![]() |
[email protected] |
![]() |
3275638434 |
![]() |
![]() |
Paper Publishing WeChat |
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
National Cybersecurity Strategy of the U.S. and Its Constructive Implication for China
Bowei Shi
Full-Text PDF
XML 4125 Views
DOI:10.17265/2159-5526/2015.11.001
Sichuan International Studies University, China
The United States, cybersecurity strategy, China, constructive implication
Sociology Study, November 2015, Vol. 5, No. 11, 825-831
Bartley, R. 2015. US, China Reach Cybersecurity Agreement, Commit to Regular Dialogue. Retrieved (http://www. fiercegovernmentit.com/story/us-china-reach-cybersecurity-agreement-commit-regular-dialogue/2015-09-25).
Blackwill, R., H. Kissinger, and A. Tellis. 2015. A New U.S. Grand Strategy Toward China. Retrieved (http://www.cfr. org/china/new-us-grand-strategy-toward-china/p36435).
Chen, X. G. 2015. A Speech on the 13th Forum of “The Oder of International Cybersecurity” of Institute of Modern International Relation, Tsinghua University. Retrieved (http://www.imir.tsinghua.edu.cn/publish/iis/7246/2015/20151015104524124852434/20151015104524124852434_.html).
Clapper, J. 2013. “Worldwide Threat Assessment of the US Intelligence Community.” A Report of Senate Select Committee on Intelligence by James R. Clapper, Director of National Intelligence. Retrieved (http://www.nctc.gov/docs/ 2013_03_12_SSCI_Worldwide_Threat_Assessment.pdf).
Fischer, E. 2013. Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions. Retrieved (http://fas.org/sgp/crs/natsec/R42114.pdf).
Innes-Ker, D., E. Economy, D. L. Shen, A. Segal, and O. H. Schell. 2015. How to Improve U.S.-China Relations. Retrieved (http://www.cfr.org/china/improve-us-china- relations/p37044).
Kerry, J. 2015. A Video File of a Very Renowned Talk Show—Yang Lan Interview Transcription. Retrieved (http:// www.iqiyi.com/v_19rrknr0co.html?vfm=2008_aldbd).
Libicki, M. 2009. Cyberdeterrence and Cyberwar. Santa Monica: RAND Corporation.
Liu, D. L. 2015. The Toxicity of Trojan Horse Virus Bear Resemblance With That Firearms. Retrieved (http://www.iolaw.org.cn/showNews.aspx?id=45963).
Obama, B. 2013. National Security Strategy 2013. Retrieved (http://www.utexas.edu/lbj/sites/default/files/file/news/National%20Security%20Strategy%202013%20(Final%20Draft).pdf).
Rogers, M. 2014. Cybersecurity Threats: The Way Forward. Retrieved (http://www.defense.gov/News/Special-Reports/ 0415_Cyber-Strategy).
Xin, J. P. 2014. Building a Cyber Superpower. Retrieved (http://news.xinhuanet.com/politics/2014-02/27/c_119538788.htm).
Yan, X. T. 2015. The Deficiency of Mutual Trust Should Be the Obstacle of Cooperation. Retrieved (http://pit.ifeng.com/a/ 20151020/45746479_0.shtml).