Getting to Yes with China in Cyberspace
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable...
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
2016
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_115523 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2016 xx |||||o ||| 0|eng d | ||
020 | |a j.ctt1cx3vfr | ||
020 | |a 9780833092526 | ||
020 | |a 9780833092496 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/j.ctt1cx3vfr |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a HBJF |2 bicssc | |
100 | 1 | |a Harold, Scott Warren |4 auth | |
700 | 1 | |a Libicki, Martin C. |4 auth | |
700 | 1 | |a Cevallos, Astrid Stuth |4 auth | |
245 | 1 | 0 | |a Getting to Yes with China in Cyberspace |
260 | |b RAND Corporation |c 2016 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Network security |2 bicssc | |
650 | 7 | |a Computer security |2 bicssc | |
650 | 7 | |a Asian history |2 bicssc | |
653 | |a Technology | ||
653 | |a History | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/j.ctt1cx3vfr |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/115523 |7 0 |z DOAB: description of the publication |