Srl | Item |
1 |
ID:
132635
|
|
|
Publication |
2014.
|
Summary/Abstract |
In May, the U.S. government circulated a wanted poster showing five members of a shadowy Chinese cyber-espionage unit. No one expects any of them to turn up in a U.S. courtroom, but the object of the publicity was twofold. First, it was intended to show the Chinese that the U.S. government takes their operations seriously, that it can and will retaliate in some unspecified way. It is as pointless to ask the Chinese (and many others) to abandon cyber espionage as it would be to seek an international treaty barring any other kind of spying. The spies would stay in business, but some naive governments would abandon counterespionage, and cease any spying of their own.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
186097
|
|
|
Summary/Abstract |
While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of achieving strategic outcomes without the need of armed attack. These campaigns are not simply transitory clever tactics, but strategic in intent. This article examines strategic cyber competition and reveals how the adoption of a different construct can pivot both explanation and policy prescription. Strategy must be unshackled from the presumption that it deals only with the realm of coercion, militarised crisis, and war in cyberspace.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
132291
|
|
|
Publication |
New Delhi, Pentagon Press, 2013.
|
Description |
xvi, 218p.Hbk
|
Standard Number |
9788182747562
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
057804 | 355.343/RID 057804 | Main | On Shelf | General | |
|
|
|
|
4 |
ID:
138669
|
|
|
5 |
ID:
182673
|
|
|
Summary/Abstract |
A state’s decision to engage in cyber operations has important implications for its trade. Successful cyber espionage could yield valuable trade secrets that could boost domestic production and spur economic growth. On the other hand, uncovered cyber operations could invite devastating sanctions that retard economic development. In spite of this, the nexus between trade and cyber attacks has received little attention in the literature. In this article, I explore how a state’s trade relations affect its propensity to engage in cyber attacks. I develop a theoretical framework that links the composition of a state’s trade to its deficit in proprietary information relative to other states. I decompose trade into its inter- and intra-industry components and show that while inter-industry trade is associated with higher incidence of state-sponsored cyber attacks, intra-industry trade has the opposite effect. I also show that these effects are non-monotonic, varying by the share of inter- or intra-industry trade in total trade. The results also show that states that have a heavy concentration of high-tech industries such as aerospace, computers, and pharmaceuticals have a higher propensity to engage in cyber espionage operations. These results are robust to a variety of controls and specifications.
|
|
|
|
|
|
|
|
|
|
6 |
ID:
188806
|
|
|
Summary/Abstract |
The United States and its partners have arrived at a critical crossroads in their relations with China – and with one another – in the realm of high technology. Some degree of high-tech decoupling between the two sides is already under way, and recent events suggest this trend is accelerating. Combined efforts to bolster their collective resilience in the face of China’s rise remain inadequate. Going forward, much greater investment in resilience is required, including measures to absorb threatening Chinese actions and to adapt and transform in response to China’s growing technological prowess. While this will call for considerable acumen and effort on the part of like-minded governments, greater resilience would afford them renewed solidarity and enriched opportunities to sustain technological leadership in the future.
|
|
|
|
|
|
|
|
|
|
7 |
ID:
129253
|
|
|