|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
JSTOROA_ocn945414813 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
160323t20162016cau ob 000 0 eng d |
040 |
|
|
|a DOS
|b eng
|e rda
|e pn
|c DOS
|d OCLCF
|d YDXCP
|d JSTOR
|d EBLCP
|d COO
|d N$T
|d DEBBG
|d IDB
|d MERUC
|d OCLCQ
|d VT2
|d OCLCA
|d AGLDB
|d VFL
|d CN8ML
|d D6H
|d WRM
|d VNS
|d OCLCQ
|d VTS
|d LOA
|d INT
|d AU@
|d OCLCQ
|d WYU
|d U3W
|d ICN
|d S9I
|d STF
|d OCLCQ
|d VLY
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 965737325
|a 1162524246
|a 1228050750
|a 1241849601
|a 1300472996
|
020 |
|
|
|a 9780833092526
|q (electronic bk.)
|
020 |
|
|
|a 0833092529
|q (electronic bk.)
|
020 |
|
|
|z 9780833092496
|
020 |
|
|
|z 0833092499
|
020 |
|
|
|z 9780833092519
|q (prc)
|
029 |
1 |
|
|a AU@
|b 000061155693
|
029 |
1 |
|
|a DEBBG
|b BV043894678
|
035 |
|
|
|a (OCoLC)945414813
|z (OCoLC)965737325
|z (OCoLC)1162524246
|z (OCoLC)1228050750
|z (OCoLC)1241849601
|z (OCoLC)1300472996
|
037 |
|
|
|a 22573/ctt1cxrst0
|b JSTOR
|
043 |
|
|
|a n-us---
|a a-cc---
|
050 |
|
4 |
|a HM851
|b .H37 2016eb online
|
072 |
|
7 |
|a COM043050
|2 bisacsh
|
072 |
|
7 |
|a HIS008000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 384.3/30951
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Harold, Scott Warren,
|e author.
|
245 |
1 |
0 |
|a Getting to Yes with China in Cyberspace /
|c by Scott Warren Harold, Martin C. Libicki, Astrid Cevallos.
|
264 |
|
1 |
|a Santa Monica, Calif. :
|b RAND,
|c [2016]
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource (xv, 104 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Research report ;
|v RR-1335-RC
|
500 |
|
|
|a "March 22, 2016"--Table of contents page
|
504 |
|
|
|a Includes bibliographical references (pages 91-104).
|
505 |
0 |
|
|a Ch. 1. The "cyber problem" in U.S.-China relations -- ch. 2. Coming to terms -- ch. 3. Getting to now -- ch. 4. Getting to yes? -- ch. 5. Conclusions -- Postscript.
|
505 |
0 |
|
|a Preface -- Summary -- Abbreviations -- Chapter One: The "Cyber Problem" in U.S.-China Relations: Purpose and Approach -- Organization of This Report -- Chapter Two: Coming to Terms: The Dimensions and Implications of Divergent Views of Deterrence -- Sources of Difference -- Elements of Difference -- Law and Equality -- The Application of Different Deterrence Approaches to Cyberspace: Hegemony -- Attribution Versus the Correlation of Forces -- Escalation -- Stability -- Signaling -- Overall -- Chapter Three: Getting to Now: China's Cyber Espionage -- The 2011 U.S. International Strategy for Cyberspace -- Mandiant, Snowden, and the PLA 5 -- Track Two Talks Between CICIR and CSIS -- What Could the United States Do to Discourage China's EMCE? -- Chapter Four: Getting to Yes?: Setting -- Track One Negotiations: Economically Motivated Cyber Espionage -- What Does China Want? -- Alternatives to Bilateral Negotiations with China -- The Law of Armed Conflict and the Right to Retaliate -- A Mutual Forbearance Proposal -- Chapter Five: Conclusions -- Postscript -- References.
|
520 |
|
|
|a "Since the founding of the People's Republic of China in 1949, the U.S.-China relationship has been characterized by conflict, confrontation, and strategic mistrust. The tensions that divide the two countries have been growing in importance in recent years. Unfortunately, they apply just as much to cyberspace as to relations in the physical world. Indeed, of all the areas where the relationship between the two sides is troubled, cyberspace has been one of the most contentious. The United States and China began formal negotiations in 2013 to resolve such differences only to see them abruptly suspended in 2014, when China broke them off in response to the U.S. indictment of several Chinese military officers on charges related to cyber-espionage activities. This study explores U.S. policy options for managing relations with China over this critical policy area through the use of agreements and norms of behavior. It looks at two basic questions: Can the United States and China achieve meaningful outcomes through formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement and what might be exchanged for what? This analysis should be of interest to two communities: those concerned with U.S. relations with China, and those concerned with developing norms of conduct in cyberspace, notably those that enhance security and freedom"--Publisher's description
|
588 |
0 |
|
|a Online resource; title from PDF title page (RAND, viewed March 22, 2016).
|
546 |
|
|
|a English.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Open Access
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Cyberspace
|x Political aspects
|z United States.
|
650 |
|
0 |
|a Cyberspace
|x Political aspects
|z China.
|
650 |
|
0 |
|a Cyberspace operations (Military science)
|z United States.
|
650 |
|
0 |
|a Information warfare
|y 21st century.
|
650 |
|
0 |
|a Internet in espionage
|z China.
|
650 |
|
0 |
|a Espionage, Chinese.
|
650 |
|
0 |
|a Cyberterrorism
|z United States.
|
650 |
|
0 |
|a Cyberterrorism
|z China.
|
650 |
|
0 |
|a Cyberterrorism
|z United States
|x Prevention.
|
650 |
|
0 |
|a Security, International
|y 21st century.
|
650 |
|
0 |
|a National security
|z United States.
|
651 |
|
0 |
|a United States
|x Foreign relations
|z China
|y 21st century.
|
651 |
|
0 |
|a China
|x Foreign relations
|z United States
|y 21st century.
|
650 |
|
6 |
|a Cyberespace
|x Aspect politique
|z États-Unis.
|
650 |
|
6 |
|a Cyberespace
|x Aspect politique
|z Chine.
|
650 |
|
6 |
|a Cyberguerre (Science militaire)
|z États-Unis.
|
650 |
|
6 |
|a Guerre de l'information
|y 21e siècle.
|
650 |
|
6 |
|a Internet dans l'espionnage
|z Chine.
|
650 |
|
6 |
|a Espionnage chinois.
|
650 |
|
6 |
|a Cyberterrorisme
|z États-Unis.
|
650 |
|
6 |
|a Cyberterrorisme
|z Chine.
|
651 |
|
6 |
|a États-Unis
|x Relations extérieures
|z Chine
|y 21e siècle.
|
651 |
|
6 |
|a Chine
|x Relations extérieures
|z États-Unis
|y 21e siècle.
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace operations (Military science)
|2 fast
|0 (OCoLC)fst01909446
|
650 |
|
7 |
|a Cyberspace
|x Political aspects.
|2 fast
|0 (OCoLC)fst00885798
|
650 |
|
7 |
|a Cyberterrorism.
|2 fast
|0 (OCoLC)fst00885802
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention.
|2 fast
|0 (OCoLC)fst01905567
|
650 |
|
7 |
|a Diplomatic relations.
|2 fast
|0 (OCoLC)fst01907412
|
650 |
|
7 |
|a Espionage, Chinese.
|2 fast
|0 (OCoLC)fst00915395
|
650 |
|
7 |
|a Information warfare.
|2 fast
|0 (OCoLC)fst00973186
|
650 |
|
7 |
|a Internet in espionage.
|2 fast
|0 (OCoLC)fst01739358
|
650 |
|
7 |
|a National security.
|2 fast
|0 (OCoLC)fst01033711
|
650 |
|
7 |
|a Security, International.
|2 fast
|0 (OCoLC)fst01110895
|
651 |
|
7 |
|a China.
|2 fast
|0 (OCoLC)fst01206073
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
648 |
|
7 |
|a 2000-2099
|2 fast
|
710 |
2 |
|
|a Rand Corporation,
|e issuing body,
|e publisher.
|
776 |
0 |
8 |
|i Erscheint auch als:
|n Druck-Ausgabe
|t Harold, Scott Warren. Getting to Yes with China in Cyberspace
|
830 |
|
0 |
|a Research report (Rand Corporation) ;
|v RR-1335-RC.
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.7249/j.ctt1cx3vfr
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4578328
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1280679
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13063157
|
994 |
|
|
|a 92
|b IZTAP
|