Information and Communications Technologies, Cyberattacks, and Strategic Asymmetry
Nir Kshetri
Chapter Chapter 6 in The Global Cybercrime Industry, 2010, pp 119-137 from Springer
Abstract:
Abstract In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations, and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This chapter discusses various asymmetries associated with institutions, nations, and organizations that influence the ICT-security nexus. Regulative, normative, and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries.
Keywords: Radio Frequency Identification Device; Biometric Technology; Positive Asymmetry; Encryption Technology; American Civil Liberty Union (search for similar items in EconPapers)
Date: 2010
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-642-11522-6_6
Ordering information: This item can be ordered from
http://www.springer.com/9783642115226
DOI: 10.1007/978-3-642-11522-6_6
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().