745
Views
6
CrossRef citations to date
0
Altmetric
Articles

A Model for the Impact of Cybersecurity Infrastructure on Economic Development in Emerging Economies: Evaluating the Contrasting Cases of India and Pakistan

References

  • Ahmad, R. A., & Hashim, M. S. (2011). The organisation of Islamic Conference – Computer Emergency Response Team (OIC-CERT): Answering cross border cooperation. In Proceedings of WCS 2011 (Second Worldwide Cybersecurity Summit). London: EastWest Institute.
  • Akuta, E. A.-M., Ong'oa, I. M., Jones, C. R. (2011). Combating cyber crime in sub-Sahara Africa: A discourse on law, policy and practice. Journal of Research in Peace, Gender and Development, 1(4), 129–137.
  • A.T. Kearney, Inc (2007). The globalization index. Foreign Policy, 163, 68–76.
  • Ben-David, Y., Hasan, S., Pal, J., Vallentin, M., Panjwani, S., … Brewer, E. A. (2011). Computing security in the developing world (p. 39). New York: ACM Press. Retrieved June 17, 2013, from http://portal.acm.org/citation.cfm?doid=1999927.1999939
  • Bhatt, S. (2010). Waiting for the president, and the baby. India Abroad, 41(5), A12
  • Boland, R. J. (2004). Design in the punctuation of management action. In R.J. Boland and F. Collopy (Eds), Managing as designing: Creating a vocabulary for management education and research, Frontiers of Management Workshop (pp. 106–112). Standford, CA: Stanford University Press.
  • Brechbühl, H., Bruce, R., Dynes, S., Johnson, M. E. (2010). Protecting critical information infrastructure: Developing cybersecurity policy. Information Technology for Development, 16(1), 83–91. doi: 10.1002/itdj.20096
  • CIA (2012). The world factbook 2012, Washington, DC: Central Intelligence Agency.
  • Coldebella, G. P., White, B. M. (2010). Foundational questions regarding the federal role in cybersecurity. Journal of National Security Law & Policy, 4, 233
  • Council on Foreign Relations (2011). Cybersecurity, foreign policy, and business, Washington, DC: Council on Foreign Relations.
  • Deibert, R. (2006). The geopolitics of Asian cyberspace. Far Eastern Economic Review, 169(10), 22–25.
  • Deibert, R. J., Rohozinski, R. (2010a). Liberation vs. control: The future of cyberspace. Journal of Democracy, 21(4), 43–57. doi: 10.1353/jod.2010.0010
  • Deibert, R. J., Rohozinski, R. (2010b). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15–32. doi: 10.1111/j.1749-5687.2009.00088.x
  • Demchak, C. C. (1999). New security in cyberspace: Emerging intersection between military and civilian contingencies. Journal of Contingencies and Crisis Management, 7(4), 181–195. doi: 10.1111/1468-5973.00112
  • Department of Industrial Policy and Promotion (2012). FDI statistics, year-wise equity inflows, New Delhi: Ministry of Commerce and Industry.
  • Desai, N., Singh, A., Bajaj, K., Srinath, B. J., Waris, S … Patil, K. (2012). India‘s cyber security challenge, New Delhi: Institute for Defence Studies and Analyses (IDSA).
  • Dewan, S., Kraemer, K. L. (2000). Information technology and productivity: Evidence from country-level data. Management Science, 46(4), 548–562. doi: 10.1287/mnsc.46.4.548.12057
  • Easterly, W., Levine, R. (1997). Africa's growth tragedy: Policies and ethnic divisions. The Quarterly Journal of Economics, 112, 1203–1250. doi: 10.1162/003355300555466
  • Ellefsen, I., & Solms, S. (2010). Critical information infrastructure protection in the developing world. In T. Moore & S. Shenoi (Eds.), Critical infrastructure protection IV (pp. 29–40). Berlin, Heidelberg: Springer.
  • Ellefsen, I., Solms, S. (2010). Critical information infrastructure protection in the developing world. In MooreT.ShenoiS. (Ed.), Critical infrastructure protection IV, (pp. 29–40). Berlin: Springer. Retrieved June 23, 2013, from http://www.springerlink.com/index/10.1007/978-3-642-16806-2_3
  • Ericsson, G. N. (2010). Cyber security and power system communication – essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501–1507. doi: 10.1109/TPWRD.2010.2046654
  • Fabro, M., Roxey, T., Assante, M. (2010). No grid left behind. IEEE Security & Privacy Magazine, 8(1), 72–76. doi: 10.1109/MSP.2010.43
  • Francois, R. (2009). World governance index – why should world governance be evaluated, and for what purpose?, Paris: Forum for a New World Governance. Retrieved from http://www.world-governance.org
  • Gorman, S., Barnes, J. E. (2011). Cyber combat: Act of war – Pentagon sets stage for U.S. to respond to computer sabotage with military force. Wall Street Journal, 257(1250), 1–A1.
  • Hare, F. B. (2009). Private sector contributions to national cyber security: A preliminary analysis. Journal of Homeland Security and Emergency Management, 6(1), Retrieved October 28, 2012, from http://www.degruyter.com/view/j/jhsem.2009.6.1/jhsem.2009.6.1.1426/jhsem.2009.6.1.1426.xml doi: 10.2202/1547-7355.1426
  • Harknett, R. J., Stever, J. A. (2009). The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen. Journal of Homeland Security and Emergency Management, 6(1), Retrieved October 13, 2012, from http://www.degruyter.com/view/j/jhsem.2009.6.1/jhsem.2009.6.1.1649/jhsem.2009.6.1.1649.xml doi: 10.2202/1547-7355.1649
  • Haygunde, C. (2011). NTRO on board, cyber security database coming. The Indian Express. Retrieved October 28, 2012, from http://www.indianexpress.com/news/ntro-on-board-cyber-security-database-coming/880721/0
  • Hevner, A. R., March, S. T., Park, J., Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75–105.
  • IBRD The World Bank (1998). The state in a changing world, world development report: 1997, New York, NY: Oxford University Press.
  • IMF (2010). Coordinated direct investment survey, Washington, DC: International Monetary Fund.
  • Ingram, A. (2001). Broadening Russia's borders?. Political Geography, 20(2), 197–219. doi: 10.1016/S0962-6298(00)00063-9
  • ITU (2012). Percentage of individuals using the Internet 2000–2011, Geneva, Switzerland: Author. Retrieved October 28, 2012, from http://www.itu.int/ITU-D/ict/statistics/index.html
  • Jellenc, E. (2012). Explaining politico-strategic cyber security: The feasibility of applying arms race theory. In E. Filiol and R. Erra (Eds.), Proceedings of the 11th European Conference on e-Government (pp. 151–162). Laval: Academic Conferences International.
  • Kessides, C. (1993). The contributions of infrastructure to economic development: A review of experience and policy implications, Washington, DC: World Bank Publications.
  • Klein, H. K., Myers, M. D. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23(1), 67–93. doi: 10.2307/249410
  • Knapp, K. J., Boulton, W. R. (2006). Cyber-warfare threatens corporations: Expansion into commercial environments. Information Systems Management, 23(2), 76–87. doi: 10.1201/1078.10580530/45925.23.2.20060301/92675.8
  • Kornbluh, K., Weitzer, D. (2011). U.S. commemorates 10th anniversary of 9/11 attacks. Foreign Policy Bulletin, 21(04), 16–43. doi: 10.1017/S1052703611000645
  • Kriz, D. (2011). Cybersecurity principles for industry and government: A useful framework for efforts globally to improve cybersecurity. In 2011 Second Worldwide Cybersecurity Summit (WCS), 1–2 June, pp. 1–3. Second Worldwide Cybersecurity Summit (WCS). London, UK: Institute of Electrical and Electronics Engineers EastWest Institute. Retrieved October 24, 2012, from http://ieeexplore.ieee.org/servlet/opac?punumber=5963768
  • Larmour, P. (1995). Modes of governance and development. Development Bulletin, 33, 4–5.
  • LeBlanc, P., Mbarika, V., McCoy, S., & Meso, P. (2004). Tele-democracy in developing countries: A focus on sub-Saharan Africa. Proceedings of the 2004 Information Resource Management Association (IRMA) International Conference, New Orleans, LA.
  • Lewis, J. (2006). Cybersecurity and critical infrastructure protection. Washington, DC: Center for Strategic and International Studies.
  • Lewis, T. G. (2006). Critical infrastructure protection in homeland security defending a networked nation, Hoboken, NJ: Wiley-Interscience.
  • Lin, H. S., Spector, A. Z., Neumann, P. G., Goodman, S. E. (2007). Toward a safer and more secure cyberspace. Communications of the ACM, 50(10), 128 doi: 10.1145/1290958.1290991
  • Low, K. L., Lim, C. S., Samudhram, A. (2011). Sustainable economic development: A perspective from ICT loops in developing nations. African Journal of Business Management, 5(15), 6138–6149.
  • Manjikian, M. M. (2010). From global village to virtual battlespace: The colonizing of the internet and the extension of realpolitik. International Studies Quarterly, 54(2), 381–401. doi: 10.1111/j.1468-2478.2010.00592.x
  • Meso, P., Datta, P., Mbarika, V. (2006). Moderating information infrastructure's effects on national development with good governance: A study of developing countries. Journal of the American Society for Information Sciences and Technology, 57(2), 186–197. doi: 10.1002/asi.20263
  • Meso, P., Duncan, N. (2000). Can national information infrastructure enhance social development in the least developed countries? An empirical investigation. Journal of Global Information Management, 8(4), 30–42. doi: 10.4018/jgim.2000100103
  • Meso, P., Straub, D., Mbarika, V. (2009). Information infrastructure, governance, and socio-economic development in developing countries. European Journal of Information Systems, 18(1), 52–65. doi: 10.1057/ejis.2008.56
  • Michael, J. B., Roberts, S. E., Voas, J. M., Wingfield, T. C. (2005). The role of policy in balancing outsourcing and homeland security. IT Professional,July/August 19–23. doi: 10.1109/MITP.2005.100
  • Mitra, P. (1998). Cyberspace war. Far Eastern Economic Review, 161(45), 28.
  • Muncaster, P. (2012). India to greenlight state-sponsored cyber attacks. The Register, Retrieved August 22, 2013, from http://www.theregister.co.uk/2012/03/16/indian_government_sites_hacked/
  • Nye, J. S. (2011). Nuclear lessons for cyber security?. Strategic Studies Quarterly, 5(4), 18–38.
  • OECD (2013). OECD factbook 2013: Economic, environmental and social statistics, Paris: OECD.
  • Oh, P. S. (2009). Future strategic environment in an era of persistent conflict. Military Review, 89(4), 68–79.
  • Ozeren, S. (2005). Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment (Doctoral dissertation). Denton: University of North Texas.
  • Pakistan Board of Investment (2012). Economic indicators, Karachi: Author. Retrieved October 28, 2012, from http://www.pakboi.gov.pk/index.php?option=com_content&view=article&id=118&Itemid=134
  • Parvaiz, A. (2010). India: Kashmiri youngsters wage online struggle. Asia Media Forum – Global Information Network. Retrieved October 28, 2012, from http://search.proquest.com/docview/749090706?accountid=14868
  • Peffers, K., Tuunanen, T., Rothenberger, M. A., Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45–77. doi: 10.2753/MIS0742-1222240302
  • Peters, B. G., Pierre, J. (1998). Governance without government? Rethinking public administration. Journal of Public Administration Research and Theory, 8(2), 223–243. doi: 10.1093/oxfordjournals.jpart.a024379
  • Shah, F. (2011). Propaganda & warfare in cyber world. Defence Journal, 15(1), 79–83.
  • Sharp, W. G.Sr (2010). Past, present, and future of cybersecurity. Journal of National Security Law & Policy, 4, 13
  • Shiu, A., Lam, P. L. (2008). Causal relationship between telecommunications and economic growth in China and its regions. Regional Studies, 42(5), 705–718. doi: 10.1080/00343400701543314
  • Stoker, G. (1998). Governance as theory: Five propositions. International Social Science Journal, 155, 17–27. doi: 10.1111/1468-2451.00106
  • Sund, C. (2007). Towards an international road-map for cybersecurity. Online Information Review, 31(5), 566–582. doi: 10.1108/14684520710832306
  • Tagert, A. C. (2010). Cybersecurity challenges in developing nations (Doctoral dissertation). Pittsburgh, PA: Carnegie Mellon University.
  • Ten, C.-W., Liu, C.-C., Manimaran, G. (2008). Vulnerability assessment of cybersecurity for SCADA systems. IEEE Transactions on Power Systems, 23(4), 1836–1846. doi: 10.1109/TPWRS.2008.2002298
  • United Nations. (2011, September 13). Cyber security: Global response to the global issue. SP’s Land Forces. Retrieved October 28, 2012, from http://search.proquest.com/docview/889349866?accountid=14868
  • United Nations Conference on Trade and Development (Geneva) (2010). World investment report 2010: Investing in a low-carbon economy, New York, NY: United Nations.
  • Unnithan, S. (2011, March 18). Inside the Indo-Pak cyber wars. India Today. Retrieved August 22, 2013, from http://indiatoday.intoday.in/story/india-pakistan-cyber-war-run-by-hired-hackers/1/132147.html
  • Warren, M., & Leitch, S. (2011). Australian national critical infrastructure protection: A case study. In Proceedings of ECIWS (10th European Conference on Information Warfare and Security). Tallinn, Estonia: The Institute of Cybernetics at the Tallinn University of Technology.
  • Warren, M. J., & McIntyre, J. (2012). Protection of New Zealand in the age of information warfare. In Protecting the infrastructure: proceedings: 3rd Australian Information Warfare & Security Conference 2002. Perth: Edith Cowan University, School of Management Information Systems, We-B Centre.
  • Welander, P. (2007). Cyber security: The human factor. Control Engineering, 54(11), C2–C3.
  • Wolde-Rufael, Y. (2007). Another look at the relationship between telecommunications investment and economic activity in the United States. International Economic Journal, 21(2), 199–205. doi: 10.1080/10168730701345372
  • Worden, S. P., Johnson-Freese, J. (2003). Globalizing space security. Joint Force Quarterly, 33(Winter), 65–71.
  • World Bank (2012). World development indicators 2012, Washington, DC: Author.
  • Yunos, Z., Ahmad, R., Hafidz Suid, S., & Ismail, Z. (2010). Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework. In IEEE, Kuala Lumpur, Malaysia, pp. 21–27. Retrieved October 28, 2012, from http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5604182

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.