LEADER 03033nam 2200625 450 001 9910220138603321 005 20230808194036.0 010 $a0-8330-9252-9 035 $a(CKB)3710000000743601 035 $a(EBL)4578328 035 $a(SSID)ssj0001690764 035 $a(PQKBManifestationID)16540120 035 $a(PQKBTitleCode)TC0001690764 035 $a(PQKBWorkID)14926316 035 $a(PQKB)25079736 035 $a(MiAaPQ)EBC4578328 035 $a(EXLCZ)993710000000743601 100 $a20160801h20162016 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGetting to yes with China in cyberspace /$fScott Warren Harold, Martin C. Libicki, Astrid Stuth Cevallos 210 1$aSanta Monica, California :$cRAND Corporation,$d2016. 210 4$dİ2016 215 $a1 online resource (121 p.) 300 $aDescription based upon print version of record. 311 $a0-8330-9249-9 320 $aIncludes bibliographical references. 327 $aCover ; Title Page ; Copyright ; Preface; Contents; Summary; Abbreviations; CHAPTER ONE: The "Cyber Problem" in U.S.-China Relations; Purpose and Approach; Organization of This Report; CHAPTER TWO: Coming to Terms; The Dimensions and Implications of Divergent Views of Deterrence; Sources of Difference; Elements of Difference; Law and Equality; The Application of Different Deterrence Approaches to Cyberspace; Hegemony; Attribution Versus the Correlation of Forces; Escalation; Stability; Signaling; Overall; CHAPTER THREE: Getting to Now; China's Cyber Espionage 327 $aThe 2011 U.S. International Strategy for CyberspaceMandiant, Snowden, and the PLA 5; Track Two Talks Between CICIR and CSIS; What Could the United States Do to Discourage China's EMCE?; CHAPTER FOUR: Getting to Yes?; Setting; Track One Negotiations; Economically Motivated Cyber Espionage; What Does China Want?; Alternatives to Bilateral Negotiations with China; The Law of Armed Conflict and the Right to Retaliate; A Mutual Forbearance Proposal; CHAPTER FIVE: Conclusions; Postscript; References 606 $aInternet governance$zChina 606 $aInternet governance$zUnited States 606 $aComputer crimes$zChina$xPrevention 606 $aComputer crimes$zUnited States$xPrevention 606 $aCyberterrorism$zChina$xPrevention 606 $aCyberterrorism$zUnited States$xPrevention 615 0$aInternet governance 615 0$aInternet governance 615 0$aComputer crimes$xPrevention. 615 0$aComputer crimes$xPrevention. 615 0$aCyberterrorism$xPrevention. 615 0$aCyberterrorism$xPrevention. 676 $a384.330951 700 $aHarold$b Scott$f1975-$0910136 702 $aLibicki$b Martin C. 702 $aCevallos$b Astrid Stuth 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910220138603321 996 $aGetting to yes with China in cyberspace$92886605 997 $aUNINA