4 options
Getting to yes with China in cyberspace / Scott Warren Harold, Martin C. Libicki, Astrid Stuth Cevallos.
- Format:
- Book
- Author/Creator:
- Harold, Scott, 1975- author.
- Libicki, Martin C., author.
- Cevallos, Astrid Stuth, author.
- Language:
- English
- Subjects (All):
- Internet governance--China.
- Internet governance.
- Internet governance--United States.
- Computer crimes--China--Prevention.
- Computer crimes.
- Computer crimes--United States--Prevention.
- Cyberterrorism--China--Prevention.
- Cyberterrorism.
- Cyberterrorism--United States--Prevention.
- Physical Description:
- 1 online resource (121 p.)
- Place of Publication:
- RAND Corporation 2016
- Santa Monica, California : RAND Corporation, 2016.
- Language Note:
- English
- Summary:
- This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace.
- Contents:
- Cover ; Title Page ; Copyright ; Preface; Contents; Summary; Abbreviations; CHAPTER ONE: The "Cyber Problem" in U.S.-China Relations; Purpose and Approach; Organization of This Report; CHAPTER TWO: Coming to Terms; The Dimensions and Implications of Divergent Views of Deterrence; Sources of Difference; Elements of Difference; Law and Equality; The Application of Different Deterrence Approaches to Cyberspace; Hegemony; Attribution Versus the Correlation of Forces; Escalation; Stability; Signaling; Overall; CHAPTER THREE: Getting to Now; China's Cyber Espionage
- The 2011 U.S. International Strategy for CyberspaceMandiant, Snowden, and the PLA 5; Track Two Talks Between CICIR and CSIS; What Could the United States Do to Discourage China's EMCE?; CHAPTER FOUR: Getting to Yes?; Setting; Track One Negotiations; Economically Motivated Cyber Espionage; What Does China Want?; Alternatives to Bilateral Negotiations with China; The Law of Armed Conflict and the Right to Retaliate; A Mutual Forbearance Proposal; CHAPTER FIVE: Conclusions; Postscript; References
- Notes:
- Description based upon print version of record.
- Includes bibliographical references.
- Description based on print version record.
- ISBN:
- 0-8330-9252-9
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.