Jump to ContentJump to Main Navigation
China and CybersecurityEspionage, Strategy, and Politics in the Digital Domain$
Users without a subscription are not able to see the full content.

Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron

Print publication date: 2015

Print ISBN-13: 9780190201265

Published to Oxford Scholarship Online: April 2015

DOI: 10.1093/acprof:oso/9780190201265.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 28 February 2020

Introduction

Introduction

(p.1) China and Cybersecurity: Controversy and Context

Chapter:
Chapter 1 Introduction
Source:
China and Cybersecurity
Author(s):

Jon R. Lindsay

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190201265.003.0001

This introduction provides an overview of Chinese national policy and institutions for managing cybersecurity. It then summarizes the organization of this volume and the content of its chapters. Cybersecurity is shaped by the strategic interaction of many different actors and defies any simple interpretation or morality tale. There is no one single Chinese view on cybersecurity or cyberwarfare, just as there is no one Western view. While the details of cyber policy debate are sure to change, the important structural and cultural influences change more slowly. The contributions in this volume describe how some of these enduring factors affect cybersecurity institutions and recent activity in China, or how more fundamental political and economic incentives shape the use of technology of any vintage.

Keywords:   Chinese policy, cybersecurity institutions, summary, cybersecurity, China

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .