Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Considerations On Deception Techniques Used In Political And Product Marketing, Carlo Kopp
Considerations On Deception Techniques Used In Political And Product Marketing, Carlo Kopp
Australian Information Warfare and Security Conference
This paper explores three deception techniques which are widely used in political and product marketing. These techniques are ‘deception by omission’, ‘deception by saturation’ and the use of ‘deception by spin’. These techniques are newly analysed in the framework of the four canonical strategies of Information Warfare and Shannon’s capacity and entropy theorems, and their respective strengths and weaknesses established. Specific strategies for the defeat of these deception techniques are discussed.
Information Terrorism In The New Security Environment, Ken Webb
Information Terrorism In The New Security Environment, Ken Webb
Australian Information Warfare and Security Conference
Over the years there have been many interpretations of what constitutes Information Terrorism. This paper examines the correlation/relationship between Information Warfare and Terrorism, and describes what is considered to be Information Terrorism now. It achieves this by outlining the threat’s impact, advantage and capability. It then examines the positives that can be derived from such and, based on the literature available on the subject, provides a deduced interpretation of what Information Terrorism is. The paper concludes with remarks supporting the assertion that Information Terrorism is a major dynamic and asymmetric threat contributing to a new national security environment.
An Information Operation Model And Classification Scheme, D T. Shaw, S Cikara
An Information Operation Model And Classification Scheme, D T. Shaw, S Cikara
Australian Information Warfare and Security Conference
Information systems are used in overt and covert conflict and information operations target an opponent’s ability to manage information in support of operations for political, commercial and military advantage. System level attacks are complicated by logistic problems that require resources, command and control. Node level attacks are practical but of limited value. Collocated equipment comprises a temporary node that may be feasibly attacked. Estimation of IW operation merits may founder on the difficulty of predicting the net benefit for the costs. Starting from with Shannon’s model, a simple costbenefit model is discussed. Existing models are extended by an IW attack …