The Resource China's internet of things, John Chen [and six others]

China's internet of things, John Chen [and six others]

Label
China's internet of things
Title
China's internet of things
Statement of responsibility
John Chen [and six others]
Creator
Contributor
Author
Issuing body
Publisher
Subject
Genre
Language
eng
Cataloging source
DID
http://library.link/vocab/creatorDate
1989-
http://library.link/vocab/creatorName
Chen, John
Government publication
federal national government publication
Illustrations
illustrations
Index
no index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • S.O.S. Int'l
  • U.S.-China Economic and Security Review Commission
http://library.link/vocab/subjectName
  • Internet of things
  • Technology and state
  • Internet of things
  • Internet of things
  • Internet of things
  • Technology and state
  • China
Label
China's internet of things, John Chen [and six others]
Instantiates
Publication
Note
  • "Research report prepared on behalf of the U.S.-China Economic and Security Review Commission"--Cover
  • "October 2018"--Cover
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Executive summary. China's approach to IoT development. China's race to set international standards. Unauthorized access to IoT devices and Chinese exploitation efforts. Authorized access to IoT data and privacy concerns. Conclusion. -- Introduction and methodology. -- Chapter 1: Overview of China's IoT development. China's IoT development strategy. Government support for IoT development. The current state of China's IoT development. Implications for the United States. Recommendations. -- Chapter 2: The standards race. Setting IoT standards. United States IoT standardization efforts. China's push to set IoT standards. Key points of contention. Implications for the United States. Recommendations. -- Chapter 3: Unauthorized access and Chinese research into IoT security vulnerabilities. Existing security vulnerabilities in the IoT: a primer. Chinese research into IoT security vulnerabilities. Implications for the United States. Recommendations. -- Chapter 4: Authorized access and privacy risks to U.S. citizens from Chinese data access. Chinese access to U.S. IoT data. Existing protections for U.S. data. Recommendations. -- Conclusions and areas for further research. -- Appendices
Control code
1060575537
Extent
1 online resource (ix, 202 pages)
Form of item
online
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
color illustrations
Specific material designation
remote
Label
China's internet of things, John Chen [and six others]
Publication
Note
  • "Research report prepared on behalf of the U.S.-China Economic and Security Review Commission"--Cover
  • "October 2018"--Cover
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Executive summary. China's approach to IoT development. China's race to set international standards. Unauthorized access to IoT devices and Chinese exploitation efforts. Authorized access to IoT data and privacy concerns. Conclusion. -- Introduction and methodology. -- Chapter 1: Overview of China's IoT development. China's IoT development strategy. Government support for IoT development. The current state of China's IoT development. Implications for the United States. Recommendations. -- Chapter 2: The standards race. Setting IoT standards. United States IoT standardization efforts. China's push to set IoT standards. Key points of contention. Implications for the United States. Recommendations. -- Chapter 3: Unauthorized access and Chinese research into IoT security vulnerabilities. Existing security vulnerabilities in the IoT: a primer. Chinese research into IoT security vulnerabilities. Implications for the United States. Recommendations. -- Chapter 4: Authorized access and privacy risks to U.S. citizens from Chinese data access. Chinese access to U.S. IoT data. Existing protections for U.S. data. Recommendations. -- Conclusions and areas for further research. -- Appendices
Control code
1060575537
Extent
1 online resource (ix, 202 pages)
Form of item
online
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
color illustrations
Specific material designation
remote

Library Locations

  • St. Louis Mercantile LibraryBorrow it
    1 University Blvd, St. Louis, MO, 63121, US
    38.710138 -90.311107
  • Thomas Jefferson LibraryBorrow it
    1 University Blvd, St. Louis, MO, 63121, US
    38.710138 -90.311107
  • University ArchivesBorrow it
    703 Lewis Hall, Columbia, MO, 65211, US
  • University of Missouri-St. Louis Libraries DepositoryBorrow it
    2908 Lemone Blvd, Columbia, MO, 65201, US
    38.919360 -92.291620
  • University of Missouri-St. Louis Libraries DepositoryBorrow it
    2908 Lemone Blvd, Columbia, MO, 65201, US
    38.919360 -92.291620
  • Ward E Barnes Education LibraryBorrow it
    8001 Natural Bridge Rd, St. Louis, MO, 63121, US
    38.707079 -90.311355
Processing Feedback ...