Volume 9, Issue 2

Volume 9, Issue 2 Editorial

Stylized Image of the Word Editorial

September, 2010

Welcome to the second issue of JIW for 2010 and the 26th issue overall. The Journal of Information Warfare continues to engage in the ever widening discipline of information warfare / operations. In particular, this issue examines disparities in the field of influence across both soft and hard power, and within critical and non-critical structures. The issue has 5 papers. The paper by Huhtinen, Armistead and Schou looks at the integration of information warfare training with traditional military training. It considers the shift from  command and control-based leadership to new forms of information-based contributions.

Educating and Training Soldiers for Information Operations

Abstract

Military Training and Education is evolving because of the growing influence of Information Operations (IO) and Information Warfare (IW).  This influence has grown from the tremendous changes in both technology and social issues. Traditional military training has dealt with key elements such as operational concepts of war, doctrine and law; leadership; combat skills; weapons skills; and operating effectively under stress.

Network Operations and Warfare: Employing Effective Paradigms across Different Environments

Abstract

Network Centric approaches feature strongly in the tactics of modern warfare. While the military have refined these paradigms into effective, applicable models, there is a scarcity of resources to assist enterprises employing these models in the commercial sphere. In the battle for information superiority, many competitive enterprises are struggling to adapt military models to achieve information superiority in a competitive business context.

State, Military and Information Warfare Nexus: A Conceptual Perspective from South Asia

Abstract

This paper questions the efficacy of the notion of information warfare (IW) due to implicit militaristic nuances which critically impact on its application as a policy instrument for optimum effects in dynamic sociopolitical spheres.

From ABAC to ZBAC: The Evolution of Access Control Models

Abstract

Several attempts at using the Services Oriented Architecture (SOA) have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the authentication of the requester, have been found to be inflexible, do not scale well, and are difficult to use and upgrade.

Pearl Harbor 2.0: When Cyber-Acts Lead to the Battlefield

Abstract

America is under constant attack in cyberspace. Which of these attacks equate to a Pearl Harbor or the terrorists' acts on September 11?

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com