References
- Ahmad, R. A., & Hashim, M. S. (2011). The organisation of Islamic Conference – Computer Emergency Response Team (OIC-CERT): Answering cross border cooperation. In Proceedings of WCS 2011 (Second Worldwide Cybersecurity Summit). London: EastWest Institute.
- Akuta, E. A.-M., Ong'oa, I. M., Jones, C. R. (2011). Combating cyber crime in sub-Sahara Africa: A discourse on law, policy and practice. Journal of Research in Peace, Gender and Development, 1(4), 129–137.
- A.T. Kearney, Inc (2007). The globalization index. Foreign Policy, 163, 68–76.
- Ben-David, Y., Hasan, S., Pal, J., Vallentin, M., Panjwani, S., … Brewer, E. A. (2011). Computing security in the developing world (p. 39). New York: ACM Press. Retrieved June 17, 2013, from http://portal.acm.org/citation.cfm?doid=1999927.1999939
- Bhatt, S. (2010). Waiting for the president, and the baby. India Abroad, 41(5), A12
- Boland, R. J. (2004). Design in the punctuation of management action. In R.J. Boland and F. Collopy (Eds), Managing as designing: Creating a vocabulary for management education and research, Frontiers of Management Workshop (pp. 106–112). Standford, CA: Stanford University Press.
- Brechbühl, H., Bruce, R., Dynes, S., Johnson, M. E. (2010). Protecting critical information infrastructure: Developing cybersecurity policy. Information Technology for Development, 16(1), 83–91. doi: 10.1002/itdj.20096
- CIA (2012). The world factbook 2012, Washington, DC: Central Intelligence Agency.
- Coldebella, G. P., White, B. M. (2010). Foundational questions regarding the federal role in cybersecurity. Journal of National Security Law & Policy, 4, 233
- Council on Foreign Relations (2011). Cybersecurity, foreign policy, and business, Washington, DC: Council on Foreign Relations.
- Deibert, R. (2006). The geopolitics of Asian cyberspace. Far Eastern Economic Review, 169(10), 22–25.
- Deibert, R. J., Rohozinski, R. (2010a). Liberation vs. control: The future of cyberspace. Journal of Democracy, 21(4), 43–57. doi: 10.1353/jod.2010.0010
- Deibert, R. J., Rohozinski, R. (2010b). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15–32. doi: 10.1111/j.1749-5687.2009.00088.x
- Demchak, C. C. (1999). New security in cyberspace: Emerging intersection between military and civilian contingencies. Journal of Contingencies and Crisis Management, 7(4), 181–195. doi: 10.1111/1468-5973.00112
- Department of Industrial Policy and Promotion (2012). FDI statistics, year-wise equity inflows, New Delhi: Ministry of Commerce and Industry.
- Desai, N., Singh, A., Bajaj, K., Srinath, B. J., Waris, S … Patil, K. (2012). India‘s cyber security challenge, New Delhi: Institute for Defence Studies and Analyses (IDSA).
- Dewan, S., Kraemer, K. L. (2000). Information technology and productivity: Evidence from country-level data. Management Science, 46(4), 548–562. doi: 10.1287/mnsc.46.4.548.12057
- Easterly, W., Levine, R. (1997). Africa's growth tragedy: Policies and ethnic divisions. The Quarterly Journal of Economics, 112, 1203–1250. doi: 10.1162/003355300555466
- Ellefsen, I., & Solms, S. (2010). Critical information infrastructure protection in the developing world. In T. Moore & S. Shenoi (Eds.), Critical infrastructure protection IV (pp. 29–40). Berlin, Heidelberg: Springer.
- Ellefsen, I., Solms, S. (2010). Critical information infrastructure protection in the developing world. In MooreT.ShenoiS. (Ed.), Critical infrastructure protection IV, (pp. 29–40). Berlin: Springer. Retrieved June 23, 2013, from http://www.springerlink.com/index/10.1007/978-3-642-16806-2_3
- Ericsson, G. N. (2010). Cyber security and power system communication – essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501–1507. doi: 10.1109/TPWRD.2010.2046654
- Fabro, M., Roxey, T., Assante, M. (2010). No grid left behind. IEEE Security & Privacy Magazine, 8(1), 72–76. doi: 10.1109/MSP.2010.43
- Francois, R. (2009). World governance index – why should world governance be evaluated, and for what purpose?, Paris: Forum for a New World Governance. Retrieved from http://www.world-governance.org
- Gorman, S., Barnes, J. E. (2011). Cyber combat: Act of war – Pentagon sets stage for U.S. to respond to computer sabotage with military force. Wall Street Journal, 257(1250), 1–A1.
- Hare, F. B. (2009). Private sector contributions to national cyber security: A preliminary analysis. Journal of Homeland Security and Emergency Management, 6(1), Retrieved October 28, 2012, from http://www.degruyter.com/view/j/jhsem.2009.6.1/jhsem.2009.6.1.1426/jhsem.2009.6.1.1426.xml doi: 10.2202/1547-7355.1426
- Harknett, R. J., Stever, J. A. (2009). The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen. Journal of Homeland Security and Emergency Management, 6(1), Retrieved October 13, 2012, from http://www.degruyter.com/view/j/jhsem.2009.6.1/jhsem.2009.6.1.1649/jhsem.2009.6.1.1649.xml doi: 10.2202/1547-7355.1649
- Haygunde, C. (2011). NTRO on board, cyber security database coming. The Indian Express. Retrieved October 28, 2012, from http://www.indianexpress.com/news/ntro-on-board-cyber-security-database-coming/880721/0
- Hevner, A. R., March, S. T., Park, J., Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75–105.
- IBRD The World Bank (1998). The state in a changing world, world development report: 1997, New York, NY: Oxford University Press.
- IMF (2010). Coordinated direct investment survey, Washington, DC: International Monetary Fund.
- Ingram, A. (2001). Broadening Russia's borders?. Political Geography, 20(2), 197–219. doi: 10.1016/S0962-6298(00)00063-9
- ITU (2012). Percentage of individuals using the Internet 2000–2011, Geneva, Switzerland: Author. Retrieved October 28, 2012, from http://www.itu.int/ITU-D/ict/statistics/index.html
- Jellenc, E. (2012). Explaining politico-strategic cyber security: The feasibility of applying arms race theory. In E. Filiol and R. Erra (Eds.), Proceedings of the 11th European Conference on e-Government (pp. 151–162). Laval: Academic Conferences International.
- Kessides, C. (1993). The contributions of infrastructure to economic development: A review of experience and policy implications, Washington, DC: World Bank Publications.
- Klein, H. K., Myers, M. D. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23(1), 67–93. doi: 10.2307/249410
- Knapp, K. J., Boulton, W. R. (2006). Cyber-warfare threatens corporations: Expansion into commercial environments. Information Systems Management, 23(2), 76–87. doi: 10.1201/1078.10580530/45925.23.2.20060301/92675.8
- Kornbluh, K., Weitzer, D. (2011). U.S. commemorates 10th anniversary of 9/11 attacks. Foreign Policy Bulletin, 21(04), 16–43. doi: 10.1017/S1052703611000645
- Kriz, D. (2011). Cybersecurity principles for industry and government: A useful framework for efforts globally to improve cybersecurity. In 2011 Second Worldwide Cybersecurity Summit (WCS), 1–2 June, pp. 1–3. Second Worldwide Cybersecurity Summit (WCS). London, UK: Institute of Electrical and Electronics Engineers EastWest Institute. Retrieved October 24, 2012, from http://ieeexplore.ieee.org/servlet/opac?punumber=5963768
- Larmour, P. (1995). Modes of governance and development. Development Bulletin, 33, 4–5.
- LeBlanc, P., Mbarika, V., McCoy, S., & Meso, P. (2004). Tele-democracy in developing countries: A focus on sub-Saharan Africa. Proceedings of the 2004 Information Resource Management Association (IRMA) International Conference, New Orleans, LA.
- Lewis, J. (2006). Cybersecurity and critical infrastructure protection. Washington, DC: Center for Strategic and International Studies.
- Lewis, T. G. (2006). Critical infrastructure protection in homeland security defending a networked nation, Hoboken, NJ: Wiley-Interscience.
- Lin, H. S., Spector, A. Z., Neumann, P. G., Goodman, S. E. (2007). Toward a safer and more secure cyberspace. Communications of the ACM, 50(10), 128 doi: 10.1145/1290958.1290991
- Low, K. L., Lim, C. S., Samudhram, A. (2011). Sustainable economic development: A perspective from ICT loops in developing nations. African Journal of Business Management, 5(15), 6138–6149.
- Manjikian, M. M. (2010). From global village to virtual battlespace: The colonizing of the internet and the extension of realpolitik. International Studies Quarterly, 54(2), 381–401. doi: 10.1111/j.1468-2478.2010.00592.x
- Meso, P., Datta, P., Mbarika, V. (2006). Moderating information infrastructure's effects on national development with good governance: A study of developing countries. Journal of the American Society for Information Sciences and Technology, 57(2), 186–197. doi: 10.1002/asi.20263
- Meso, P., Duncan, N. (2000). Can national information infrastructure enhance social development in the least developed countries? An empirical investigation. Journal of Global Information Management, 8(4), 30–42. doi: 10.4018/jgim.2000100103
- Meso, P., Straub, D., Mbarika, V. (2009). Information infrastructure, governance, and socio-economic development in developing countries. European Journal of Information Systems, 18(1), 52–65. doi: 10.1057/ejis.2008.56
- Michael, J. B., Roberts, S. E., Voas, J. M., Wingfield, T. C. (2005). The role of policy in balancing outsourcing and homeland security. IT Professional,July/August 19–23. doi: 10.1109/MITP.2005.100
- Mitra, P. (1998). Cyberspace war. Far Eastern Economic Review, 161(45), 28.
- Muncaster, P. (2012). India to greenlight state-sponsored cyber attacks. The Register, Retrieved August 22, 2013, from http://www.theregister.co.uk/2012/03/16/indian_government_sites_hacked/
- Nye, J. S. (2011). Nuclear lessons for cyber security?. Strategic Studies Quarterly, 5(4), 18–38.
- OECD (2013). OECD factbook 2013: Economic, environmental and social statistics, Paris: OECD.
- Oh, P. S. (2009). Future strategic environment in an era of persistent conflict. Military Review, 89(4), 68–79.
- Ozeren, S. (2005). Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment (Doctoral dissertation). Denton: University of North Texas.
- Pakistan Board of Investment (2012). Economic indicators, Karachi: Author. Retrieved October 28, 2012, from http://www.pakboi.gov.pk/index.php?option=com_content&view=article&id=118&Itemid=134
- Parvaiz, A. (2010). India: Kashmiri youngsters wage online struggle. Asia Media Forum – Global Information Network. Retrieved October 28, 2012, from http://search.proquest.com/docview/749090706?accountid=14868
- Peffers, K., Tuunanen, T., Rothenberger, M. A., Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45–77. doi: 10.2753/MIS0742-1222240302
- Peters, B. G., Pierre, J. (1998). Governance without government? Rethinking public administration. Journal of Public Administration Research and Theory, 8(2), 223–243. doi: 10.1093/oxfordjournals.jpart.a024379
- Shah, F. (2011). Propaganda & warfare in cyber world. Defence Journal, 15(1), 79–83.
- Sharp, W. G.Sr (2010). Past, present, and future of cybersecurity. Journal of National Security Law & Policy, 4, 13
- Shiu, A., Lam, P. L. (2008). Causal relationship between telecommunications and economic growth in China and its regions. Regional Studies, 42(5), 705–718. doi: 10.1080/00343400701543314
- Stoker, G. (1998). Governance as theory: Five propositions. International Social Science Journal, 155, 17–27. doi: 10.1111/1468-2451.00106
- Sund, C. (2007). Towards an international road-map for cybersecurity. Online Information Review, 31(5), 566–582. doi: 10.1108/14684520710832306
- Tagert, A. C. (2010). Cybersecurity challenges in developing nations (Doctoral dissertation). Pittsburgh, PA: Carnegie Mellon University.
- Ten, C.-W., Liu, C.-C., Manimaran, G. (2008). Vulnerability assessment of cybersecurity for SCADA systems. IEEE Transactions on Power Systems, 23(4), 1836–1846. doi: 10.1109/TPWRS.2008.2002298
- United Nations. (2011, September 13). Cyber security: Global response to the global issue. SP’s Land Forces. Retrieved October 28, 2012, from http://search.proquest.com/docview/889349866?accountid=14868
- United Nations Conference on Trade and Development (Geneva) (2010). World investment report 2010: Investing in a low-carbon economy, New York, NY: United Nations.
- Unnithan, S. (2011, March 18). Inside the Indo-Pak cyber wars. India Today. Retrieved August 22, 2013, from http://indiatoday.intoday.in/story/india-pakistan-cyber-war-run-by-hired-hackers/1/132147.html
- Warren, M., & Leitch, S. (2011). Australian national critical infrastructure protection: A case study. In Proceedings of ECIWS (10th European Conference on Information Warfare and Security). Tallinn, Estonia: The Institute of Cybernetics at the Tallinn University of Technology.
- Warren, M. J., & McIntyre, J. (2012). Protection of New Zealand in the age of information warfare. In Protecting the infrastructure: proceedings: 3rd Australian Information Warfare & Security Conference 2002. Perth: Edith Cowan University, School of Management Information Systems, We-B Centre.
- Welander, P. (2007). Cyber security: The human factor. Control Engineering, 54(11), C2–C3.
- Wolde-Rufael, Y. (2007). Another look at the relationship between telecommunications investment and economic activity in the United States. International Economic Journal, 21(2), 199–205. doi: 10.1080/10168730701345372
- Worden, S. P., Johnson-Freese, J. (2003). Globalizing space security. Joint Force Quarterly, 33(Winter), 65–71.
- World Bank (2012). World development indicators 2012, Washington, DC: Author.
- Yunos, Z., Ahmad, R., Hafidz Suid, S., & Ismail, Z. (2010). Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework. In IEEE, Kuala Lumpur, Malaysia, pp. 21–27. Retrieved October 28, 2012, from http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5604182