Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Introduction to Information Warfare
Unit Code
CSI2104
Year
2015
Enrolment Period
1
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit will investigate the use of information/knowledge as a weapon and a target in competitive environments. On completion of this unit, the student should have firm grasp of the concept information warfare and its implications to the management of an organisation. Threats and opportunities from competitors or aggressors will be considered. The strategic, tactical, and operational implications of information warfare will be explored.
Equivalent Rule
Unit was previously coded CSI4110
Learning Outcomes
On completion of this unit students should be able to:
- Apply strategies of using information as a weapon and a target.
- Apply the principles of offensive and defensive information warfare for a given context.
- Demonstrate appropriate techniques to gather intelligence from a variety of sources to support a position / objective.
- Discuss the social, legal and ethical implications of information warfare.
- Evaluate contemporary information warfare concepts for their application in a corporate environment.
- Explain the theory of data, information and knowledge as they pertain to information warfare.
Unit Content
- Attack strategies.
- Contemporary issues in Information Warfare, eg Individual Information Warfare, Critical Infrastructure Protection.
- Corporate espionage.
- Cyberterrorism.
- Information Assurance.
- National, criminal, and military information warfare.
- Social, legal, cultural and ethical aspects of information warfare including Terrorism Acts.
- Swarming as an attack strategy.
- The concept of information as a target.
- The nature of information, data, and knowledge.
- The use of information as a weapon.
Additional Learning Experience Information
The unit content will be presented in both on-line and classroom mode. All lectures are available as written and audio materials. Learning will be facilitated by the use of: case studies, problem solving activities, simulations, and critical analysis activities.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Assignment | Assessment based on demonstrating an understanding of set readings | 25% |
Research Paper | A short academic paper | 25% |
Examination ^ | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Assignment | Assessment based on demonstrating an understanding of set readings | 25% |
Research Paper | A short academic paper | 25% |
Examination ^ | End of semester examination | 50% |
^ Mandatory to Pass
Text References
- ^ Carr, J. (2010). Inside Cyber Warfare. Sebastopol CA, USA: O'Reilly Media.
- Alberts, D.S., Garstka, J.J., & Stein, F.P. (2001). Understanding information age warfare. Vienna, VA: CCRP Publications.
- Rattray, G.J. (2001). Strategic warfare in cyberspace. Cambridge, MA: MIT Press.
- Munro, I. (2005). Information warfare in business: strategies of control and resistance in the network society. London: Routledge.
- Kramer, F.D., Starr, S.H & Wentz, L.K. (Eds.) (2009). Cyberpower and national security. Virginia: Potomac Books.
- Jones, A., Kovacich, G.L., Luzwick, P.G. (2002). Global information warfare. New York: Auerbach Publications.
- Armistead, L. (Ed.) (2007). Information warfare: separating hype from reality. Washington DC: Potomac Books.
- Arquilla, J., & Ronfeldt, D. (Eds.). (2001). Networks and netwars. Santa Monica: RAND.
- Clarke, R.A. & Knake, R.K. (2010). Cyber war. New York: Harper Collins.
- Kott, A. (Ed.) (2007). Information warfare and organizational decision-making. Artech House: Boston, M.A.
Journal References
- Information Society
- Ethics and Information Technology
- Computer Security
- Journal of Information Warfare
- Journal of the Australian Institute of Professional Intelligence Officers
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI2104|1|1
Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Introduction to Information Warfare
Unit Code
CSI2104
Year
2015
Enrolment Period
2
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit will investigate the use of information/knowledge as a weapon and a target in competitive environments. On completion of this unit, the student should have firm grasp of the concept information warfare and its implications to the management of an organisation. Threats and opportunities from competitors or aggressors will be considered. The strategic, tactical, and operational implications of information warfare will be explored.
Equivalent Rule
Unit was previously coded CSI4110
Learning Outcomes
On completion of this unit students should be able to:
- Apply strategies of using information as a weapon and a target.
- Apply the principles of offensive and defensive information warfare for a given context.
- Demonstrate appropriate techniques to gather intelligence from a variety of sources to support a position / objective.
- Discuss the social, legal and ethical implications of information warfare.
- Evaluate contemporary information warfare concepts for their application in a corporate environment.
- Explain the theory of data, information and knowledge as they pertain to information warfare.
Unit Content
- Attack strategies.
- Contemporary issues in Information Warfare, eg Individual Information Warfare, Critical Infrastructure Protection.
- Corporate espionage.
- Cyberterrorism.
- Information Assurance.
- National, criminal, and military information warfare.
- Social, legal, cultural and ethical aspects of information warfare including Terrorism Acts.
- Swarming as an attack strategy.
- The concept of information as a target.
- The nature of information, data, and knowledge.
- The use of information as a weapon.
Additional Learning Experience Information
The unit content will be presented in both on-line and classroom mode. All lectures are available as written and audio materials. Learning will be facilitated by the use of: case studies, problem solving activities, simulations, and critical analysis activities.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Assignment | Assessment based on demonstrating an understanding of set readings | 25% |
Research Paper | A short academic paper | 25% |
Examination ^ | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Assignment | Assessment based on demonstrating an understanding of set readings | 25% |
Research Paper | A short academic paper | 25% |
Examination ^ | End of semester examination | 50% |
^ Mandatory to Pass
Text References
- ^ Carr, J. (2010). Inside Cyber Warfare. Sebastopol CA, USA: O'Reilly Media.
- Alberts, D.S., Garstka, J.J., & Stein, F.P. (2001). Understanding information age warfare. Vienna, VA: CCRP Publications.
- Armistead, L. (Ed.) (2007). Information warfare: separating hype from reality. Washington DC: Potomac Books.
- Arquilla, J., & Ronfeldt, D. (Eds.). (2001). Networks and netwars. Santa Monica: RAND.
- Clarke, R.A. & Knake, R.K. (2010). Cyber war. New York: Harper Collins.
- Kott, A. (Ed.) (2007). Information warfare and organizational decision-making. Artech House: Boston, M.A.
- Jones, A., Kovacich, G.L., Luzwick, P.G. (2002). Global information warfare. New York: Auerbach Publications.
- Kramer, F.D., Starr, S.H & Wentz, L.K. (Eds.) (2009). Cyberpower and national security. Virginia: Potomac Books.
- Rattray, G.J. (2001). Strategic warfare in cyberspace. Cambridge, MA: MIT Press.
- Munro, I. (2005). Information warfare in business: strategies of control and resistance in the network society. London: Routledge.
Journal References
- Journal of Information Warfare
- Computer Security
- Information Society
- Ethics and Information Technology
- Journal of the Australian Institute of Professional Intelligence Officers
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
CSI2104|1|2