Using a layered model to place EW in context within the information sphere
In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a n...
Gespeichert in:
Veröffentlicht in: | Journal of information warfare 2012-09, Vol.11 (3), p.1-6 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6 |
---|---|
container_issue | 3 |
container_start_page | 1 |
container_title | Journal of information warfare |
container_volume | 11 |
creator | Maasdorp, F.D.V. Du Plessis, W.P. |
description | In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer. |
format | Article |
fullrecord | <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_journals_1966852235</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>26486874</jstor_id><sourcerecordid>26486874</sourcerecordid><originalsourceid>FETCH-LOGICAL-j505-4a86e7c8e03da4e85efe1131b0bc28a07393f767055857b7c165474c524e4c373</originalsourceid><addsrcrecordid>eNo9TclKw0AYHkTBUvsIwoDnwCz_LD1KqRsFLxWPYTL5YxLSTJyZon17A5WevoVvuSILDqAKKcFcXzgXt2SVUs8Y40Ywy8SCvH2kbvyijg7uhBFregg1DjQHOg3OI91-0m6kPowZfzP96XI7y9zi7DYhHlzuwkjT1M7dO3LTuCHh6h-XZP-03W9eit378-vmcVf0iqkCnNVovEUmawdoFTbIueQVq7ywjhm5lo3RhilllamM51qBAa8EIHhp5JI8nGenGL6PmHLZh2Mc58eSr7W2Sgip5tT9OdWnHGI5xe7g4qkUGqy2BuQfnIBSZg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1966852235</pqid></control><display><type>article</type><title>Using a layered model to place EW in context within the information sphere</title><source>Jstor Complete Legacy</source><creator>Maasdorp, F.D.V. ; Du Plessis, W.P.</creator><creatorcontrib>Maasdorp, F.D.V. ; Du Plessis, W.P.</creatorcontrib><description>In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.</description><identifier>ISSN: 1445-3312</identifier><identifier>EISSN: 1445-3347</identifier><language>eng</language><publisher>Yorktown: School of Computer and Security Science, Edith Cowan University, Western Australia</publisher><subject>21st century ; Command and control ; Communications networks ; Councils ; Defense ; Electronic warfare ; Information warfare ; Physics ; Wireless networks</subject><ispartof>Journal of information warfare, 2012-09, Vol.11 (3), p.1-6</ispartof><rights>Copyright 2012</rights><rights>Copyright Peregrine Technical Solutions 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/26486874$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/26486874$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>314,778,782,801,58006,58239</link.rule.ids></links><search><creatorcontrib>Maasdorp, F.D.V.</creatorcontrib><creatorcontrib>Du Plessis, W.P.</creatorcontrib><title>Using a layered model to place EW in context within the information sphere</title><title>Journal of information warfare</title><description>In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.</description><subject>21st century</subject><subject>Command and control</subject><subject>Communications networks</subject><subject>Councils</subject><subject>Defense</subject><subject>Electronic warfare</subject><subject>Information warfare</subject><subject>Physics</subject><subject>Wireless networks</subject><issn>1445-3312</issn><issn>1445-3347</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNo9TclKw0AYHkTBUvsIwoDnwCz_LD1KqRsFLxWPYTL5YxLSTJyZon17A5WevoVvuSILDqAKKcFcXzgXt2SVUs8Y40Ywy8SCvH2kbvyijg7uhBFregg1DjQHOg3OI91-0m6kPowZfzP96XI7y9zi7DYhHlzuwkjT1M7dO3LTuCHh6h-XZP-03W9eit378-vmcVf0iqkCnNVovEUmawdoFTbIueQVq7ywjhm5lo3RhilllamM51qBAa8EIHhp5JI8nGenGL6PmHLZh2Mc58eSr7W2Sgip5tT9OdWnHGI5xe7g4qkUGqy2BuQfnIBSZg</recordid><startdate>20120901</startdate><enddate>20120901</enddate><creator>Maasdorp, F.D.V.</creator><creator>Du Plessis, W.P.</creator><general>School of Computer and Security Science, Edith Cowan University, Western Australia</general><general>Peregrine Technical Solutions</general><scope>3V.</scope><scope>7XB</scope><scope>88F</scope><scope>8BJ</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FQK</scope><scope>HCIFZ</scope><scope>JBE</scope><scope>M1Q</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20120901</creationdate><title>Using a layered model to place EW in context within the information sphere</title><author>Maasdorp, F.D.V. ; Du Plessis, W.P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j505-4a86e7c8e03da4e85efe1131b0bc28a07393f767055857b7c165474c524e4c373</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>21st century</topic><topic>Command and control</topic><topic>Communications networks</topic><topic>Councils</topic><topic>Defense</topic><topic>Electronic warfare</topic><topic>Information warfare</topic><topic>Physics</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Maasdorp, F.D.V.</creatorcontrib><creatorcontrib>Du Plessis, W.P.</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>International Bibliography of the Social Sciences</collection><collection>SciTech Premium Collection</collection><collection>International Bibliography of the Social Sciences</collection><collection>Military Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Journal of information warfare</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Maasdorp, F.D.V.</au><au>Du Plessis, W.P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Using a layered model to place EW in context within the information sphere</atitle><jtitle>Journal of information warfare</jtitle><date>2012-09-01</date><risdate>2012</risdate><volume>11</volume><issue>3</issue><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1445-3312</issn><eissn>1445-3347</eissn><abstract>In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.</abstract><cop>Yorktown</cop><pub>School of Computer and Security Science, Edith Cowan University, Western Australia</pub><tpages>6</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1445-3312 |
ispartof | Journal of information warfare, 2012-09, Vol.11 (3), p.1-6 |
issn | 1445-3312 1445-3347 |
language | eng |
recordid | cdi_proquest_journals_1966852235 |
source | Jstor Complete Legacy |
subjects | 21st century Command and control Communications networks Councils Defense Electronic warfare Information warfare Physics Wireless networks |
title | Using a layered model to place EW in context within the information sphere |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T09%3A25%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Using%20a%20layered%20model%20to%20place%20EW%20in%20context%20within%20the%20information%20sphere&rft.jtitle=Journal%20of%20information%20warfare&rft.au=Maasdorp,%20F.D.V.&rft.date=2012-09-01&rft.volume=11&rft.issue=3&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1445-3312&rft.eissn=1445-3347&rft_id=info:doi/&rft_dat=%3Cjstor_proqu%3E26486874%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1966852235&rft_id=info:pmid/&rft_jstor_id=26486874&rfr_iscdi=true |