• 沒有找到結果。

Future of the cyber world and IR: the case of the United States and China

Chapter 6 Conclusions

6.1 Future of the cyber world and IR: the case of the United States and China

On October 2017, the Attorney General Jefferson B. Sessions III and Acting Secretary of Homeland Security Elaine Duke, together with Chinese State Councilor and Minister of Public Security Guo Shengkin, co-chaired the first US-China Law Enforcement and Cybersecurity Dialogue (LECD). This is one of four dialogues agreed to by President Trump and President Xi during their first meeting in April 2017. They discussed repatriation, counter-narcotics, cybercrime and cybersecurity and fugitives.

Even though differences still remain, it seems that both sides try to make some progress, at least officially on issues such as cybercrime. In the specific topic regarding Cybersecurity they both said that they will continue their implementation of the consensus reached by President Obama and President Xi on 2015, regarding US-China cybersecurity cooperation. They will continue implementing five main points: first, that timely responses should be provided to requests for information and assistance concerning malicious cyber activities; second, that neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors; third, to make common effort to further identify and promote appropriate norms of state behavior in cyberspace within the international community; fourth, to maintain a high-level joint dialogue mechanism on fighting cybercrime and related issues; and fifth, to enhance law enforcement communication on cyber security incidents and to mutually provide timely responses.

The US-China is one of the most relevant relationships in the world, they both require a stable environment to benefit from the smooth functioning of the economic system. It seems that

立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y

the Cybersecurity issues won’t be resolved anytime soon. The process of understanding each other and overcome the “trust deficit” won’t be an easy one in the short term. It will require more willingness to approach, and the role of the leaders is a key element in this realm. Donald Trump seems a bit more reluctant than his predecessor, so it will be a really interesting time not only for cybersecurity and United States and China but for the whole bilateral relations.


立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y

Bibliography

Adler, E. (2002). Handbook of International Relations. in London: SAGE Publications Ltd.

Retrieved from http://sk.sagepub.com/reference/hdbk_intlrelations. doi:

10.4135/9781848608290

Bader, J. A. (2016). How Xi Jinping Sees The World & And Why. Order From Chaos: Foreign Policy in a Troubled World.

Baldwin, D. (1997). The Concept Of Security. Review Of International Studies, 23(1), (pp. 5-26).

doi:10.1017/S0260210597000053

Baylis, J. (2008). The Concept of Security in International Relations. In H. G. Brauch, Ú. O.

Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P.

H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 495-502). Berlin, Heidelberg: Springer Berlin Heidelberg.

Brauch, H. G. (2008). Introduction: Globalization and Environmental Challenges:

Reconceptualizing Security in the 21st Century. In H. G. Brauch, Ú. O. Spring, C.

Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 27-43). Berlin, Heidelberg: Springer Berlin Heidelberg.

Brown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 1:

The US Approach to Cyberspace. The Diplomat.

立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y

Brown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 3:

Over a Year Later, What Impact has the 2015 Cyber Agreement had on U.S.-China Relations? The Diplomat.

Bull, H. (1977). The Anarchical Society: A Study of Order in World Politics. New York.

Buzan, B. (1983). People, States, and Fear: The National Security Problem in International Relations: Wheatsheaf Books.

Buzan, B. (2008). The Changing Agenda of Military Security. Globalization and Environmental Challenges, (pp. 553-560).

Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A New Framework for Analysis: Lynne Rienner Pub.

China Internet Network Information Center. (2017). Statistical Report on Internet Development in China. In: CNNIC Beijing.

Choucri, N. (2012). Cyberpolitics in International Relations: MIT press.

Coats, D. R. (2017). Worldwide Threat Assessment of the US Intelligence Community. Retrieved f r o m h t t p s : / / w w w. d n i . g o v / f i l e s / d o c u m e n t s / N e w s r o o m / Te s t i m o n i e s / SSCI%20Unclassified%20SFR%20-%20Final.pdf.

Dunne, T., Kurki, M., & Smith, S. (2013). International Relations Theories: Oxford University Press.

Eriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review / Revue internationale de science politique, 27(3), (pp. 221-244).

立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y

Farrell, H., & Glaser, C. L. (2017). The Role of Effects, Saliencies and Norms in US Cyberwar Doctrine. Journal of Cybersecurity, 3(1), (pp 7-17). doi:10.1093/cybsec/tyw015

Fountain, J. (2004). Building the Virtual State: Information Technology and Institutional Change:

Brookings Institution Press.

German Federal Ministry of the Interior. (2011). Cyber Security Strategy for Germany. Federal Ministry of the Interior Retrieved from https://www.cio.bund.de/SharedDocs/

Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile.

Gierow, H. J. (2014). Cyber Security in China: New Political Leadership Focuses on Boosting National Security Restructuring Internet Regulation. Placing Restrictions on Foreign Software. Developing the PRC's own IT Standards. China Monitor.

Glaser, C. L., & Kaufmann, C. (1998). What is the Offense-Defense Balance and how can we Measure it? International Security, 22(4), (pp. 44-82).

Hanson, E. C. (2008). The Information Revolution and World Politics: Rowman & Littlefield Publishers.

He, R. (2013) China Opposes and Combats Cyber Attacks. Financial Times.

Healey, J. (2013). China is a Cyber Victim, too. Foreign Policy(April 16).

Heginbotham, E., Nixon, M., Morgan, F. E., Hagen, J., Heim, J. L., Engstrom, J., . . . Libicki, M.

C. (2015). The US-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017: Rand Corporation.

Hennessey, S. (2017). Deterring Cyberattacks: How to Reduce Vulnerability. Foreign Affairs, 96(6), (pp. 39-46).

立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y

Jackson, R. H., & Sørensen, G. (2007). Introduction to International Relations: Theories and Approaches: Oxford University Press.

Jørgensen, K. E. (2017). International relations theory: A new introduction: Macmillan International Higher Education.

Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War: Simon & Schuster.

Kelly, N., & Foran, C. (2015). President Obama and Chinese President Xi Jinping Announce Cybersecurity Agreement. The Atlantic.

Kissinger, H. (2015). World order: Penguin Books.

Koselleck, R., & Presner, T. S. (2002). The Practice of Conceptual History: Timing history, spacing concepts: Stanford University Press.

Kremer, J.-F., & Müller, B. (2014). SAM: A Framework to Understand Emerging Challenges to States in an Interconnected World. In Cyberspace and International Relations (pp.

41-58): Springer.

Kshetri, N. (2013). Cyber-Victimization and Cybersecurity in China. Commun. ACM, 56(4), (pp 35-37). doi:10.1145/2436256.2436267

Kshetri, N. (2016). Cybersecurity in China. In The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies (pp. 123-143). Cham:

Springer International Publishing.

Kshetri, N. (2016). The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies: Springer International Publishing.

Kuehl, D. T. (2009). From Cyberspace to Cyberpower: Defining the Problem. Cyberpower and national security, (pp. 24-42).

立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y

Li, C. (2016). Assessing US-China Relations Under the Obama Administration. Brookings Institution, 5.

Li, R. (2004). Security Challenge of an Ascendant China: Great Power Emergence and International Stability. Chinese Foreign Policy: Pragmatism and Strategic Behaviour, East Gate, New York, (pp. 23-58).

Lieberthal, K., & Singer, P. W. (2012). Cybersecurity and US-China relations: Brookings.

Lindsay, J. R. (2015). The impact of China on Cybersecurity: Fiction and friction. International Security, 39(3), (pp. 7-47).

Longdi, X. (2014). China's Internet Development and Cybersecurity–Policies and Practices.

Chinese Cybersecurity and Defense, (pp. 1-54).

Molyneux, S. (1999). Broadband Internet: Future Applications and Challenges. In J. Vince & R.

Earnshaw (Eds.), Digital Convergence: The Information Revolution (pp. 3-12). London:

Springer London.

Nye, J. S. (2011). Nuclear Lessons for Cyber Security? (Vol. 5): Strategic Studies Quarterly.

OECD. (2011). Cybersecurity Policy Making at a Turning Point: OECD Publishing.

Parker, E. (2017). Hack Job: How America Invented Cyberwar. Foreign Affairs, 96(3), (pp.

133-138).

Pei, M. (2014). How China and America See Each Other. Foreign Affairs, 93(2), (pp. 31-32).

Petallides, C. J. (2012). Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat. Inquiries Journal/Student Pulse, 4(03).

Retrieved from http://www.inquiriesjournal.com/a?id=627

立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y

Radu, R. G. (2012). The Monopoly of Violence in the Cyber Space: Challenges of Cyber Security. In E. Fels, J.-F. Kremer, & K. Kronenberg (Eds.), Power in the 21st Century:

International Security and International Political Economy in a Changing World (pp.

137-150). Berlin, Heidelberg: Springer Berlin Heidelberg.

Renard, T. (2015). US-China Cybersecurity Agreement: A Good Case of Cyber Diplomacy.

Egmont Commentary, 1 October 2015.

Romanosky, S. (2016). Examining the Costs and Causes of Cyber Incidents. Journal of Cybersecurity, 2(2), (pp. 121-135). doi:10.1093/cybsec/tyw001

Rulog, H. (2013) China Opposes and Combats Cyber Attacks. Financial Times.

Segal, A. (2012). U.S. and China in Cyberspace: Uneasy Next Steps. In: Council on Foreign Relations.

Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age: Hachette UK.

Segal, A. (2017). How China is Preparing for Cyberwar. The Christian Science Monitor.

Sutter, R. G. (2013). US-Chinese Relations: Perilous Past, Pragmatic Present: Rowman &

Littlefield Publishers.

The International Telecommunication Union (ITU). (2008). Overview of Cybersecurity, Recommendation ITU–T X.1205. Paper presented at the The ITU Plenipotentiary Conference 2010, Guadalajara, Jalisco, Mexico. http://tinyurl.com/boys7dj

The International Telecommunication Union (ITU). (2017). Global Cybersecurity Index 2017.

In: ITU.

立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y

The White House. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington D.C.: White House.

The White House. (2013). Executive Order on Improving Critical Infrastructure Cybersecurity [Press release]. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/

2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity-0

The White House. (2015). FACT SHEET: Cyber Threat Intelligence Integration Center. The White House, Office of the Press Secretary Retrieved from https://

obamawhitehouse.archives.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center.

The White House. (2015). Fact Sheet: President Xi Jinping’s State Visit to the United States.

Press Release, 25.

The World Bank. (2017). Individuals Using the Internet (% of population) [Table]. In (pp.

Internet users are individuals who have used the Internet (from any location) in the last 3 months. The Internet can be used via a computer, mobile phone, personal digital assistant, games machine, digital TV etc.).

Thornburgh, N., Forney, M., Bennett, B., Burger, T. J., & Shannon, E. (2005). The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them). Time Magazine, 29, 1098961-1098961.

U.S. Department of Homeland Security. (2018). Cybersecurity Strategy. Retrieved from https://

www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf.

立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y

U.S. Department of the Treasury. (2009). Fact Sheet: U.S.-China Strategic and Economic Dialogue. Retrieved from https://www.treasury.gov/initiatives/Documents/

SEDfactsheet09.pdf.

United States National Security Council. (2010). Cyberspace Policy Review: Securing America's Digital Future: Cosimo, Incorporated.

Valeriano, B., & Maness, R. C. (2018). International Relations Theory and Cyber Security. The Oxford Handbook of International Political Theory, (pp. 259).

Ventre, D. (2014). Chinese cybersecurity and defense: John Wiley & Sons.

Vince, J., & Earnshaw, R. (2012). Digital Convergence: The Information Revolution: Springer London.

Volz, D. (2016). Yahoo Says Hackers Stole Data From 500 Million Accounts in 2014. Reuters.

Retrieved from https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-hackers-stole-data-from-500-million-accounts-in-2014-idUSKCN11S16P

Waltz, K. N. (1979). Theory of International Politics: Waveland Press.

Weibin, Z. (2017). The Four Stages of Sino-American Cyber Relations. In: China-United States Exchange Foundation.

Wu, X. (2005). Chinese Cyber Nationalism: How China's Online Public Sphere Affected its Social and Political Transitions. University of Florida,

中华⼈民共和国国务院. (2012). 国务院出台意见推进信息化发展切实保障信息安全.

立 政 治 大 學

N a

tio na

l C h engchi U ni ve rs it y