The Resource Getting to Yes with China in Cyberspace, by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos
Getting to Yes with China in Cyberspace, by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos
Resource Information
The item Getting to Yes with China in Cyberspace, by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri-St. Louis Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Getting to Yes with China in Cyberspace, by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri-St. Louis Libraries.
This item is available to borrow from 1 library branch.
- Summary
- "Since the founding of the People's Republic of China in 1949, the U.S.-China relationship has been characterized by conflict, confrontation, and strategic mistrust. The tensions that divide the two countries have been growing in importance in recent years. Unfortunately, they apply just as much to cyberspace as to relations in the physical world. Indeed, of all the areas where the relationship between the two sides is troubled, cyberspace has been one of the most contentious. The United States and China began formal negotiations in 2013 to resolve such differences only to see them abruptly suspended in 2014, when China broke them off in response to the U.S. indictment of several Chinese military officers on charges related to cyber-espionage activities. This study explores U.S. policy options for managing relations with China over this critical policy area through the use of agreements and norms of behavior. It looks at two basic questions: Can the United States and China achieve meaningful outcomes through formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement and what might be exchanged for what? This analysis should be of interest to two communities: those concerned with U.S. relations with China, and those concerned with developing norms of conduct in cyberspace, notably those that enhance security and freedom"--Publisher's description
- Language
- eng
- Extent
- 1 online resource (xv, 104 pages).
- Note
- "March 22, 2016"--Table of contents page
- Contents
-
- Ch. 1. The "cyber problem" in U.S.-China relations -- ch. 2. Coming to terms -- ch. 3. Getting to now -- ch. 4. Getting to yes? -- ch. 5. Conclusions -- Postscript
- Preface -- Summary -- Abbreviations -- Chapter One: The "Cyber Problem" in U.S.-China Relations: Purpose and Approach -- Organization of This Report -- Chapter Two: Coming to Terms: The Dimensions and Implications of Divergent Views of Deterrence -- Sources of Difference -- Elements of Difference -- Law and Equality -- The Application of Different Deterrence Approaches to Cyberspace: Hegemony -- Attribution Versus the Correlation of Forces -- Escalation -- Stability -- Signaling -- Overall -- Chapter Three: Getting to Now: China's Cyber Espionage -- The 2011 U.S. International Strategy for Cyberspace -- Mandiant, Snowden, and the PLA 5 -- Track Two Talks Between CICIR and CSIS -- What Could the United States Do to Discourage China's EMCE? -- Chapter Four: Getting to Yes?: Setting -- Track One Negotiations: Economically Motivated Cyber Espionage -- What Does China Want? -- Alternatives to Bilateral Negotiations with China -- The Law of Armed Conflict and the Right to Retaliate -- A Mutual Forbearance Proposal -- Chapter Five: Conclusions -- Postscript -- References
- Isbn
- 9780833092526
- Label
- Getting to Yes with China in Cyberspace
- Title
- Getting to Yes with China in Cyberspace
- Statement of responsibility
- by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos
- Subject
-
- China
- China -- Foreign relations -- United States -- 21st century
- Cyberspace -- Political aspects
- Cyberspace -- Political aspects -- China
- Cyberspace -- Political aspects -- United States
- Cyberspace operations (Military science)
- Cyberspace operations (Military science) -- United States
- Cyberterrorism
- Cyberterrorism -- China
- Cyberterrorism -- Prevention
- Cyberterrorism -- United States
- Cyberterrorism -- United States -- Prevention
- Diplomatic relations
- Electrical & Computer Engineering
- Engineering & Applied Sciences
- Espionage, Chinese
- Espionage, Chinese
- Information warfare
- Information warfare -- 21st century
- Internet in espionage
- Internet in espionage -- China
- National security
- National security -- United States
- Security, International
- Security, International -- 21st century
- Telecommunications
- United States
- United States -- Foreign relations -- China -- 21st century
- 2000-2099
- COMPUTERS -- Networking | Security
- Language
- eng
- Summary
- "Since the founding of the People's Republic of China in 1949, the U.S.-China relationship has been characterized by conflict, confrontation, and strategic mistrust. The tensions that divide the two countries have been growing in importance in recent years. Unfortunately, they apply just as much to cyberspace as to relations in the physical world. Indeed, of all the areas where the relationship between the two sides is troubled, cyberspace has been one of the most contentious. The United States and China began formal negotiations in 2013 to resolve such differences only to see them abruptly suspended in 2014, when China broke them off in response to the U.S. indictment of several Chinese military officers on charges related to cyber-espionage activities. This study explores U.S. policy options for managing relations with China over this critical policy area through the use of agreements and norms of behavior. It looks at two basic questions: Can the United States and China achieve meaningful outcomes through formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement and what might be exchanged for what? This analysis should be of interest to two communities: those concerned with U.S. relations with China, and those concerned with developing norms of conduct in cyberspace, notably those that enhance security and freedom"--Publisher's description
- Cataloging source
- DOS
- http://library.link/vocab/creatorName
- Harold, Scott Warren
- Dewey number
- 384.3/30951
- Index
- no index present
- LC call number
- HM851
- LC item number
- .H37 2016eb online
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Rand Corporation
- Series statement
- Research report
- Series volume
- RR-1335-RC
- http://library.link/vocab/subjectName
-
- Cyberspace
- Cyberspace
- Cyberspace operations (Military science)
- Information warfare
- Internet in espionage
- Espionage, Chinese
- Cyberterrorism
- Cyberterrorism
- Cyberterrorism
- Security, International
- National security
- United States
- China
- COMPUTERS
- Cyberspace operations (Military science)
- Cyberspace
- Cyberterrorism
- Cyberterrorism
- Diplomatic relations
- Espionage, Chinese
- Information warfare
- Internet in espionage
- National security
- Security, International
- China
- United States
- Telecommunications
- Electrical & Computer Engineering
- Engineering & Applied Sciences
- Label
- Getting to Yes with China in Cyberspace, by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos
- Note
- "March 22, 2016"--Table of contents page
- Bibliography note
- Includes bibliographical references (pages 91-104)
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Ch. 1. The "cyber problem" in U.S.-China relations -- ch. 2. Coming to terms -- ch. 3. Getting to now -- ch. 4. Getting to yes? -- ch. 5. Conclusions -- Postscript
- Preface -- Summary -- Abbreviations -- Chapter One: The "Cyber Problem" in U.S.-China Relations: Purpose and Approach -- Organization of This Report -- Chapter Two: Coming to Terms: The Dimensions and Implications of Divergent Views of Deterrence -- Sources of Difference -- Elements of Difference -- Law and Equality -- The Application of Different Deterrence Approaches to Cyberspace: Hegemony -- Attribution Versus the Correlation of Forces -- Escalation -- Stability -- Signaling -- Overall -- Chapter Three: Getting to Now: China's Cyber Espionage -- The 2011 U.S. International Strategy for Cyberspace -- Mandiant, Snowden, and the PLA 5 -- Track Two Talks Between CICIR and CSIS -- What Could the United States Do to Discourage China's EMCE? -- Chapter Four: Getting to Yes?: Setting -- Track One Negotiations: Economically Motivated Cyber Espionage -- What Does China Want? -- Alternatives to Bilateral Negotiations with China -- The Law of Armed Conflict and the Right to Retaliate -- A Mutual Forbearance Proposal -- Chapter Five: Conclusions -- Postscript -- References
- Control code
- 945414813
- Extent
- 1 online resource (xv, 104 pages).
- Form of item
- online
- Isbn
- 9780833092526
- Lccn
- 2016008425
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- 22573/ctt1cxrst0
- Specific material designation
- remote
- System control number
- (OCoLC)945414813
- Label
- Getting to Yes with China in Cyberspace, by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos
- Note
- "March 22, 2016"--Table of contents page
- Bibliography note
- Includes bibliographical references (pages 91-104)
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Ch. 1. The "cyber problem" in U.S.-China relations -- ch. 2. Coming to terms -- ch. 3. Getting to now -- ch. 4. Getting to yes? -- ch. 5. Conclusions -- Postscript
- Preface -- Summary -- Abbreviations -- Chapter One: The "Cyber Problem" in U.S.-China Relations: Purpose and Approach -- Organization of This Report -- Chapter Two: Coming to Terms: The Dimensions and Implications of Divergent Views of Deterrence -- Sources of Difference -- Elements of Difference -- Law and Equality -- The Application of Different Deterrence Approaches to Cyberspace: Hegemony -- Attribution Versus the Correlation of Forces -- Escalation -- Stability -- Signaling -- Overall -- Chapter Three: Getting to Now: China's Cyber Espionage -- The 2011 U.S. International Strategy for Cyberspace -- Mandiant, Snowden, and the PLA 5 -- Track Two Talks Between CICIR and CSIS -- What Could the United States Do to Discourage China's EMCE? -- Chapter Four: Getting to Yes?: Setting -- Track One Negotiations: Economically Motivated Cyber Espionage -- What Does China Want? -- Alternatives to Bilateral Negotiations with China -- The Law of Armed Conflict and the Right to Retaliate -- A Mutual Forbearance Proposal -- Chapter Five: Conclusions -- Postscript -- References
- Control code
- 945414813
- Extent
- 1 online resource (xv, 104 pages).
- Form of item
- online
- Isbn
- 9780833092526
- Lccn
- 2016008425
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- 22573/ctt1cxrst0
- Specific material designation
- remote
- System control number
- (OCoLC)945414813
Subject
- China
- China -- Foreign relations -- United States -- 21st century
- Cyberspace -- Political aspects
- Cyberspace -- Political aspects -- China
- Cyberspace -- Political aspects -- United States
- Cyberspace operations (Military science)
- Cyberspace operations (Military science) -- United States
- Cyberterrorism
- Cyberterrorism -- China
- Cyberterrorism -- Prevention
- Cyberterrorism -- United States
- Cyberterrorism -- United States -- Prevention
- Diplomatic relations
- Electrical & Computer Engineering
- Engineering & Applied Sciences
- Espionage, Chinese
- Espionage, Chinese
- Information warfare
- Information warfare -- 21st century
- Internet in espionage
- Internet in espionage -- China
- National security
- National security -- United States
- Security, International
- Security, International -- 21st century
- Telecommunications
- United States
- United States -- Foreign relations -- China -- 21st century
- 2000-2099
- COMPUTERS -- Networking | Security
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/portal/Getting-to-Yes-with-China-in-Cyberspace-by-Scott/XCQORecTIp8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/portal/Getting-to-Yes-with-China-in-Cyberspace-by-Scott/XCQORecTIp8/">Getting to Yes with China in Cyberspace, by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Getting to Yes with China in Cyberspace, by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/portal/Getting-to-Yes-with-China-in-Cyberspace-by-Scott/XCQORecTIp8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/portal/Getting-to-Yes-with-China-in-Cyberspace-by-Scott/XCQORecTIp8/">Getting to Yes with China in Cyberspace, by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>