Information and communications technologies, strategic asymmetry and national security

UNCG Author/Contributor (non-UNCG co-authors, if there are any, appear on document)
Nir B. Kshetri, Professor (Creator)
The University of North Carolina at Greensboro (UNCG )
Web Site:

Abstract: In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This article discusses various asymmetries associated with institutions, nations and organizations that influence the ICT-national security nexus. Regulative, normative and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries. Integrative approaches that combine policy and technological measures at various levels are likely to make the world more secure.

Additional Information

Journal of International Management, 11(4), 563-580.
Language: English
Date: 2005
Strategic asymmetry, Information and communication technologies, National security, Institutions, Cyber attacks

Email this document to