1,113
Views
9
CrossRef citations to date
0
Altmetric
Part I: Geopolitical theory and strategy: The words and the history of ideas

Information power: Strategy, geopolitics, and the fifth dimension

Pages 137-157 | Published online: 24 Jan 2008

Notes

  • Wriston , Walter B. 1997 . ‘Bits, Bytes, and Diplomacy’ . Foreign Affairs , 76 ( 5 ) Sept./Oct. : 172 172 – 82 .
  • Libicki , Martin . 1996 . ‘The Emerging Primacy of Information’ . Orbis , 40 ( 2 ) Spring : 261 – 76 .
  • Vlahos , Michael . 1997 . ‘The War after Byte City’ . The Washington Quarterly , 20 ( 2 ) Spring : 39 – 72 .
  • Mathews , Jessica T. 1997 . ‘Power Shift’ . Foreign Affairs , 76 ( 1 ) Jan./Feb. : 50 – 66 .
  • Mackinder , Halford J. 1962 . Democratic Ideals and Reality [1919] , NY : Norton .
  • Zoppo , Ciro E. 1985 . “ ‘Classical Geopolitics and Beyond’ ” . In On Geopolitics: Classical and Nuclear , Edited by: Zorgbibe , Charles . NATO ASI Series, Dordrect : Nijhoff .
  • Douhet , Giulio . 1943 . The Command of the Air [1921] , London : Faber .
  • von Clausewitz , Carl . 1993 . On War , London : David Campbell .
  • Gray , Colin S. 1990 . War, Peace, and Victory: Strategy and Statecraft for the Next Century , NY : Simon & Schuster .
  • Brettingham , Laurie . 1997 . Royal Air Force Beam Benders No.80 (Signals) Wing 1940–1945 , Leicester : Midland Publishing .
  • Alvin and Toffler , Heidi . 1994 . War and Anti‐war: Survival at the Dawn of the 21st Century , London : Little, Brown .
  • Libicki . “ ‘Emerging Primacy’ ” . 274 (note 2)
  • Keohane , Robert O. and Nye , Joseph S. Jr . 1998 . ‘Power and Interdependence in the Information Age’ . Foreign Affairs , 77 ( 5 ) Sept./Oct. : 81 – 94 .
  • Ferrill , Arther . 1985 . The Origins of War: From the Stone Age to Alexander the Great , 204 – 5 . London : Thames & Hudson .
  • Weigley , Russell F. 1991 . The Age of Battles: The Quest for Decisive Warfare from Breitenfeld to Waterloo , 59 London : Pimlico .
  • Carlin , John . 1997 . ‘The Netizen: A Farewell to Arms’ . Wired , 5 ( 5 ) May
  • Chandler , David . 1966 . The Campaigns of Napoleon , 165 London : Weidenfeld & Nicolson .
  • Hastings , Max and Jenkins , Simon . 1997 . The Battle for the Falklands [1983] , 300 – 1 . London : Pan Books .
  • Hawking , Stephen . 1995 . A Brief History of Time: From the Big Bang to Black Holes , London : Bantam Books .
  • Asprey , Robert B. 1994 . War in the Shadows, , 2nd ed. , 419 London : Little, Brown .
  • Slim , Viscount . 1956 . Defeat into Victory , London : Cassell .
  • Tzu , Sun . 1971 . The Art of War , Edited by: Griffith , Samuel B. London : OUP .
  • Libicki , Martin C. “ ‘Technology and Warfare’ ” . In 2015: Power and Progress Edited by: Cronin , Patrick M.
  • Evers , Stacey . 1997 . ‘US Navy Seeks Fast Track to Revolution’ . Jane's Defence Weekly , 26 Nov. : 55 – 9 .
  • Corbett , Julian S. 1919 . Some Principles of Maritime Strategy, , 2nd ed. , 77 London : Longmans, Green .
  • Warden , John A. III . 1989 . The Air Campaign: Planning for Combat, Future Warfare Series , Vol.3 , 130 Washington DC : Pergamon‐Brasseys .
  • Grove , Eric . 1990 . The Future of Sea Power , 12 – 13 . Annapolis, MO : Naval Institute Press .
  • Starry , M.D. and Arneson , C.W. Jr . 1996 . ‘FM 100–6: Information Operations’ . Military Review , 76 ( 6 ) Nov./Dec. : 3 – 15 .
  • Seffers , George I. 1997 . ‘Army War Game Reveals Power of Commercial Data’ . Defense News , 22–28 Sept. : 44
  • Nye , Joseph S. Jr and Owens , William A. 1996 . ‘America's Information Edge’ . Foreign Affairs , 75 ( 2 ) March/April : 24 20 – 36 .
  • Atkinson , Rick . 1993 . Crusade: The Untold Story of the Persian Gulf War , 439 Boston : Houghton Mifflin .
  • Gray , Colin S. 1992 . The Leverage of Sea Power: The Strategic Advantage of Navies in War , 12 NY : Free Press .
  • 1997 . ‘Sri Lanka says navy will be upgraded to combat Tigers’ . Jane's Defence Weekly , 12 Nov. : 5
  • Gertz , Bill . 17 April 1998 . “ ‘Pentagon Fortifying Computer Networks to Block Hackers’ ” . 17 April , http://www.washtimes.eom/nation/nation/.html.
  • Baddeley , A.J. 1997 . ‘Insurgency and Counter Insurgency in the Information Age’ . paper prepared for the BISA Annual Conference . Dec. 15–17 1997 .
  • Luttwak , Edward N. 1996 . ‘A Post‐Heroic Military Policy’ . Foreign Affairs , 75 ( 4 ) July/Aug. : 33 – 44 .
  • Starr , Barbara . 1997 . ‘Wargames highlight US vulnerability in space’ . Jane's Defence Weekly , 8 Oct. : 17
  • Libicki . “ ‘Emerging Primacy’ ” . 268 (note 2)
  • Robins , W.J.P. 1997 . ‘Information Age Operations’ . RUSI Journal , 142 ( 3 ) June : 40 37 – 41 .
  • Schwartau , Winn . 1996 . Information Warfare: Cyberterrorism: Protecting Your Personal Security in the Electronic Age, , 2nd ed. , NY : Thunder's Mouth Press .
  • Henry , Ryan and Peartree , C. Edward . 1997 . ‘Assessing ‘Byte City’: An Insightful or Misleading Vision?’ . Washington Quarterly , 20 ( 2 ) Spring : 77 73 – 8 .
  • Szafranski , Richard and Libicki , Martin C. 1996 . ‘... Or Go Down in Flame? Toward an Airpower Manifesto for the Twenty‐first Century’ . Airpower Journal , 10 ( 3 ) Fall : 65 – 77 .
  • Clodfelter , Mark . 1989 . The Limits of Air Power: The American Bombing of North Vietnam , NY : Free Press .
  • Luttwak , Edward N. 1987 . Strategy: The Logic of War and Peace , Cambridge, MA : The Belknap Press of Harvard UP .
  • Wohlstetter , Albert . 1968 . ‘Illusions of Distance’ . Foreign Affairs , 46 ( 2 ) Jan. : 242 – 55 .
  • Ball , Desmond . “ ‘Modern Technology and Geopolitics’ ” . In On Geopolitics Edited by: Zoppo and Zorgbibe . 175 (note 3)
  • Libicki . “ ‘Emerging Primacy’ ” . 261 (note 2)
  • Carter , Ashton B. 1987 . “ ‘Assessing Command System Vulnerability’, and ‘Sources of Error and Uncertainty’ ” . In Managing Nuclear Operations , Edited by: Carter , John D. Steinbruner and Zraket , Charles A. 555 – 610 . 611 – 39 . Washington DC : Brookings .
  • Gray . Leverage of Sea Power 4 (note 29)
  • Gray , Colin S. 1996 . ‘A Rejoinder by Colin S. Gray’ . Orbis , 40 ( 2 ) Spring : 274 – 76 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.