Volume 5, Issue 2 Editorial
August 2006
Welcome to the fourteenth issue of JIW. It starts with Ryan’s paper on the use of information sharing as a weapon, and then leads to three technical papers. Clarke and Furnell discuss authentications for mobile devices, whilst Kamel et al examine the use of profiling in psychological operations; lastly Lim et al consider the tracking of criminal and terrorist activity using visualisation tools. Finally, Williams and Mahncke examine the important topic of security in medical records systems.
Remember that quality papers are always sought for the journal so submit that when you can.
Bill Hutchinson
Email: w.hutchinson@ecu.edu.au
AUTHORS
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive