Volume 6, Issue 1 Editorial
MARCH 2007
Welcome to the first issue in the sixth year of JIW. As in previous issues, there are a variety of issues examined. The first paper by Hutchinson, Huhtinen and Rantapelkonen explores the idea that the perspective taken of a particular problem or conflict fundamentally effects the tactics and strategies used in it, and so the consequent outputs. Gray and Martin explain the consequences of actions in terms of an interesting concept ‘backfires’ and their relationships to types of propaganda.
The next two papers are more technology oriented. Karakasiliotis, Furnell, and Papadaki examine the contemporary problem of phishing and how we can distinguish between genuine and deceptive messages. Voipio and Addams-Moring examine methods of filtering out unsolicited messages.
The final paper by Pye and Warren explores the use of systems’ methods and their use in critical infrastructure modelling.
I hope you enjoy and are enlightened by the contents of this issue.
Bill Hutchinson
Email: w.hutchinson@ecu.edu.au
AUTHORS
Security Research Institute Edith Cowan University
Perth, Australia.
Professor Bill Hutchinson was Foundation IBM Chair in Information Security at Edith Cowan University in Western Australia. He was Director of SECAU (Security Research Centre) and was coordinator of the Information Operations and Security programmes. From 2000 to 2010, he was the Chief Editor and founder of the Journal of Information Warfare.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive