China's Quest for Foreign Technology
Beyond Espionage
Herausgeber: Hannas, William C; Tatlow, Didi Kirsten
China's Quest for Foreign Technology
Beyond Espionage
Herausgeber: Hannas, William C; Tatlow, Didi Kirsten
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book analyses China's foreign technology acquisition activity and how this has helped its rapid rise to superpower status.
Andere Kunden interessierten sich auch für
- Intelligence Analysis in the Digital Age180,99 €
- Edward Sing Yue ChanChina's Maritime Security Strategy180,99 €
- Scot MacdonaldPropaganda and Information Warfare in the Twenty-First Century212,99 €
- Andrew HenshawUnderstanding Insurgent Resilience180,99 €
- Connor DonahueFreedom of the Seas and Us Foreign Policy180,99 €
- Routledge Handbook of Strategic Culture286,99 €
- Military Coercion and US Foreign Policy180,99 €
-
-
-
This book analyses China's foreign technology acquisition activity and how this has helped its rapid rise to superpower status.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 350
- Erscheinungstermin: 23. September 2020
- Englisch
- Abmessung: 236mm x 152mm x 23mm
- Gewicht: 658g
- ISBN-13: 9780367473594
- ISBN-10: 0367473593
- Artikelnr.: 60004275
- Verlag: Taylor & Francis
- Seitenzahl: 350
- Erscheinungstermin: 23. September 2020
- Englisch
- Abmessung: 236mm x 152mm x 23mm
- Gewicht: 658g
- ISBN-13: 9780367473594
- ISBN-10: 0367473593
- Artikelnr.: 60004275
William C. Hannas is Professor and Lead Analyst at the Center for Security and Emerging Technology (CSET), Georgetown University, Washington, DC, USA. Prior to this he was a member of the Central Intelligence Agency's leadership cadre and a three-time recipient of its McCone Award. Didi Kirsten Tatlow is Senior Fellow at the German Council on Foreign Relations in Berlin, Germany, and Senior Non-Resident Fellow at Project Sinopsis in Prague, Czech Republic.
Preface Section I: China's transfer venues 1. Chinese technology
transfer-an introduction William C. Hannas and Huey-Meei Chang 2. Serve the
motherland while working overseas Andrew Spear 3. China's talent programs
Jeffrey Stoff Section II: The system in operation 4. Foreign technology
through commerce Karen Sutter 5. The myth of the stateless global society
Anna B. Puglisi 6. Targeting defense technologies James Mulvenon and Chenny
Zhang Section III: China's worldwide transfer networks 7. Europe: a
technology transfer mosaic Didi Kirsten Tatlow, Hinnerk Feldwisch-Drentrup
and Ryan Fedasiuk 8. Technology transfer from Germany Didi Kirsten Tatlow,
Hinnerk Feldwisch-Drentrup and Ryan Fedasiuk 9. Japan and South Korea
William C. Hannas and Huey-Meei Chang Section IV: Case studies 10.
Sino-foreign research collaboration Jeffrey Stoff 11. China's access to
foreign AI technology William C. Hannas and Huey-Meei Chang 12. The Impact
of China's policies Didi Kirsten Tatlow, Greg Walton and Anna B. Puglisi
Section V: Technology in the shadows 13. The People's Liberation Army and
foreign technology Elsa Kania and Peter Wood 14. Foreign technology and the
surveillance state Dahlia Peterson 15. The United Front and technology
transfer Alex Joske and Jeffrey Stoff Section VI: Managing the transfer
problem 16. Chinese students, scholarship and US innovation Anna B. Puglisi
17. Economic espionage and trade secret theft cases in the US James
Mulvenon 18. Mitigation efforts to date James Mulvenon, Didi Kirsten Tatlow
and Alex Joske Conclusion William C. Hannas and Didi Kirsten Tatlow
transfer-an introduction William C. Hannas and Huey-Meei Chang 2. Serve the
motherland while working overseas Andrew Spear 3. China's talent programs
Jeffrey Stoff Section II: The system in operation 4. Foreign technology
through commerce Karen Sutter 5. The myth of the stateless global society
Anna B. Puglisi 6. Targeting defense technologies James Mulvenon and Chenny
Zhang Section III: China's worldwide transfer networks 7. Europe: a
technology transfer mosaic Didi Kirsten Tatlow, Hinnerk Feldwisch-Drentrup
and Ryan Fedasiuk 8. Technology transfer from Germany Didi Kirsten Tatlow,
Hinnerk Feldwisch-Drentrup and Ryan Fedasiuk 9. Japan and South Korea
William C. Hannas and Huey-Meei Chang Section IV: Case studies 10.
Sino-foreign research collaboration Jeffrey Stoff 11. China's access to
foreign AI technology William C. Hannas and Huey-Meei Chang 12. The Impact
of China's policies Didi Kirsten Tatlow, Greg Walton and Anna B. Puglisi
Section V: Technology in the shadows 13. The People's Liberation Army and
foreign technology Elsa Kania and Peter Wood 14. Foreign technology and the
surveillance state Dahlia Peterson 15. The United Front and technology
transfer Alex Joske and Jeffrey Stoff Section VI: Managing the transfer
problem 16. Chinese students, scholarship and US innovation Anna B. Puglisi
17. Economic espionage and trade secret theft cases in the US James
Mulvenon 18. Mitigation efforts to date James Mulvenon, Didi Kirsten Tatlow
and Alex Joske Conclusion William C. Hannas and Didi Kirsten Tatlow
Preface Section I: China's transfer venues 1. Chinese technology
transfer-an introduction William C. Hannas and Huey-Meei Chang 2. Serve the
motherland while working overseas Andrew Spear 3. China's talent programs
Jeffrey Stoff Section II: The system in operation 4. Foreign technology
through commerce Karen Sutter 5. The myth of the stateless global society
Anna B. Puglisi 6. Targeting defense technologies James Mulvenon and Chenny
Zhang Section III: China's worldwide transfer networks 7. Europe: a
technology transfer mosaic Didi Kirsten Tatlow, Hinnerk Feldwisch-Drentrup
and Ryan Fedasiuk 8. Technology transfer from Germany Didi Kirsten Tatlow,
Hinnerk Feldwisch-Drentrup and Ryan Fedasiuk 9. Japan and South Korea
William C. Hannas and Huey-Meei Chang Section IV: Case studies 10.
Sino-foreign research collaboration Jeffrey Stoff 11. China's access to
foreign AI technology William C. Hannas and Huey-Meei Chang 12. The Impact
of China's policies Didi Kirsten Tatlow, Greg Walton and Anna B. Puglisi
Section V: Technology in the shadows 13. The People's Liberation Army and
foreign technology Elsa Kania and Peter Wood 14. Foreign technology and the
surveillance state Dahlia Peterson 15. The United Front and technology
transfer Alex Joske and Jeffrey Stoff Section VI: Managing the transfer
problem 16. Chinese students, scholarship and US innovation Anna B. Puglisi
17. Economic espionage and trade secret theft cases in the US James
Mulvenon 18. Mitigation efforts to date James Mulvenon, Didi Kirsten Tatlow
and Alex Joske Conclusion William C. Hannas and Didi Kirsten Tatlow
transfer-an introduction William C. Hannas and Huey-Meei Chang 2. Serve the
motherland while working overseas Andrew Spear 3. China's talent programs
Jeffrey Stoff Section II: The system in operation 4. Foreign technology
through commerce Karen Sutter 5. The myth of the stateless global society
Anna B. Puglisi 6. Targeting defense technologies James Mulvenon and Chenny
Zhang Section III: China's worldwide transfer networks 7. Europe: a
technology transfer mosaic Didi Kirsten Tatlow, Hinnerk Feldwisch-Drentrup
and Ryan Fedasiuk 8. Technology transfer from Germany Didi Kirsten Tatlow,
Hinnerk Feldwisch-Drentrup and Ryan Fedasiuk 9. Japan and South Korea
William C. Hannas and Huey-Meei Chang Section IV: Case studies 10.
Sino-foreign research collaboration Jeffrey Stoff 11. China's access to
foreign AI technology William C. Hannas and Huey-Meei Chang 12. The Impact
of China's policies Didi Kirsten Tatlow, Greg Walton and Anna B. Puglisi
Section V: Technology in the shadows 13. The People's Liberation Army and
foreign technology Elsa Kania and Peter Wood 14. Foreign technology and the
surveillance state Dahlia Peterson 15. The United Front and technology
transfer Alex Joske and Jeffrey Stoff Section VI: Managing the transfer
problem 16. Chinese students, scholarship and US innovation Anna B. Puglisi
17. Economic espionage and trade secret theft cases in the US James
Mulvenon 18. Mitigation efforts to date James Mulvenon, Didi Kirsten Tatlow
and Alex Joske Conclusion William C. Hannas and Didi Kirsten Tatlow