IDEAS home Printed from https://ideas.repec.org/a/eee/intman/v11y2005i4p563-580.html
   My bibliography  Save this article

Information and communications technologies, strategic asymmetry and national security

Author

Listed:
  • Kshetri, Nir

Abstract

In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This article discusses various asymmetries associated with institutions, nations and organizations that influence the ICT-national security nexus. Regulative, normative and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries. Integrative approaches that combine policy and technological measures at various levels are likely to make the world more secure.

Suggested Citation

  • Kshetri, Nir, 2005. "Information and communications technologies, strategic asymmetry and national security," Journal of International Management, Elsevier, vol. 11(4), pages 563-580, December.
  • Handle: RePEc:eee:intman:v:11:y:2005:i:4:p:563-580
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1075425305000712
    Download Restriction: Full text for ScienceDirect subscribers only
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Wanda J. Orlikowski & Jack J. Baroudi, 1991. "Studying Information Technology in Organizations: Research Approaches and Assumptions," Information Systems Research, INFORMS, vol. 2(1), pages 1-28, March.
    2. Georg Götz, 1999. "Monopolistic Competition and the Diffusion of New Technology," RAND Journal of Economics, The RAND Corporation, vol. 30(4), pages 679-693, Winter.
    3. Gary S. Becker, 1995. "The economics of crime," Cross Sections, Federal Reserve Bank of Richmond, vol. 12(Fall), pages 8-15.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kshetri, Nir, 2005. "Pattern of global cyber war and crime: A conceptual framework," Journal of International Management, Elsevier, vol. 11(4), pages 541-562, December.
    2. Elbanna, Amany & Newman, Mike, 2022. "The bright side and the dark side of top management support in Digital Transformaion –A hermeneutical reading," Technological Forecasting and Social Change, Elsevier, vol. 175(C).
    3. Aaltonen, Aleksi Ville & Alaimo, Cristina & Kallinikos, Jannis, 2021. "The making of data commodities: data analytics as an embedded process," LSE Research Online Documents on Economics 110296, London School of Economics and Political Science, LSE Library.
    4. Panu Poutvaara & Mikael Priks, 2005. "Violent Groups and Police Tactics: Should Tear Gas Make Crime Preventers Cry?," CESifo Working Paper Series 1639, CESifo.
    5. Wanda J. Orlikowski & C. Suzanne Iacono, 2001. "Research Commentary: Desperately Seeking the “IT” in IT Research—A Call to Theorizing the IT Artifact," Information Systems Research, INFORMS, vol. 12(2), pages 121-134, June.
    6. Marie-José Avenier & Catherine Thomas, 2015. "Finding one's way around various methodological guidelines for doing rigorous case studies: A comparison of four epistemological frameworks [Se frayer un chemin parmi les différentes recommandation," Post-Print halshs-01491454, HAL.
    7. Chen, Wenshin & Bennett, David, 2013. "Gaining social values of wireless technology: An interpretive case study in the healthcare institutional context," International Journal of Information Management, Elsevier, vol. 33(5), pages 802-809.
    8. Carlos A. Osorio & Dov Dori & Joseph Sussman, 2011. "COIM: An object‐process based method for analyzing architectures of complex, interconnected, large‐scale socio‐technical systems," Systems Engineering, John Wiley & Sons, vol. 14(4), pages 364-382, December.
    9. Neumeier, Stefan, 2017. "Modellvorhaben chance.natur - Endbericht der Begleitforschung," Thünen Reports 51, Johann Heinrich von Thünen Institute, Federal Research Institute for Rural Areas, Forestry and Fisheries.
    10. Cătălina Sitnikov & Anca Băndoi & Ionuț Riza, 2019. "Management of Systems from a Cybernetic Perspective," Ovidius University Annals, Economic Sciences Series, Ovidius University of Constantza, Faculty of Economic Sciences, vol. 0(2), pages 582-588, December.
    11. Nagy, A., 2009. "Adoption of interorganizational information systems : The adoption position model," Other publications TiSEM af471297-bf03-43bf-88c1-4, Tilburg University, School of Economics and Management.
    12. Dacey, Raymond & Gallant, Kenneth S., 1997. "Crime control and harassment of the innocent," Journal of Criminal Justice, Elsevier, vol. 25(4), pages 325-334.
    13. Umair Baig & Dr. Muhammad Arsalan Hashmi & Syed Babar Ali & Dr. Saba Zehara, 2020. "Exploratory Sequential Mixed Methods In Doctorate Research: Extended Application Of Constructivist Grounded Theory," IBT Journal of Business Studies (JBS), Ilma University, Faculty of Management Science, vol. 16(2), pages 47-65.
    14. Bulent Unel, 2013. "The Interaction Between Technology Adoption and Trade When Firms are Heterogeneous," Review of International Economics, Wiley Blackwell, vol. 21(4), pages 797-808, September.
    15. Alexander Brem & Pierre Wolfram, 2017. "Organisation of new product development in Asia and Europe: results from Western multinationals R&D sites in Germany, India, and China," Review of Managerial Science, Springer, vol. 11(1), pages 159-190, January.
    16. Ismail Moumouni & Mohamed N. Baco & Latifou Idrissou, 2019. "Towards a Re-Conceptualization of the Pathway of Agricultural Technology for a Better Impact Assessment," International Journal of Publication and Social Studies, Asian Economic and Social Society, vol. 4(2), pages 123-131, June.
    17. Rob Gleasure & Kieran Conboy & Lorraine Morgan, 2019. "Talking Up a Storm: How Backers Use Public Discourse to Exert Control in Crowdfunded Systems Development Projects," Information Systems Research, INFORMS, vol. 30(2), pages 447-465, June.
    18. Chandwani, Rajesh & Edacherian, Saneesh & Sud, Mukesh, 2019. "Whose Empowerment? National Digital Infrastructure and India’s Healthcare sector," IIMA Working Papers WP 2019-02-01, Indian Institute of Management Ahmedabad, Research and Publication Department.
    19. Taj, Saud A., 2016. "Application of signaling theory in management research: Addressing major gaps in theory," European Management Journal, Elsevier, vol. 34(4), pages 338-348.
    20. Sang Lee & Liqiang Chen, 2011. "An integrative research framework for the online social network service," Service Business, Springer;Pan-Pacific Business Association, vol. 5(3), pages 259-276, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:intman:v:11:y:2005:i:4:p:563-580. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/wps/find/journaldescription.cws_home/601266/description#description .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.