Using a layered model to place EW in context within the information sphere

In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a n...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of information warfare 2012-09, Vol.11 (3), p.1-6
Hauptverfasser: Maasdorp, F.D.V., Du Plessis, W.P.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue 3
container_start_page 1
container_title Journal of information warfare
container_volume 11
creator Maasdorp, F.D.V.
Du Plessis, W.P.
description In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.
format Article
fullrecord <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_journals_1966852235</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>26486874</jstor_id><sourcerecordid>26486874</sourcerecordid><originalsourceid>FETCH-LOGICAL-j505-4a86e7c8e03da4e85efe1131b0bc28a07393f767055857b7c165474c524e4c373</originalsourceid><addsrcrecordid>eNo9TclKw0AYHkTBUvsIwoDnwCz_LD1KqRsFLxWPYTL5YxLSTJyZon17A5WevoVvuSILDqAKKcFcXzgXt2SVUs8Y40Ywy8SCvH2kbvyijg7uhBFregg1DjQHOg3OI91-0m6kPowZfzP96XI7y9zi7DYhHlzuwkjT1M7dO3LTuCHh6h-XZP-03W9eit378-vmcVf0iqkCnNVovEUmawdoFTbIueQVq7ywjhm5lo3RhilllamM51qBAa8EIHhp5JI8nGenGL6PmHLZh2Mc58eSr7W2Sgip5tT9OdWnHGI5xe7g4qkUGqy2BuQfnIBSZg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1966852235</pqid></control><display><type>article</type><title>Using a layered model to place EW in context within the information sphere</title><source>Jstor Complete Legacy</source><creator>Maasdorp, F.D.V. ; Du Plessis, W.P.</creator><creatorcontrib>Maasdorp, F.D.V. ; Du Plessis, W.P.</creatorcontrib><description>In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.</description><identifier>ISSN: 1445-3312</identifier><identifier>EISSN: 1445-3347</identifier><language>eng</language><publisher>Yorktown: School of Computer and Security Science, Edith Cowan University, Western Australia</publisher><subject>21st century ; Command and control ; Communications networks ; Councils ; Defense ; Electronic warfare ; Information warfare ; Physics ; Wireless networks</subject><ispartof>Journal of information warfare, 2012-09, Vol.11 (3), p.1-6</ispartof><rights>Copyright 2012</rights><rights>Copyright Peregrine Technical Solutions 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/26486874$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/26486874$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>314,778,782,801,58006,58239</link.rule.ids></links><search><creatorcontrib>Maasdorp, F.D.V.</creatorcontrib><creatorcontrib>Du Plessis, W.P.</creatorcontrib><title>Using a layered model to place EW in context within the information sphere</title><title>Journal of information warfare</title><description>In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.</description><subject>21st century</subject><subject>Command and control</subject><subject>Communications networks</subject><subject>Councils</subject><subject>Defense</subject><subject>Electronic warfare</subject><subject>Information warfare</subject><subject>Physics</subject><subject>Wireless networks</subject><issn>1445-3312</issn><issn>1445-3347</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNo9TclKw0AYHkTBUvsIwoDnwCz_LD1KqRsFLxWPYTL5YxLSTJyZon17A5WevoVvuSILDqAKKcFcXzgXt2SVUs8Y40Ywy8SCvH2kbvyijg7uhBFregg1DjQHOg3OI91-0m6kPowZfzP96XI7y9zi7DYhHlzuwkjT1M7dO3LTuCHh6h-XZP-03W9eit378-vmcVf0iqkCnNVovEUmawdoFTbIueQVq7ywjhm5lo3RhilllamM51qBAa8EIHhp5JI8nGenGL6PmHLZh2Mc58eSr7W2Sgip5tT9OdWnHGI5xe7g4qkUGqy2BuQfnIBSZg</recordid><startdate>20120901</startdate><enddate>20120901</enddate><creator>Maasdorp, F.D.V.</creator><creator>Du Plessis, W.P.</creator><general>School of Computer and Security Science, Edith Cowan University, Western Australia</general><general>Peregrine Technical Solutions</general><scope>3V.</scope><scope>7XB</scope><scope>88F</scope><scope>8BJ</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FQK</scope><scope>HCIFZ</scope><scope>JBE</scope><scope>M1Q</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20120901</creationdate><title>Using a layered model to place EW in context within the information sphere</title><author>Maasdorp, F.D.V. ; Du Plessis, W.P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j505-4a86e7c8e03da4e85efe1131b0bc28a07393f767055857b7c165474c524e4c373</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>21st century</topic><topic>Command and control</topic><topic>Communications networks</topic><topic>Councils</topic><topic>Defense</topic><topic>Electronic warfare</topic><topic>Information warfare</topic><topic>Physics</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Maasdorp, F.D.V.</creatorcontrib><creatorcontrib>Du Plessis, W.P.</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>International Bibliography of the Social Sciences</collection><collection>SciTech Premium Collection</collection><collection>International Bibliography of the Social Sciences</collection><collection>Military Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Journal of information warfare</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Maasdorp, F.D.V.</au><au>Du Plessis, W.P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Using a layered model to place EW in context within the information sphere</atitle><jtitle>Journal of information warfare</jtitle><date>2012-09-01</date><risdate>2012</risdate><volume>11</volume><issue>3</issue><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1445-3312</issn><eissn>1445-3347</eissn><abstract>In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.</abstract><cop>Yorktown</cop><pub>School of Computer and Security Science, Edith Cowan University, Western Australia</pub><tpages>6</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1445-3312
ispartof Journal of information warfare, 2012-09, Vol.11 (3), p.1-6
issn 1445-3312
1445-3347
language eng
recordid cdi_proquest_journals_1966852235
source Jstor Complete Legacy
subjects 21st century
Command and control
Communications networks
Councils
Defense
Electronic warfare
Information warfare
Physics
Wireless networks
title Using a layered model to place EW in context within the information sphere
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T09%3A25%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Using%20a%20layered%20model%20to%20place%20EW%20in%20context%20within%20the%20information%20sphere&rft.jtitle=Journal%20of%20information%20warfare&rft.au=Maasdorp,%20F.D.V.&rft.date=2012-09-01&rft.volume=11&rft.issue=3&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1445-3312&rft.eissn=1445-3347&rft_id=info:doi/&rft_dat=%3Cjstor_proqu%3E26486874%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1966852235&rft_id=info:pmid/&rft_jstor_id=26486874&rfr_iscdi=true