Information and Communications Technologies, Strategic Asymmetry and National Security
University of North Carolina (UNC) at Greensboro - Bryan School of Business & Economics
Journal of International Management, Vol. 11, No. 4, 2005
In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This article discusses various asymmetries associated with institutions, nations and organizations that influence the ICT-national security nexus. Regulative, normative and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries. Integrative approaches that combine policy and technological measures at various levels are likely to make the world more secure.
Number of Pages in PDF File: 33
Keywords: Strategic asymmetry, information and communication technologies, national security, institutions, cyber attacks
JEL Classification: O33Accepted Paper Series
Date posted: November 11, 2005
© 2013 Social Science Electronic Publishing, Inc. All Rights Reserved.
This page was processed by apollo4 in 0.312 seconds