Volume 6, Issue 3

Volume 6, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2007

Welcome to the last issue of 2007. Next year will be the seventh year of publication for JIW so any suggestions to improve the service to the readers will be gratefully received. We are always looking for quality papers so if you feel you want to contribute please send your work in. Most papers are of an academic nature and follow the rigorous process of peer review and need to stick to accepted practice. However, we also welcome papers with opinions on relevant topics from knowledgeable persons – these do not require such rigorous analysis by peers.

The Role of Dynamic Security Policy in Military Scenarios

ABSTRACT

The military is moving towards Network Enabled Capability (NEC) where the emphasis is on resource sharing within national contingents and on a coalition basis, facilitated by the Network.  Future capability is predicated on the core attribute of agility.  NEC is expected to enable the dynamic formation of communities of interest and the rapid reorganisation of resources as required by military commanders.  Through the application of a suitable security policy framework to a small-scale case study, this paper tests the assertion that the ability to express, verify and implement flexible security policy is essential to achieve the agility required.

War Crimes from Cyber-Weapons

ABSTRACT

As information warfare capabilities have grown in recent years, the possibilities of war crimes with cyber-attacks have increased.  The main ethical problems of cyber-weapons in regard to ruses, secrecy, and collateral damage are examined, and analogies drawn to biological weapons.  It argues that most cyber-attacks are instances of perfidy, and spread so easily that they can approach biological weapons in their uncontrollability.  Then mitigation techniques for cyber-weapons in the form of more precise targeting, reversibility, and self-attribution are considered.  The paper concludes with a survey of some methods for prosecution and punishment of cyber-war crimes including forensics, interventions, cyber-blockades, and reparations, and proposes a new kind of pacifism called 'cyber-pacifism'.

The Importance of Human Factors when Assessing Outsourcing Security Risks

ABSTRACT

The word is becoming increasingly interconnected and ways of doing business are evolving rapidly. Communications technology is ubiquitous and reliable and businesses are continuously seeking ways in which systems can be exploited to improve resilience, become more efficient and reduce costs. One way in which organisations seek to achieve this is by concentrating their efforts on core business processes and outsourcing non-core functions. However, outsourcing - and particularly off-shoring - presents many security issues that must be considered throughout the lifetime of contracts. The scale of outsourcing and increasing technological and security complexity is making this task more difficult. Often neglected, or given low priority, are factors relating to the people who will be working on the contract. These factors will be driven by regional and cultural differences and will manifest themselves in differing security threat and risk profiles and risk management frameworks must be designed to recognise and cater for these variations.

Islamist Militants on the Internet

ABSTRACT

The problem of online radicalisation is at the nexus of two key trends: the democratisation of communications driven by user generated content on the Internet; and the democratisation of strategic violence driven by mass-casualty non-state terrorism. How can governments capitalise on the first trend to counter the second?

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com