Paper Status Tracking
Contact us
[email protected]
Click here to send a message to me 3275638434
Paper Publishing WeChat

Article
Affiliation(s)

Sichuan International Studies University, China

ABSTRACT

Deteriorating continuously, cybersecurity issue has become the focal point of global attention and the grave concern from countries of the world since around 2010. The United States, a country of most developed internet technology, is also the most serious victimized country subjected to cyber attacks. After more than 10 years of tremendous funding and energy investment, the United States, at present stage, has built a relatively impeccable, government-led system of cybersecurity strategy. This strategic system is characterized by a full-fledged combination of offensive and defensive capabilities which takes full advantage of America’s technological superiority, and the primary purpose of this system is forming strategic deterrence. This paper is designed to provide an interpretation of the specific components and nature of this strategy and hopes to reveal the possible enlightenment on how to manage cybersecurity discrepancy between China and America and its constructive implication to China’s construction of cybersecurity strategy.

KEYWORDS

The United States, cybersecurity strategy, China, constructive implication

Cite this paper

Sociology Study, November 2015, Vol. 5, No. 11, 825-831

References

Bartley, R. 2015. US, China Reach Cybersecurity Agreement, Commit to Regular Dialogue. Retrieved (http://www. fiercegovernmentit.com/story/us-china-reach-cybersecurity-agreement-commit-regular-dialogue/2015-09-25).

Blackwill, R., H. Kissinger, and A. Tellis. 2015. A New U.S. Grand Strategy Toward China. Retrieved (http://www.cfr. org/china/new-us-grand-strategy-toward-china/p36435).

Chen, X. G. 2015. A Speech on the 13th Forum of “The Oder of International Cybersecurity” of Institute of Modern International Relation, Tsinghua University. Retrieved (http://www.imir.tsinghua.edu.cn/publish/iis/7246/2015/20151015104524124852434/20151015104524124852434_.html).

Clapper, J. 2013. “Worldwide Threat Assessment of the US Intelligence Community.” A Report of Senate Select Committee on Intelligence by James R. Clapper, Director of National Intelligence. Retrieved (http://www.nctc.gov/docs/ 2013_03_12_SSCI_Worldwide_Threat_Assessment.pdf).

Fischer, E. 2013. Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions. Retrieved (http://fas.org/sgp/crs/natsec/R42114.pdf).

Innes-Ker, D., E. Economy, D. L. Shen, A. Segal, and O. H. Schell. 2015. How to Improve U.S.-China Relations. Retrieved (http://www.cfr.org/china/improve-us-china- relations/p37044).

Kerry, J. 2015. A Video File of a Very Renowned Talk Show—Yang Lan Interview Transcription. Retrieved (http:// www.iqiyi.com/v_19rrknr0co.html?vfm=2008_aldbd).

Libicki, M. 2009. Cyberdeterrence and Cyberwar. Santa Monica: RAND Corporation.

Liu, D. L. 2015. The Toxicity of Trojan Horse Virus Bear Resemblance With That Firearms. Retrieved (http://www.iolaw.org.cn/showNews.aspx?id=45963).

Obama, B. 2013. National Security Strategy 2013. Retrieved (http://www.utexas.edu/lbj/sites/default/files/file/news/National%20Security%20Strategy%202013%20(Final%20Draft).pdf).

Rogers, M. 2014. Cybersecurity Threats: The Way Forward. Retrieved (http://www.defense.gov/News/Special-Reports/ 0415_Cyber-Strategy).

Xin, J. P. 2014. Building a Cyber Superpower. Retrieved (http://news.xinhuanet.com/politics/2014-02/27/c_119538788.htm).

Yan, X. T. 2015. The Deficiency of Mutual Trust Should Be the Obstacle of Cooperation. Retrieved (http://pit.ifeng.com/a/ 20151020/45746479_0.shtml).

About | Terms & Conditions | Issue | Privacy | Contact us
Copyright © 2001 - David Publishing Company All rights reserved, www.davidpublisher.com
3 Germay Dr., Unit 4 #4651, Wilmington DE 19804; Tel: 001-302-3943358 Email: [email protected]