IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v7y2014i2p124-137.html
   My bibliography  Save this article

Whither cyberpower?

Author

Listed:
  • Rowland, Jill
  • Rice, Mason
  • Shenoi, Sujeet

Abstract

Since World War II, control over land, sea, air and space has been essential to projecting national power. During the past two decades, the domain of cyberspace has emerged; it is the new frontier for wielding the four instruments of power – diplomacy, information, military and economics. The pervasiveness of cyberspace supports near instantaneous action in all the domains of human power – land, sea, air, space and cyberspace. Could cyberspace be the one domain to rule them all?

Suggested Citation

  • Rowland, Jill & Rice, Mason & Shenoi, Sujeet, 2014. "Whither cyberpower?," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 124-137.
  • Handle: RePEc:eee:ijocip:v:7:y:2014:i:2:p:124-137
    DOI: 10.1016/j.ijcip.2014.04.001
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548214000225
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2014.04.001?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Keohane, Robert O., 1969. "Lilliputians' Dilemmas: Small States in Internatinal Politics," International Organization, Cambridge University Press, vol. 23(2), pages 291-310, April.
    2. Rowland, Jill & Rice, Mason & Shenoi, Sujeet, 2014. "The anatomy of a cyber power," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(1), pages 3-11.
    3. Flemes, Daniel, 2007. "Emerging Middle Powers' Soft Balancing Strategy: State and Perspectives of the IBSA Dialogue Forum," GIGA Working Papers 57, GIGA German Institute of Global and Area Studies.
    4. Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
    5. Mr. S. M. Ali Abbas & Mr. Bernardin Akitoby & Mr. Jochen R. Andritzky & Mr. Helge Berger & Mr. Takuji Komatsuzaki & Justin Tyson, 2013. "Dealing with High Debt in an Era of Low Growth," IMF Staff Discussion Notes 2013/007, International Monetary Fund.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ramesh Kumar Raj, 2023. "The Manifestation of Small State Syndromes in Foreign Policy of Nepal: An Assessment through Case of MCC Grant," International Journal of Research and Innovation in Social Science, International Journal of Research and Innovation in Social Science (IJRISS), vol. 7(11), pages 446-454, December.
    2. Gauguier, Jean-Jacques, 2009. "L’industrialisation de l’Open Source," Economics Thesis from University Paris Dauphine, Paris Dauphine University, number 123456789/4388 edited by Toledano, Joëlle.
    3. Czeczeli, Vivien, 2023. "Az államadósság fenntarthatósága alacsony kamatkörnyezetben [The sustainability of public debt in a low interest rate environment]," Közgazdasági Szemle (Economic Review - monthly of the Hungarian Academy of Sciences), Közgazdasági Szemle Alapítvány (Economic Review Foundation), vol. 0(12), pages 1361-1388.
    4. Seo-Young Cho, 2016. "A crime 2.0 - cybercrime, e-talent, and institutions," MAGKS Papers on Economics 201608, Philipps-Universität Marburg, Faculty of Business Administration and Economics, Department of Economics (Volkswirtschaftliche Abteilung).
    5. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," Review of Economic Studies, Oxford University Press, vol. 81(4), pages 1518-1542.
    6. Stanley Brunn, 2015. "Philatelic Boosterism: Tourism Stamps Of Small Island States," International Journal for Responsible Tourism, Fundatia Amfiteatru, vol. 4(2), pages 23-52, December.
    7. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    8. Hilmar Tór HILMARSSON, 2016. "Iceland, economic integration and the European Union," REVISTA DE MANAGEMENT COMPARAT INTERNATIONAL/REVIEW OF INTERNATIONAL COMPARATIVE MANAGEMENT, Faculty of Management, Academy of Economic Studies, Bucharest, Romania, vol. 17(4), pages 373-391, October.
    9. Alberto Botta, 2020. "The short- and long-run inconsistency of the expansionary austerity theory: a post-Keynesian/evolutionist critique," Journal of Evolutionary Economics, Springer, vol. 30(1), pages 143-177, January.
    10. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    11. Irena Melounová, 2016. "Prezidentská Diplomacie: Srovnání Tří Brazilských Prezidentů (Presidential Diplomacy: Three Brazilian Presidents In A Comparative Perspective)," Medzinarodne vztahy (Journal of International Relations), Ekonomická univerzita, Fakulta medzinárodných vzťahov, vol. 14(1), pages 93-118.
    12. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    13. Tyler MOORE & Richard CLAYTON, 2011. "The Impact of Public Information on Phishing Attack and Defense," Communications & Strategies, IDATE, Com&Strat dept., vol. 1(81), pages 45-68, 1st quart.
    14. Bernardin Akitoby & Ariel Binder & Takuji Komatsuzaki, 2017. "Inflation and Public Debt Reversals in the G7 Countries," Journal of Banking and Financial Economics, University of Warsaw, Faculty of Management, vol. 1(7), pages 5-27, May.
    15. Cloos, Janis & Mohr, Svenja, 2022. "Acceptance of data sharing in smartphone apps from key industries of the digital transformation: A representative population survey for Germany," Technological Forecasting and Social Change, Elsevier, vol. 176(C).
    16. Michael Greenfield Partem, 1983. "The Buffer System in International Relations," Journal of Conflict Resolution, Peace Science Society (International), vol. 27(1), pages 3-26, March.
    17. Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
    18. Dell'Erba, Salvatore & Koloskova, Ksenia & Poplawski-Ribeiro, Marcos, 2018. "Medium-term fiscal multipliers during protracted economic contractions," Journal of Macroeconomics, Elsevier, vol. 56(C), pages 35-52.
    19. Kristian Stokke, 2012. "Peace-building as Small State Foreign Policy," International Studies, , vol. 49(3-4), pages 207-231, July.
    20. Schmidt, Andreas, 2012. "At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker," Telecommunications Policy, Elsevier, vol. 36(6), pages 451-461.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:7:y:2014:i:2:p:124-137. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.