Skip to main content

2010 | OriginalPaper | Buchkapitel

6. Information and Communications Technologies, Cyberattacks, and Strategic Asymmetry

verfasst von : Dr. Nir Kshetri

Erschienen in: The Global Cybercrime Industry

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations, and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This chapter discusses various asymmetries associated with institutions, nations, and organizations that influence the ICT-security nexus. Regulative, normative, and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Adams, J. (2001, May/June). Virtual defense. Foreign Affairs, 98–112. Adams, J. (2001, May/June). Virtual defense. Foreign Affairs, 98–112.
Zurück zum Zitat Bickers, C. (2001, August 16). Combat on the Web. Far Eastern Economic Review, 30–33. Bickers, C. (2001, August 16). Combat on the Web. Far Eastern Economic Review, 30–33.
Zurück zum Zitat Blank, S. (2004). Rethinking the concept of asymmetric threats in US strategy. Comparative Strategy, 23(4/5), 343–367.CrossRef Blank, S. (2004). Rethinking the concept of asymmetric threats in US strategy. Comparative Strategy, 23(4/5), 343–367.CrossRef
Zurück zum Zitat Bridis, T. (2001, June 27). E-Espionage rekindles cold-war tensions – US tries to identify hackers; millions of documents are stolen. Wall Street Journal, A.18. Bridis, T. (2001, June 27). E-Espionage rekindles cold-war tensions – US tries to identify hackers; millions of documents are stolen. Wall Street Journal, A.18.
Zurück zum Zitat Bucci, C., & Steven, P. (2009). A most dangerous link. US Naval Institute Proceedings, 135(10), 38–42. Bucci, C., & Steven, P. (2009). A most dangerous link. US Naval Institute Proceedings, 135(10), 38–42.
Zurück zum Zitat Busetta, A., & Milito, A. M. (2009). Socio-demographic vulnerability: The condition of Italian young people. Social Indicators Research. DOI 10.1007/s11205-009-9507-9. Busetta, A., & Milito, A. M. (2009). Socio-demographic vulnerability: The condition of Italian young people. Social Indicators Research. DOI 10.1007/s11205-009-9507-9.
Zurück zum Zitat Coll, S. (2008). The Bin Ladens: An Arabian family in the American century. New York: The Penguin Press. Coll, S. (2008). The Bin Ladens: An Arabian family in the American century. New York: The Penguin Press.
Zurück zum Zitat The Economist. (2008a, December 8). Marching off to cyberwar. 389(8609), 20. The Economist. (2008a, December 8). Marching off to cyberwar. 389(8609), 20.
Zurück zum Zitat The Economist. (2008b). Between Allah and America. 387(8575), 92–93. The Economist. (2008b). Between Allah and America. 387(8575), 92–93.
Zurück zum Zitat English, L. P. (2005). Information quality: Critical ingredient for national security. Journal of Database Management, 16(1), 18–32. English, L. P. (2005). Information quality: Critical ingredient for national security. Journal of Database Management, 16(1), 18–32.
Zurück zum Zitat Fisher, I. (2002, August 1). Cybercafe crackdown may trip up leering boys. New York Times. Fisher, I. (2002, August 1). Cybercafe crackdown may trip up leering boys. New York Times.
Zurück zum Zitat Gabrys, E. (2002). The international dimensions of cyber-crime, Part 1. Information Systems Security, 11(4), 21–32.CrossRef Gabrys, E. (2002). The international dimensions of cyber-crime, Part 1. Information Systems Security, 11(4), 21–32.CrossRef
Zurück zum Zitat GAO Reports. (2007, June 22). Public and private entities face challenges in addressing cyber threats. RPT-number: GAO-07-705. GAO Reports. (2007, June 22). Public and private entities face challenges in addressing cyber threats. RPT-number: GAO-07-705.
Zurück zum Zitat Garner, J. M. (1997, March). Asymmetric niche warfare. Phalanx, 1. Garner, J. M. (1997, March). Asymmetric niche warfare. Phalanx, 1.
Zurück zum Zitat Gillis, C., & McHugh, M. (2002, February). Bonner proposes ‘smart box’. American Shipper, 33. Gillis, C., & McHugh, M. (2002, February). Bonner proposes ‘smart box’. American Shipper, 33.
Zurück zum Zitat Gotz, G. (1999). Monopolistic competition and the diffusion of new technology. The Rand Journal of Economics, 30(4), 679–693.CrossRef Gotz, G. (1999). Monopolistic competition and the diffusion of new technology. The Rand Journal of Economics, 30(4), 679–693.CrossRef
Zurück zum Zitat Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week. Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week.
Zurück zum Zitat Harvard Law Review. (2006, June). Note: Immunizing the Internet, Or: How I learned to stop worrying and love the worm, 119, 2442. Harvard Law Review. (2006, June). Note: Immunizing the Internet, Or: How I learned to stop worrying and love the worm, 119, 2442.
Zurück zum Zitat Hernandez, J. C., Sierra, J. M., & Ribagorda, A. (2004). Beware of the security software. Information Systems Security, 12(6), 39–45.CrossRef Hernandez, J. C., Sierra, J. M., & Ribagorda, A. (2004). Beware of the security software. Information Systems Security, 12(6), 39–45.CrossRef
Zurück zum Zitat Hirsh, M. (2002). Bush and the world. Foreign Affairs, 81(5), 18–44.CrossRef Hirsh, M. (2002). Bush and the world. Foreign Affairs, 81(5), 18–44.CrossRef
Zurück zum Zitat Hoo, K. S., Goodman, S., & Greenberg, L. (1997). Information technology and the terrorist threat. Survival, 39(3), 135–155. Hoo, K. S., Goodman, S., & Greenberg, L. (1997). Information technology and the terrorist threat. Survival, 39(3), 135–155.
Zurück zum Zitat Johnson, M. L. (2004, April). Biometrics and the threat to civil liberties. Computer, 90–93. Johnson, M. L. (2004, April). Biometrics and the threat to civil liberties. Computer, 90–93.
Zurück zum Zitat Kshetri, N. (2005, May/June). Hacking the odds. Foreign Policy, 93. Kshetri, N. (2005, May/June). Hacking the odds. Foreign Policy, 93.
Zurück zum Zitat Lenzner, R., & Vardi, N. (2004, September 20). The next threat. Forbes, 70. Lenzner, R., & Vardi, N. (2004, September 20). The next threat. Forbes, 70.
Zurück zum Zitat Maney, K. (2001). Osama’s messages could be hiding in plain sight. USA Today, B6. Maney, K. (2001). Osama’s messages could be hiding in plain sight. USA Today, B6.
Zurück zum Zitat McGeer, B. (2002). Security: Bankers fight a new battle it adjustments, purchases Part of Patriot Act. Bank Technology News, 15(11), 1. McGeer, B. (2002). Security: Bankers fight a new battle it adjustments, purchases Part of Patriot Act. Bank Technology News, 15(11), 1.
Zurück zum Zitat McHugh, M., & Damas, P. (2002, November). Mega-port groups back security pilot. American Shipper, 14–18. McHugh, M., & Damas, P. (2002, November). Mega-port groups back security pilot. American Shipper, 14–18.
Zurück zum Zitat Meigs, M. C. (2003). Unorthodox thoughts about asymmetric warfare. Parameters, 33(2), 4–18. Meigs, M. C. (2003). Unorthodox thoughts about asymmetric warfare. Parameters, 33(2), 4–18.
Zurück zum Zitat Metz, S. (2001, July–August). Strategic asymmetry. Military Review, 81(4), 23–31. Metz, S. (2001, July–August). Strategic asymmetry. Military Review, 81(4), 23–31.
Zurück zum Zitat Metz, S., & Johnson, D. V., II. (2001, January). Asymmetry and US military strategy: Definition, background, and strategic concepts. Carlisle Barracks, PA: US Army War College, Strategic Studies Institute. Metz, S., & Johnson, D. V., II. (2001, January). Asymmetry and US military strategy: Definition, background, and strategic concepts. Carlisle Barracks, PA: US Army War College, Strategic Studies Institute.
Zurück zum Zitat Michael, G. (2009). Adam Gadahn and Al-Qaeda’s internet strategy. Middle East Policy, 16(3), 135–152.CrossRef Michael, G. (2009). Adam Gadahn and Al-Qaeda’s internet strategy. Middle East Policy, 16(3), 135–152.CrossRef
Zurück zum Zitat Nance, M. (2008, May/June). How (not) to spot a terrorist. Foreign Policy, 166, 74–76. Nance, M. (2008, May/June). How (not) to spot a terrorist. Foreign Policy, 166, 74–76.
Zurück zum Zitat Price, S. A. (1999). Understanding contemporary cryptography and its wider impact upon the general law. International Review of Law, Computers & Technology, 13(2), 95–126. Price, S. A. (1999). Understanding contemporary cryptography and its wider impact upon the general law. International Review of Law, Computers & Technology, 13(2), 95–126.
Zurück zum Zitat Rogers, E. M. (1983). The diffusion of innovations (3rd ed.). New York: Free Press. Rogers, E. M. (1983). The diffusion of innovations (3rd ed.). New York: Free Press.
Zurück zum Zitat Rogers, E. M. (1995). The diffusion of innovations (4th ed.). New York: Free Press. Rogers, E. M. (1995). The diffusion of innovations (4th ed.). New York: Free Press.
Zurück zum Zitat Sabel, C., & Zeitlin, J. (eds.) (1997). World of possibilities: Flexibility and mass production in western industrialization. New York: Cambridge University Press. Sabel, C., & Zeitlin, J. (eds.) (1997). World of possibilities: Flexibility and mass production in western industrialization. New York: Cambridge University Press.
Zurück zum Zitat Scott, W. R. (1995). Institutions and organizations. Thousand Oaks, CA: Sage. Scott, W. R. (1995). Institutions and organizations. Thousand Oaks, CA: Sage.
Zurück zum Zitat Scott, W. R. (2001). Institutions and organizations. Thousand Oaks, CA: Sage. Scott, W. R. (2001). Institutions and organizations. Thousand Oaks, CA: Sage.
Zurück zum Zitat Snidal, D. (1994). The politics of scope: Endogenous actors, heterogeneity and institutions. Journal of Theoretical Politics, 6(4), 449–472.CrossRef Snidal, D. (1994). The politics of scope: Endogenous actors, heterogeneity and institutions. Journal of Theoretical Politics, 6(4), 449–472.CrossRef
Zurück zum Zitat Snidal, D. (1996). Political economy and international institutions. International Review of Law and Economics, 16(1), 121–137. Snidal, D. (1996). Political economy and international institutions. International Review of Law and Economics, 16(1), 121–137.
Zurück zum Zitat Stone, B. (2001, July 16). Busting the web bandits. Newsweek, 55. Stone, B. (2001, July 16). Busting the web bandits. Newsweek, 55.
Zurück zum Zitat Storper, M., & Walker, R. (1989). The capitalist imperative: Territory, technology and industrial growth. London: Basil Blackwell. Storper, M., & Walker, R. (1989). The capitalist imperative: Territory, technology and industrial growth. London: Basil Blackwell.
Zurück zum Zitat Swartz, J. (2007, March 12). Chinese hackers seek US access; Attacks highlight weaknesses in Internet security. USA Today, 3B. Swartz, J. (2007, March 12). Chinese hackers seek US access; Attacks highlight weaknesses in Internet security. USA Today, 3B.
Zurück zum Zitat Vardi, N. (2005, July 25). Chinese take out. Forbes, 54. Vardi, N. (2005, July 25). Chinese take out. Forbes, 54.
Zurück zum Zitat Varese, F. (2002). The Russian Mafia: Private protection in a new market economy. New York: Oxford University Press. Varese, F. (2002). The Russian Mafia: Private protection in a new market economy. New York: Oxford University Press.
Zurück zum Zitat Verton, D. (2003). Black ice: The invisible threat of cyberterrorism. New York: McGraw-Hill/Osborne. Verton, D. (2003). Black ice: The invisible threat of cyberterrorism. New York: McGraw-Hill/Osborne.
Zurück zum Zitat Waller, J. M. (2000, February 28). PLA revises the art of war. Insight on the News, 21–23. Waller, J. M. (2000, February 28). PLA revises the art of war. Insight on the News, 21–23.
Zurück zum Zitat World IT Report. (2003, February 3). Pakistan faces difficulties to block porn sites. World IT Report. (2003, February 3). Pakistan faces difficulties to block porn sites.
Zurück zum Zitat Yousafzai, S., & Hirsh, M. (2004). The harder hunt for Bin Laden. Newsweek, December 29, 2003/January 5, 2004, 58. Yousafzai, S., & Hirsh, M. (2004). The harder hunt for Bin Laden. Newsweek, December 29, 2003/January 5, 2004, 58.
Zurück zum Zitat Zhou, L. (2005). Special Issue: Database technology for enhancing national security. Journal of Database Management, 16(1), I–III. Zhou, L. (2005). Special Issue: Database technology for enhancing national security. Journal of Database Management, 16(1), I–III.
Metadaten
Titel
Information and Communications Technologies, Cyberattacks, and Strategic Asymmetry
verfasst von
Dr. Nir Kshetri
Copyright-Jahr
2010
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-11522-6_6