IDEAS home Printed from https://ideas.repec.org/a/eee/intman/v11y2005i4p563-580.html
   My bibliography  Save this article

Information and communications technologies, strategic asymmetry and national security

Author

Listed:
  • Kshetri, Nir

Abstract

In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This article discusses various asymmetries associated with institutions, nations and organizations that influence the ICT-national security nexus. Regulative, normative and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries. Integrative approaches that combine policy and technological measures at various levels are likely to make the world more secure.

Suggested Citation

  • Kshetri, Nir, 2005. "Information and communications technologies, strategic asymmetry and national security," Journal of International Management, Elsevier, vol. 11(4), pages 563-580, December.
  • Handle: RePEc:eee:intman:v:11:y:2005:i:4:p:563-580
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1075425305000712
    Download Restriction: Full text for ScienceDirect subscribers only
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Wanda J. Orlikowski & Jack J. Baroudi, 1991. "Studying Information Technology in Organizations: Research Approaches and Assumptions," Information Systems Research, INFORMS, vol. 2(1), pages 1-28, March.
    2. Georg Götz, 1999. "Monopolistic Competition and the Diffusion of New Technology," RAND Journal of Economics, The RAND Corporation, vol. 30(4), pages 679-693, Winter.
    3. Gary S. Becker, 1995. "The economics of crime," Cross Sections, Federal Reserve Bank of Richmond, vol. 12(Fall), pages 8-15.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kshetri, Nir, 2005. "Pattern of global cyber war and crime: A conceptual framework," Journal of International Management, Elsevier, vol. 11(4), pages 541-562, December.
    2. Aaltonen, Aleksi Ville & Alaimo, Cristina & Kallinikos, Jannis, 2021. "The making of data commodities: data analytics as an embedded process," LSE Research Online Documents on Economics 110296, London School of Economics and Political Science, LSE Library.
    3. Wanda J. Orlikowski & C. Suzanne Iacono, 2001. "Research Commentary: Desperately Seeking the “IT” in IT Research—A Call to Theorizing the IT Artifact," Information Systems Research, INFORMS, vol. 12(2), pages 121-134, June.
    4. Marie-José Avenier & Catherine Thomas, 2015. "Finding one's way around various methodological guidelines for doing rigorous case studies: A comparison of four epistemological frameworks [Se frayer un chemin parmi les différentes recommandation," Post-Print halshs-01491454, HAL.
    5. Neumeier, Stefan, 2017. "Modellvorhaben chance.natur - Endbericht der Begleitforschung," Thünen Reports 51, Johann Heinrich von Thünen Institute, Federal Research Institute for Rural Areas, Forestry and Fisheries.
    6. Umair Baig & Dr. Muhammad Arsalan Hashmi & Syed Babar Ali & Dr. Saba Zehara, 2020. "Exploratory Sequential Mixed Methods In Doctorate Research: Extended Application Of Constructivist Grounded Theory," IBT Journal of Business Studies (JBS), Ilma University, Faculty of Management Science, vol. 16(2), pages 47-65.
    7. Alexander Brem & Pierre Wolfram, 2017. "Organisation of new product development in Asia and Europe: results from Western multinationals R&D sites in Germany, India, and China," Review of Managerial Science, Springer, vol. 11(1), pages 159-190, January.
    8. Rob Gleasure & Kieran Conboy & Lorraine Morgan, 2019. "Talking Up a Storm: How Backers Use Public Discourse to Exert Control in Crowdfunded Systems Development Projects," Information Systems Research, INFORMS, vol. 30(2), pages 447-465, June.
    9. Taj, Saud A., 2016. "Application of signaling theory in management research: Addressing major gaps in theory," European Management Journal, Elsevier, vol. 34(4), pages 338-348.
    10. Garcia-Canal, Esteban & Rialp-Criado, Alex & Rialp-Criado, Josep, 2013. "Speed of ICT integration strategies in absorptions: Insights from a qualitative study," European Management Journal, Elsevier, vol. 31(3), pages 295-307.
    11. Lange, Carola, 2005. "Ein Bezugsrahmen zur Beschreibung von Forschungsgegenständen und -methoden in Wirtschaftsinformatik und Information Systems," ICB Research Reports 1, University Duisburg-Essen, Institute for Computer Science and Business Information Systems (ICB).
    12. Aguilar Alonso, Igor & Carrillo Verdún, José & Tovar Caro, Edmundo, 2017. "Description of the structure of the IT demand management process framework," International Journal of Information Management, Elsevier, vol. 37(1), pages 1461-1473.
    13. Shalini R. Tiwari & Rajen Gupta, 2012. "Dynamics of Knowledge Integration in a Project Network," International Journal of Business and Economics, School of Management Development, Feng Chia University, Taichung, Taiwan, vol. 11(2), pages 143-169, December.
    14. Chong, Alberto & Micco, Alejandro, 2003. "The Internet and the ability to innovate in Latin America," Emerging Markets Review, Elsevier, vol. 4(1), pages 53-72, March.
    15. Jonathan Beck & Michal Grajek & Christian Wey, 2005. "Hypermarket Competition and the Diffusion of Retail Checkout Barcode Scanning," CIG Working Papers SP II 2005-19, Wissenschaftszentrum Berlin (WZB), Research Unit: Competition and Innovation (CIG).
    16. Philipp Köllinger, 2005. "Why IT Matters: An Empirical Study of E-Business Usage, Innovation, and Firm Performance," Discussion Papers of DIW Berlin 495, DIW Berlin, German Institute for Economic Research.
    17. Hart O. Awa & Ojiabo Ukoha & Best C. Eke, 2016. "Adoption of emerging ICTs: The role of actors in a social network," Cogent Business & Management, Taylor & Francis Journals, vol. 3(1), pages 1259879-125, December.
    18. Jyoti Choudrie & Efpraxia Zamani & Chike Obuekwe, 2022. "Bridging the Digital Divide in Ethnic Minority Older Adults: an Organisational Qualitative Study," Information Systems Frontiers, Springer, vol. 24(4), pages 1355-1375, August.
    19. Alexander Nikiporenko, 2023. "Time-limited Metaheuristics for Cardinality-constrained Portfolio Optimisation," Papers 2307.04045, arXiv.org.
    20. Allen S. Lee & Richard L. Baskerville, 2003. "Generalizing Generalizability in Information Systems Research," Information Systems Research, INFORMS, vol. 14(3), pages 221-243, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:intman:v:11:y:2005:i:4:p:563-580. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/wps/find/journaldescription.cws_home/601266/description#description .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.