EconPapers    
Economics at your fingertips  
 

Information and Communications Technologies, Cyberattacks, and Strategic Asymmetry

Nir Kshetri

Chapter Chapter 6 in The Global Cybercrime Industry, 2010, pp 119-137 from Springer

Abstract: Abstract In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations, and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This chapter discusses various asymmetries associated with institutions, nations, and organizations that influence the ICT-security nexus. Regulative, normative, and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries.

Keywords: Radio Frequency Identification Device; Biometric Technology; Positive Asymmetry; Encryption Technology; American Civil Liberty Union (search for similar items in EconPapers)
Date: 2010
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-642-11522-6_6

Ordering information: This item can be ordered from
http://www.springer.com/9783642115226

DOI: 10.1007/978-3-642-11522-6_6

Access Statistics for this chapter

More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-23
Handle: RePEc:spr:sprchp:978-3-642-11522-6_6