Volume 6, Issue 2 Editorial

Stylized Image of the Word Editorial

AUGUST 2007

Welcome to the second issue in the sixth volume of JIW. The papers show the depth and variety if the Information Operations discipline. The first paper by Shorer-Zeltser and Ben-Israel examines the web presence of three Diasporas, whilst Webb examines the equally modern phenomenon of Information Operations by terrorist groups. Edge et al. then examine the concept of ‘protection trees’ on the risk analysis of a system. The next paper by Kuusisto et al. looks at the implications of information flow priorities for inter-organizational crisis management. Al Mannai and Lewis propose a new definition of network risk, and this issue concludes with Maule and Gallup illustrating a simulation of the US Department of Defense supporting civilian authorities in time of crisis.

Please keep the papers coming. Each issue adds to the knowledge base of the area.

Bill Hutchinson
Email: w.hutchinson@ecu.edu.au


AUTHORS

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com