Information and Communications Technologies, Strategic Asymmetry and National Security

In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This article discusses various asymmetries associated with institutions, nations and organizations that influence the ICT-national security nexus. Regulative, normative and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries. Integrative approaches that combine policy and technological measures at various levels are likely to make the world more secure.

[1]  The economics of crime , 1995 .

[2]  Andrew J. Hoffman,et al.  INSTITUTIONAL EVOLUTION AND CHANGE: ENVIRONMENTALISM AND THE US CHEMICAL INDUSTRY , 1999 .

[3]  Richard Walker,et al.  The Capitalist Imperative: Territory, Technology, and Industrial Growth. , 1989 .

[4]  Montgomery C. Meigs Unorthodox Thoughts about Asymmetric Warfare , 2003 .

[5]  C. Sabel,et al.  World of Possibilities: Flexibility and Mass Production in Western Industrialization , 1997 .

[6]  L. Piacentini,et al.  The Russian Mafia: Private Protection in a New Market Economy. By Federico Varese (Oxford: Oxford University Press, 2005, 304pp. £14.99 pb) , 2006 .

[7]  R. Freeman,et al.  The economics of crime , 1999 .

[8]  Larry P. English Information Quality: Critical Ingredient for National Security , 2005, J. Database Manag..

[9]  Philip Damas,et al.  MEGA-PORT GROUPS BACK SECURITY PILOT. , 2002 .

[10]  M. D. Myers,et al.  Critical ethnography in information systems , 1997 .

[11]  M. Hitt,et al.  Attributes of Successful and Unsuccessful Acquisitions of US Firms , 1998 .

[12]  Dan Verton,et al.  Black Ice: The Invisible Threat of Cyber-Terrorism , 2003 .

[13]  W. Scott,et al.  Institutions and Organizations. , 1995 .

[14]  Robert C Bonner BONNER PROPOSES 'SMART BOX' , 2002 .

[15]  E. Rogers,et al.  Diffusion of Innovations , 1964 .

[16]  Margaret L. Johnson Biometrics and the threat to civil liberties , 2004, Computer.

[17]  Rajiv Kishore,et al.  A content-analytic longitudinal study of the drivers for information technology and systems outsourcing , 2000, ICIS.

[18]  Wanda J. Orlikowski,et al.  Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..

[19]  Jeroen de Kloet Digitisation and Its Asian Discontents: The Internet, Politics and Hacking in China and Indonesia , 2002, First Monday.

[20]  Federico Varese,et al.  Reviews - The Russian Mafia. Private Protection in a New Market Economy , 2001 .

[21]  M. Hirsh Bush and the World , 2002 .

[22]  Simon A. Price Understanding Contemporary Cryptography and its Wider Impact upon the General Law , 1999 .

[23]  William R Baron VOLPE ENGINEERS USE BIOMETRICS TO HELP EASE BORDER CRUSH , 1997 .

[24]  S. Kelman Making Public Policy , 1988 .

[25]  José María Sierra,et al.  Beware of the Security Software , 2004, Inf. Secur. J. A Glob. Perspect..

[26]  R. Yin Case Study Research: Design and Methods , 1984 .

[27]  G. Götz Monopolistic Competition and the Diffusion of New Technology , 1999 .

[28]  J. C. Campbell,et al.  How Nations Behave , 1979 .

[29]  Özlem Öz Using Boolean- and Fuzzy-Logic-Based Methods to Analyze Multiple Case Study Evidence in Management Research , 2004 .

[30]  Douglas V. Johnson,et al.  Asymmetry and U.S. Military Strategy: Definition, Background, and Strategic Concepts , 2001 .