Contents

Author Biographies

Introduction

1 China’s Internet Development and Cybersecurity – Policies and Practices

1.1. Introduction

1.2. Internet development in China: an overview

1.3. China’s policies towards Internet development

1.4. Cyber legislation and Internet administration

1.5. Cybersecurity and diplomacy: an international perspective

1.6. A cybersecurity strategy in the making?

1.7. Conclusion

2 PLA Views on Informationized Warfare, Information Warfare and Information Operations

2.1. The evolution of chinese military thinking

2.2. The growing importance of information

2.3. Information operations

2.4. Key types of information operations

2.5. Computer network warfare and information operations

3 China’s Adaptive Internet Management Strategy after the Emergence of Social Networks

3.1. Weibo: the turning point

3.2. Latest adjustments under Xi Jinping

3.3. Bibliography

4 India’s Cybersecurity – The Landscape

4.1. A snapshot of Asian cyberspace

4.2. The Indian cyber landscape

4.3. The China challenge: a case study

4.4. Responses

4.5. Creating an institutional framework

4.6. Takeaways

5 China and Southeast Asia: Offline Information Penetration and Suspicions of Online Hacking – Strategic Implications from a Singaporean Perspective

5.1. Offline sphere: latent “diasporic” information power and official Chinese soft power

5.2. The online sphere: hacktivism as mostly projections

5.3. Conclusion: offline politics strategically obscure online projections

5.4. Bibliography

6 Impact of Mongolia’s Choices in International Politics on Cybersecurity

6.1. Mongolia’s cyberspace

6.2. Cyberspace and political stakes

6.3. Information-space security policy

7 China-Iran-Russia – A Cybercommunity of Information?

7.1. The hall marks of cyber-cooperation

7.2. The geopolitical bases for the cyber-Mongol empire

7.3. Order in cyberspace: an absolute necessity within China

8 Discourse Regarding China: Cyberspace and Cybersecurity

8.1. Identification of prevailing themes

8.2. The evolution of American discourse about China, Cybersecurity and cyberdefense

8.3. Conclusion

General Conclusion

List of Authors

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.225.255.178