6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Karim Hamza and Van Dalen<br />
Awareness and Media : create citizen/personal awareness working and dealing with<br />
eGovernance framework, on how to protect themselves, how to report violation, be awre with<br />
different types of threat and the legal impact of violation<br />
8. Conclusion<br />
It is becoming obvious that eGovernance will become the information backbone of any government<br />
which creates a strong relation to strategic information warfare; since both are based on information<br />
and use technology. In addition, the first will contain most of the government’s and community<br />
information and will become the main war fields in the future. This requires different set of attention;<br />
since not all existing warfare techniques will be applicable in handling eGovernance threats; this<br />
should include non military approaches like Policy, diplomatic and laws.<br />
eGovernance framework main challenge is adaptability on dynamic eGovernance framework; since<br />
continuous changes on government strategies and the environment surrounding it plus the continuous<br />
changes of technology and threat parties either internal or external, will require continuous<br />
development to cope with such changes and complex decision making structure, not to forget that<br />
some conditions of strategic information warfare have to be taken into account in the design process<br />
of eGovernance frameworks, like: control of different stakeholders, monitor and detection, continuous<br />
development and defining different sets of response approaches to deal with the rapid changing<br />
environment and changing enemy map.<br />
References<br />
Bhatnagar, Subash EGovernment: From Vision to Implementation” by; Sage Publications; 2004.<br />
Clarke , Richard A. (April, 2010) Cyber War: The Next Threat to National Security and What to Do About, Ecco<br />
Dearth, Douglas H., (2001) “Implications and Challenges of Applied Information Operations”, Joint Military<br />
Intelligence Training Centre Washington D.C. Journal of Information Warfare Volume 1, Issue1<br />
Denning, D.E. (1999). Information Warfare and Security, Addison Wesley, Reading: Mass.<br />
DoD Dictionary of Military Terms (October,2008), Washington, D.C, Joint Doctrine Division, J-7<br />
Drucker, Peter F. (August 24, 1998) “the Next Information Revolution” , Forbes ASAP.<br />
Hutchinson, W. and Warren, M. (2001) “Principles of Information Warfare”, Journal of Information Warfare 1, 1:1 -<br />
6 1 ISSN 1445-3312 print/ISSN 1445-3347<br />
Hutchinson, W.E. Warren, M.J. (1999). Attacking the Attackers: Attitudes of Australian IT Managers to retaliation<br />
against Hackers, ACIS (Australasian <strong>Conference</strong> on Information Systems) 99, December, Wellington, New<br />
Zealand.<br />
Libicki, Martin C. (2009) CyberDeterrence and CyberWar , Rand Corporation, Project Air Force<br />
Libicki, Martin C.(May,1995) “What Is Information Warfare?” Strategic<br />
Mechling, J. (2000), Eight Imperatives for Leaders in a Networked World, Massachusetts, The Harvard Policy<br />
Group<br />
Roger C. Molander/Andrew S. Riddile/Peter A. Wilson (1996) “Strategic Information Warfare, A New Face of<br />
War” Office of the Secretary of Defense, National Defense Research Institute , Rand<br />
Schwartau, W. (1996). Information Warfare – second edition. Thunder’s Mouth Press, New York.<br />
UNESCO(2009) http://portal.unesco.org/ci/en/ev.php-<br />
URL_ID=4404&URL_DO=DO_TOPIC&URL_SECTION=201.html (extracted 07.10.2010)<br />
Waltz, E. (1998) Information Warfare – Principles and Operations. Artech House, Norwood.<br />
World Bank : Source: http://go.worldbank.org/M1JHE0Z280 (extracted on 02.10.2010)<br />
112