Article contents
A Chinese perspective on cyber war
Published online by Cambridge University Press: 15 April 2013
Abstract
- Type
- Comments and Opinions
- Information
- International Review of the Red Cross , Volume 94 , Issue 886: New Technologies and Warfare , June 2012 , pp. 801 - 807
- Copyright
- Copyright © International Committee of the Red Cross 2013
References
1 ‘International Strategy for Cyberspace – Prosperity, Security and Openness in a Networked World’, The White House, May 2011, available at: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf. All internet references were accessed in September 2012, unless otherwise stated.
2 Ibid., p. 14.
3 In the 1990s, some scholars in the United Kingdom and United States proposed the concept of ‘cyber power’ or ‘information power’. See Jordan, Tim, Cyberpower: The Culture and Politics of Cyberspace and the Internet, Routledge, London/New York, 1999CrossRefGoogle Scholar; Nye, Joseph S., The Paradox of American Power: Why the World's Only Superpower Can't Go it Alone, Oxford University Press, Oxford/New York, 2002Google Scholar; Kramer, Franklin, Starr, Stuart, and Wentz, Larry K. (eds.), Cyberpower and National Security, National Defense University Press, Potomac Books, Washington, DC, 2009Google Scholar.
4 Available (only in Chinese) at: http://www.donews.com/net/201210/1678402.shtm.
5 Available (only in Chinese) at: http://www.mod.gov.cn/affair/2012-03/29/content_4354898.htm.
6 Menn, Joseph, ‘Defence groups turn to cybersecurity’, in The Financial Times, 10 October 2011Google Scholar, available at: http://www.ft.com/intl/cms/s/0/84697a96-b834-11e0-8d23-00144feabdc0.html#axzz2BeHfWRvK.
7 ‘U.S., Australia to add cyber realm to defense treaty’, in Reuters, 14 September 2011, available at: http://www.reuters.com/article/2011/09/15/us-usa-cyber-australia-idUSTRE78E05I20110915.
8 Ministry of Foreign Affairs of the People's Republic of China, ‘China, Russia and other countries submit the document of International Code of Conduct for Information Security to the United Nations’, 19 March 2011, available at: http://www.fmprc.gov.cn/eng/zxxx/t858978.htm.
9 Speech by HE Ambassador Wang Qun at the First Committee of the 66th Session of the UN General Asssembly on Information and Cyberspace Security, New York, 20 October 2011, available at: http://www.fmprc.gov.cn/eng/wjdt/zyjh/t869580.htm.
10 See Sterling, Bruce, ‘Cyberspace with Chinese characteristics’, in Wired, 8 October 2012Google Scholar, available at: http://www.wired.com/beyond_the_beyond/2012/10/cyberspace-with-chinese-characteristics-%E7%BD%91%E7%BB%9C%E7%A9%BA%E9%97%B4/; and
11 Office of the Vice-President, ‘VP's remarks to London Cyberspace Conference’, The White House, 1 November 2011, transcript and video available at: http://www.whitehouse.gov/the-press-office/2011/11/01/vps-remarks-london-cyberspace-conference.
12 Secretary of Treaty and Law of the Ministry of Foreign Affairs Huang Huikang's speech in Budapest, available at: http://news.xinhuanet.com/tech/2012-10/05/c_113280788.htm.
- 10
- Cited by