My Account Log in

4 options

Getting to yes with China in cyberspace / Scott Warren Harold, Martin C. Libicki, Astrid Stuth Cevallos.

DOAB Directory of Open Access Books Available online

View online

EBSCOhost Academic eBook Collection (North America) Available online

View online

JSTOR Books Open Access Available online

View online

RAND Reports Available online

View online
Format:
Book
Author/Creator:
Harold, Scott, 1975- author.
Libicki, Martin C., author.
Cevallos, Astrid Stuth, author.
Language:
English
Subjects (All):
Internet governance--China.
Internet governance.
Internet governance--United States.
Computer crimes--China--Prevention.
Computer crimes.
Computer crimes--United States--Prevention.
Cyberterrorism--China--Prevention.
Cyberterrorism.
Cyberterrorism--United States--Prevention.
Physical Description:
1 online resource (121 p.)
Place of Publication:
RAND Corporation 2016
Santa Monica, California : RAND Corporation, 2016.
Language Note:
English
Summary:
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace.
Contents:
Cover ; Title Page ; Copyright ; Preface; Contents; Summary; Abbreviations; CHAPTER ONE: The "Cyber Problem" in U.S.-China Relations; Purpose and Approach; Organization of This Report; CHAPTER TWO: Coming to Terms; The Dimensions and Implications of Divergent Views of Deterrence; Sources of Difference; Elements of Difference; Law and Equality; The Application of Different Deterrence Approaches to Cyberspace; Hegemony; Attribution Versus the Correlation of Forces; Escalation; Stability; Signaling; Overall; CHAPTER THREE: Getting to Now; China's Cyber Espionage
The 2011 U.S. International Strategy for CyberspaceMandiant, Snowden, and the PLA 5; Track Two Talks Between CICIR and CSIS; What Could the United States Do to Discourage China's EMCE?; CHAPTER FOUR: Getting to Yes?; Setting; Track One Negotiations; Economically Motivated Cyber Espionage; What Does China Want?; Alternatives to Bilateral Negotiations with China; The Law of Armed Conflict and the Right to Retaliate; A Mutual Forbearance Proposal; CHAPTER FIVE: Conclusions; Postscript; References
Notes:
Description based upon print version of record.
Includes bibliographical references.
Description based on print version record.
ISBN:
0-8330-9252-9

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account