Editorial

Volume 8, Issue 2 Editorial

Stylized Image of the Word Editorial

AUGUST 2009

Welcome to the 23rd edition of the Journal of Information Warfare. As usual there are a variety of topics covered in the papers. In the first paper, Ramluckan and Niekerk explore the relationship between the media and terrorism. This is followed by Flaherty, who compares the difference between two and three dimensional tactics and their relevance to counter-terrorism. Then Ma investigates the use of Extended Evolutionary Games Theory and research into strategic information warfare. This issue closes with Sloggett and Sloggett giving their opinion on the changes in the narrative surrounding the ‘Global War on Terrorism’.

Volume 8, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2009

Welcome to the 24th issue of JIW and the last that I will be Editor in Charge. I will be retiring at the end of the year so wish you all well and thank you for all your contributions over the last eight years. The organisation of the journal will be changed somewhat with Professors Matthew Warren and Craig Valli, and Dr. Leigh Armistead sharing the editorial load which should make better management of the content.

Volume 10, Issue 2 Editorial

Stylized Image of the Word Editorial

OCTOBER 2011

Welcome to the second issue of JIW for 2011 and the 29th issue overall. The Journal of Information Warfare is committed to an involvement in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to Information Warfare.

Volume 11, Issue 2 Editorial

Stylized Image of the Word Editorial

JULY 2012

In this 32nd issue of JIW, some of the papers have been expanded from the International Conference on Information Warfare 2012 whilst some of the others have their derivation from the ICT Uses in Warfare and The Safeguarding of Peace Workshop held in South Africa.

Volume 10, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2011

Welcome to the third issue of JIW for 2011 and the 30th issue overall. The Journal of Information Warfare is committed to an involvement in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to security and risk within the broad frame of Information Warfare.

Volume 11, Issue 1 Editorial

Stylized Image of the Word Editorial

JUNE 2012

Welcome to the 31st Issue of the Journal of Information Warfare (JIW). The Journal is committed to engaging in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to security and risk within the broad frame of Information Warfare.
This issue has four papers. The paper by Matthew Warren and Shona Leitch looks at Web 2.0 and its potential use by terrorist organizations. It considers a variety of real-life case studies that indicate that although less sophisticated than other organizations, terrorist movements in Ireland demonstrate a strategic approach to social media.

Volume 11, Issue 3 Editorial

Stylized Image of the Word Editorial

NOVEMBER 2012

In this final issue for 2012, we again welcome our colleagues from South Africa who have contributed five papers that illustrate the variety of topics covered by Information Warfare. The first paper by Maasdorp and Du Plessis proposes a model to illustrate the relationship between Electronic Warfare, Information Warfare, Cyber Operations, Net-Centric Warfare, and Information Operations.

Volume 12, Issue 2 Editorial

Stylized Image of the Word Editorial

JULY 2013

The Journal of Information Warfare (JIW) is turning a new page.  We are moving forward with a new staff that retains the best of the past, present, and future of our field.  My name is Leigh Armistead and I am the new chief editor for JIW, having received my PhD in IW from Edith Cowan University and published three books, which focus on cyber warfare.

Volume 12, Issue 1 Editorial

Stylized Image of the Word Editorial

APRIL 2013

In this first issue for 2013, there are a variety of papers sourced from the best conference papers of the International Conference of Information Warfare and the European conference of Information Warfare. These papers were selected by the session chairs at each conference and the authors asked to amend them for publication in the JIW. Of course, the traditional source of papers was also used so the mix of papers in this issue provides more material than normal.

Volume 12, Issue 3 Editorial

Stylized Image of the Word Editorial

OCTOBER 2013

The staff of the Journal of Information Warfare (JIW) is very excited about this edition. The majority of these papers came from the 12th annual European Conference of Cyber Warfare and Security (ECCWS) held in July 2013 at the University of Jyvaskyla in Finland. This was an exciting event with a tremendous turnout of IW professionals meeting in a great setting.

Volume 13, Issue 3 Editorial

Stylized Image of the Word Editorial

AUGUST 2014

June was a tough month for the Information Warfare world.

I am sad to announce that we lost Dr. Dan Kuehl to an aggressive form of cancer. An innovative and early advocate of IW, he was a long-term professor at the National Defense University in Washington, DC, who developed and taught strategic-level Information Operations (IO) classes starting in the late 1990s. In this role, he taught thousands of senior-level officers and officials on the greater role that information can play in military and civil operations and missions. In the process, he coined the acronym DIME for Defense, Information, Military, and Economic when discussing the elements of power, and his moniker was “To Inform is to Influence”. A true believer in the future of IO in the DoD, Dan was always a leader in this realm. His death is a true loss to our community.

Volume 13, Issue 1 Editorial

Stylized Image of the Word Editorial

FEBRUARY 2014

I would like to wish all of our readers a Happy New Year. This is my fourth issue as the new Chief Editor of the Journal of Information Warfare, which gives me a chance to look back over the last 12 months to reflect on what we have done … and more importantly to think about where we want to go in the future. So far, we have published editions with eight great papers in each quarter, all of which were selected from a large number of very good articles. We continue to utilize a double-blind, peer-reviewed methodology to ensure academic rigor in the process; plus we have aligned ourselves very closely with the following IW annual events:

Volume 13, Issue 2 Editorial

Stylized Image of the Word Editorial

APRIL 2014

To all readers, we are very excited about this issue. This is a special edition of the Journal of Information Warfare (JIW) and the first of its kind where we have collaborated with the Information Assurance Directorate (IAD) of the National Security Agency (NSA). In this publication, we bring you 10 articles from current and highly technical subject matter experts from NSA, all of which focus on cyber-security efforts that attempt to realize their theme of Confidence in Cyberspace. We hope you enjoy this special issue, and it is our desire to continue this new effort as an annual tradition.

Volume 13, Issue 4 Editorial

Stylized Image of the Word Editorial

October 2014

These papers were selected from a number of outstanding presentations at the 13th European Conference on Cyber Warfare and Security (ECCWS ’14) conducted in Athens, Greece at the University of Piraeus. These eight articles represent a wide breadth and depth of international participation from a number of countries and show a broad spectrum of expertise across a holistic view of Cyber Warfare.

Volume 14, Issue 1 Editorial

Stylized Image of the Word Editorial

APRIL 2015

The year 1995 was considered the start of the Revolution of Military of Affairs (RMA) in the United States and in the last two decades, much has changed with respect to Command and Control Warfare (C2W), Information Warfare (IW), Information Operations (IO), and now Cyber Warfare.  Unfortunately there are still significant issues that are unresolved including how perception management or strategic communication is (or is not) conducted by Western Governments in this current era.  A quick look at the major foreign policy issues involving ISIS and the conflict in the Ukraine over the last few months reveals that the great promise indicated in RMA in ’95 is still unrealized, with significant deficiencies in the ability of the US Government to conduct IO on a real time basis.

Volume 14, Issue 2 Editorial

Stylized Image of the Word Editorial

APRIL 2015

In April 2014, Peregrine collaborated on a special edition of the Journal of Information Warfare (JIW), with every article being written by a serving member of the National Security Agency (NSA) staff. Our staff worked closely with the Information Assurance Directorate (IAD) personnel during a six month period to bring together an exciting issue. Here is a quote from Neal Ziring, the Technical Director for the National Security Agency’s Information Assurance Directorate (IAD) on that effort – “The April 2014 issue of JIW was the first time that NSA IAD worked with an academic journal to create a special issue. It was a great learning experience for some of our internal experts, and also helped raise awareness of some of our important mission challenges among academic researchers in this field.”

Volume 14, Issue 3 Editorial

Stylized Image of the Word Editorial

JULY 2015

From an IO and Cyber Warfare aspect, it is a very interesting period. For many, attribution has always been a stumbling block with cyberattacks, but two recent events in widely divergent arenas have opened up the ability to know the identity of the individual, group, organization, or nation that probably conducted the incident. With both the hacks on Sony Pictures and the Office of Personal Management, the National Security Agency has come forward and, using its capabilities, acknowledged to the world, that North Korea and China, respectively, were responsible for these attacks. We are also seeing widespread use of perception management by ISIS, once again around the globe, through the use of social media to incite and recruit potential warriors to their cause. In all of these cases, the use of IW as a tool to conduct action from abroad has been very successful.

04 Nov

Test 14.3 Editorial

July 2015

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com