of the Journal of Information Warfare. As usual there are a variety of topics covered in the papers. In the first paper, Ramluckan and Niekerk explore the relationship between the media and terrorism. This is followed by Flaherty, who compares the difference between two and three dimensional tactics and their relevance to counter-terrorism. Then Ma investigates the use of Extended Evolutionary Games Theory and research into strategic information warfare. This issue closes with Sloggett and Sloggett giving their opinion on the changes in the narrative surrounding the ‘Global War on Terrorism’.

Volume 8, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2009

Welcome to the 24th issue of JIW and the last that I will be Editor in Charge. I will be retiring at the end of the year so wish you all well and thank you for all your contributions over the last eight years. The organisation of the journal will be changed somewhat with Professors Matthew Warren and Craig Valli, and Dr. Leigh Armistead sharing the editorial load which should make better management of the content.

Volume 10, Issue 2 Editorial

Stylized Image of the Word Editorial

OCTOBER 2011

Welcome to the second issue of JIW for 2011 and the 29th issue overall. The Journal of Information Warfare is committed to an involvement in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to Information Warfare.

Volume 11, Issue 2 Editorial

Stylized Image of the Word Editorial

JULY 2012

In this 32nd issue of JIW, some of the papers have been expanded from the International Conference on Information Warfare 2012 whilst some of the others have their derivation from the ICT Uses in Warfare and The Safeguarding of Peace Workshop held in South Africa.

Volume 10, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2011

Welcome to the third issue of JIW for 2011 and the 30th issue overall. The Journal of Information Warfare is committed to an involvement in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to security and risk within the broad frame of Information Warfare.

Volume 11, Issue 1 Editorial

Stylized Image of the Word Editorial

JUNE 2012

Welcome to the 31st Issue of the Journal of Information Warfare (JIW). The Journal is committed to engaging in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to security and risk within the broad frame of Information Warfare.
This issue has four papers. The paper by Matthew Warren and Shona Leitch looks at Web 2.0 and its potential use by terrorist organizations. It considers a variety of real-life case studies that indicate that although less sophisticated than other organizations, terrorist movements in Ireland demonstrate a strategic approach to social media.

Volume 11, Issue 3 Editorial

Stylized Image of the Word Editorial

NOVEMBER 2012

In this final issue for 2012, we again welcome our colleagues from South Africa who have contributed five papers that illustrate the variety of topics covered by Information Warfare. The first paper by Maasdorp and Du Plessis proposes a model to illustrate the relationship between Electronic Warfare, Information Warfare, Cyber Operations, Net-Centric Warfare, and Information Operations.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Principal Office

  • Journal of Information Warfare
  • ArmisteadTEC
  • 525 Landfall Arch,
  • Virginia Beach, VA 23462

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com