US EUROPE AFRICA ASIA 中文
Opinion / From the Readers

My opinion on Sino-US relationship

(chinadaily.com.cn) Updated: 2015-09-25 13:47
From cybersecurity to cyber-collaboration

By Ricky Leung

Cybersecurity is a top priority agenda item on President Xi Jinping’s visit to the US this year. Troubled by large-scale cyberattacks in recent months, all of which were allegedly launched from China, President Obama has made it clear that the US will not tolerate similar attacks. In a recent speech, President Obama assured business leaders that the US has the necessary capacity to "take countervailing measures" against espionage and the theft of trade secrets.

In this context, it is expected that cybersecurity concerns will be raised, and discussed at great depth, during President Xi’s visit.

What approaches can be taken to address cybersecurity concerns?

One is to emphasize retaliation, what some have called tit-for-tat. This approach is threat-based: If your country commits malicious acts on my country, expect us to return the favor! We will be more sophisticated and incur deeper harms to you in the cyber world. So, just don’t mess with me. I can, and will beat you down!

Building trust is the other alternative approach. Whether it is business, science, or politics, trust is the fundamental denominator that unites stakeholders in the field. This approach doesn't require the US and China to assume a hostile position to begin with in any discussion on cybersecurity. But, to be effective, the leadership needs to pledge allegiance to the protection of intellectual property. If a piece of information or knowledge is open-source, feel free to use it. If the author requires a price or acknowledgement, do accordingly.

In the cyber world, the commitment to intellectual property is the basis of trust. Both American and Chinese leaders should demonstrate this commitment with concrete actions. Actions always speak louder than words.

Importantly, a trust-based approach to address cybersecurity issues can make the cyber world a new collaborative space, not a battleground. Advances in the Internet and mobile technology have already made virtual interactions convenient and inexpensive. American and Chinese business leaders, scientists and politicians should build on this achievement to make the cyber world a place for productive collaborations.

With increased collaborations, additional measures to address cybersecurity concerns that are creative, feasible and culturally appropriate will likely arise.

Most Viewed Today's Top News
...
主站蜘蛛池模板: 亚洲激情成人网| 国产在线观看一区精品| 一级毛片免费观看不卡视频| 日韩精品无码一区二区三区AV | 黄网站在线播放| 国产精品福利久久| aa级黄色毛片| 性色欲情网站iwww| 久久99精品久久久久麻豆| 最近最好的中文字幕2019免费 | 国产内射999视频一区| www.日本xxxx| 国产精品视频永久免费播放| baoyu122.永久免费视频| 巨大黑人极品videos精品| 中文字幕日韩亚洲| 日本福利视频导航| 久久综合色视频| 欧美亚洲综合另类| 亚洲天堂中文字幕在线| 激情网站免费看| 免费国产黄网站在线观看视频| 精品无人区一区二区三区| 国产一级特黄a大片免费| 香蕉app在线观看免费版| 国产无吗一区二区三区在线欢| 波多野结衣33| 国产精品区一区二区三 | 日韩福利电影网| 亚洲av无码成人网站在线观看| 欧美国产综合视频| 亚洲成a人一区二区三区| 欧美黑人xxxx性高清版| 亚洲精品无码乱码成人| 热热色原原网站 | 成人网站在线进入爽爽爽| 久久99精品一区二区三区| 日本午夜大片a在线观看| 久久人搡人人玩人妻精品首页| 日韩乱码人妻无码中文字幕| 久久精品国产亚洲av高清漫画|