Maasdorp, FDVDu Plessis, WP2013-01-282013-01-282012-11Maasdorp, FDV and Du Plessis, WP. 2012. Using a layered model to place EW in context within the information sphere. The Journal of Information Warfare, vol. 11(3), pp. 1-61445-3312http://hdl.handle.net/10204/6457Copyright: 2012 Mindsystems Pty Ltd.In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.enElectronic WarfareEWInformation OperationsIOInformation WarfareIWCyberspaceElectro Magnetic SpectrumEMSInformation SphereUsing a layered model to place EW in context within the information sphereArticleMaasdorp, F., & Du Plessis, W. (2012). Using a layered model to place EW in context within the information sphere. http://hdl.handle.net/10204/6457Maasdorp, FDV, and WP Du Plessis "Using a layered model to place EW in context within the information sphere." (2012) http://hdl.handle.net/10204/6457Maasdorp F, Du Plessis W. Using a layered model to place EW in context within the information sphere. 2012; http://hdl.handle.net/10204/6457.TY - Article AU - Maasdorp, FDV AU - Du Plessis, WP AB - In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer. DA - 2012-11 DB - ResearchSpace DP - CSIR KW - Electronic Warfare KW - EW KW - Information Operations KW - IO KW - Information Warfare KW - IW KW - Cyberspace KW - Electro Magnetic Spectrum KW - EMS KW - Information Sphere LK - https://researchspace.csir.co.za PY - 2012 SM - 1445-3312 T1 - Using a layered model to place EW in context within the information sphere TI - Using a layered model to place EW in context within the information sphere UR - http://hdl.handle.net/10204/6457 ER -