Skip to content
You are not logged in |Login  

LEADER 00000cam  2200817Ii 4500 
001    ocn945414813 
003    OCoLC 
005    20180404051412.0 
006    m     o  d         
007    cr ||||||||||| 
008    160323t20162016cau     ob    000 0 eng d 
010      2016008425 
019    965737325 
020    9780833092526|q(electronic bk.) 
020    0833092529|q(electronic bk.) 
020    |z9780833092496 
020    |z0833092499 
035    (OCoLC)945414813|z(OCoLC)965737325 
040    DOS|beng|erda|epn|cDOS|dOCLCF|dYDXCP|dJSTOR|dEBLCP|dCOO
       |dN$T|dDEBBG|dIDB|dMERUC|dOCLCQ|dVT2|dOCLCA|dAGLDB|dVFL
       |dCN8ML|dD6H 
043    n-us---|aa-cc--- 
049    CKEA 
050  4 HM851|b.H37 2016eb online 
082 04 384.3/30951 
100 1  Harold, Scott Warren,|eauthor. 
245 10 Getting to Yes with China in Cyberspace /|cby Scott Warren
       Harold, Martin C. Libicki, Astrid Cevallos. 
264  1 Santa Monica, Calif. :|bRAND,|c[2016] 
264  4 |c©2016 
300    1 online resource (xv, 104 pages). 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
490 1  Research report ;|vRR-1335-RC 
500    "March 22, 2016"--Table of contents page. 
504    Includes bibliographical references (pages 91-104). 
505 0  Ch. 1. The "cyber problem" in U.S.-China relations -- ch. 
       2. Coming to terms -- ch. 3. Getting to now -- ch. 4. 
       Getting to yes? -- ch. 5. Conclusions -- Postscript. 
505 0  Preface -- Summary -- Abbreviations -- Chapter One: The 
       "Cyber Problem" in U.S.-China Relations: Purpose and 
       Approach -- Organization of This Report -- Chapter Two: 
       Coming to Terms: The Dimensions and Implications of 
       Divergent Views of Deterrence -- Sources of Difference -- 
       Elements of Difference -- Law and Equality -- The 
       Application of Different Deterrence Approaches to 
       Cyberspace: Hegemony -- Attribution Versus the Correlation
       of Forces -- Escalation -- Stability -- Signaling -- 
       Overall -- Chapter Three: Getting to Now: China's Cyber 
       Espionage -- The 2011 U.S. International Strategy for 
       Cyberspace -- Mandiant, Snowden, and the PLA 5 -- Track 
       Two Talks Between CICIR and CSIS -- What Could the United 
       States Do to Discourage China's EMCE? -- Chapter Four: 
       Getting to Yes?: Setting -- Track One Negotiations: 
       Economically Motivated Cyber Espionage -- What Does China 
       Want? -- Alternatives to Bilateral Negotiations with China
       -- The Law of Armed Conflict and the Right to Retaliate --
       A Mutual Forbearance Proposal -- Chapter Five: Conclusions
       -- Postscript -- References. 
520    "Since the founding of the People's Republic of China in 
       1949, the U.S.-China relationship has been characterized 
       by conflict, confrontation, and strategic mistrust. The 
       tensions that divide the two countries have been growing 
       in importance in recent years. Unfortunately, they apply 
       just as much to cyberspace as to relations in the physical
       world. Indeed, of all the areas where the relationship 
       between the two sides is troubled, cyberspace has been one
       of the most contentious. The United States and China began
       formal negotiations in 2013 to resolve such differences 
       only to see them abruptly suspended in 2014, when China 
       broke them off in response to the U.S. indictment of 
       several Chinese military officers on charges related to 
       cyber-espionage activities. This study explores U.S. 
       policy options for managing relations with China over this
       critical policy area through the use of agreements and 
       norms of behavior. It looks at two basic questions: Can 
       the United States and China achieve meaningful outcomes 
       through formal negotiations over norms and rules in 
       cyberspace? And, if so, what areas are most likely to 
       yield agreement and what might be exchanged for what? This
       analysis should be of interest to two communities: those 
       concerned with U.S. relations with China, and those 
       concerned with developing norms of conduct in cyberspace, 
       notably those that enhance security and freedom"--
       Publisher's description. 
588 0  Online resource; title from PDF title page (RAND, viewed 
       March 22, 2016). 
648  7 2000-2099|2fast 
650  0 Cyberspace|xPolitical aspects|zUnited States. 
650  0 Cyberspace|xPolitical aspects|zChina. 
650  0 Cyberspace operations (Military science)|zUnited States. 
650  0 Information warfare|y21st century. 
650  0 Internet in espionage|zChina. 
650  0 Espionage, Chinese. 
650  0 Cyberterrorism|zUnited States. 
650  0 Cyberterrorism|zChina. 
650  0 Cyberterrorism|zUnited States|xPrevention. 
650  0 Security, International|y21st century. 
650  0 National security|zUnited States. 
650  7 Cyberspace operations (Military science)|2fast
       |0(OCoLC)fst01909446 
650  7 Cyberspace|xPolitical aspects.|2fast|0(OCoLC)fst00885798 
650  7 Cyberterrorism.|2fast|0(OCoLC)fst00885802 
650  7 Cyberterrorism|xPrevention.|2fast|0(OCoLC)fst01905567 
650  7 Diplomatic relations.|2fast|0(OCoLC)fst01907412 
650  7 Espionage, Chinese.|2fast|0(OCoLC)fst00915395 
650  7 Information warfare.|2fast|0(OCoLC)fst00973186 
650  7 Internet in espionage.|2fast|0(OCoLC)fst01739358 
650  7 National security.|2fast|0(OCoLC)fst01033711 
650  7 Security, International.|2fast|0(OCoLC)fst01110895 
651  0 United States|xForeign relations|zChina|y21st century. 
651  0 China|xForeign relations|zUnited States|y21st century. 
651  7 China.|2fast|0(OCoLC)fst01206073 
651  7 United States.|2fast|0(OCoLC)fst01204155 
655  0 Electronic books. 
710 2  Rand Corporation,|eissuing body,|epublisher. 
776 08 |iErscheint auch als:|nDruck-Ausgabe|tHarold, Scott 
       Warren. Getting to Yes with China in Cyberspace 
830  0 Research report (Rand Corporation) ;|vRR-1335-RC. 
994    C0|bCKE 
Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource