Volume 15, Issue 3

Volume 15, Issue 3 Editorial

Stylized Image of the Word Editorial

Summer 2016

Cyber Security is certainly the hot topic of 2016 and this latest version of JIW reflects that emphasis. We have a wide spectrum of papers in this edition, with a diverse group of authors from around the world who have contributed to this edition. I think that you will find it very interesting and thought provoking.

Using Values-Based Cultural Data to Shape Information Operations Strategies

Abstract:

People are important: they design, use, and defend information systems, and are the targets of ‘softer’ information operations. People can be understood from many different perspectives, including national culture characteristics, personality traits, and cultural history. An intriguing research question to explore is how values, beliefs, and cultures affect the design, strategy, and implementation of information operations.

Hofstede’s Cultural Markers in Successful Victim Cyber Exploitations

Abstract:

Hofstede, Hofstede, and Minkov (2010) observed that culture acts as “software of the mind”. These authors have written that culture influences behaviour and motivation for behaviour. This phenomenon may also be connected to underlying behaviours that inadvertently lead to successful exploitation. The current study was undertaken in order to determine if a statistical relationship exists between culture and successfully exploited government and military websites housed in victim countries.

How Secure is Our Information Infrastructure?

Abstract:

Managers of critical information infrastructures need better tools for managing risk than the qualitative or compliance-based metrics commonly used today in critical infrastructure protection. This paper provides a performance-based metric that can be used to obtain a quantitative measure of the security of information infrastructures. 

Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications

Abstract:

Attacks are usually orchestrated based upon the motivation of the attackers, who are becoming increasingly savvy, better resourced, and more committed. This article examines cyber threats and vulnerabilities through the eyes of the perpetrator. To begin, the authors discuss some counter approaches that have produced limited benefits at best, and then introduce a novel approach that details the use of mobile device resource usage to discern unauthentic mobile applications from authentic applications.

Dynamic Cyber Defence Framework

Abstract:

There are flaws in the current approaches in cyber defence as they are generally static in nature and fortress-based. They are thus not flexible in dealing with variations of attacks or with zero-day attacks. To address this issue, researchers have looked into dynamic cyber defence. However, the available approaches are either only about strategies or only about tactics. 

Development of a Cyber-Threat Intelligence-Sharing Model from Big Data Sources

Abstract:

As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and respond to cyberattacks that are increasing in severity, complexity, and frequency. In fact, cybercriminals are developing and sharing advanced techniques for their cyber espionage, reconnaissance missions, and ultimately devastating attacks. In order to reduce cybersecurity risks and strengthen cyber resilience, strategic cybersecurity information-sharing is a necessity. This article discusses one way of handling large volumes of unstructured data that have been generated by multiple sources across different sectors into a cyber-threat intelligence-sharing model.

Cross-Border Law Enforcement: Gathering of Stored Electronic Evidence

Abstract:

The investigation of cybercrime committed across national borders can only be effectively addressed if law enforcement authorities may gather electronic evidence with specific reference to cross-border stored evidence. The legal question arises as to whether a country’s law enforcement agency has extra-territorial remote and unilateral powers to access evidence stored in the cloud in another country or whether law enforcement authorities must use preestablished formal channels of cooperation, such as Mutual Legal Assistance Treaties (MLATs).

Leveraging Virtualization Technologies to Improve SCADA ICS Security

Abstract: 

In recent years, Supervisory Control and Data Acquisition (SCADA) Industrial Control Systems (ICS)—systems used for controlling industrial processes, power plants, or assembly lines—have become a serious concern because of security and manageability issues.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com