Martin C. Libicki
#49,754
Most Influential Person Now
American scholar
Martin C. Libicki's AcademicInfluence.com Rankings
Download Badge
Economics
Martin C. Libicki's Degrees
- PhD Economics University of California, Berkeley
- Masters Economics University of California, Berkeley
- Bachelors Economics University of California, Berkeley
Similar Degrees You Can Earn
Why Is Martin C. Libicki Influential?
(Suggest an Edit or Addition)According to Wikipedia, Martin C. Libicki is an American scholar and Professor at the Frederick S. Pardee RAND Graduate School in Santa Monica, California. Early life Martin C. Libicki graduated from the Massachusetts Institute of Technology in Cambridge, Massachusetts, where he received a Bachelor of Science degree in Mathematics. He went on to receive a master's degree in City and Regional Planning as well as a PhD in Economics from the University of California, Berkeley.
Martin C. Libicki's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- How Terrorist Groups End: Lessons for Countering al Qa'ida (2008) (351)
- Cyberdeterrence and Cyberwar (2009) (264)
- What Is Information Warfare (1995) (157)
- Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar (2014) (156)
- Conquest in Cyberspace: National Security and Information Warfare (2007) (125)
- War by Other Means -- Building Complete and Balanced Capabilities for Counterinsurgency (2008) (120)
- How Insurgencies End (2010) (77)
- The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017 (2015) (76)
- Mind the Gap: Promoting a Transatlantic Revolution in Military Affairs (1999) (60)
- Exploring Terrorist Targeting Preferences (2006) (55)
- Cyberspace Is Not a Warfighting Domain (2012) (52)
- How Terrorist Groups End (2008) (48)
- Hackers Wanted: An Examination of the Cybersecurity Labor Market (2014) (48)
- The emerging primacy of information (1996) (47)
- Markets for Cybercrime Tools and Stolen Data (2014) (42)
- Crisis and Escalation in Cyberspace (2012) (37)
- The Mesh and The Net: Speculations on Armed Conflict in a Time of Free Silicon (2004) (37)
- Cyber Warfare and Sino-American Crisis Instability (2014) (36)
- Dominant Battlespace Knowledge (1996) (35)
- Information Technology Standards: Quest for the Common Byte (1995) (35)
- New Challenges, New Tools for Defense Decisionmaking (2003) (33)
- Scaffolding the New Web: Standards and Standards Policy for the Digital Economy (2000) (32)
- The Defender's Dilemma: Charting a Course Toward Cybersecurity (2015) (32)
- The Costs and Benefits of Moving to the ICD-10 Code Sets (2005) (32)
- And what to do about it (1996) (31)
- Internet Freedom and Political Space (2013) (28)
- Dominant Battlespace Knowledge: The Winning Edge, (1995) (28)
- Hackers' Bazaar: The Markets for Cybercrime Tools and Stolen Data (2015) (26)
- Defending Cyberspace and Other Metaphors (2002) (24)
- Chinese Responses to U.S. Military Transformation and Implications for the Department of Defense (2006) (23)
- Why Cyber War Will Not and Should Not Have Its Grand Strategist (2014) (23)
- Getting to Yes with China in Cyberspace (2016) (22)
- The Challenge of Domestic Intelligence in a Free Society: A Multidisciplinary Look at the Creation of a U.S. Domestic Counterterrorism Intelligence Agency (2009) (22)
- Byting Back-Regaining Information Superiority Against 21st-Century Insurgents (2007) (21)
- Standards: The Rough Road to the Common Byte (1997) (21)
- Cyberspace in Peace and War (2016) (19)
- The U.S.-China Military Scorecard (2015) (17)
- Illuminating Tomorrow's War (2000) (16)
- Cyberwar as a Confidence Game (2011) (16)
- Rethinking War: The Mouse's New Roar? (1999) (16)
- The convergence of information warfare (2020) (16)
- Brandishing Cyberattack Capabilities (2013) (15)
- Waging Cyber War the American Way (2015) (15)
- The Global Course of the Information Revolution (2000) (14)
- Collecting the Dots: Problem Formulation and Solution Elements (2004) (14)
- Who Runs What in the Global Information Grid: Ways to Share Local and Global Responsibility (2001) (14)
- Global Demographic Change and Its Implications for Military Power (2011) (13)
- Sub Rosa Cyber War (2009) (12)
- Cyber House Rules: On War, Retaliation and Escalation (2015) (12)
- The coming of cyber espionage norms (2017) (12)
- The Specter of Non-Obvious Warfare (2012) (11)
- What Makes Industries Strategic (2004) (11)
- Air Force Cyber Command (Provisional) Decision Support (2010) (10)
- Underkill: Scalable Capabilities for Military Operations Amid Populations (2009) (10)
- Industrial Strength Defense: A Disquisition on Manufacturing, Surge and War (1990) (9)
- '...Or Go Down in Flame?' Toward an Airpower Manifesto for the Twenty-First Century (1996) (9)
- Root Cause Analyses of Nunn-McCurdy Breaches, Volume 1: Zumwalt -Class Destroyer, Joint Strike Fighter, Longbow Apache, and Wideband Global Satellite (2011) (9)
- Scaffolding the New Web (2000) (7)
- I'll Buy That! Cybersecurity in the Internet Marketplace (2007) (7)
- Root Cause Analyses of Nunn-McCurdy Breaches, Volume 2 (2011) (7)
- The Revolution in Military Affairs (1990) (7)
- How Terrorist Groups End: Implications for Countering al Qa'ida (2008) (7)
- Enabling the Information Society by Stimulating the Creation of a Broadband Environment in Europe (2003) (7)
- Information Warfare: A Brief Guide to Defense Preparedness (1997) (6)
- Drawing inferences from cyber espionage (2018) (6)
- What Should Be Classified?: A Framework with Application to the Global Force Management Data Initiative (2011) (6)
- Influences on the Adoption of Multifactor Authentication (2011) (6)
- Markets for Cybercrime Tools and Stolen Information: Hackers' Bazaar (2014) (6)
- Correlations Between Cyberspace Attacks and Kinetic Attacks (2020) (6)
- A Framework for Programming and Budgeting for Cybersecurity (2016) (5)
- Sharing Information About Threats Is Not a Cybersecurity Panacea (2015) (5)
- Or Go Down in Flame (1996) (5)
- THE SMALL AND THE MANY (1997) (5)
- Ramifications of DARPA's Programming Computation on Encrypted Data Program (2014) (5)
- Do We Need An Information Corps? (Joint Force Quarterly, Autumn 1993) (1993) (4)
- It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture (2017) (4)
- Cyber War and Nuclear Peace (2019) (4)
- Planning the Future Military Workforce (2003) (4)
- Information and Nuclear RMAs Compared (1996) (4)
- Acquisition of Space Systems. Volume 7. Past Problems and Future Challenges (2015) (3)
- INCORPORATING INFORMATION TECHNOLOGY IN DEFENSE PLANNING (2003) (3)
- Don't Buy the Cyberhype (2013) (3)
- Assessing Living Conditions in Iraq's Anbar Province in 2009 (2010) (3)
- Review Essay: Full-Bodied Cyber without the Hype (2019) (3)
- 1 – What Standards Do (1995) (3)
- TWO, MAYBE THREE CHEERS FOR AMBIGUITY (2016) (3)
- Conclusion: the changing role of information in warfare (1999) (3)
- The Day After... in Jerusalem: A Strategic Planning Exercise on the Path to Achieving Peace in the Middle East (2009) (3)
- Second acts in cyberspace (2017) (3)
- Could the Issue of DPRK Hacking Benefit from Benign Neglect? (2018) (3)
- The Next Enemy (1995) (2)
- The Nature of Strategic Instability (2012) (2)
- The Defender's Dilemma (2015) (2)
- Tomorrow's Air Force (1996) (2)
- Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals (2015) (2)
- Coping with the Dragon: Essays on PLA Transformation and the U.S. Military (2007) (2)
- Towards a Quantum Internet: Post-pandemic Cyber Security in a Post-digital World (2021) (2)
- Quantum Communication for Post-Pandemic Cybersecurity (2021) (2)
- Conquest in Cyberspace: Hostile Conquest as Information Warfare (2007) (2)
- Chinese Threats to U.S. Surface Ships: An Assessment of Relative Capabilities, 1996–2017 (2015) (2)
- How to Counter Putin's Subversive War on the West (2016) (2)
- Chinese Threats to U.S. Surface Ships (2015) (1)
- 13 – So Many Standards, So Little Time (1995) (1)
- Conquest in Cyberspace: Retail Conquest in Cyberspace (2007) (1)
- The Day After... in Jerusalem (2009) (1)
- Acquisition of Space Systems, Volume 7 (2015) (1)
- Can Publicly Available Information Be Used in Planning Terrorist Attacks (2007) (1)
- US Industrial Base Dependence/Vulnerability. Phase 2. Analysis (1987) (1)
- Chinese Attacks on U.S. Air Bases in Asia (2015) (1)
- Living Conditions in Anbar Province in June 2008 (2009) (1)
- U.S. and Chinese Air Superiority Capabilities: An Assessment of Relative Advantage, 1996–2017 (2015) (1)
- Collecting the dots (2004) (1)
- Obnoxious Deterrence (2022) (1)
- The Significance of DBK (1995) (1)
- Freedom and Information: Assessing Publicly Available Data Regarding U.S. Transportation Infrastructure Security (2007) (1)
- U.S.–Japan Alliance Conference: Strengthening Strategic Cooperation (2016) (1)
- Cybersecurity Economic Issues (2008) (1)
- Defending the “revolution” (2001) (1)
- What Should Be Classified (2010) (1)
- Are RFIDs Coming to Get You? (2005) (1)
- Second-best practices for interoperability (1996) (1)
- Countering Insurgency in the Muslim World (2008) (1)
- For a Baltic Cyberspace Alliance? (2019) (1)
- 12 – The Future of Standards (1995) (0)
- Epilogue: Detours from the Inevitable Future (1994) (0)
- Chapter Three WHAT INFORMATION ARCHITECTURE FOR DEFENSE ? (2003) (0)
- Reinforcing Security at the FBI (2003) (0)
- 5. Unconventional Conflict (1994) (0)
- Should Global Force Management Information Be Classified (2010) (0)
- 10 – A Congress of Libraries (1995) (0)
- Conquest in Cyberspace: Friendly Conquest Using Global Systems (2007) (0)
- The Role of Technical Standards in Today's Society and in the Future (2000) (0)
- Steps to an ecology of cyberspace as a contested domain (2020) (0)
- 7 – The Ada Programming Language (1995) (0)
- Design of the Qatar National Research Fund (2008) (0)
- 9 – ISDN: Narrow and Broad (1995) (0)
- Freedom and Information (2007) (0)
- 7. Conclusions: Mesh versus Net (1994) (0)
- 4. Wares of War: Hard and Soft (1994) (0)
- Information Warfare Against Command and Control (2007) (0)
- Conquest in Cyberspace: Managing Conquest in Cyberspace (2007) (0)
- Conquest in Cyberspace: Friendly Conquest in Cyberspace (2007) (0)
- 5 – Front-Line Manufacturing (1995) (0)
- Reading 10.2 Why Cyberdeterrence Is Different (2017) (0)
- Countering Insurgency in the Muslim World: Rethinking U.S. Priorities and Capabilities (2008) (0)
- U.S. and Chinese Air Superiority Capabilities (2015) (0)
- U.S.–Japan Alliance Conference (2016) (0)
- 1. the Rising Tidal Wave (1994) (0)
- Tallying the U.S.-China Military Scorecard (2015) (0)
- Conquest in Cyberspace: Information Warfare as Noise (2007) (0)
- Getting Inside the Terrorist Mind (2007) (0)
- The Open Road (1995) (0)
- 2. the Small and the Many (1994) (0)
- Cybersecurity Economic Issues: Corporate Approaches and Challenges to Decisionmaking (2008) (0)
- 11 – Some Limits of Standards Policy (1995) (0)
- 3. toward an Information Corps (1994) (0)
- Conquest in Cyberspace: Why Cyberspace Is Likely to Gain Consequence (2007) (0)
- Stop the 'War' on Terror: Calling It a 'War' Is a Boon to Terrorist Recruiters (2008) (0)
- E‐Mail Users Told of Risks of Getting a Bad Code in the Node (1998) (0)
- Conquest in Cyberspace: Can Information Warfare Be Strategic? (2007) (0)
- 8 – To the Gigabit Station (1995) (0)
- Managing Conquest in Cyberspace (2007) (0)
- Decoding the Breach: The Truth About the CENTCOM Hack (2015) (0)
- 6. the Net and Its Discontents (1994) (0)
- Tallying the U.S.-China Military Scorecard: Relative Capabilities and the Evolving Balance of Power, 1996–2017 (2015) (0)
- Internet Freedom Software and Illicit Activity (2015) (0)
- From Intimacy, Vulnerability (2007) (0)
- Information & Nuclear RMA's Compared (1996) (0)
- A ten-year rule for defense planning (2001) (0)
This paper list is powered by the following services:
Other Resources About Martin C. Libicki
What Schools Are Affiliated With Martin C. Libicki?
Martin C. Libicki is affiliated with the following schools:
