Listing 1 - 2 of 2 |
Sort by
|
Choose an application
This new book is the first full account, inside or outside government, of Chinaʹs efforts to acquire foreign technology. Based on primary sources and meticulously researched, the book lays bare Chinaʹs efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods -- without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history." Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the Peopleʹs Republic of Chinaʹs policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US. -- Publisher description.
Business intelligence --- Technology transfer --- S10/0640 --- S10/0641 --- S10/0760 --- S19/0160 --- Business espionage --- Competitive intelligence --- Corporate intelligence --- Economic espionage --- Espionage, Business --- Espionage, Economic --- Espionage, Industrial --- Industrial espionage --- Intelligence, Business --- Intelligence, Corporate --- Business ethics --- Competition, Unfair --- Industrial management --- Confidential business information --- China: Economics, industry and commerce--Foreign trade and economic relations: 1976 - 1989 --- China: Economics, industry and commerce--Foreign trade and economic relations: since 1989 --- China: Economics, industry and commerce--Transfer of technology --- China: Natural sciences--Technology, inventions --- Business policy --- China
Choose an application
Written by two of America's leading government analysts and an expert on Chinese cyber networks, this new book is the first full account, inside or outside government, of China's efforts to acquire foreign technology.
Listing 1 - 2 of 2 |
Sort by
|