Search Books
An introduction to modern t… The Cotton Kings: Capitalis…

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain

Publisher Oxford University Press
Category Business & Economics
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
33.90 34.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $37.99

✓ Usually ships in 24 hours

Share:
Book Details
ISBN / ASIN0190201274
ISBN-139780190201272
AvailabilityUsually ships in 24 hours
Sales Rank452,034
MarketplaceUnited States 🇺🇸

Description

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians.

Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber -- attacks -- predominantly from the United States.

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors -- Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West -- address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
Capital: The Story of Long-Term Investment Excellence
View
Six Sigma Beyond the Factory Floor: Deployment Strateg…
View
The Introvert Entrepreneur: Amplify Your Strengths and…
View
Polarity Management: Identifying and Managing Unsolvab…
View
Essentials of the U.S. Health Care System: .
View
Category Management in Purchasing: A Strategic Approac…
View
The Discipline of Market Leaders: Choose Your Customer…
View
Business-Focused HR: 11 Processes to Drive Results
View