Home > Open Access Journals > JSS > Vol. 5 > No. 1 (2012)
Author Biography
Dr. Andrew M. Colarik is an independent consultant, author, researcher, and inventor of information security technologies. He has published multiple security books and publications in the areas of cyber terrorism, information warfare, and cyber security. He has made presentations before a host of groups and organizations; has appeared on syndicated TV and radio shows such as Fox News, The 700 Club, and Coast to Coast; and is a Fox News contributing cyber security and terrorism expert. Dr. Colarik's research interests involve technology's impact on social, political, legal, and economic structures in society; the design and implementation of secure communication systems; and the evolving applications and consequences of the global information infrastructure on businesses, governments, and individuals. For more information on Dr. Colarik, visit his website at: http://www.AndrewColarik.com. Dr. Lech Janczewski has over thirty-five years' experience in information technology. He was managing director of the largest IBM installation in Poland, and project manager of the first computing center in Nigeria. He is an associate professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes data security management with a special emphasis on cyber terrorism. Dr. Janczewski has written about 300 articles presented in scientific journals, conference proceedings, and books. He is chairperson of the New Zealand Information Security Forum, secretary of the IFIP TC-11 committee (Security and Privacy Protection in Information Processing Systems) and Fellow of the New Zealand Computer Society. For more information on Dr. Janczewski, visit his website at: http://staff.business.auckland.ac.nz/5283.aspx. References
DOI
http://dx.doi.org/10.5038/1944-0472.5.1.3
Abstract
Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national) cyber warfare doctrine (CWD). An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.
Recommended Citation
Colarik, Andrew M. Ph.D. and Janczewski, Lech D.Eng. "Establishing Cyber Warfare Doctrine." Journal of Strategic Security 5, no. 1 (2012)
: 31-48.
DOI:
http://dx.doi.org/10.5038/1944-0472.5.1.3
Available at: https://digitalcommons.usf.edu/jss/vol5/iss1/7