Skip to content
You are not logged in |Login  

LEADER 00000cam a2201045Ii 4500 
001    ocn945414813 
003    OCoLC 
005    20210521141208.8 
006    m     o  d         
007    cr ||||||||||| 
008    160323t20162016cau     ob    000 0 eng d 
019    965737325|a1162524246|a1228050750|a1241849601 
020    9780833092526|q(electronic book) 
020    0833092529|q(electronic book) 
020    |z9780833092496 
020    |z0833092499 
020    |z9780833092519|q(prc) 
035    (OCoLC)945414813|z(OCoLC)965737325|z(OCoLC)1162524246
       |z(OCoLC)1228050750|z(OCoLC)1241849601 
037    22573/ctt1cxrst0|bJSTOR 
040    DOS|beng|erda|epn|cDOS|dOCLCF|dYDXCP|dJSTOR|dEBLCP|dCOO
       |dN$T|dDEBBG|dIDB|dMERUC|dOCLCQ|dVT2|dOCLCA|dAGLDB|dVFL
       |dCN8ML|dD6H|dWRM|dVNS|dOCLCQ|dVTS|dLOA|dINT|dAU@|dOCLCQ
       |dWYU|dU3W|dICN|dS9I|dSTF|dOCLCQ|dVLY|dOCLCQ|dOCLCO 
043    n-us---|aa-cc--- 
049    RIDW 
050  4 HM851|b.H37 2016eb online 
072  7 COM043050|2bisacsh 
072  7 HIS008000|2bisacsh 
072  7 COM053000|2bisacsh 
082 04 384.3/30951 
090    HM851|b.H37 2016eb online 
100 1  Harold, Scott Warren,|eauthor. 
245 10 Getting to Yes with China in Cyberspace /|cby Scott Warren
       Harold, Martin C. Libicki, Astrid Cevallos. 
264  1 Santa Monica, Calif. :|bRAND,|c[2016] 
264  4 |c©2016 
300    1 online resource (xv, 104 pages). 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    data file 
490 1  Research report ;|vRR-1335-RC 
500    "March 22, 2016"--Table of contents page 
504    Includes bibliographical references (pages 91-104). 
505 0  Ch. 1. The "cyber problem" in U.S.-China relations -- ch. 
       2. Coming to terms -- ch. 3. Getting to now -- ch. 4. 
       Getting to yes? -- ch. 5. Conclusions -- Postscript. 
505 0  Preface -- Summary -- Abbreviations -- Chapter One: The 
       "Cyber Problem" in U.S.-China Relations: Purpose and 
       Approach -- Organization of This Report -- Chapter Two: 
       Coming to Terms: The Dimensions and Implications of 
       Divergent Views of Deterrence -- Sources of Difference -- 
       Elements of Difference -- Law and Equality -- The 
       Application of Different Deterrence Approaches to 
       Cyberspace: Hegemony -- Attribution Versus the Correlation
       of Forces -- Escalation -- Stability -- Signaling -- 
       Overall -- Chapter Three: Getting to Now: China's Cyber 
       Espionage -- The 2011 U.S. International Strategy for 
       Cyberspace -- Mandiant, Snowden, and the PLA 5 -- Track 
       Two Talks Between CICIR and CSIS -- What Could the United 
       States Do to Discourage China's EMCE? -- Chapter Four: 
       Getting to Yes?: Setting -- Track One Negotiations: 
       Economically Motivated Cyber Espionage -- What Does China 
       Want? -- Alternatives to Bilateral Negotiations with China
       -- The Law of Armed Conflict and the Right to Retaliate --
       A Mutual Forbearance Proposal -- Chapter Five: Conclusions
       -- Postscript -- References. 
520    "Since the founding of the People's Republic of China in 
       1949, the U.S.-China relationship has been characterized 
       by conflict, confrontation, and strategic mistrust. The 
       tensions that divide the two countries have been growing 
       in importance in recent years. Unfortunately, they apply 
       just as much to cyberspace as to relations in the physical
       world. Indeed, of all the areas where the relationship 
       between the two sides is troubled, cyberspace has been one
       of the most contentious. The United States and China began
       formal negotiations in 2013 to resolve such differences 
       only to see them abruptly suspended in 2014, when China 
       broke them off in response to the U.S. indictment of 
       several Chinese military officers on charges related to 
       cyber-espionage activities. This study explores U.S. 
       policy options for managing relations with China over this
       critical policy area through the use of agreements and 
       norms of behavior. It looks at two basic questions: Can 
       the United States and China achieve meaningful outcomes 
       through formal negotiations over norms and rules in 
       cyberspace? And, if so, what areas are most likely to 
       yield agreement and what might be exchanged for what? This
       analysis should be of interest to two communities: those 
       concerned with U.S. relations with China, and those 
       concerned with developing norms of conduct in cyberspace, 
       notably those that enhance security and freedom"--
       Publisher's description 
546    English. 
588 0  Online resource; title from PDF title page (RAND, viewed 
       March 22, 2016). 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
590    JSTOR|bBooks at JSTOR Open Access 
648  7 21st century|2fast 
648  7 2000-2099|2fast 
650  0 Cyberspace|0https://id.loc.gov/authorities/subjects/
       sh97002963|xPolitical aspects|0https://id.loc.gov/
       authorities/subjects/sh00005651|zUnited States.|0https://
       id.loc.gov/authorities/names/n78095330-781 
650  0 Cyberspace|0https://id.loc.gov/authorities/subjects/
       sh97002963|xPolitical aspects|0https://id.loc.gov/
       authorities/subjects/sh00005651|zChina.|0https://
       id.loc.gov/authorities/names/n79091151-781 
650  0 Cyberspace operations (Military science)|0https://
       id.loc.gov/authorities/subjects/sh2013000988|zUnited 
       States.|0https://id.loc.gov/authorities/names/n78095330-
       781 
650  0 Information warfare|0https://id.loc.gov/authorities/
       subjects/sh95005481|y21st century.|0https://id.loc.gov/
       authorities/subjects/sh2002012478 
650  0 Internet in espionage|0https://id.loc.gov/authorities/
       subjects/sh2005008677|zChina.|0https://id.loc.gov/
       authorities/names/n79091151-781 
650  0 Espionage, Chinese.|0https://id.loc.gov/authorities/
       subjects/sh96010429 
650  0 Cyberterrorism|0https://id.loc.gov/authorities/subjects/
       sh00001974|zUnited States.|0https://id.loc.gov/authorities
       /names/n78095330-781 
650  0 Cyberterrorism|0https://id.loc.gov/authorities/subjects/
       sh00001974|zChina.|0https://id.loc.gov/authorities/names/
       n79091151-781 
650  0 Cyberterrorism|zUnited States|xPrevention.|0https://
       id.loc.gov/authorities/subjects/sh2009121190 
650  0 Security, International|0https://id.loc.gov/authorities/
       subjects/sh85119471|y21st century.|0https://id.loc.gov/
       authorities/subjects/sh2002012478 
650  0 National security|zUnited States.|0https://id.loc.gov/
       authorities/subjects/sh85140387 
650  7 Cyberspace|xPolitical aspects.|2fast|0https://
       id.worldcat.org/fast/885798 
650  7 Cyberspace.|2fast|0https://id.worldcat.org/fast/885794 
650  7 Cyberspace operations (Military science)|2fast|0https://
       id.worldcat.org/fast/1909446 
650  7 Information warfare.|2fast|0https://id.worldcat.org/fast/
       973186 
650  7 Internet in espionage.|2fast|0https://id.worldcat.org/fast
       /1739358 
650  7 Espionage, Chinese.|2fast|0https://id.worldcat.org/fast/
       915395 
650  7 Cyberterrorism.|2fast|0https://id.worldcat.org/fast/885802
650  7 Cyberterrorism|xPrevention.|2fast|0https://id.worldcat.org
       /fast/1905567 
650  7 Security, International.|2fast|0https://id.worldcat.org/
       fast/1110895 
650  7 National security.|2fast|0https://id.worldcat.org/fast/
       1033711 
650  7 International relations.|2fast|0https://id.worldcat.org/
       fast/977053 
651  0 United States|xForeign relations|zChina|0https://
       id.loc.gov/authorities/subjects/sh2007100024|y21st 
       century.|0https://id.loc.gov/authorities/subjects/
       sh2002012478 
651  0 China|xForeign relations|zUnited States|0https://
       id.loc.gov/authorities/subjects/sh2008100081|y21st 
       century.|0https://id.loc.gov/authorities/subjects/
       sh2002012478 
651  7 United States.|2fast|0https://id.worldcat.org/fast/1204155
651  7 China.|2fast|0https://id.worldcat.org/fast/1206073 
655  4 Electronic books. 
710 2  Rand Corporation,|0https://id.loc.gov/authorities/names/
       n78083407|eissuing body,|epublisher. 
776 08 |iErscheint auch als:|nDruck-Ausgabe|tHarold, Scott 
       Warren. Getting to Yes with China in Cyberspace 
830  0 Research report (Rand Corporation) ;|0https://id.loc.gov/
       authorities/names/no2013072664|vRR-1335-RC. 
856 40 |uhttps://www.jstor.org/stable/10.7249/j.ctt1cx3vfr
       |zOnline ebook. Open Access via JSTOR. 
856 40 |uhttps://rider.idm.oclc.org/login?url=https://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=1280679|zOnline ebook via EBSCO. Access 
       restricted to current Rider University students, faculty, 
       and staff. 
901    MARCIVE 20231220 
948    |d20210713|cJSTOR|tJSTOROpenAccess 1505 Updates 1434EBSCO
       |lridw 
948    |d20190820|cJSTOR EBSCO|tJSTOROpenAccess 
       EBSCOebooksacademic UPDATES 5472J 1248 BOTH 7-12-19|lridw 
948    |d20171110|cEBSCO|tebscoebooksacademic NEW|lridw 
948    |d20180926|clti|tlti-aex 
948    |d20180531|cEBSCO JSTOR|tEBSCOebooksacademic 
       JSTOROpenAccess BOTH 5-29|lridw 
994    92|bRID