dc.contributor.author | Brenner, Joel | |
dc.contributor.author | Lindsay, Jon R. | |
dc.date.accessioned | 2015-12-28T16:06:29Z | |
dc.date.available | 2015-12-28T16:06:29Z | |
dc.date.issued | 2015-08 | |
dc.identifier.issn | 0162-2889 | |
dc.identifier.issn | 1531-4804 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/100538 | |
dc.description.abstract | In “The Impact of China on Cybersecurity: Fiction and Friction,” Jon Lindsay asserts that the threat of Chinese cyber operations, though “relentlessly irritating,” is greatly exaggerated; that China has more to fear from U.S. cyber operations than the United States does from China; and that U.S.-China relations are reasonably stable.1 He claims that “[o]verlap across political, intelligence, military, and institutional threat narratives … can lead to theoretical confusion” (p. 44). In focusing almost exclusively on military-to-military operations, however, where he persuasively argues that the United States retains a significant qualitative advantage, Lindsay underemphasizes the significance of vulnerabilities in U.S. civilian networks to the exercise of national power, and he draws broad conclusions that have doubtful application in circumstances short of a full-out armed conflict with China. In addition, he does not discuss subthreshold conflicts that characterize, and are likely to continue to characterize, this symbiotic but strife-ridden relationship. | en_US |
dc.language.iso | en_US | |
dc.publisher | MIT Press | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1162/ISEC_c_00208 | en_US |
dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
dc.source | MIT Press | en_US |
dc.title | Correspondence: Debating the Chinese Cyber Threat | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Brenner, Joel, and Jon R. Lindsay. “Correspondence: Debating the Chinese Cyber Threat.” International Security 40, no. 1 (July 2015): 191–195. © 2015 by the President and Fellows of Harvard College and the Massachusetts Institute of Technology | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Center for International Studies | en_US |
dc.contributor.mitauthor | Brenner, Joel | en_US |
dc.relation.journal | International Security | en_US |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dspace.orderedauthors | Brenner, Joel; Lindsay, Jon R. | en_US |
mit.license | PUBLISHER_POLICY | en_US |
mit.metadata.status | Complete | |