Volume 6, Issue 2 Editorial
AUGUST 2007
Welcome to the second issue in the sixth volume of JIW. The papers show the depth and variety if the Information Operations discipline. The first paper by Shorer-Zeltser and Ben-Israel examines the web presence of three Diasporas, whilst Webb examines the equally modern phenomenon of Information Operations by terrorist groups. Edge et al. then examine the concept of ‘protection trees’ on the risk analysis of a system. The next paper by Kuusisto et al. looks at the implications of information flow priorities for inter-organizational crisis management. Al Mannai and Lewis propose a new definition of network risk, and this issue concludes with Maule and Gallup illustrating a simulation of the US Department of Defense supporting civilian authorities in time of crisis.
Please keep the papers coming. Each issue adds to the knowledge base of the area.
Bill Hutchinson
Email: w.hutchinson@ecu.edu.au
AUTHORS
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive