{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T09:11:45Z","timestamp":1651828305115},"reference-count":31,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"abstract":"Cyber threats pose a growing risk to national security for all nations; cyberpower is consequently becoming an increasingly prominent driver in the attainment of national security for any state. This paper investigates the national cyberpower environment by analysing the elements of cyberspace as part of national security. David Jablonsky (1997) distinguishes between natural and social determinants of power in his discussion of national power. Also, Jablonsky refers to Ray Cline's formula (Cline, 1993) to determine a rough estimate of \u201cperceived\u201d national power by focusing primarily on a state's capacity to wage war. In this paper, the formula for Perceived Power (PP) will be adapted for use in cyberspace to create a similar formula for Perceived Cyberpower (PCP) that focuses primarily on a state's capacity for cyberwarfare. Military cyberpower is one of the critical elements of cyberpower. The paper also discusses how to operationalise military cyberpower.<\/jats:p>","DOI":"10.4018\/ijcwt.2017070102","type":"journal-article","created":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T11:13:37Z","timestamp":1498821217000},"page":"16-28","source":"Crossref","is-referenced-by-count":0,"title":["Formulating the Building Blocks for National Cyberpower"],"prefix":"10.4018","volume":"7","author":[{"given":"JC","family":"Jansen van Vuuren","sequence":"first","affiliation":[{"name":"University of Venda, Thohoyandou, South Africa & CSR Defence, Peace, Safety and Security, Pretoria, South Africa"}]},{"given":"Louise","family":"Leenen","sequence":"additional","affiliation":[{"name":"CSIR Defence, Peace, Safety and Security, Pretoria, South Africa"}]},{"given":"Graeme","family":"Plint","sequence":"additional","affiliation":[{"name":"Department of Defense, Pretoria, South Africa"}]},{"given":"Jannie","family":"Zaaiman","sequence":"additional","affiliation":[{"name":"Belgium Campus, Pretoria, South Africa"}]},{"given":"Jackie","family":"Phahlamohlaka","sequence":"additional","affiliation":[{"name":"CSIR Defence, Peace, Safety and Security: CSIR, Pretoria, South Africa"}]}],"member":"2432","reference":[{"key":"IJCWT.2017070102-0","doi-asserted-by":"publisher","DOI":"10.1080\/00396336408440453"},{"key":"IJCWT.2017070102-1","author":"D.Betz","year":"2011","journal-title":"Cyberspace and the state: Toward a strategy for cyber-power"},{"key":"IJCWT.2017070102-2","author":"D.Bodeau","year":"2013","journal-title":"Mapping the cyber terrain"},{"key":"IJCWT.2017070102-3","unstructured":"Booz Allan Hamilton. (2011). Cyber power index: findings and methodology. Retrieved January, 6 2013 from http:\/\/www.boozallen.com\/media\/file\/Cyber_Power_Index_Findings_and_Methodology.pdf"},{"key":"IJCWT.2017070102-4","author":"R. S.Cline","year":"1993","journal-title":"The power of nations in the 1990s: a strategic assessment"},{"key":"IJCWT.2017070102-5","unstructured":"H\u00f6hn, K. H. (2014). Geopolitics and the measurement of National Power [Doktorgrades]. Universit\u00e4t Hamburg. Retrieved August 16, 2015 from http:\/\/ediss.sub.uni-hamburg.de\/volltexte\/2014\/6550\/pdf\/Dissertation.pdf"},{"key":"IJCWT.2017070102-6","author":"B.Hughes","year":"2016","journal-title":"Exploring and shaping international futures"},{"key":"IJCWT.2017070102-7","first-page":"34","article-title":"National power.","volume":"27","author":"D.Jablonsky","year":"1997","journal-title":"Parameters"},{"key":"IJCWT.2017070102-8","article-title":"National Power","author":"D.Jablonsky","year":"2001","journal-title":"US Army War College Guide to Strategy"},{"key":"IJCWT.2017070102-9","unstructured":"Jablonsky, D. (2010). National Power. In J. Bartholomess (Ed.), The US Army War College Guide to National Security Issues (4 ed., Vol. 1, pp. 123-140). Strategic Studies Institute."},{"key":"IJCWT.2017070102-10","unstructured":"Kern, S. C. (2015). Expanding Combat Power Through Military Cyberpower Theory. Joint Force Quarterly, 4th Quarter, 88-95."},{"key":"IJCWT.2017070102-11","first-page":"171","author":"A.Klimburg","year":"2011","journal-title":"The whole of nation in cyberpower"},{"key":"IJCWT.2017070102-12","author":"F. D.Kramer","year":"2009","journal-title":"Cyberpower and National Security"},{"key":"IJCWT.2017070102-13","author":"B.Krekel","year":"2009","journal-title":"Capability of the People\u2019s Republic of China (PRC) to Conduct Cyber Warfare and Computer Network Exploitation"},{"key":"IJCWT.2017070102-14","first-page":"26","article-title":"From cyberspace to cyberpower: Defining the problem","author":"D. T.Kuehl","year":"2009","journal-title":"Cyberpower and National Security (National Defense University)"},{"key":"IJCWT.2017070102-15","doi-asserted-by":"crossref","DOI":"10.4324\/9780203508176","volume":"Vol. 9","author":"D. J.Lonsdale","year":"2004","journal-title":"The nature of war in the information age: Clausewitzian future"},{"key":"IJCWT.2017070102-16","unstructured":"McConnell, J. M. (2012). The road to cyber-power: Seizing opportunity while managing risk in the digital age. In B. A. Hamilton (Ed.), Foreign Affairs (pp. 162\u2013183). Mclean, VA: Booz Allen Hamilton; Retrieved from http:\/\/www.boozallen.com\/media\/file\/road-to-cyberpower.pdf"},{"key":"IJCWT.2017070102-17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-137-00841-1"},{"key":"IJCWT.2017070102-18","unstructured":"Murphy, M. (2010). Cyberwar in the fifth domain. The Economist. Retrieved 1 July 2010 from http:\/\/www.economist.com\/node\/16478792"},{"key":"IJCWT.2017070102-19","unstructured":"NDUi College. (2015). Cyber Leadership (Cyber-L) program. Retrieved October, 20 2015 from http:\/\/icollege.ndu.edu\/Academics\/GraduatePrograms\/CyberLeadershipProgram.aspx"},{"key":"IJCWT.2017070102-20","unstructured":"Nye, J. S., Jr. (2010). Cyber power. Retrieved 20 July 2012 from http:\/\/belfercenter.ksg.harvard.edu\/files\/cyber-power.pdf"},{"key":"IJCWT.2017070102-21","first-page":"95","author":"J.Phahlamohlaka","year":"2008","journal-title":"Globalisation and national security issues for the state: Implications for national ICT policies Social Dimensions Of Information And Communication Technology Policy"},{"key":"IJCWT.2017070102-22","unstructured":"Raymond, J. W. (2010). Functional concept for cyberspace operations. 14 June 2010. Retrieved 10 March 2012 from http:\/\/info.publicintelligence.net\/USAF-CyberspaceOpsConcept.pdf"},{"key":"IJCWT.2017070102-23","unstructured":"Riley, S. (2014). \u201cCyber Terrain\u201d: A Model for Increased Understanding of Cyber Activity. Retrieved September, 9 2015 from https:\/\/www.linkedin.com\/pulse\/20141007190806-36149934--cyber-terrain-a-model-for-increased-understanding-of-cyber-activity"},{"key":"IJCWT.2017070102-24","unstructured":"Schreier, F. (2015). On cyberwarfare. Retrieved 7 November 2015 from http:\/\/www.dcaf.ch\/Publications\/On-Cyberwarfare"},{"key":"IJCWT.2017070102-25","unstructured":"Sheldon, J. B. (2011). Deciphering cyberpower: Strategic purpose in peace and war. Retrieved 20 May 2012 from http:\/\/www.au.af.mil\/au\/ssq\/2011\/summer\/sheldon.pdf"},{"key":"IJCWT.2017070102-26","author":"J. M.Spade","year":"2012","journal-title":"China\u2019s cyber power and America\u2019s national security"},{"key":"IJCWT.2017070102-27","author":"R. D.Steele","year":"2006","journal-title":"Information Operations: Putting the\u201d I\u201d Back Into DIME"},{"key":"IJCWT.2017070102-28","unstructured":"Treverton, G. F., & Jones, S. G. (2005). Measuring National Power (CF215). Retrieved 10 October, 2015 from http:\/\/www.rand.org\/content\/dam\/rand\/pubs\/conf_proceedings\/2005\/RAND_CF215.pdf"},{"key":"IJCWT.2017070102-29","first-page":"173","article-title":"National Cyber Doctrine: The Missing Link in the Application of American Cyber Power.","volume":"4","author":"M. D.Young","year":"2010","journal-title":"Journal of National Security Law & Policy."},{"key":"IJCWT.2017070102-30","first-page":"1","article-title":"Military service cyber overview","author":"E.Zimet","year":"2009","journal-title":"Military Perspectives on Cyber power"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=185601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T08:31:43Z","timestamp":1651825903000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCWT.2017070102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":31,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2017070102","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7]]}}}