2,136
Views
5
CrossRef citations to date
0
Altmetric
Research Article

Intelligence, Cyberspace, and National Security

, &
Pages 18-45 | Received 09 Oct 2019, Accepted 03 Jun 2020, Published online: 18 Jul 2020

References

  • Alpcan, T., and T. Başar. 2011. Network Security: A Decision and Game Theoretic Approach. New York, USA: Cambridge University Press.
  • Bandyopadhyay, T., and R. Sebalia. 2008. “Countering Cyber Terrorism: Investment Models under Decision and Game Theoretic Frameworks.” Proceedings of the Southern Association for Information Systems Conference (p. 1–6), Richmond, VA, USA.
  • Bar-El, R., K. Kagan, and A. Tishler. 2010. “Forward-looking versus Shortsighted Defense Budget Allocation.” Journal of Conflict Resolution 54 (4): 638–662. doi:10.1177/0022002710361939.
  • Bar-El, R., E. Pecht, and A. Tishler. 2020. “Human Capital and National Security.” Defence and Peace Economics 31 (2): 121–141. doi:10.1080/10242694.2018.1485088.
  • Bar-Joseph, U. 2013. “The ‘Special Means of Collection’: The Missing Link in the Surprise of the Yom Kippur War.” The Middle East Journal 67 (4): 531–546. doi:10.3751/67.4.12.
  • Baryshnikov, Y. 2012. “IT Security Investment and Gordon-Loeb’s 1/e Rule.” Workshop on the Economics of Information Security, (p. 1–6).
  • Biran, D., and Y. Tauman. 2008. “The Role of Intelligence in Nuclear Deterrence.” November 2. http://yairtauman.googlepages.com/Intelligence.pdf Accessed on 13 March 2020
  • Böhme, R. 2010. “Security Metrics and Security Investment Models.” In IWSEC’10 Proceedings of the 5th International Conference on Advances in Information and Computer Security, edited by I. Echizen, N. Kunihiro, and R. Sasaki, Vol. 6434: 10–24. Berlin Heidelberg: Springer.
  • Böhme, R., and T. Nowey. 2008. “Economic Security Metrics.” In Dependability Metrics, edited by. I. Eusgeld, F. C. Freiling, and R. Reussner, 176–187,  Germany: Springer Berlin Heidelberg.
  • Bracken, J., and R. Darilek. 1998. “Information Superiority and Game Theory: The Value of Information in Four Games.” MORS Phalanx 31: 4.
  • Brecht, M., and T. Nowey. 2012. “A Closer Look at Information Security Costs.” Workshop on the Economics of Information Security (WEIS): 1–21. Berlin, Germany.
  • Brito, D. L., and M. D. Intriligator. 1995. “Arms Races and Proliferation.” In Handbook of Defense Economics, edited by. K. Hartley and T. Sandler, 109–164. Vol. 1. Amsterdam: Elsevier Science B.V.
  • Brown, H., and W. B. Rudman. 1996. “Preparing for the 21st Century: An Appraisal of U.S. Intelligence.” Report of the Commission on the Roles and Capabilities of the United States Intelligence Community. March 1. http://www.fas.org/irp/offdocs/report.html Accessed on 14 September 2019.
  • Carl, L. D. 1990. International Dictionary of Intelligence. McLean, VA: Maven Books.
  • Cavusoglu, H., B. Mishra, and S. Raghunathan. 2004. “A Model for Evaluating IT Security Investments.” Communications of the ACM 47 (7): 87–92. doi:10.1145/1005817.1005828.
  • Cavusoglu, H., S. Raghunathan, and W. T. Yue. 2008. “Decision-theoretic and Game-theoretic Approaches to IT Security Investment.” Journal of Management Information Systems 25 (2): 281–304. doi:10.2753/MIS0742-1222250211.
  • Clark, J. R. 2007. Intelligence and National Security. Westport: Praeger Security International.
  • Crawford, V. P. 2003. “Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions.” American Economic Review 93 (1): 133–149. doi:10.1257/000282803321455197.
  • Cremonini, M., and D. Nizovtsev. 2006. “Understanding and Influencing Attackers’ Decisions: Implications for Security Investment Strategies.” Workshop on the Economics of Information Security (WEIS), 1–24.
  • Dertouzos, M. 1997. What Will Be: How the New World of Information Will Change Our Lives. New York: Harper-Collins.
  • Dixit, A. K. A., and J. E. Stiglitz. 1977. “Monopolistic Competition and Optimum Product Diversity.” American Economic Review 67 (3): 297–308.
  • DoD Dictionary. 2020. DOD Dictionary of Military and Associated Terms. Washington DC: Office of the Chairman of the Joint Chiefs of Staff.
  • Dunne, J. P., M. Garcia-Alonso, R. Smith, and P. Levine. 2002. “Concentration in the International Arms Industry.” In ECAAR Panel Session, American Economic Association/ASSA Annual Meetings. Atlanta.
  • England, W. L. 1988. “An Exponential Model Used for Optimal Threshold Selection on ROC Curves.” Medical Decision Making 8 (2): 120–131. doi:10.1177/0272989X8800800208.
  • Eom, J. H. H., N. U. U. Kim, S. H. H. Kim, and T. M. M. Chung. 2012. “Cyber Military Strategy for Cyberspace Superiority in Cyber Warfare.” Proceedings of the 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 295–299, Kuala Lumpur, Malaysia.
  • Even, S., and A. Granit. 2009. “The Intelligence Community – Where To?” Memorandum 97, INSS - The Institute for National Security Studies, June (Hebrew).
  • FAS. 2019. “Intelligence Resource Program.” http://fas.org/irp/budget/ Accessed on 14 September 2019.
  • Gal-Or, E., and A. Ghose. 2005. “The Economic Incentives for Sharing Security Information.” Information Systems Research 16 (2): 186–208. doi:10.1287/isre.1050.0053.
  • Garicano, L., and R. A. Posner. 2005. “Intelligence Failures: An Organizational Economics Perspective.” The Journal of Economic Perspectives 19 (4): 151–170. doi:10.1257/089533005775196723.
  • Gilad, A., and A. Tishler. 2019. “Mitigating the Risk of Advanced Cyber-attacks: An Economic Model of the Variety of Weapons and Detectors.” Paper presented at the 23rd Annual International Conference on Economics and Security, Madrid, Spain.
  • Gilboa, A., and E. Lapid 2008. “Masterpiece, an inside look at sixty years of Israeli intelligence.” Tel Aviv, Israel: Miskal - Yedioth Ahronoth Books and Chemed Books (Hebrew).
  • Gordon, L. A., and M. P. Loeb. 2002. “The Economics of Information Security Investment.” ACM Transactions on Information and System Security 5 (4): 438–457. doi:10.1145/581271.581274.
  • Grossklags, J., N. Christin, and J. Chuang. 2008. “Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents.” Workshop on the Economics of Information Security, 1–40.
  • Hausken, K. 2008. “Strategic Defense and Attack for Series and Parallel Reliability Systems.” European Journal of Operational Research 186 (2): 856–881. doi:10.1016/j.ejor.2007.02.013.
  • Hausken, K. 2011. “Protecting Complex Infrastructures against Multiple Strategic Attackers.” International Journal of Systems Science 42 (1): 11–29. doi:10.1080/00207720903434789.
  • Henderson, J. M., and R. E. Quandt. 1980. Microeconomic Theory – A Mathematical Approach. New York: McGraw-Hill.
  • Hendricks, K., and R. P. McAfee. 2006. “Feints.” Journal of Economics & Management Strategy 15 (2): 431–456. doi:10.1111/j.1530-9134.2006.00106.x.
  • Herman, M. 1996. Intelligence Power in Peace and War. Cambridge, UK: Cambridge University Press.
  • Hirao, Y. 1994. “Quality versus Quantity in Arms Races.” Southern Economic Journal 61 (1): 96–103. doi:10.2307/1060132.
  • Ho, S. J. 2007. “An Economic Analysis of Military Intelligence.” Defence and Peace Economics 18 (6): 485–493. doi:10.1080/10242690701197571.
  • Ho, S. J. 2008. “Extracting the Information: Espionage with Double Crossing.” Journal of Economics 93 (1): 31–58. doi:10.1007/s00712-007-0290-2.
  • Hoo, K. J. S. Consortium for Research on Information Security and Policy (CRISP). 2000. How Much Is Enough? A Risk Management Approach to Computer Security. Stanford, CA., USA: Stanford University.
  • Hua, J., and S. Bapna. 2013. “The Economic Impact of Cyber Terrorism.” The Journal of Strategic Information Systems 22 (2): 175–186. doi:10.1016/j.jsis.2012.10.004.
  • Hughes-Wilson, J. 1999. Military Intelligence Blunders. New York: Carroll & Graf.
  • Johnson, L. K. 2000. Bombs, Bugs, Drugs and Thugs: Intelligence and America’s Quest for Security. New York, NY: New York University Press.
  • Johnson, L. K., A. W. Dorn, S. Webb, S. Kreps, W. Krieger, E. Schwarz, S. Shpiro, P. F. Walsh, and J. J. Wirtz. 2017. “An INS Special Forum: Intelligence and Drones.” Intelligence and National Security 32 (4): 411–440. doi:10.1080/02684527.2017.1303127.
  • Kagan, K. 2004. “Optimal Structure of a Defense System in Models of Arms Races between Developed and Less Developed Countries.” PhD diss., Bar Ilan University.
  • Kagan, K., A. Levkowitz, A. Tishler, and A. Weiss. 2009. “Evaluating Strategic Arms Limitation Agreements, with Application to the Israeli-Syrian and the North versus South Korean Conflicts.” Defence and Peace Economics 20 (2): 95–121. doi:10.1080/10242690801923132.
  • Levitan, K. B. 1982. “Information Resources as “Goods” in the Life Cycle of Information Production.” Journal of the American Society for Information Science 33 (1): 44–54. doi:10.1002/asi.4630330108.
  • Lin, J. C., J. M. Chen, C. C. Chen, and Y. S. Chien. 2009. “A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense.” Proceedings of the IEEE International Conference on Secure Software Integration and Reliability Improvement:, 75–81, Shanghai, China.
  • Manshaei, M. H., Q. Zhu, T. Alpcan, T. Bacşar, and J. P. Hubaux. 2013. “Game Theory Meets Network Security and Privacy.” ACM Computing Surveys 45 (3): 1–39. doi:10.1145/2480741.2480742.
  • Marschak, J. 1968. “Economics of Inquiring, Communicating, Deciding.” American Economic Review 58 (2): 1–18.
  • Matsui, A. 1989. “Information Leakage Forces Cooperation.” Games and Economic Behavior 1 (1): 94–115. doi:10.1016/0899-8256(89)90007-9.
  • Mattern, T., J. Felker, R. Borum, and G. Bamford. 2014. “Operational Levels of Cyber Intelligence.” International Journal of Intelligence and Counterintelligence 27 (4): 702–719. doi:10.1080/08850607.2014.924811.
  • Méndez-Coto, M. V., and F. Rivera Vélez. 2018. “The Intelligence Service in Costa Rica: Between the New and the Old Paradigm.” The International Journal of Intelligence, Security, and Public Affairs 20 (1): 6–19. doi:10.1080/23800992.2018.1436387.
  • Osborne, M. J., and A. Rubinstein. 1994. A Course in Game Theory.” Computers & Mathematics with Applications. Cambridge, MA: MIT Press.
  • Pecht, E. 2013. “The Value of Military Intelligence: Theoretical, Analytical, and Empirical Perspectives.” PhD diss., Faculty of Management, Tel Aviv University.
  • Pecht, E., and A. Tishler. 2015. “The Value of Military Intelligence.” Defence and Peace Economics 26 (2): 179–211. doi:10.1080/10242694.2014.886435.
  • Pecht, E., and A. Tishler. 2017. “Budget Allocation, National Security, Military Intelligence, and Human Capital: A Dynamic Model.” Defence and Peace Economics 28 (3): 367–399. doi:10.1080/10242694.2015.1101885.
  • Posner, R. A. 2006. Uncertain Shield: The US Intelligence System in the Throes of Reform. New York: Rowman & Littlefield Publishers.
  • Raggad, B. G. 2010. Information Security Management: Concepts and Practice. Boca Raton: CRC Press. Taylor & Francis Group.
  • Repo, A. J. 1989. “The Value of Information: Approaches in Economics, Accounting, and Management Science.” Journal of the American Society for Information Science 40 (2): 68–85. doi:10.1002/(SICI)1097-4571(198903)40:2<68::AID-ASI2>3.0.CO;2-J.
  • Roberson, B. 2006. “The Colonel Blotto Game.” Economic Theory 29 (1): 1–24. doi:10.1007/s00199-005-0071-5.
  • Rose, F. 1999. The Economics, Concept, and Design of Information Intermediaries: A Theoretic Approach. Heidelberg, Germany: Physica-Verlag.
  • Roy, S., C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. W. Q. Wu. 2010. “A Survey of Game Theory as Applied to Network Security.” Proceedings of the 43rd Hawaii International Conference on System Sciences, IEEE, 1–10, Honolulu, HI, USA.
  • Rudner, M. 2013. “Cyber-threats to Critical National Infrastructure: An Intelligence Challenge.” International Journal of Intelligence and Counterintelligence 26 (3): 453–481. doi:10.1080/08850607.2013.780552.
  • Rue, R., S. L. Pfleeger, and D. Ortiz. 2007. “A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-making.” Workshop on the Economics of Information Security, 1–23.
  • Russell, S., and T. Abdelzaher. 2018. “The Internet of Battlefield Things: The Next Generation of Command, Control, Communications and Intelligence (C3I) Decision-making.” Milcom 2018 Track 5 – Big Data and Machine Learning. 737–742.
  • Setter, O., and A. Tishler. 2007. “Budget Allocation for Integrative Technologies: Theory and Application to the US Military.” Defence and Peace Economics 18 (2): 133–155. doi:10.1080/10242690600797273.
  • Shapiro, C., and H. R. Varian. 1999. Information Rules: A Strategic Guide to the Network Economy. Boston, MA: Harvard Business School Press.
  • Shin, J. H., S. P. Cheon, and J. H. Eom. 2014. “The Role and Responsibility of Cyber Intelligence in Cyber Warfare.” Advanced Science and Technology Letters 51: 305–308.
  • Shpiro, S. 2017. “Seeing but Unseen: Intelligence Drones in Israel.” L. K. Johnson, A. Walter Dorn, S. Webb, S. Kreps, W. Krieger, E. Schwarz, S. Shpiro, P. F. Walsh, and J. J. Wirtz An INS Special Forum: Intelligence and Drones Intelligence and National Security 324:425–429
  • Sigholm, J., and E. Larsson. 2014. “Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation.” Proceedings of the 2014 IEEE Military Communications Conference, 110–116, Baltimore, MD, USA.
  • Smith, G. 2018. “Israel and the Trillion-dollar 2005-2018 US Intelligence Budget.” http://www.defenddemocracy.press/israel-and-the-trillion-dollar-2005-2018-us-intelligence-budget/ Accessed on 14 September 2019.
  • Solan, E., and L. Yariv. 2004. “Games with Espionage.” Games and Economic Behavior 47 (1): 172–199. doi:10.1016/S0899-8256(03)00177-5.
  • Stigler, G. J. 1961. “The Economics of Information.” The Journal of Political Economy 69 (3): 213–225. doi:10.1086/258464.
  • Stiglitz, J. E. 2000. “The Contributions of the Economics of Information to Twentieth Century Economics.” The Quarterly Journal of Economics 115 (4): 1441–1478. doi:10.1162/003355300555015.
  • Su, X. 2006. “An Overview of Economic Approaches to Information Security Management.” Technical Report TR-CTIT-06-30. University of Twente.
  • Thales, and Verint. 2019. “The Cyberthreat Handbook.” Thales-Verint. https://www.thalesgroup.com/en/group/journalist/press-release/cyberthreat-handbook-thales-and-verint-release-their-whos-who
  • US, E. O. 1981. “United States Intelligence Activities.” US Executive Order 12333. December 4.
  • US, DNI. 2009. “2009 National Intelligence Strategy”, Media Conference Call with the Director of National Intelligence Mr. Dennis C, Blair, September 15, San Francisco, CA, USA. https://www.dni.gov/files/documents/2009-NIS/20090915_interview.pdf
  • US, DNI. 2010. “DNI Releases Budget Figure for 2010 National Intelligence Program.” ODNI News Release No. 21-10. October 28.
  • Viduto, V., W. Huang, and C. Maple. 2011. “Toward Optimal Multi-objective Models of Network Security: Survey.” Proceedings of the 17th International Conference on Automation and Computing (ICAC), 6–11. Huddersfield.
  • Williams, P. 2001. “Information Security Governance.” Information Security Technical Report 6 (3): 60–70. doi:10.1016/S1363-4127(01)00309-0.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.