首页期刊导航|Journal of Information Warfare
期刊信息/Journal information
Journal of Information Warfare
Teamlink Australia Pty Ltd
Journal of Information Warfare

Teamlink Australia Pty Ltd

1445-3312

Journal of Information Warfare/Journal Journal of Information Warfare
正式出版
收录年代

    Defining Influence across Online Social Media Platforms

    TW MaherB TurnbullT Lynar
    20页
    查看更多>>摘要:The ubiquitous nature of social media has seen it become a conduit for the propagation of misinformation to a global audience. The unfettered nature of social media has served to dele-gitimize the online environment. This has been compounded through the use of social media by malicious actors for the conduct of influence operations at scale. Therefore, there is a need for a greater understanding of social media platforms within the context of Information Warfare. This paper has two main purposes: first to provide an overview of the current state of social media as a platform for coordinated disinformation campaigns; and also to introduce a new taxonomy, Social Media Platforms for Information Warfare (SMP-IW), outlines social network attributes and components for the identification of influence vectors within existing, emerging, and bespoke social media platforms. This taxonomy is a novel approach to the classification of social media platforms for the conduct of information warfare, and can serve as a baseline for future research operations in this area.

    Do Hostile Information Operations Really Have the Intended Effects? A Literature Review

    C Wallenius
    15页
    查看更多>>摘要:The purpose of this paper is to review the scientific basis for claiming any effect of foreign information operations. The literature on information operations is reviewed, as well as other kinds of persuasive communication (advertising, risk and health communication) that aims to change attitudes or behaviour. Most research indicates that persuasive communication in general has little effect on receiver attitudes and/or behaviour. Some hypothetical strategies that may increase the effect are formulated, such as hiding the sender's intent, sending messages not too distant from the receiver's present views, or using the emotional, rather than the rational, route.

    AI as a Tool of Hybrid Warfare: Challenges and Responses

    H Sheikh
    14页
    查看更多>>摘要:"Artificial Intelligence is the new revolution, the one who leads in AI - will be the ruler of the world. " - Vladimir Putin The evolution of emerging technologies has entered a revolutionary phase. Artificial intelligence is the key factor behind this revolution. Managing complex network algorithms and machine learning are applications of AI. The use of these applications to run different affairs has provided a giant leap towards modernity and progress. However, along with its use for social progress, there is also a negative aspect attached to Artificial Intelligence (AI). While AI could enable several military innovations, it is not a military innovation itself. AI has a serious impact on future warfare, especially hybrid warfare. All the five features of hybrid warfare (synergy, ambiguity, asymmetry, innovative disruption, and the battle over psychology) will receive a strategic modality with the use of AI for a Multi Capability Development Campaign(MCDC). This research will explore the potential use of AI as a tool of hybrid warfare. Practicing AI in asymmetric warfare can be lethal, as it could lead to complete disruption, a hijack upon every domain of life. It has the power to cripple the economy, institutions, and overall social system of the target state. It is necessary to provide an immediate response to this imminent threat in the form of international laws and organizations, which could regulate the covert misuse of AI.

    The Prohibition of Cyberterrorism as a Method of Warfare in International Law: The Need for a New IHL Treaty

    B MwaleS Casey-Maslen
    14页
    查看更多>>摘要:There is no doubt that cyber operations can play a significant role in the conduct of warfare. This article focuses on a specific aspect of cyber operations that is growing in significance: cyberterrorism as a method of warfare. It begins by exploring the definitional issues surrounding cyberterrorism. It then examines the extent to which international humanitarian law (IHL), which was primarily designed to govern kinetic means and methods of warfare, applies to cyberterrorism, and concludes that there is a need for new treaty law to explicitly prohibit such acts and to hold the perpetrators responsible.

    Extending the 'Attribution Problem': Why Who-Based Attribution Is Insufficient to Deterring Cyberattacks

    JN Sakellariadis
    13页
    查看更多>>摘要:Current scholarship explains the shortcomings of cyber deterrence through the difficulty involved in proving who launched an attack-what scholars refer to as the 'attribution problem'. This paper identifies an additional intelligence-centric impediment to cyber deterrence. Cyberat-tacks yield effects in a manner that is indirect, while offensive cyber operations are multi-stage and multipurpose. These characteristics complicate analytic judgments about the culpability of the attacker, whereas deterrence requires that states retaliate with measures which are timely, clear, and proportionate. The paper uses three cases studies - the 2016 Russian election interference campaign, WannaCry, and NotPetya-to illustrate how the indirectness and ambiguity of cyberattacks and offensive cyber operations obscure the motivations, goals, and culpability of the attacker. It concludes that these characteristics discourage states from adopting punishment-based deterrence strategies because they lengthen the temporal and epistemological requirements of attribution analysis.

    Applying Fog Analysis Tool to AFSIM Multi-Domain CLASS Scenarios

    D TryhornR DillD HodsonM Grimaila...
    18页
    查看更多>>摘要:Military leaders must consider uncertainty in decision making to accomplish mission objectives. Wargames and military simulations model real-world scenarios to understand potential outcomes for alternative courses of action to support decision making. This research applies the Fog Analysis Tool (FAT) (Tryhorn et al. 2021) to Cyber Land Air Sea Space (CLASS) scenarios for the Advanced Framework for Simulation, Integration, and Modeling (AFSIM). The CLASS scenario structure supports fog analysis in multi-domain operations within AFSIM scenarios. The CLASS result trends support the hypothesis that increasing fog effect levels disrupts the decisionmaking and tasking processes for all warfighting domains. A crossover event occurs from success to failure for each fog effect as the level increases for all CLASS scenarios. Therefore, FAT should be used for incorporating fog in multi-domain wargame scenarios to aid commanders in course of action analysis and planners in modifying scenario difficulty.

    PSYOP, CYBER, and Internet Influence: Firing Digital Bullets

    CL Cook
    10页
    查看更多>>摘要:With the ubiquitous nature of the Internet, social media, and their continued exponential growth across society, it is necessary to comprehensively understand these platforms to engage threat networks at home and abroad. Undergirding all web-based actions, however, is human behaviour. Therefore, understanding human behaviour and the dynamic range of characteristics, actions, and attributes that are influenced by culture and context, for web-based offensive and defensive actions, is an ever-evolving niche skill. As such, non-kinetic activities and change efforts, especially in the cyber domain, require cross-cultural competence and experience in addition to any cyber capability.

    False Information as a Threat to Modern Society: A Systematic Review of False Information, Its Impact on Society, and Current Remedies

    M AhmedSD BachmannC MartinT Walker...
    16页
    查看更多>>摘要:False information and by extension misinformation, disinformation and fake news are an ever-growing concern to modern democratic societies, which value the freedom of information alongside the right of the individual to express his or her opinions freely. This paper focuses on misinformation, with the aim to provide a collation of current research on the topic and a discussion of future research directions. It argues that a major current issue is the lack of reliable verified datasets and, by extension, the algorithmic learning models based on them. Through the understanding of different variations of false information, it has been possible to see the impact this absence is currently having on society. At the core is a focus on misinformation. A deeper investigation shows that artificial intelligence-based techniques are widely used to counter the effects and confusion caused by misinformation. Potential consequences of misinformation are being highlighted to allow insight into potential issues that may arise from this form of false information to highlight the severity of the issue and to demonstrate the growing need for reliable detection and prevention systems.