Why would russia or china agree to cyber security

Assignment Help Management Information Sys
Reference no: EM131689206

Assignment

Russia and China view the importance of cyber and how it is structured within their security procedures. It has a more foundational role than I feel the U.S. is prioritizing. For example, China prioritizes Information Warfare but defines it as informationization - cyber does not really have a term or place from a Chinese point of view (it's a western term?). The Chinese view the dominance of this area as critical to who controls the overall "cyber" network or flow of digital information. These preemptive measures are viewed as important by Chinese standards to not allow an enemy to be able to react when attacked. Russia has a somewhat similar view, they feel that the information ware might be to true third world war. (Kramer) I feel the U.S. sees itself as the leaders and originator of the internet and the digital world, but we likely haven't placed enough priority on protecting information or offensive capabilities to keep pace with our digital rivals. I am not sure that international norms can really be established, as it looks like China/Russia (and possibly other cyber leaders) have a different view than that of the U.S. The overall importance and prioritization of "Cyber" as a field to control for future operations and conflicts is likely already known in those leadership structures, while the U.S. wants to limit others access to what they are behind on - why would Russia or China agree to that?

Reference no: EM131689206

Questions Cloud

What are competitive priorities : What are competitive priorities? Examine a few companies that you do business with and see what competitive priorities they have that draw you in.
Describe what you find by relating the swot components : Describe what you find by relating the SWOT components to the Marketing Mix and the 4As. These are found in your reading material
Describe how the inverted page table works : Need answer for this two question. Please make it simple and easy to understand!
What is the perfect order metric for this company : You work for a company that manufactures and ships electronic products to consumers. What is the perfect order metric for this company?
Why would russia or china agree to cyber security : Russia and China view the importance of cyber and how it is structured within their security procedures. why would Russia or China agree to that?
Discussion about the binary number system : There will be a discussion about the binary number system. Give an example of how you would teach a 7th grader about the binary number system.
Describe the current theory of how the earths moon formed : Describe the current theory of how the Earth's moon formed. Describe the current theory of how the Earth's moon formed.
Access the network using rob computer : The troubleshooting process will be completed when you are able to access the network using Rob's computer.
Which depicts how project stakeholders will be communicated : Which depicts how project stakeholders will be communicated with, including the communications mode, frequency .

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd