2,099
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

On the asymmetric advantages of cyberwarfare. Western literature and the Chinese journal Guofang Keji

Bibliography

  • Adamsky, Dmitry, ‘From Moscow with Coercion: Russian Deterrence Theory and Strategic Culture’, Journal of Strategic Studies 41/1–2 (2018), 33–60. doi:10.1080/01402390.2017.1347872.
  • Alderman, Daniel, Lisa Crawford, Brian Lafferty and Aaron Shraberg, ‘The Rise of Chinese Civil-Military Integration’, in Tai Ming Cheung (ed.), Forging China’s Military Might. A New Framework for Assessing Innovation (Baltimore: Johns Hopkins University Press 2014), 109–35.
  • Allison, Graham, ‘The Thucydides Trap: Are the U.S. And China Headed for War?’, The Atlantic, September 24, 2015, https://www.theatlantic.com/international/archive/2015/09/united-states-china-war-thucydides-trap/406756/.
  • Allison, Graham, Destined for War. Can America and China Escape Thucydides’s Trap? (Boston, MA: Houghton Mifflin Harcourt 2017).
  • Andres, Richard B., ‘The Emerging Structure of Strategic Cyber Offense, Cyber Defense, and Cyber Deterrence’, in Derek S. Reveron (ed.), Cyberspace and National Security. Threats, Opportunities, and Power in a Virtual World (Washington, DC: Georgetown UP 2012), 89–104.
  • Arquilla, John, ‘Cyberwar Is Already Upon Us. But Can It Be Controlled?’, Foreign Policy, February 2012, 27, http://foreignpolicy.com/2012/02/27/cyberwar-is-already-upon-us/#.
  • Austin, Greg, Cybersecurity in China. The Next Wave (Cham: Springer 2018).
  • Betz, David, ‘Cyberpower in Strategic Affairs: Neither Unthinkable nor Blessed’, Journal of Strategic Studies 35/5 (2012), 689–711. doi:10.1080/01402390.2012.706970.
  • Betz, David J. and Tim Stevens, Cyberspace and the State. Toward a Strategy for Cyber-Power (London: IISS 2011).
  • Blank, Stephen, ‘Web War I: Is Europe’s First Information War a New Kind of War?’, Comparative Strategy 27/3 (2008), 227–47. doi:10.1080/01495930802185312.
  • Blasko, Dennis J., ‘“Technology Determines Tactics”: The Relationship between Technology and Doctrine in Chinese Military Thinking’, Journal of Strategic Studies 34/3 (2011), 355–81. doi:10.1080/01402390.2011.574979.
  • Brenner, Joel and Jon R. Lindsay, ‘Debating the Chinese Cyber Threat’, International Security 40/1 (2015), 191–95. doi:10.1162/ISEC_c_00208.
  • Bruzdzinski, Jason, ‘Demystifying Shashoujian: China’s “Assassin’s Mace” Concept’, in Andrew Scobell and Larry Wortzel (eds.), Civil-Military Change in China: Elites, Institutes, and Ideas after the 16th Party Congress (Carlisle, PA: Strategic Studies Institute 2004), 309–64.
  • Bucci, Steven, ‘Joining Cybercrime and Cyberterrorism. A Likely Scenario’, in Derek S. Reveron (ed.), Cyberspace and National Security. Threats, Opportunities, and Power in a Virtual World (Washington, DC: Georgetown UP 2012), 57–68.
  • Burton, Rachel and Mark Stokes, The People’s Liberation Army Strategic Support Force. Leadership and Structure (Arlington, VA: Project 2049 Institute 2018).
  • Cai, Jun and Yu Xiaohong, ‘Meiguo Wangluo Kongjian Zuozhan Nengli Jianshe’ [ On the Construction of U.S. Cyberspace Operations Capabilities], Guofang Keji 39/3 (2018), 105–09.
  • Chen, Tian, Xian Ming and Li Zili, ‘Mei Jun Wangluo Kongjian Zuozhan Guihua Yanjiu’ [ Research on the U.S. Military’s Cyberspace Operations Planning], Guofang Keji 37/3 (2016), 68–72.
  • Cheng, Dean, Cyber Dragon. Inside China’s Information Warfare and Cyber Operations (Santa Barbara, CA: Praeger 2017).
  • Cheng, Shaojie, Zhang Tao and Chang Zhenyu, ‘Wangluo Kongjian yu 21 Shiji de “Shouzhan”’ [ Cyberspace and “First Strike” in the Twenty-First Century], Guofang Keji 30/6 (2009), 81–84.
  • Cheung, Tai Ming, ‘Innovation in China’s Defense Technology Base: Foreign Technology and Military Capabilities’, Journal of Strategic Studies 39/5–6 (2016), 728–61. doi:10.1080/01402390.2016.1208612.
  • Cheung, Tai Ming, ‘The Rise of China as a Cybersecurity Industrial Power. Balancing National Security, Geopolitical, and Development Priorities’, Journal of Cyber Policy 3/3 (2018), 306–26. doi:10.1080/23738871.2018.1556720.
  • Choucri, Nazli, Cyberpolitics in International Relations (Cambridge, MA: MIT Press 2012).
  • Costello, John and Joe McReynolds, China’s Strategic Support Force: A Force for a New Era (Washington, DC: National Defense University Press 2018).
  • Defense Intelligence Agency, China Military Power. Modernizing a Force to Fight and Win (Washington, DC 2019), 45–6, 97. www.dia.mil/Portals/27/Documents/News/Military%20Power%20Publications/China_Military_Power_FINAL_5MB_20190103.pdf.
  • Demchak, Chris C., Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security (Athens, GA: University of Georgia Press 2011).
  • Deng, Feng, ‘Bianzheng Renshi Gao Jishu Zhanzheng Zhong Yi Lie Sheng You de Wenti’ [Dialectical Understanding of the Issue of Defeating the Superior from a Position of Inferiority in High-Tech Wars], Zhongguo Junshi Kexue 17/3 (2004), 107–11.
  • Department of Defense, Annual Report to Congress. Military and Security Developments Involving the People’s Liberation of China 2018 (Washington, DC 2018), 39–41, 60–1, 74–5. https://media.defense.gov/2018/Aug/16/2001955282/-1/-1/1/2018-CHINA-MILITARY-POWER-REPORT.PDF.
  • Dossi, Simone, ‘Confronting China’s Cyberwarfare Capabilities: A “Weapon of the Weak” or a Force Multiplier?’, in Marco Clementi, Matteo Dian and Barbara Pisciotta (eds.), US Foreign Policy in a Challenging World. Building Order on Shifting Foundations (Cham: Springer 2018), 357–77.
  • Du, Yanyun and Liu Yangyue, ‘Zhong Mei Wangluo Kongjian Boyi yu Jingzheng’ [ Sino-U.S. Competition in Cyberspace], Guofang Keji 35/3 (2014), 70–82.
  • Eriksson, Johan and Giampiero Giacomello, ‘Conclusion. Digital-Age Security in Theory and Practice’, in Johan Erkisson and Giampiero Giacomello (eds.), International Relations and Security in the Digital Age (London: Routledge 2007), 173–84.
  • Eriksson, Johan and Giampiero Giacomello (eds.), International Relations and Security in the Digital Age (London: Routledge 2007).
  • Farwell, James P. and Rafal Rohozinski, ‘Stuxnet and the Future of Cyber War’, Survival 53/1 (2011), 23–40. doi:10.1080/00396338.2011.555586.
  • Fu, Yanhong and Zhao Yang, ‘Wangluo Kongjian Junbei Kongzhi Yanjiu Xianzhuang ji Qishi Sikao’ [ State of Research on Cyberspace Arms Control and Assessment], Guofang Keji 34/1 (2013), 34–37.
  • Gartzke, Erik, ‘The Myth of Cyberwar. Bringing War in Cyberspace Back down to Earth’, International Security 38/2 (2013), 41–73. doi:10.1162/ISEC_a_00136.
  • Gat, Azar, ‘Clausewitz and the Marxists: Yet Another Look’, Journal of Contemporary History 27/2 (1992), 363–84. doi:10.1177/002200949202700208.
  • Giacomello, Giampiero, ‘Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism’, Studies in Conflict & Terrorism 27/5 (2004), 387–408. doi:10.1080/10576100490483660.
  • Goh, Evelyn, ‘Great Powers and Hierarchical Order in Southeast Asia: Analyzing Regional Security Strategies’, International Security 32/3 (2008), 113–57. doi:10.1162/isec.2008.32.3.113.
  • Gompert, David C. and Martin Libicki, ‘Waging Cyber War the American Way’, Survival 57/4 (2015), 7–28. doi:10.1080/00396338.2015.1068551.
  • Guo, Fuliang, ‘Yang Xinde and Zhou Gang, ‘Wai Jun Wangluo Zhan Fazhan Xiankuang Yanjiu ji Qishi’ [Analysis of the Current Situation of Cyberwar Development in Foreign Armed Forces and Implications], Guofang Keji 34/3 (2013), 49–52.
  • Gvosdev, Nikolas K., ‘The Bear Goes Digital. Russia and Its Cyber Capabilities’, in Derek S. Reveron (ed.), Cyberspace and National Security. Threats, Opportunities, and Power in a Virtual World (Washington, DC: Georgetown UP 2012), 173–89.
  • Holmes, James R., ‘Beware the “Thucydides Trap” Trap. Why the U.S. And China Aren’t Necessarily Athens and Sparta or Britain and Germany before WWI’, The Diplomat (June 13, 2013), https://thediplomat.com/2013/06/beware-the-thucydides-trap-trap/.
  • Hu, Yanjing and Zhan Zhongkun, ‘Jiakuai Tuijin Xinxi Gongfang Xinxing Zuozhan Liliang Jianshe’ [ On Speeding Up the Construction of Information Attack and Defence Forces of a New Type], Guofang Keji 38/2 (2017), 64–67.
  • Huang, Renquan and Li Weimin, ‘Kongfang Duikang Zhanchang Tuozhan Dao Wang Dian Kongjian dui Weilai Guojia Fangkong de Yingxiang’ [ The Extension of the Air Defence Battlefield to the Network Electronic Space: Impact on the Future of National Antiaircraft Defence], Guofang Keji 33/3 (2012), 46–50.
  • Huo, Jiajia, ‘Meiguo Wangluo Fangwu Chengbao de Xianzhuang’ [ State of Cyber Defence Contracting in the United States], Guofang Keji 37/6 (2016), 100–03.
  • Inkster, Nigel, China’s Cyber Power (London: Adelphi Series 2015).
  • Jiang, Lei, Xiandai Yi Lie Sheng You Zhanlüe [ Contemporary Strategy for Defeating the Superior from a Position of Inferiority] (Beijing: Guofang Daxue Chubanshe 1997).
  • John, Ikenberry, G., ‘Between the Eagle and the Dragon: America, China, and Middle State Strategies in East Asia’, Political Science Quarterly 131/1 (2016), 9–43. doi:10.1002/polq.12430.
  • Johnston, Alastair Iain, Cultural Realism. Strategic Culture and Grand Strategy in Chinese History (Princeton, NJ: Princeton UP 1995).
  • Junshi Kexueyuan Junshi Zhanlüe Yanjiubu [Academy of Military Sciences Military Strategy Research Institute], Zhanlüe Xue [ The Science of Military Strategy] (Beijing: Junshi Kexue Chubanshe 2013).
  • Junshi Kexueyuan Zhanlüe Yanjiubu [Academy of Military Sciences Strategy Research Institute], Zhanlüe Xue [ The Science of Military Strategy] (Beijing: Junshi Kexue Chubanshe 2001).
  • Kang, David C., China Rising. Peace, Power, and Order in East Asia (New York, NY: Columbia UP 2007).
  • Kania, Elsa B. and John K. Costello. ‘The Strategic Support Force and the Future of Chinese Information Operations’, The Cyber Defense Review 3/2 (2018), 105–21.
  • Ke, Hongfa, Zhu Jilu and Zhao Rong, ‘Tuijin Wangluo Kongjian Hexin Zhiyuan Nengli Jianshe’ [ Promoting the Building-Up of Core Supporting Capabilities in Cyberspace], Guofang Keji 38/2 (2017), 50–54.
  • Kello, Lucas, ‘The Meaning of the Cyber Revolution. Perils to Theory and Statecraft’, International Security 38/2 (2013), 7–40. doi:10.1162/ISEC_a_00138.
  • Kipp, Jacob W., ‘Lenin and Clausewitz: The Militarization of Marxism, 1914-1921’, Military Affairs 49/4 (1985), 184–91. doi:10.2307/1987539.
  • Klimburg, Alexander, ‘Mobilizing Cyber Power’, Survival 53/1 (2011), 41–60. doi:10.1080/00396338.2011.555595.
  • Koblentz, Gregory D. and Brian M. Mazanec, ‘Viral Warfare: The Security Implications of Cyber and Biological Weapons’, Comparative Strategy 32/5 (2013), 418–34. doi:10.1080/01495933.2013.821845.
  • Kremer, Jan-Frederik and Benedikt Müller (eds.), Cyberspace and International Relations. Theory, Prospects and Challenges (Berlin: Springer 2014).
  • Kugler, Richard R., ‘Deterrence of Cyber Attacks’, in Franklin D. Kramer, Stuart H. Starr and Larry K. Wentz (eds.), Cyberpower and National Security (Washington, DC: National Defense UP 2009), 309–40.
  • Laskai, Lorand, ‘Civil-Military Fusion and the PLA’s Pursuit of Dominance in Emerging Technologies’, China Brief 18/6 (2018), 12–16.
  • Liang, Meng, Han Yue and Qiao Zheng, ‘Meiguo “Guofangbu Wangluo Kongjian Zuozhan Zhanlüe” Shuping’ [ A Discussion of the U.S. “Department of Defense Strategy for Operating in Cyberspace”], Guofang Keji 33/1 (2012), 84–87.
  • Libicki, Martin C., Conquest in Cyberspace. National Security and Information Warfare (Cambridge: Cambridge UP 2007).
  • Libicki, Martin C., Cyberdeterrence and Cyberwar (Santa Monica: RAND 2009).
  • Lieberthal, Kenneth and Peter W. Singer, Cybersecurity and U.S.-China Relations (Washington, DC: Brookings 2012).
  • Liff, Adam P., ‘Cyberwar: A New “Absolute Weapon”? The Proliferation of Cyberwarfare Capabilities and Interstate War’, Journal of Strategic Studies 35/3 (2012), 401–28. doi:10.1080/01402390.2012.663252.
  • Liff, Adam P., ‘Whither the Balancers? The Case for a Methodological Reset’, Security Studies 25/3 (2016), 420–59. doi:10.1080/09636412.2016.1195624.
  • Lin, Ying Yu, ‘One Step Forward, One Step Back for PLA Military Education’, China Brief 18/7 (2018), https://jamestown.org/program/one-step-forward-one-step-back-for-pla-military-education/.
  • Lindsay, Jon R., ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3 (2013), 365–404. doi:10.1080/09636412.2013.816122.
  • Lindsay, Jon R., ‘The Impact of China on Cybersecurity. Fiction and Friction’, International Security 39/3 (2015), 7–47. doi:10.1162/ISEC_a_00189.
  • Lindsay, Jon R., Tai Ming Cheung and Derek S. Reveron (eds.), China and Cybersecurity. Espionage, Strategy, and Politics in the Digital Domain (Oxford: Oxford UP 2015).
  • Liu, Yangyue, ‘Jun Min Ronghe Shijiao Xia de Meiguo Wangluo Anquan Rencai Zhanlüe’ [ U.S. Cybersecurity Personnel Strategy From the Point of View of Civil-Military Fusion], Guofang Keji 39/1 (2018), 71–75.
  • Ma, Zengjun and Li Jian, ‘Mei Jun Wangluo Zuozhan Zhihui yu Kongzhi de Guoqu, Xianzai yu Jianglai’ [ Past, Present and Future of the U.S. Military’s Cyberwarfare Command and Control], Guofang Keji 35/5 (2014), 73–85.
  • Manson, George P., III, ‘Cyberwar: The United States and China Prepare for the Next Generation of Conflict’, Comparative Strategy 30/2 (2011), 121–33. doi:10.1080/01495933.2011.561730.
  • McGraw, Gary, ‘Cyber War Is Inevitable (Unless We Build Security In)’, Journal of Strategic Studies 36/1 (2013), 109–19. doi:10.1080/01402390.2012.742013.
  • Moore, Gregory J., ‘Avoiding a Thucydides Trap in Sino-American Relations (… and 7 Reasons Why that Might Be Difficult)’, Asian Security 13/2 (2017), 98–115. doi:10.1080/14799855.2017.1286162.
  • Newmyer, Jacqueline, ‘The Revolution in Military Affairs with Chinese Characteristics’, Journal of Strategic Studies 33/4 (2010), 483–504. doi:10.1080/01402390.2010.489706.
  • Ning, Jun and Dan Xiufa, ‘Mao Zedong Yi Ruo Sheng Qiang Lilun Zai Yanjiu’ [ New Research on Mao Zedong’s Theory of Defeating the Strong from a Position of Weakness], Zhongguo Junshi Kexue 23/3 (2010), 60–70.
  • Nye, Joseph S., ‘Nuclear Lessons for Cyber Security?’, Strategic Studies Quarterly 5/4 (2011), 18–38.
  • Nye, Joseph S., The Future of Power (New York: Public Affairs 2011).
  • Peng, Hongqi, ‘Qiantan Xinxihua Tiaojian Xia de Yi Lie Sheng You’ [ On Defeating the Superior from a Position of Inferiority under Information Conditions], Zhongguo Junshi Kexue 21/1 (2008), 142–48.
  • Peterson, Dale, ‘Offensive Cyber Weapons: Construction, Development, and Employment’, Journal of Strategic Studies 36/1 (2013), 120–24. doi:10.1080/01402390.2012.742014.
  • Pollpeter, Kevin, ‘Chinese Writings on Cyberwarfare and Coercion’, in Jon R. Lindsay, Tai Ming Cheung and Derek S. Reveron (eds.), China and Cybersecurity. Espionage, Strategy, and Politics in the Digital Domain (Oxford: Oxford UP 2015), 138–62.
  • Pollpeter, Kevin L., Michael S. Chase and Eric Heginbotham, The Creation of the PLA Strategic Support Force and Its Implications for Chinese Military Space Operations (Santa Monica, CA: RAND Corporation 2017).
  • Rattray, Greg, Strategic Warfare in Cyberspace (Cambridge, MA: MIT Press 2001).
  • Reveron, Derek, ‘An Introduction to National Security and Cyberspace’, in Derek S. Reveron (ed.), Cyberspace and National Security. Threats, Opportunities, and Power in a Virtual World (Washington, DC: Georgetown UP 2012), 3–19.
  • Rid, Thomas, Cyber War Will Not Take Place (London: Hurst & Company 2013).
  • Rid, Thomas and Ben Buchanan, ‘Attributing Cyber Attacks’, Journal of Strategic Studies 38/1–2 (2015), 4–37. doi:10.1080/01402390.2014.977382.
  • Ross, Robert S., ‘Balance of Power Politics and the Rise of China: Accommodation and Balancing in East Asia’, Security Studies 15/3 (2006), 355–95. doi:10.1080/09636410601028206.
  • Ross, Robert S. and Øystein Tunsjø (eds.), Strategic Adjustment and the Rise of China. Power and Politics in East Asia (Ithaca, NY: Cornell UP 2017).
  • Segal, Adam, ‘Chinese Computer Games: Keeping Safe in Cyberspace’, Foreign Affairs 91/2 (2012), 14–20.
  • Shang, Liang, Yang Guoxin, Shi Jinlai and Sui Shilong, ‘Wangluo Zhan Budui. Ge Guo Jun Zhong Xin Chong’ [ Cyberwar Forces: The New Favourite of Every Country’s Military], Guofang Keji 30/4 (2009), 89–92.
  • Sharp, Travis, ‘Theorizing Cyber Coercion: The 2014 North Korean Operation Against Sony’, Journal of Strategic Studies 40/7 (2017), 898–926. doi:10.1080/01402390.2017.1307741.
  • Sheldon, Robert and Joe McReynolds, ‘Civil-Military Integration and Cybersecurity. A Study of Chinese Information Warfare Militias’, in Jon R. Lindsay, Tai Ming Cheung and Derek S. Reveron (eds.), China and Cybersecurity. Espionage, Strategy, and Politics in the Digital Domain (Oxford: Oxford UP 2015), 188–222.
  • Shen, Xueshi, ‘Wangluo Kongjian Gong Fang Jishu Fazhan Dongxiang Fenxi’ [ An Analysis of the Development Trends in Cyberspace Offence and Defence Technology], Guofang Keji 38/4 (2017), 42–46.
  • Slayton, Rebecca, ‘What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment’, International Security 41/3 (2017), 72–109. doi:10.1162/ISEC_a_00267.
  • Smeets, Max, ‘A Matter of Time: On the Transitory Nature of Cyberweapons’, Journal of Strategic Studies 41/1–2 (2018), 6–32. doi:10.1080/01402390.2017.1288107.
  • Stokes, Mark A., ‘The Chinese People’s Liberation Army Computer Network Operations Infrastructure’, in Jon R. Lindsay, Tai Ming Cheung and Derek S. Reveron (eds.), China and Cybersecurity. Espionage, Strategy, and Politics in the Digital Domain (Oxford: Oxford UP 2015), 163–87.
  • Sun, Qiangyin, ‘Zhunque Tangxun Xinxihua Zhanzheng Yi Lie Sheng You Zhisheng Jili’ [ Exploring the Mechanism of Defeating the Superior from a Position of Inferiority in Informationized War], Guofang Keji 36/1 (2015), 75–78.
  • Sun, Wei, ‘Quanli Zhengzhi Shijiao Xia Wangluo Zhuquan de Jichu’ [ The Basis of Cyber Sovereignty from the Perspective of Power Politics], Guofang Keji 37/6 (2016), 81–87.
  • Sun, Wei and Bao Chuang, ‘Guoji Wangluo Anquan Chanpin Shichang Fazhan Xianzhuang Yu Qushi’ [ State and Trends in the Development of the International Market for Cybersecurity Products], Guofang Keji 37/2 (2016), 59–64.
  • Tang, Lu, ‘Qianxi Yi Falü Xingshi Kongzhi Wangluo Junbei Jingsai de Biyaoxing’ [ An Analysis on the Necessity of Controlling Cyber Arms Race through Law], Guofang Keji 31/3 (2010), 33–36.
  • Thomas, Timothy L., ‘Nation-State Cyber Strategies: Examples from China and Russia’, in Franklin D. Kramer, Stuart H. Starr and Larry K. Wentz (eds.), Cyberpower and National Security (Washington, DC: National Defense UP 2009), 465–88.
  • Thomas, Timothy L., ‘Google Confronts China’s “Three Warfares”’, Parameters 40/2 (2010), 101–13.
  • Tian, Chengxin, Zhang Feng and Jiang Fei, ‘Wangluo Zhan dui Zuozhan de Yingxiang ji Duice’ [Influence of Cyberwarfare on Operations and Countermeasures], Guofang Keji 35/5 (2014), 103–05.
  • Wang, Zengzhuo and Zhu Yajie, ‘Mei Jun Wangluo Silingbu Yu Guojia Anquan Ju Chaifen De Kenengxing’ [ On the Possibility of a Split between the U.S. Cyber Command and the National Security Agency], Guofang Keji 39/5 (2018), 91–96.
  • Wenger, Andreas, ed., ‘The Internet and the Changing Face of International Relations and Security’, Information & Security 7 (2001). Special issue.
  • Whyte, Christopher, ‘Ending Cyber Coercion: Computer Network Attack, Exploitation and the Case of North Korea’, Comparative Strategy 35/2 (2016), 93–102. doi:10.1080/01495933.2016.1176453.
  • Wu, Chenggang, ‘Jiakuai Zhongguo “Wangluo Guofang” Jianshe de Zhanlüe Sikao’ [ Strategic Reflection on Accelerating the Construction of China’s “Cyber National Defence”], Guofang Keji 33/3 (2012), 1–4.
  • Wu, Tong, ‘Jingwai Xinxi Wangluo Jiankong Xingshi yu Tiaozhan’ [ Situation and Challenges of Information Network Monitoring Abroad], Guofang Keji 37/3 (2016), 40–43.
  • Wu, Zecheng, ‘Meiguo Wangluo Baquan dui Zhongguo Guojia Anquan de Yingxiang ji Duice’ [ The Influence of U.S. Cyber Hegemony on China’s National Security and Countermeasures], Guofang Keji 35/1 (2014), 55–60.
  • Wuthnow, Joel and Phillip C. Saunders, Chinese Military Reforms in the Age of Xi Jinping: Drivers, Challenges, and Implications (Washington, DC: National Defense University Press 2017), 35–37.
  • Xi, Jinping, ‘Zai Wangluo Anquan he Xinxihua Gongzuo Zuotanhui shang de Jianghua’ [ Speech at the Cybersecurity and Informatization Work Conference], Renmin Ribao, 26 April 2016, 1.
  • Xiao, Xunlong and Li Shouqi, ‘Wangluo Yulun Zhan de Lilun Tanxi’ [ Theoretical Analysis of Cyber Public Opinion Warfare], Guofang Keji 35/2 (2014), 5–8.
  • Yang, Tengfei, Zhu Yaohua and Zhang Weichao, ‘Heping Shiqi Wangluo Yulun Zhan de Tedian ji Duice Chuyi’ [ Characteristics of Cyber Public Opinion Warfare in Peacetime and Opinions on Countermeasures], Guofang Keji 35/2 (2014), 33–36.
  • Ye, Zheng, ‘From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond’, in Jon R. Lindsay, Tai Ming Cheung and Derek S. Reveron (eds.), China and Cybersecurity. Espionage, Strategy, and Politics in the Digital Domain (Oxford: Oxford UP 2015), 123–37.
  • Zhan, Xiaosu, ‘Jiaqiang Wangluo Guofang Jianshe Zhanlüe Yunchou Xuyao Qianghua de Liu Zhong Yishi’ [ On the Six Elements of Awareness that Should Be Strengthened in order to Reinforce the Strategic Planning for Cyber National Defence Construction], Guofang Keji 34/6 (2013), 69–72.
  • Zhang, Jianchao, Shen Xueshi and Zhong Hua, ‘Mei Jun Wangluo Kongjian Zuozhan Lilun Fazhan ji Yingxiang Fenxi’ [ The Development of the U.S. Military’s Cyberspace Operations Theory and Its Influence], Guofang Keji 37/3 (2016), 63–67.
  • Zhang, Yining, Xu Yan, Sun Kejia and Zhang Wenjie, Zhongguo Xiandai Junshi Sixiang [ China’s Contemporary Military Thought] (Beijing: Guofang Daxue Chubanshe 2006).
  • Zheng, Hebin, ‘Wangluo Junbei dui Zhuquan de Yingxiang ji Woguo Duice’ [ The Impact of Cyber Arms on Sovereignty and Countermeasures of China], Guofang Keji 34/2 (2013), 62–68.
  • Zhongguo Da Baike Quanshu – Junshi Bianweihui [Editorial Committee of ‘Chinese Encyclopedia – Military’], Zhongguo Da Baike Quanshu – Junshi [Chinese Encyclopedia – Military] (Beijing: Zhongguo Da Baike Quanshu Chubanshe 2005).
  • Zhonghua Renmin Gongheguo Guowuyuan Xinwen Bangongshi [Information Office of the PRC State Council], Zhongguo de Junshi Zhanlüe [China’s Military Strategy] (Beijing: Renmin Chubanshe 2015).
  • Zhuang, Lin and Si Huijing, ‘Meiguo Wangluo Anquan Zhanlüe de Shizhi’ [ Essence of the U.S. Cybersecurity Strategy], Guofang Keji 34/4 (2013), 74–78.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.