{"title":"对抗“中国制造2025”:西方大国在网络世界的战略","authors":"David Mussington","doi":"10.5038/2378-0789.3.2.1055","DOIUrl":null,"url":null,"abstract":": Cyber capabilities have diffused disruptive potential to new actors and locations around the world. The engine for diffusion, however, is the economy, not politics. Interactions in trade, global product development systems and digital services spreads patterns of mutual dependence – and vulnerability – worldwide. Access to this global economy equates to participation in wealth creation and technological progress. Denial of access creates disadvantages and imposes costs. For nation-states, this environment is full of both risk and opportunity. Confronting a Chinese government strategy that targets Western economic advantages, the democracies face a series of questions: what is the best strategy for successful protection of assets and infrastructures of value? What should be done about authoritarian states that both participate in the cybered world, yet oppose the open, transparent and democratic norms of cyberspace’s originators?","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"76 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Countering \\\"Made in China 2025\\\": Strategy for Western Powers in a Cybered World\",\"authors\":\"David Mussington\",\"doi\":\"10.5038/2378-0789.3.2.1055\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": Cyber capabilities have diffused disruptive potential to new actors and locations around the world. The engine for diffusion, however, is the economy, not politics. Interactions in trade, global product development systems and digital services spreads patterns of mutual dependence – and vulnerability – worldwide. Access to this global economy equates to participation in wealth creation and technological progress. Denial of access creates disadvantages and imposes costs. For nation-states, this environment is full of both risk and opportunity. Confronting a Chinese government strategy that targets Western economic advantages, the democracies face a series of questions: what is the best strategy for successful protection of assets and infrastructures of value? What should be done about authoritarian states that both participate in the cybered world, yet oppose the open, transparent and democratic norms of cyberspace’s originators?\",\"PeriodicalId\":345606,\"journal\":{\"name\":\"Military Cyber Affairs\",\"volume\":\"76 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Military Cyber Affairs\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5038/2378-0789.3.2.1055\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Military Cyber Affairs","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5038/2378-0789.3.2.1055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Countering "Made in China 2025": Strategy for Western Powers in a Cybered World
: Cyber capabilities have diffused disruptive potential to new actors and locations around the world. The engine for diffusion, however, is the economy, not politics. Interactions in trade, global product development systems and digital services spreads patterns of mutual dependence – and vulnerability – worldwide. Access to this global economy equates to participation in wealth creation and technological progress. Denial of access creates disadvantages and imposes costs. For nation-states, this environment is full of both risk and opportunity. Confronting a Chinese government strategy that targets Western economic advantages, the democracies face a series of questions: what is the best strategy for successful protection of assets and infrastructures of value? What should be done about authoritarian states that both participate in the cybered world, yet oppose the open, transparent and democratic norms of cyberspace’s originators?