000 04046nam a2200445 i 4500
005 20250919010719.0
008 160204t2015 nyu bi 001 0 eng d
020 _a9780190201272
_qpaperback
_cRM150.37
039 9 _a201605171459
_bhaiyati
_c201605101606
_dlan
_c201605101603
_dlan
_c201605101601
_dlan
_y02-04-2016
_zrahah
040 _aDLC
_beng
_erda
_cDLC
_dYDX
_dBTCTA
_dBDX
_dOCLCF
_dCDX
_dIUL
_dYUS
_dYDXCP
_dOCLCQ
_dUKM
_erda
043 _aa-cc---
_an-us---
090 _aHV6773.15.C97C485
090 _aHV6773.15.C97
_bC485
245 0 0 _aChina and cybersecurity :
_bespionage, strategy, and politics in the digital domain /
_cedited by Jon R. Lindsay [and two others].
246 1 8 _ispine title :
_aChina and cybersecurity.
264 1 _aNew York :
_bOxford University Press,
_c[2015].
264 4 _c©2015.
300 _axvii, 375 pages ;
_c25 cm.
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a'China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of'informatization' reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber -- attacks -- predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors -- Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West -- address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain'--
_cProvided by publisher.
520 _a'Examines cyberspace threats and policies from the vantage points of China and the U.S'--
_cProvided by publisher.
650 0 _aCyberterrorism
_zChina.
650 0 _aNational security
_zUnited States.
650 0 _aSecurity, International.
650 0 _aInternational cooperation.
700 1 _aLindsay, Jon R.,
_eeditor.
700 1 _aCheung, Tai Ming,
_eeditor.
700 1 _aReveron, Derek S.,
_eeditor.
907 _a.b16270113
_b2019-11-12
_c2019-11-12
942 _c01
_n0
_kHV6773.15.C97C485
914 _avtls003600067
990 _arab
991 _aFakulti Sains Sosial dan Kemanusiaan
998 _at
_b2016-04-02
_cm
_da
_feng
_gnyu
_y0
_z.b16270113
999 _c604648
_d604648