2015
DOI: 10.1162/isec_a_00189
|View full text |Cite
|
Sign up to set email alerts
|

The Impact of China on Cybersecurity: Fiction and Friction

Abstract: Exaggerated fears about the paralysis of digital infrastructure and the loss of competitive advantage contribute to a spiral of mistrust in U.S.-China relations. In every category of putative Chinese cyber threat, there are also considerable Chinese vulnerabilities and Western advantages. China has inadvertently degraded the economic efficiency of its networks and exposed them to foreign infiltration by prioritizing political information control over technical cyber defense. Although China also actively infilt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0
3

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 93 publications
(32 citation statements)
references
References 49 publications
0
29
0
3
Order By: Relevance
“…A second trend is the danger of relying on technology and data, as in the Chinese plans for "informatisation." There has been a major increase in attention to internet or cyber security (wangluo anquan 网络安全 or xinxi anquan 信息安全) in Chinese policy lately, but the level of ICT security in China remains notoriously low, as large-scale hacks, data leaks, and online scams are frequent occurrences (Lindsay 2015). As IoT proliferates in China, ensuring even a basic level of security will also prove challenging, as IoT devices in general are poorly secured, are often used for extended periods, and often lack a mechanism to receive security updates.…”
Section: Moving Forwardmentioning
confidence: 99%
“…A second trend is the danger of relying on technology and data, as in the Chinese plans for "informatisation." There has been a major increase in attention to internet or cyber security (wangluo anquan 网络安全 or xinxi anquan 信息安全) in Chinese policy lately, but the level of ICT security in China remains notoriously low, as large-scale hacks, data leaks, and online scams are frequent occurrences (Lindsay 2015). As IoT proliferates in China, ensuring even a basic level of security will also prove challenging, as IoT devices in general are poorly secured, are often used for extended periods, and often lack a mechanism to receive security updates.…”
Section: Moving Forwardmentioning
confidence: 99%
“…The Cyber Security Law (CSL) is a regulation with directives that enhances awareness, and protection from cyber-threats. It went into effect on June 1, 2017, and it marked a fundamental milestone in Chinese legal strata [21]. Consisting of 7 chapters, and 79 articles, the CSL granted the state control over the ‗content' and the ‗type' of on-line traffic.…”
Section: E the Cyber Security Lawmentioning
confidence: 99%
“…El desafío es entender cómo las viejas fuentes del poder interactúan con nuevos formatos (Morozov E., 2011). Unos argumentan que el debate de las relaciones cibernéticas necesita moverse hacia las bases del estudio de la política internacional (Choucri, 2012;Kello, 2013;Valeriano & Maness, 2015;Lindsay, 2015a;Eriksson & Giacomello, 2007). En efecto, los problemas cibernéticos internacionales no están desmarcados completamente de los procesos de las relaciones internacionales cinéticos, en otras palabras, "las operaciones que ocurren en el dominio cibernético no están desconectadas de otros dominios de la interacción política internacional" (Valeriano & Maness, 2015, p. 14).…”
Section: Cibernética Internacionalunclassified
“…Por otra parte, hay una gran literatura técnica sobre seguridad de redes informáticas, así como una discusión emergente sobre los incentivos económicos y las fallas del mercado que dan forma al problema (Kramer, Starr, Wentz & (eds. ), 2009;Lindsay, 2015a;Hansen & Nissenbaum, 2009;Libicki, 2009;Owens, Dam, Lin & (eds. ) 2014).…”
Section: La Organización Del Sistema Internacional Cibernéticounclassified