Information and Communications Technologies, Cyberattacks, and Strategic Asymmetry

  • Kshetri N
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations, and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This chapter discusses various asymmetries associated with institutions, nations, and organizations that influence the ICT-security nexus. Regulative, normative, and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries.

Cite

CITATION STYLE

APA

Kshetri, N. (2010). Information and Communications Technologies, Cyberattacks, and Strategic Asymmetry. In The Global Cybercrime Industry (pp. 119–137). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-11522-6_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free