LEADER 03714nam 22006615 450 001 9910299283103321 005 20200704104005.0 010 $a3-319-68436-1 024 7 $a10.1007/978-3-319-68436-9 035 $a(CKB)4100000004243465 035 $a(DE-He213)978-3-319-68436-9 035 $a(MiAaPQ)EBC5394735 035 $a(PPN)227404564 035 $a(EXLCZ)994100000004243465 100 $a20180515d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity in China $eThe Next Wave /$fby Greg Austin 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XXI, 130 p. 1 illus.) 225 1 $aSpringerBriefs in Cybersecurity,$x2193-973X 311 $a3-319-68435-3 327 $aPreface -- The Cybersecurity Ecosystem -- Education in Cyber Security- Chinese Views of the Cyber Industrial Complex -- Corporate Cyber Security -- Cyber Insecurity.of Chinese Citizens- Governmental Cybersecurity -- Grading National Cybersecurity -- The Next Wave. 330 $aThis book offers the first benchmarking study of China?s response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don?t know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China?s cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China?s efforts. It lays out the major gaps and shortcomings in China?s cyber security policy. It is the first book to base itself around an assessment of China?s cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country?s core technologies are dominated by foreigners. 410 0$aSpringerBriefs in Cybersecurity,$x2193-973X 606 $aManagement information systems 606 $aComputer science 606 $aPublic policy 606 $aInternational criminal law 606 $aElectronics 606 $aMicroelectronics 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aPublic Policy$3https://scigraph.springernature.com/ontologies/product-market-codes/911060 606 $aInternational Criminal Law $3https://scigraph.springernature.com/ontologies/product-market-codes/R19040 606 $aElectronics and Microelectronics, Instrumentation$3https://scigraph.springernature.com/ontologies/product-market-codes/T24027 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aPublic policy. 615 0$aInternational criminal law. 615 0$aElectronics. 615 0$aMicroelectronics. 615 14$aManagement of Computing and Information Systems. 615 24$aPublic Policy. 615 24$aInternational Criminal Law . 615 24$aElectronics and Microelectronics, Instrumentation. 676 $a352.34 700 $aAustin$b Greg$4aut$4http://id.loc.gov/vocabulary/relators/aut$0802478 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299283103321 996 $aCybersecurity in China$92214259 997 $aUNINA