Skip to content | Change text size

CSE 468 - Information Conflict

Lecturer: Dr Carlo Kopp, PEng  - 122/75 Clayton Campus - Email: carlo@csse.monash.edu.au Xt: 55229

CSE 468 Topic Objectives/Synopsis


Information conflict is concerned with how information is used in disputes, disagreements, conflicts, and survival contests and with how the information technology infrastructure influences such situations. Important recent developments in the area include the definition of a theoretical basis for the discipline using Shannon's information theory, game theory and graph theory.
This module is intended to provide an introduction to the basic theoretical concepts and an overview of various applications and their practical impact.
  1. Shannon's information theory concepts, basic game theory concepts.
  2. Four canonical strategies of information conflict vs Shannon's information theory.
  3. Compound information conflict strategies and using graphs to model these.
  4. Hypergames vs information conflict strategies.
  5. Evolutionary nature of information conflict and biological examples.
  6. Analysis and modelling of information conflict attacks and techniques.
  7. Forms of information conflict, Class I, II, III, IV information warfare, denial of service attack classification.
  8. Information conflict vs copyright, privacy, spam, espionage, surveillance, perception management, propaganda, advertising, hacking and cyberwar, viruses/worms, and identity theft.
  9. Information conflict vs basic concepts and risks in computer security and encryption.
  10. Problems arising in law enforcement and organisational security due to the proliferation of information conflict techniques.
Topic Prerequisites:

Basic familiarity with information technology is expected and assumed in the module materials. If you are uncertain about the level of your prior knowledge/experience in the area, please contact the lecturer at the beginning of the semester.There are no other units that depend upon this subject, and no formal prerequisites.

Lectures/Tutorials:
  1. Location/Time: 75/G55 (Seminar Room) @ Wed 15.00-17:00 hrs

Topic Assessment:

  1. 3 Points
  2. Assignments: (2 at 25% each) totalling 50%.
  3. One 50% final examination (3 hours).

A 45% hurdle will be applied to the assignments and the final examination. Assignment due dates will be provided when assignments are posted. Failing any hurdle could result in failing the topic.

Late submission without a good reason agreed in advance of submission due date will result in a penalty deduction of 3 marks per calendar day or part thereof.  If you believe that your assignment will be delayed because of circumstances beyond your control such as illness you should apply for an extension before the due date. Medical certificates or certification supporting your application may be required.

Cheating/Plagiarism

It is an academic requirement of this subject that your solutions to the assignment questions be your own work.

It is perfectly acceptable to seek help and advice when completing the assignments, but this must not be taken to the point where what is submitted as your own work is in part someone else's work which has not been clearly acknowledged in the report.  Where you are using someone else's work as a part of your assignment, then such usage needs to be acknowledged in your report.


All submitted assignments will be checked by a plagiarism detection system (Damocles) which is 100% effective.  Unacknowledged reproduction of work from others will result in zero marks being awarded.

Topic Schedule (Subject to Change):


Lecture Number
Topic
1
Introduction and overview - Lecture Notes
2
Shannon's information theory concepts - Lecture Notes
3
Basic game theory concepts - Lecture Notes
4
Four canonical strategies of information conflict vs Shannon's information theory - Lecture Notes
5
Compound information conflict strategies and using graphs to model these - Lecture Notes
6
Hypergames vs information conflict strategies - Lecture Notes
7
Evolutionary nature of information conflict and biological examples - Lecture Notes and IWC3 Slides
8
Classical deception techniques, perception management, propaganda, advertising - Lecture Notes
9
Forms of information conflict, Class I, II, III, IV information warfare, denial of service attack classification; Analysis and modelling of information conflict attacks and techniques - Lecture Notes
10
Information conflict vs copyright, privacy, spam, espionage, surveillance,hacking and cyberwar, viruses/worms, and identity theft - Lecture Notes
11
Information conflict vs basic concepts and risks in computer security and encryption - Lecture Notes
12
Problems arising in law enforcement and organisational security due to the proliferation of information conflict techniques - Lecture Notes
13
Revision - Lecture Notes

Recommended Reading and Links
  1. Dorothy E. Denning, Information Warfare and Security, ACMPress (Addison-Wesley), 1999, ISBN 0-201-43303-6.
  2. Winn Schwartau, Information Warfare: Cyberterrorism : Protecting Your Personal Security in the Electronic Age, New York, NY: Thunder's Mouth Press, 1995, Second Edition.
  3. In addition, selected research papers will be referenced and discussed throughout the topic.
Borden, Andrew.  What Is Information Warfare?  Air & Space Power Chronicles  November 1999.
Kopp, Carlo; A Fundamental Paradigm of Infowar, Systems, February, 2000.
United States. Dept of the Air Force. Cornerstones of Information Warfare. Washington, 1995.
Cyberspace and Information Operations Study Center, Air University
Winn Schwartau's Infowar.Com
Information Warfare Monitor
The Information Warfare Site
Georgetown University - COSC 511 Information Warfare: Terrorism, Crime, and National Security
Prof Dorothy Denning's Cybercrime, Infowar, and Infosecurity Webpage
Carlo Kopp's Information/Electronic Warfare Publications
Aldrich, Richard W.  Cyberterrorism and Computer Crimes: Issues Surrounding the Establishment of an International Regime.  USAF Academy, CO, USAF Institute for National Security Studies, 2000.  92 p.  (INSS occasional paper 32).
Arquilla, John and Ronfeldt, David, eds.  Networks and Netwars: The Future of Terror, Crime, and Militancy.  Santa Monica, CA, RAND Corp., 2001.  375 p.  (RAND report, MR-1382)
Information Warfare Bibliography - Air University
A Mathematical Theory of Communication by Claude E. Shannon
How fundamental is information?
WHAT IS INFORMATION?
Web Dictionary of Cybernetics and Systems - Information
Measures of Uncertainty: Shannon's Entropy
Properties of Shannon's Entropy
Game Theory .net
Harvard University Introduction to Game Theory
MIT Game Theory Lectures
Game Theory Lectures
AGSM - Strategic Game Theory for Managers
Introduction to Game Theory - Indian Institute of Technology Delhi