Volume 23, Issue 4

Social Murder in Another Century: Technologies That Enable Misinformation to Instigate Assault

Abstract:

Social media is currently understood as a potential path to extremist beliefs, which sometimes lead to violent action. Current enabling technologies of Internet infrastructure, personalized advertisement targeting, and AI generated text and images allow for the previously expensive process of instigating extremism to be done via online services for exponentially less time and resources than previously possible. The historical context that ‘approves’ murder is explored with foci on modern engagements. This includes modern calls to violence. The specificity of the call to violence is explored. A hypothethical case study is presented as an example for a potential call to violence.

A Cyber Risk Management Perspective on Shipbuilding AI-Based Supply Chain Management

Abstract:

Artificial Intelligence (AI) has become a key driver of productivity gains across various industrial sectors, including naval shipbuilding and repair. By integrating AI into supply chain operations, these industries can achieve greater efficiency, cost savings, and resilience. AI’s ability to optimize processes and enhance decision making offers significant advantages. However, with the growing use of AI, the risks of cybersecurity incidents also increase. As the use of AI-based systems becomes more prevalent, the potential for cybersecurity vulnerabilities and incidents also grows. These incidents could have severe repercussions, potentially compromising the integrity of supply chains, disrupting manufacturing operations, and exposing sensitive data. This paper explores the role of AI in supply chain management within the naval shipbuilding and repair industry, focusing on both the benefits and the emerging cybersecurity risk management and other challenges associated with AI adoption. It provides insights into balancing innovation with the need for strong cyber defenses in this vital sector.

Developing a Framework to Evaluate the Cyber-protection of the Information Sharing across Different Types of Supply Chain Governance

Abstract:

The rising reliance on digital technologies to share information across different actors in the supply chain and the evolving integration of systems across organizations to achieve end-to-end visibility has increased the supply chain’s exposure to cyber threats. This paper focuses on developing a framework for cyber protection of inter-organizational information sharing in the supply chain, focusing on governance mechanisms adopted by the leading actors. The governance models and the information-sharing type shape the cyber protection required in terms of cybersecurity investments, training, and organizational structures. This paper extends the concepts of the Port Community System (PCS) towards a more comprehensive complex supply chain structure.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com