[iwar] [fc:Soft.Power.-.Informational.Ambiguities.and.Asymmetries.in.the.Network.Age.-.CFP]

From: Fred Cohen (fc@all.net)
Date: 2002-01-04 18:26:34


Return-Path: <sentto-279987-4204-1010197579-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 04 Jan 2002 18:32:07 -0800 (PST)
Received: (qmail 30598 invoked by uid 510); 5 Jan 2002 02:31:07 -0000
Received: from n3.groups.yahoo.com (216.115.96.53) by all.net with SMTP; 5 Jan 2002 02:31:07 -0000
X-eGroups-Return: sentto-279987-4204-1010197579-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.165] by n3.groups.yahoo.com with NNFMP; 05 Jan 2002 02:26:18 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 5 Jan 2002 02:26:19 -0000
Received: (qmail 5089 invoked from network); 5 Jan 2002 02:26:19 -0000
Received: from unknown (216.115.97.172) by m11.grp.snv.yahoo.com with QMQP; 5 Jan 2002 02:26:19 -0000
Received: from unknown (HELO red.all.net) (12.232.125.69) by mta2.grp.snv.yahoo.com with SMTP; 5 Jan 2002 02:26:17 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g052QYR30263 for iwar@onelist.com; Fri, 4 Jan 2002 18:26:34 -0800
Message-Id: <200201050226.g052QYR30263@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 4 Jan 2002 18:26:34 -0800 (PST)
Subject: [iwar] [fc:Soft.Power.-.Informational.Ambiguities.and.Asymmetries.in.the.Network.Age.-.CFP]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

                          Call for Papers

  Soft Power: Informational Ambiguities and Asymmetries in the Network
Age

    Special Topic Issue of the Journal of the American Society for
              Information Science and Technology
(JASIST)

                          Guest editors:
       Christopher Lueg, University of Technology Sydney, Australia
                Blaise Cronin, Indiana University, USA. 

                   Deadline: October 31, 2002


The next Special Topic Issue of the Journal of the American Society for
Information Science and Technology (JASIST) is scheduled to come out in
2004 on the topic of "Soft Power: Informational Ambiguities and
Asymmetries in the Network Age".  The guest editors for this special
issue will be Christopher Lueg of University of Technology Sydney,
Australia, and Blaise Cronin of Indiana University, USA. 

Virtually unlimited access to computers and networks in the age of the
Internet and World Wide Web is a double-edged sword, creating both
positive and negative externalities, and generating planned outcomes and
unintended second order effects in near equal measure.  On the one hand,
ubiquitous network access provides numerous benefits to business and
society; on the other, it has created a host of unforeseen problems and
technical challenges for organizations of almost every kind. 

So-called information-level threats are based on the active or passive
distribution of key information to a large audience.  Such information
may result from discussions in Usenet newsgroups or they may be created
purposefully with a certain impact in mind.  Examples of such threats
are hoaxes, false rumors, revenge web sites, and joe jobs - spamming
under the name of a competitor which has the effect that the competitor
is blamed (and punished) for spamming. 

Information-level threats need to be distinguished from more technical
threats (denial of service, content degrading or destruction). 
Information-level threats are not targeted at computers and
communications networks, but at humans receiving the information: the
primary lever of an information-level attack is the content of a message
or claim, rather than its form.  An implication of this is that
information-level threats are less about security in a technical or
computational sense than notions of propaganda, opinion formation, and
perception management. 

Specific topics of interest include, but are not limited to, the
following:

* Identifying information-level activities in networked environments
* Security management, cyber forensics, and counterintelligence
* Strengths and limitations of commercially available Internet
  surveillance technology
* Commercial terrorism through the Internet
* Epistemological and neo-cortical warfare
* Information education - understanding information-based threats
* Digital defamation and free speech
* Journalism in the network age
* Branding in the age of the Internet
* Advertising vs. misinformation

The guest editors are seeking papers that address these and related
topics.  Inquiries can be made to:

Christopher Lueg &lt;<a href="mailto:lueg@it.uts.edu.au?Subject=Re:%20[c4i2]%20Soft%20Power%20-%20Informational%20Ambiguities%20and%20Asymmetries%20in%20the%20Network%20Age%2526In-Reply-To=%2526lt;1010192701.0003@hypermail.dummy">lueg@it.uts.edu.au</a>	 

or
Blaise Cronin    &lt;<a href="mailto:bcronin@indiana.edu?Subject=Re:%20[c4i2]%20Soft%20Power%20-%20Informational%20Ambiguities%20and%20Asymmetries%20in%20the%20Network%20Age%2526In-Reply-To=%2526lt;1010192701.0003@hypermail.dummy">bcronin@indiana.edu</a>


Manuscript submissions (Word files) should be
addressed to:

Dr. Christopher Lueg
Department of Information Systems
Faculty of Information Technology
University of Technology Sydney
PO Box 123, Broadway NSW 2007
AUSTRALIA
Voice: +61 2 9514 1851
Fax    +61 2 9514 1807
Email: <a href="mailto:lueg@it.uts.edu.au?Subject=Re:%20[c4i2]%20Soft%20Power%20-%20Informational%20Ambiguities%20and%20Asymmetries%20in%20the%20Network%20Age%2526In-Reply-To=%2526lt;1010192701.0003@hypermail.dummy">lueg@it.uts.edu.au</a>

The deadline for accepting manuscripts for consideration for publication
in this special issue is October 31, 2002.  All manuscripts will be
reviewed by a select panel of referees.  Original artwork and a signed
copy of the copyright release form will be required for all accepted
papers. 

A copy of the call for papers will be available on
the World Wide Web at
<a href="http://www-staff.it.uts.edu.au/~lueg/CfP_JASIST.html">http://www-staff.it.uts.edu.au/~lueg/CfP_JASIST.html>
as is further information about JASIST, at
<a href="http://www.asis.org/">http://www.asis.org/>.



+______________________________________________________________________+
|                                                   
                  |
| Dr. Christopher Lueg                 
<a href="mailto:lueg@it.uts.edu.au?Subject=Re:%20[c4i2]%20Soft%20Power%20-%20Informational%20Ambiguities%20and%20Asymmetries%20in%20the%20Network%20Age%2526In-Reply-To=%2526lt;1010192701.0003@hypermail.dummy">lueg@it.uts.edu.au</a> 
(preferred) |
| Department of Information Systems     Fax +61 2
9514 1807 / Vox 1851 |
| University of Technology Sydney      
www-staff.it.uts.edu.au/~lueg/ |
| PO Box 123 Broadway NSW 2007, AU      CRICOS
Provider 00099F         |

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Tiny Wireless Camera under $80!
Order Now! FREE VCR Commander!
Click Here - Only 1 Day Left!
http://us.click.yahoo.com/WoOlbB/7.PDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:02 PST