Integrating Information Security and Intelligence Courses

  • William Hutchinson
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 125)


As the Western nations move further into the Information Age, the strategic nature and value of information becomes more apparent. The conventional approach to (corporate) information management, security, and its associated systems has conventionally been narrow, protective and a reactive. However, this paper argues that information security is a part of the information management (rather than the security) function. The contemporary concept of Information Warfare has developed the concept of information as a ‘target’ and that of a’ weapon’. This means an aggressive and dynamic organisational change in the use of information and associated systems. This requires a change in mindset. An integrated information strategy requires an integrated perspective on security (a protective paradigm) and intelligence (an aggressive paradigm). This paper argues that courses for information professionals of the future should integrate these worldviews in their education. A post-graduate course being implemented at an Australian university will be offered as an example.

Key words

Information warfare information security training intelligence training information superiority education. 


  1. Alberts, D.S. and Garstka, J. (2000) Information Superiority and Network Centric Warfare, talk given at InfoWarCon2000, Washington, September, 2000.Google Scholar
  2. Alberts, D.S., Garstka, J.J., Stein, F.P. (1999) Network Centric Warfare,CCRP, Washington.Google Scholar
  3. Arquilla, J., Ronfeldt, D. (1996) The Advent of Netwar,RAND, Santa Monica.Google Scholar
  4. Beer, S. (1984) The Viable System Model: its provenance, development, methodology and pathology. In, Espejo R, Harnden R.(eds.), The Viable System Model, John Wiley & Sons, Chichester. pp. 211–270.Google Scholar
  5. Beer, S. (1985) Diagnosing the System for Organisations. Wiley, Chichester.Google Scholar
  6. Boisot, M.H. (1998) Knowledge Assets. Oxford University Press, Oxford.Google Scholar
  7. Campen, A.D. (ed) (1992) The First Information War, AFCEA International Press, Fairfax.Google Scholar
  8. Denning, D.E. (1999) Information Warfare and Security, Addison Wesley, Reading: Mass.Google Scholar
  9. Hutchinson, W.E., Warren, M.J. (2001a) Information Warfare: Corporate Attack and Defencein the Digital Age, Butterworth-Heineman, Oxford.Google Scholar
  10. Hutchinson, W., Warren, M. (2001b) Principles of Information Warfare, Journal of Information Warfare, 1, 1: 1–6.Google Scholar
  11. Ignatieff, M. (2000) Virtual war, Chatto and Windus, London.Google Scholar
  12. Jones, A., Kovacich, G. L., Luzwick, P.G. (2002) Global InfonnationWarfare,Auerbach, Washington Google Scholar
  13. Knecht, R.J. (1996) Thoughts About Information Warfare, in: Campen, A.D., Dearth, D.H., Thomas Godden, R (eds) Cyberwar: Security, Strategy, and Conflict in the Information Age, AFCEA International Press, Fairfax.Google Scholar
  14. Owens, B (2000) Lifting the Fog of War, FSG, New York.Google Scholar
  15. Schwartau, W. (1996). Infoimation Warfare— second edition, Thunder’s Mouth Press, New York.Google Scholar
  16. Waltz, E. (1998) Information Warfare — Principles and Operations, Artech House, Norwood.Google Scholar

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • William Hutchinson
    • 1
  1. 1.School of Computer and Information ScienceEdith Cowan UniversityMount LawleyAustralia

Personalised recommendations