The United States Motivation in Having Cyber Security Cooperation With China

Main Article Content

Devi Purwanti

Abstract

The United States and China had conducted cyber cooperation since 2011. But in 2013, both states were involved in the cyber conflict that made the previous cyber collaboration had been ineffective. After that, in 2015, both states agreed to re-form cyber cooperation. This study aims to analyse the United States' motivation in conducting cyber partnerships with China using the cybersecurity concept. This research has discovered at the national level, the United States tried to achieve its information assurance through cyber defence strategy by strengthening collaboration. On the other hand, at the international level, norm construction through bilateral collaboration has made the United States become an impactful actor in international cybersecurity.

Article Details

How to Cite
Purwanti, D. (2020). The United States Motivation in Having Cyber Security Cooperation With China. Journal of International Studies on Energy Affairs, 2(1), 105–122. https://doi.org/10.51413/jisea.Vol2.Iss1.2021.105-122
Section
Articles

References

Baezner, Marie.”Cybersecurity in Sino-American Relations”. CSS Analyses in Security Policy. No.224. (2018)

Bebber, Robert .“China’s Cyber Economic Warfare Threatens U.S”.US Naval

Institute. Vol.143. No. 7. (2017)

Bortz, Travis. “Cyberspace: United States vs China”. The Journal of Hgh Technology Law. https://sites.suffolk.edu/jhtl/2014/04/04/cyberspace-united-states-v-china/ (diakses 15 Maret 2019)

Dunn Cavelty, Myriam. Cyber Security. Oxford:Oxford University Press.(2012)

Finnermore, Martha. dan Duncan B. Hollis. “Constructing Norms for Global

Cybersecurity”. The American Journal of International Law. Vol.110. No.3 (2016)

Fisher, Eric A. dkk., “The 2013 Cyber security Executive Order: Overview and Considerations for Congress”. Congressional Research Service. (2013) http://www2.gwu.edu/~nsarchiv/ NSAEBB/NSAEB B424/docs/Cyber-089.pdf.

Hollis, Duncan B. “China and the US Strategic Construction of Cybernorms: The

Process is the Product”. Aegis Paper Series.No.1704

Lewis, James A.”Computer Espionage, Titan Rain and China”.Center for

Strategic and International Studies-Technology and Public Policy Program, http://cybercampaigns.net/wp-content/uploads/2013/05/Titan-Rain-Moonlight-Maze.pdf (diakses 6 Maret 2019 )

Louie, Celia. “U.S-China Cybersecurity Cooperation”. The Henry M. Jackson School of International Studies.(2017). https://jsis. washington.edu/news/u-s-china-cybersecurity-cooperation/ (diakses 23 April 2019)

Maurer, Tim dan Kathryn Taylor. “Outlook on International Cyber Norms: Three Avenues For Future Progress”. Carneige Endowment for International Peace.2018. https://carnegie endowment.org/2018/03/02/outlook-on-international-cyber-norms-three-avenues-for-future-progress-pub-75704 (diakses 17 April 2019)

McKenzie, Timothy M. “Is Cyber Deterrence Possible”. Air Force Research

Instituse Papers (2017)

Nicola, Stefan. “China Working to Halt Commercial Cyberwar in Deal with

Germany”, BLOOMBERG (2015) https://www.bloomberg.com/news /articles/2015-10-29/china-working-to-halt-commercial-cyberwar-in-deal-with-germany (diakses, 29 April 2019)

Powner, David. “National Cybersecurity Strategy: Key Improvements Are

Needed to Strengthen the Nation’s Posture”.United States Government Accountability Office.2009

Presidential Document. “Excecutive Order 13694: Blocking the Property of

Certain Person Engaging in Significant Malicious Cyber-Enabled Activities”. Federal Register. Vol. 80. No. 63 (2015)

Ryan, Camille dan Jamie M. Lewis. “Computer and Internet Use in the United

States : 2015”. American Community Survey Reports. 2017. diakses di https://www.census.gov/content/dam/Census/library /publications/2017/acs/acs-37.pdf, 18 Desember 2018

Saalman, Lora .“Rethinking China-Russia-U.S. Deterrence in Cyberspace”.ThinkChina.dk Policy Brief. No.4 (2017)

Sanger David E. dan Nicole Perlroth.”NSA Breached Chinese Servers Seen as

Security Threat”.New York Times, https://www.nytimes.com/2014/03/23 /world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html. (diakses 12 maret 2019)

Schou, Corey D. dan Kenneth J. Trimmer. “Information Assurance and Security”.

Journal of Organizational and End User Computing on Information Security (2005).https://www.researchgate.net/publication/220349069 _Information_Assurance_and_Security

Smeets, Max. dan Herbert S. Lin. “Offensive Cyber Capabilities: To What End” NATO CCDCOE (2018)

Stevens, T. “A cyberwar of ideas?: Deterrence and norms in cyberspace”.

Contemporary Security Policy. Vol. 33. No.1. (2012): 151. doi:10.1080/13523260.2012.659597

The White House. “Critical Foundations: Protecting America’s

Infrastructure”(1997) https://fas.org/sgp /library/pccip.pdf, diakses 7 April 2019

The White House. “Presidential Decision Directive/NSC-63”(1998) https://nsarchive2.gwu.edu /NSAEBB/NSAEBB424/docs/Cyber-012.pdf (diakses 7 April 2019)

The White House, “National Plan for Information Systems Protection Version

0”, 2000, https://fas.org/irp /offdocs/pdd/CIP-plan.pdf, diakses (7 April 2019)

The White House.“The National Strategy to Secure Cyberspace”.2003. https://www.energy.gov/sites/prod/files /National%20Strategy%20to% 20Secure%20Cyberspace.pdf. (diakses 1 April 2019)

The White House. “Presidential Policy Directive/PPD-21: Critical Infrastructure Security and Resilience,” U.S. General Services Administration. http://www.gsa.gov/portal/ mediaId/176571/fileName/ATTCH_2_-_PPD-21.action (diakses 19 April 2019)

The White House Office of the Press Secretary. “The U.S-China Strategic and Economic Dialogue”. 2009. https://obamawhitehouse.archives.gov /realitycheck /the-press-office/remarks-president-uschina-strategic-and-economic-dialogue. (diakses 27 Maret 2019)

The White House Office of the Press Secretary. “U.S-China Joint Statement”.

https://obamawhitehouse.archives.gov/the-press-office/2011/01/19/us-china-joint-statement. (diakses 27 Maret 2019)

The White House. “The National Strategy to Secure Cyberspace”. Washington.

diakses di https://georgewbush-whitehouse.archives.gov/pcipb/ (diakses 18 Desember 2018)

The White House. “Cyberspace Policy Review : Assuring a Trusted and Resilient

Information and Communication Infrastructure”. 2010 diakses di http://www.whitehouse.gov/assets/documents /Cyberspace_Policy_Review_final.pdf

U.S Department of Defense.”Department of Defense Strategy for Operating in Cyberspace” (2011)

Warren Harold, Scott, Martin C. Libicki. Astrid Stuth Cevallos. “Getting Yes

With China in Cyberspace”. ( Santa Monica. CA: RAND Corporation.2016)

Xu, Ting. “China and The United States : Hacking Away at Cyber Warfare”. Asia

Pacific Bulletin. No. 135. 2011

Yeniman Yildirim, Erbu .“The Importance of Risk Management in Information

Security”. IIER International Conference. ISBN: 978-93-86083-34-0 (2016)