Jump to ContentJump to Main Navigation
China and CybersecurityEspionage, Strategy, and Politics in the Digital Domain$
Users without a subscription are not able to see the full content.

Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron

Print publication date: 2015

Print ISBN-13: 9780190201265

Published to Oxford Scholarship Online: April 2015

DOI: 10.1093/acprof:oso/9780190201265.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 25 February 2020

Conclusion

Conclusion

The Rise of China and the Future of Cybersecurity

Chapter:
(p.333) Chapter 13 Conclusion
Source:
China and Cybersecurity
Author(s):

Jon R. Lindsay

Derek S. Reveron

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190201265.003.0013

Among scholars and policymakers there exist fundamental disagreements about the magnitude of risk posed by threats in cyberspace and the trajectory of China’s rise in international politics. It should hardly be surprising that there is confusion where these debates and assumptions intersect. The subject of this book falls at the nexus of these two contentious debates. The interaction between their extreme positions gives rise to four different interpretations of the political character of cyberspace. The chapters in this volume explore cyber issues that span these four different categories. This conclusion leverages their collective insights to explain what accounts for the types of cyberthreats and responses we observe in this important case. Further research is needed to better understand which of these categories are most likely or how activity is likely to shift among them.

Keywords:   strategy, cybersecurity, China, future research, theoretical explanation

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .