Professional Documents
Culture Documents
Previewpdf
Previewpdf
Bill Hutchinson
Mat Warren
~~ ~~o~~!~n~~:up
LONDO N AND NEW YORK
First published by Butterworth-Heinemann
Butterworth-Heinemann/Computer Weekly
Professional Series vii
About the authors x
Preface xi
Acknowledgements xiii
How to use this book xiv
Introduction xvii
Publisher
Mike Cash, Butterworth-Heinemann
Series Editor
Dan Remenyi, MCIL (Management Centre International
Limited)
series:
Dr Dan Remenyi, Series Editor
(Remenyi@compuserve.com)
Forthcoming
Delivering business value from IT
Reinventing the IT department
Delivering IT strategies
e-Business strategies for virtual organizations
How to become a successful IT consultant
How to manage the IT help desk (second edition)
The project manager’s toolkit
Network security
E-business
Implementing ERP
IT management
About the authors
The idea for this book came out of a need to find a text for
a unit in Information Warfare given to Doctor of Business
Administration students. Most of the existing texts had a
military flavour and so did not suit our task. Others con-
centrated on security aspects and assumed some level of
knowledge in this area. What we wanted was a text that
illustrated the uses and abuses of information and its
power in the civilian world. Hence, this text was born.
The book itself assumes that readers can apply the prin-
ciples to their own situation. Examples are given but it is
underlying ideas that need to be absorbed. The organisa-
tional world is experiencing tremendous change at present.
Corporations need to fully understand the importance of
their data and the embedded knowledge of their staff to
survive. Information warfare theory exposes these needs
and points the way to effective organisational change.
Bill Hutchinson
Acknowledgements
Bill Hutchinson
w.hutchinson@ecu.edu.au
Mat Warren
mwarren@deakin.edu.au
Introduction
1.1 Fundamentals
The fundamental weapon and target in I-War is informa-
tion. It is the commodity which has to be manipulated to
the advantage of those trying to influence events. The
means of achieving this are manifold. Protagonists can
attempt to directly alter data or to deprive competitors of
access to it. The technology of information collection,
storage, and dissemination can be compromised. Using
other, subtler techniques, the way the data is interpreted
can be changed by altering the context in which it is
viewed.
However, the first thing to be established is the nature of
information itself.
‘thing’ ‘agent’
INFORMATION
Figure 1.1: Boisot’s model of data, information, and knowledge
Deny
Manipulate Change Change
Disrupt/
perceptions context
Destroy
Steal
DEGRADED INFORMATION
Information
Key: and action
Transporters =
Figure 1.3: Components of an information system
10 1 Concepts in information warfare
Each one of the elements, and the means by which they can
be attacked, are briefly explained below.
Sensors
Event/object
Processors
Containers
Recorders
Context
Human receiver/activator