Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Introduction to Information Warfare
  • Unit Code

    CSI2104
  • Year

    2015
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit will investigate the use of information/knowledge as a weapon and a target in competitive environments. On completion of this unit, the student should have firm grasp of the concept information warfare and its implications to the management of an organisation. Threats and opportunities from competitors or aggressors will be considered. The strategic, tactical, and operational implications of information warfare will be explored.

Equivalent Rule

Unit was previously coded CSI4110

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply strategies of using information as a weapon and a target.
  2. Apply the principles of offensive and defensive information warfare for a given context.
  3. Demonstrate appropriate techniques to gather intelligence from a variety of sources to support a position / objective.
  4. Discuss the social, legal and ethical implications of information warfare.
  5. Evaluate contemporary information warfare concepts for their application in a corporate environment.
  6. Explain the theory of data, information and knowledge as they pertain to information warfare.

Unit Content

  1. Attack strategies.
  2. Contemporary issues in Information Warfare, eg Individual Information Warfare, Critical Infrastructure Protection.
  3. Corporate espionage.
  4. Cyberterrorism.
  5. Information Assurance.
  6. National, criminal, and military information warfare.
  7. Social, legal, cultural and ethical aspects of information warfare including Terrorism Acts.
  8. Swarming as an attack strategy.
  9. The concept of information as a target.
  10. The nature of information, data, and knowledge.
  11. The use of information as a weapon.

Additional Learning Experience Information

The unit content will be presented in both on-line and classroom mode. All lectures are available as written and audio materials. Learning will be facilitated by the use of: case studies, problem solving activities, simulations, and critical analysis activities.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentAssessment based on demonstrating an understanding of set readings25%
Research PaperA short academic paper25%
Examination ^End of semester examination50%
ONLINE
TypeDescriptionValue
AssignmentAssessment based on demonstrating an understanding of set readings25%
Research PaperA short academic paper25%
Examination ^End of semester examination50%

^ Mandatory to Pass

Text References

  • ^ Carr, J. (2010). Inside Cyber Warfare. Sebastopol CA, USA: O'Reilly Media.
  • Alberts, D.S., Garstka, J.J., & Stein, F.P. (2001). Understanding information age warfare. Vienna, VA: CCRP Publications.
  • Rattray, G.J. (2001). Strategic warfare in cyberspace. Cambridge, MA: MIT Press.
  • Munro, I. (2005). Information warfare in business: strategies of control and resistance in the network society. London: Routledge.
  • Kramer, F.D., Starr, S.H & Wentz, L.K. (Eds.) (2009). Cyberpower and national security. Virginia: Potomac Books.
  • Jones, A., Kovacich, G.L., Luzwick, P.G. (2002). Global information warfare. New York: Auerbach Publications.
  • Armistead, L. (Ed.) (2007). Information warfare: separating hype from reality. Washington DC: Potomac Books.
  • Arquilla, J., & Ronfeldt, D. (Eds.). (2001). Networks and netwars. Santa Monica: RAND.
  • Clarke, R.A. & Knake, R.K. (2010). Cyber war. New York: Harper Collins.
  • Kott, A. (Ed.) (2007). Information warfare and organizational decision-making. Artech House: Boston, M.A.

Journal References

  • Information Society
  • Ethics and Information Technology
  • Computer Security
  • Journal of Information Warfare
  • Journal of the Australian Institute of Professional Intelligence Officers

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI2104|1|1

Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Introduction to Information Warfare
  • Unit Code

    CSI2104
  • Year

    2015
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit will investigate the use of information/knowledge as a weapon and a target in competitive environments. On completion of this unit, the student should have firm grasp of the concept information warfare and its implications to the management of an organisation. Threats and opportunities from competitors or aggressors will be considered. The strategic, tactical, and operational implications of information warfare will be explored.

Equivalent Rule

Unit was previously coded CSI4110

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply strategies of using information as a weapon and a target.
  2. Apply the principles of offensive and defensive information warfare for a given context.
  3. Demonstrate appropriate techniques to gather intelligence from a variety of sources to support a position / objective.
  4. Discuss the social, legal and ethical implications of information warfare.
  5. Evaluate contemporary information warfare concepts for their application in a corporate environment.
  6. Explain the theory of data, information and knowledge as they pertain to information warfare.

Unit Content

  1. Attack strategies.
  2. Contemporary issues in Information Warfare, eg Individual Information Warfare, Critical Infrastructure Protection.
  3. Corporate espionage.
  4. Cyberterrorism.
  5. Information Assurance.
  6. National, criminal, and military information warfare.
  7. Social, legal, cultural and ethical aspects of information warfare including Terrorism Acts.
  8. Swarming as an attack strategy.
  9. The concept of information as a target.
  10. The nature of information, data, and knowledge.
  11. The use of information as a weapon.

Additional Learning Experience Information

The unit content will be presented in both on-line and classroom mode. All lectures are available as written and audio materials. Learning will be facilitated by the use of: case studies, problem solving activities, simulations, and critical analysis activities.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentAssessment based on demonstrating an understanding of set readings25%
Research PaperA short academic paper25%
Examination ^End of semester examination50%
ONLINE
TypeDescriptionValue
AssignmentAssessment based on demonstrating an understanding of set readings25%
Research PaperA short academic paper25%
Examination ^End of semester examination50%

^ Mandatory to Pass

Text References

  • ^ Carr, J. (2010). Inside Cyber Warfare. Sebastopol CA, USA: O'Reilly Media.
  • Alberts, D.S., Garstka, J.J., & Stein, F.P. (2001). Understanding information age warfare. Vienna, VA: CCRP Publications.
  • Armistead, L. (Ed.) (2007). Information warfare: separating hype from reality. Washington DC: Potomac Books.
  • Arquilla, J., & Ronfeldt, D. (Eds.). (2001). Networks and netwars. Santa Monica: RAND.
  • Clarke, R.A. & Knake, R.K. (2010). Cyber war. New York: Harper Collins.
  • Kott, A. (Ed.) (2007). Information warfare and organizational decision-making. Artech House: Boston, M.A.
  • Jones, A., Kovacich, G.L., Luzwick, P.G. (2002). Global information warfare. New York: Auerbach Publications.
  • Kramer, F.D., Starr, S.H & Wentz, L.K. (Eds.) (2009). Cyberpower and national security. Virginia: Potomac Books.
  • Rattray, G.J. (2001). Strategic warfare in cyberspace. Cambridge, MA: MIT Press.
  • Munro, I. (2005). Information warfare in business: strategies of control and resistance in the network society. London: Routledge.

Journal References

  • Journal of Information Warfare
  • Computer Security
  • Information Society
  • Ethics and Information Technology
  • Journal of the Australian Institute of Professional Intelligence Officers

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI2104|1|2