Skip to main content

The projection and measurement of cyberpower


Cyberspace and cyberpower are terms that are increasingly used in common parlance, but are notoriously difficult to define and measure. This article builds on previous work defining the properties of cyberspace in terms of vertical layers, which when combined with a representation of distance presents a three-dimensional model. The unique attributes of cyberspace can be harnessed for power projection, the aim of which is ultimately to alter the behaviour of individuals. Although cyberspace has yet to be used as a medium to demonstrate conventional hard power of coercion and threats supported by physical force, it does present a suitable medium for the projection of soft power of attraction and imitation. These are defined within the context of the online environment and by drawing on the techniques used to optimise Web-based commerce, potential methods of implementing and measuring the success of a campaign of cyberpower projection are proposed.

This is a preview of subscription content, access via your institution.

Figure 1


  1. Barwinski, M. (2005) Taxonomy of Spyware and Empirical Study of Network Drive-by-Downloads. Monterey, CA: Naval Postgraduate School.

    Google Scholar 

  2. Bastardi, A., Uhlmann, E.L. and Ross, L. (2011) Wishful thinking: Belief, desire, and the motivated evaluation of scientific evidence. Psychological Science 22(6): 731–732.

    Article  Google Scholar 

  3. BBC News. (2002) EU agrees Zimbabwe sanctions. 18 February,, accessed 4 February 2015.

  4. Cha, M., Haddadi, H., Benevenuto, F. and Gummadi, K. (2010) Measuring user influence in twitter: The million follower fallacy. Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media, AAAI Press, Menco Park, CA.

  5. Concho, C. (2004) Radio propagation during World War II., accessed 4 February 2015.

  6. Dahl, R. (1957) The concept of power. Behavioral Science 2(July): 202.

    Google Scholar 

  7. Department of Defense. (2007) Joint Publication 1-02 Dictionary of Military and Associated Terms.

  8. Development, Concepts and Doctrine Centre. (2013) Joint Doctrine Note 3/13. Ministry of Defence, UK.

  9. Fuchs, C. (2012) Behind the news. Social media, riots and revolutions. Capital and Class 19(3): 383.

    Article  Google Scholar 

  10. Gassen, G. and Gerhards-Padilla, E. (2012) Current botnet-techniques and countermeasures. Praxis der Informationsverarbeitung und Kommunikation 35(1): 3–10.

    Article  Google Scholar 

  11. Google Analytics. (2014), accessed 2 September 2014.

  12. Greenwald, T. (2010) The soft-power fallacy. Commentary January.

  13. Hall, I. and Smith, F. (2013) The struggle for soft power in Asia: Public diplomacy and regional competition. Asian Security 9(1): 1–18.

    Article  Google Scholar 

  14. House of Lords Select Committee on Soft Power and the UK’s Influence. (2014a) Report of Session 2013–14. Persuasion and Power in the Modern World, HL Paper 150, London: The Stationery Office, March, pp. 33–53.

  15. House of Lords Select Committee on Soft Power and the UK’s Influence. (2014b) Oral and Written Evidence. Report of Session 2013–14, Persuasion and Power in the Modern World, HL Paper 150, London: The Stationery Office, March, Vol 1. p. 122.

  16. Jegatheesan, S. (2013) Cookies – Invading our privacy for marketing, advertising and security issues. International Journal of Scientific and Engineering Research 4(5): 3.

    Google Scholar 

  17. Kent, M., Carr, B., Husted, R. and Pop, R. (2011) Learning web analytics: A tool for strategic communication. Public Relations Review 37(5): 536–543.

    Article  Google Scholar 

  18. Kroenig, M., McAdam, M. and Weber, S. (2010) Taking soft power seriously. Comparative Strategy 29(5): 412–431.

    Article  Google Scholar 

  19. Lister, C. (2014) Profiling the Islamic state. The Brookings Institution,, accessed 5 February 2014.

  20. Ministry of Defence. (2013a) Cyber Primer. Development, Concepts and Doctrine Centre, UK pp. 1–22.

  21. Ministry of Defence. (2013b) New cyber reserve unit created. 29 September,, accessed 5 August 2014.

  22. NATO Parliamentary Assembly. (2009) NATO and cyber defence,, accessed 5 August 2014.

  23. Nye, Jr, J.S. (1991) Bound to Lead: The Changing Nature of American Power. Canada: Basic Books.

    Google Scholar 

  24. Nye, Jr, J.S. (2004) Power in The Global Information Age. Oxon, UK: Routledge, p. 90.

    Google Scholar 

  25. Nye, Jr, J.S. (2008) Public diplomacy and soft power. The Annals of the American Academy of Political and Social Science 94(1): 109.

    Google Scholar 

  26. Nye, Jr, J.S. (2009) Get smart. Combining hard and soft power. Foreign Affairs July/August., accessed 3 September 2014.

  27. Nye, Jr, J.S. (2010) Cyber power. Harvard Kennedy School, May,, accessed 27 October 2013, p. 2.

  28. Open Net Initiative. (2014), accessed 3 September 2014.

  29. Rid, T. (2011) Cyber war will not take place. Journal of Strategic Studies 35(1): 6.

    Google Scholar 

  30. Rid, T. (2012) Cyber-weapons. The RUSI Journal 157(1): 6–13.

    Article  Google Scholar 

  31. Sheldon, J. (2011) Deciphering cyberpower. Strategic Studies Quarterly (Summer): 98.

  32. Sullivan, B. (2015) Anonymous #OPIsis attackers take down ISIS twitter accounts,, accessed 19 February 2015.

  33. Talbot, D. (2008) How Obama really did it. Technology Review Sep/Oct.

  34. Tellis, A., Bially, J., Layne, C. and McPherson, M. (2000) Measuring National Power in the Post Industrial Age. Santa Monica, CA: Rand, p. 5.

    Google Scholar 

  35. Treverton, G. and Jones, S. (2000) Measuring national power, RAND national security research division,, accessed 5 August 2014.

  36. Tsikerdekis, M. and Zeadally, S. (2014) Online Deception in Social Media, Library and Information Science Faculty, Paper 12, University of Kentucky UKnowledge.

  37. Twitter Analytics. (2014), accessed 2 September 2014.

  38. Whitehead, T. and Evans, M. (2014) Passengers learn of bomb scare on twitter. The Telegraph 6 August.

Download references

Author information



Corresponding author

Correspondence to Adrian Venables.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Venables, A., Shaikh, S. & Shuttleworth, J. The projection and measurement of cyberpower. Secur J 30, 1000–1011 (2017).

Download citation


  • cyberpower
  • soft power
  • social media
  • e-commerce
  • measures of effectiveness