The projection and measurement of cyberpower

Cyberspace and cyberpower are terms that are increasingly used in common parlance, but are notoriously difficult to define and measure. This article builds on previous work defining the properties of cyberspace in terms of vertical layers, which when combined with a representation of distance presents a three-dimensional model. The unique attributes of cyberspace can be harnessed for power projection, the aim of which is ultimately to alter the behaviour of individuals. Although cyberspace has yet to be used as a medium to demonstrate conventional hard power of coercion and threats supported by physical force, it does present a suitable medium for the projection of soft power of attraction and imitation. These are defined within the context of the online environment and by drawing on the techniques used to optimise Web-based commerce, potential methods of implementing and measuring the success of a campaign of cyberpower projection are proposed.

[1]  ScienceDirect Public relations review , 1975 .

[2]  B. Russett Bound To Lead: The Changing Nature Of American Power , 1990, American Political Science Review.

[3]  Jerry M. Sollinger,et al.  Measuring National Power in the Postindustrial Age: Analyst's Handbook , 2000 .

[4]  Mark Andrei Barwinski Taxonomy of Spyware and Empirical Study of Network Drive-By-Downloads , 2005 .

[5]  Gregory F. Treverton,et al.  Measuring National Power , 2005 .

[6]  R. Dahl The concept of power , 2007 .

[7]  J. Nye Public Diplomacy and Soft Power , 2008 .

[8]  William P. Kiehl,et al.  Get Smart: Combining Hard and Soft Power , 2009 .

[9]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[10]  M. Kroenig,et al.  Taking Soft Power Seriously , 2010 .

[11]  Michael L. Kent,et al.  Learning web analytics: A tool for strategic communication , 2011 .

[12]  Eric Luis Uhlmann,et al.  Wishful Thinking , 2011, Psychological science.

[13]  Thomas Rid Cyber War Will Not Take Place , 2012 .

[14]  Christian Fuchs,et al.  Social media, riots, and revolutions , 2012 .

[15]  Elmar Gerhards-Padilla,et al.  Current Botnet-Techniques and Countermeasures , 2012, PIK Prax. Informationsverarbeitung Kommun..

[16]  M. Gilmore Electing Police and Crime Commissioners , 2012 .

[17]  Ian Hall,et al.  The Struggle for Soft Power in Asia: Public Diplomacy and Regional Competition , 2013 .

[18]  Sowmyan Jegatheesan,et al.  Cookies Invading Our Privacy for Marketing Advertising and Security Issues , 2013, ArXiv.

[19]  Sherali Zeadally,et al.  Online deception in social media , 2014, Commun. ACM.