Abstract
As the Western nations move further into the Information Age, the strategic nature and value of information becomes more apparent. The conventional approach to (corporate) information management, security, and its associated systems has conventionally been narrow, protective and a reactive. However, this paper argues that information security is a part of the information management (rather than the security) function. The contemporary concept of Information Warfare has developed the concept of information as a ‘target’ and that of a’ weapon’. This means an aggressive and dynamic organisational change in the use of information and associated systems. This requires a change in mindset. An integrated information strategy requires an integrated perspective on security (a protective paradigm) and intelligence (an aggressive paradigm). This paper argues that courses for information professionals of the future should integrate these worldviews in their education. A post-graduate course being implemented at an Australian university will be offered as an example.
Chapter PDF
Similar content being viewed by others
Key words
References
Alberts, D.S. and Garstka, J. (2000) Information Superiority and Network Centric Warfare, talk given at InfoWarCon2000, Washington, September, 2000.
Alberts, D.S., Garstka, J.J., Stein, F.P. (1999) Network Centric Warfare,CCRP, Washington.
Arquilla, J., Ronfeldt, D. (1996) The Advent of Netwar,RAND, Santa Monica.
Beer, S. (1984) The Viable System Model: its provenance, development, methodology and pathology. In, Espejo R, Harnden R.(eds.), The Viable System Model, John Wiley & Sons, Chichester. pp. 211–270.
Beer, S. (1985) Diagnosing the System for Organisations. Wiley, Chichester.
Boisot, M.H. (1998) Knowledge Assets. Oxford University Press, Oxford.
Campen, A.D. (ed) (1992) The First Information War, AFCEA International Press, Fairfax.
Denning, D.E. (1999) Information Warfare and Security, Addison Wesley, Reading: Mass.
Hutchinson, W.E., Warren, M.J. (2001a) Information Warfare: Corporate Attack and Defencein the Digital Age, Butterworth-Heineman, Oxford.
Hutchinson, W., Warren, M. (2001b) Principles of Information Warfare, Journal of Information Warfare, 1, 1: 1–6.
Ignatieff, M. (2000) Virtual war, Chatto and Windus, London.
Jones, A., Kovacich, G. L., Luzwick, P.G. (2002) Global InfonnationWarfare,Auerbach, Washington
Knecht, R.J. (1996) Thoughts About Information Warfare, in: Campen, A.D., Dearth, D.H., Thomas Godden, R (eds) Cyberwar: Security, Strategy, and Conflict in the Information Age, AFCEA International Press, Fairfax.
Owens, B (2000) Lifting the Fog of War, FSG, New York.
Schwartau, W. (1996). Infoimation Warfare— second edition, Thunder’s Mouth Press, New York.
Waltz, E. (1998) Information Warfare — Principles and Operations, Artech House, Norwood.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer Science+Business Media New York
About this paper
Cite this paper
Hutchinson, W. (2003). Integrating Information Security and Intelligence Courses. In: Irvine, C., Armstrong, H. (eds) Security Education and Critical Infrastructures. WISE 2003. IFIP Advances in Information and Communication Technology, vol 125. Springer, New York, NY. https://doi.org/10.1007/978-0-387-35694-5_7
Download citation
DOI: https://doi.org/10.1007/978-0-387-35694-5_7
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4757-6491-8
Online ISBN: 978-0-387-35694-5
eBook Packages: Springer Book Archive