دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: William C.Hannas, Didi Kirsten Tatlowv سری: Asian Security Studies ISBN (شابک) : 2020017064, 9780367473570 ناشر: Routledge سال نشر: 2021 تعداد صفحات: 373 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 4 مگابایت
در صورت تبدیل فایل کتاب China's Quest for Foreign Technology; Beyond Espionage به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تلاش چین برای فناوری خارجی؛ فراتر از جاسوسی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Cover Half Title Series Page Title Page Copyright Page Table of Contents List of figures List of tables Notes on contributors Preface Notes List of abbreviations Part I: China\'s transfer venues Chapter 1: Chinese technology transfer—an introduction Changing the soup without changing the medicine China’s foreign tech transfer infrastructure The statutory record Selling the program— appeals to the heart Why does it happen? Myth and reality Notes Bibliography Chapter 2: Serve the motherland while working overseas Key concepts Policy system Specific programs Homeland serving action plan for overseas Chinese HOME Program Chunhui Cup start up competition 111 Project Notes Bibliography Chapter 3: China\'s talent programs Origins of PRC talent programs Policy and doctrine supporting the talent programs Overview of major talent programs The case of USA v. Chunzai Wang China’s flagship Thousand Talents Plan: its lesser known elements TTP Venture Capital Center, entrepreneurial contests TTP Expert Association Supporting infrastructure: talent innovation bases in China Supporting infrastructure: talent databases for targeting overseas experts Survey of other talent programs Notes Bibliography Part II: The system in operation Chapter 4: Foreign technology transfer through commerce China’s trade and investment regime: the plans Funding China’s foreign investment approvals Tax Corporate structures: JVs, investment zones, and special projects Corporate theft and espionage Procurement, standards, IP, and antitrust Trade barriers and market pressures Overseas investment Conclusion Notes Bibliography Chapter 5: The myth of the stateless global society Technology as a national asset: the new geopolitical battlespace We are not playing the same game: China’s hybrid innovation system Inefficiency and its discontents33 Does innovation matter? Losing home field advantage Conclusions Notes Bibliography Chapter 6: Targeting defense technologies The China defense innovation literature: missing pieces Role of defense technology planning in technology espionage National S&T and industrial planning: MLP 2006–2020 and Made in China 2025 From civil–military integration to military–civil fusion Foreign sources of defense technology: within China Bureaucratic and regulatory pressure Defense technology and China’s talent programs Outsourcing defense R&D Foreign sources of defense technology: outside China Defense technical information collection40 Knowledge transfer through study abroad Defense related investment and acquisition activities Looking ahead Notes Bibliography Part III: China\'s worldwide transfer networks Chapter 7: Europe: a technology transfer mosaic A talent pipeline Professional associations Talent plans The FCPAE: umbrella organization An overseas proxy: the Zhigong Party53 The European Union: Horizon 2020 and beyond Member states: some examples The impact Notes Bibliography Chapter 8: Technology transfer from Germany A transfer pipeline Students and scholars Professional associations A traditional talent exchange organization A new style technology exchange association Austria: a politics and technology transfer organizational cluster Professors Technology transfer at German research institutes Espionage: the sharp end A case study: Lanxess Weak law enforcement Notes Bibliography Chapter 9: Japan and South Korea Japan: official support and collaboration Japan: the “academic” dimension Union of Chinese residing in Japan ((全日本华侨华人联合会) Association of Chinese scientists and engineers in Japan (在日 中国科学技术者联盟) All Japan federation of overseas Chinese professionals (中国留 日同学总会) Ph.D. and experts group in Japan (留日博士专家团) Japan–China Innovation Centre (日中イノベーション センター) China–South Korea technology transfer Threat awareness Sympathy for the Devil Notes Bibliography Part IV: Case studies Chapter 10: Sino-foreign research collaboration Understanding the challenges Surveying problematic US–China research collaboration Summary of methodology, findings Example 1: US collaboration with Harbin Institute of Technology Example 2: US collaboration with Northwest Polytechnical University Example 3: US collaboration with Beijing Institute of Technology Example 4: US collaboration with Nanjing University of Aeronautics and Astronautics Example 5: US collaboration with Xidian University Example 6: US collaboration with People’s Armed Police schools Example 7: US private sector collaboration with PRC schools Conclusion Notes Bibliography Chapter 11: China\'s \'artificial\' intelligence Chinese government statutory support for foreign AI access Other state sponsored AI technology transfers AI focused “talent” programs, support guilds, and returnee enclaves Foreign AI “talent flows” Angel funds Start up competitions Cui bono? Chinese scholars on the matter of Chinese innovation Notes Bibliography Chapter 12: The impact of China\'s policies The Nortel case: technology appropriation and company collapse Technology loss through an Advanced Persistent Threat (APT) Technology loss through a joint venture— and old fashioned human intelligence The NucTech case: the monkey king’s piercing eyes Vignettes of future capabilities: biotech and medical research Genetically modified grain Medical research and pharmaceuticals Conclusion Notes Bibliography Part V: Technology in the shadows Chapter 13: The People\'s Liberation Army and foreign technology The era of direct transfers (1950s–1980s) The era of foreign military sales (1980s–1990s) American antecedents The era of acquisitions and talent cultivation (2000s–2010s) Avionics Aeroengines Semiconductors The dual use dilemma in technological engagement Notes Bibliography Chapter 14: Foreign technology and the surveillance state How does China’s surveillance state work? China’s dependence on Western hardware companies Western government funded surveillance research moves to China Western academics and universities provide support to Chinese entities Continued lack of ethical publication standards Countermeasures Notes Bibliography Chapter 15: The United Front and technology transfer United front work as a vector for tech transfer Case study: Yang Chunlai Case study: Cao Guangzhi The Western Returned Scholars Association WRSA overseas liaison “workstations” Overseas talent recruitment workstations The ‘Dalian Model’: United Front technology transfer in action Conclusion Notes Bibliography Part VI: Managing the transfer problem Chapter 16: Chinese students, scholarship, and US innovation The story of foreign talent: assumptions, benefits, and challenges “Picking flowers in foreign lands to make honey in China” Impact on US innovation system and values Does it matter? Issue of quality Issue of numbers System issues How do we protect research integrity without becoming China? Notes Bibliography Chapter 17: Economic espionage and trade secret theft cases in the US Assessment of racial bias: Andrew Kim’s “Prosecuting Chinese ‘Spies’ ” Another way to look at the issue of racial bias in economic espionage cases: nationality vs. ethnicity An analysis of commonalities in theft/espionage tradecraft Economic espionage prosecutions and “foreign instrumentality” Conclusion Notes Bibliography Chapter 18: Mitigation efforts to date United States Arms Export Control Act (AECA) and the International Trafficking in Arms Regulation (ITAR) Export Administration Regulations (EAR) The “Farewell Dossier”: a model for effective counter operations Wassenaar Arrangement The Obama Administration Naming and shaming Foreign Investment Risk Review Modernization Act (FIRRMA) 2019 John S. McCain National Defense Authorization Act (NDAA) DOJ China Initiative Australia Europe Notes Bibliography Standards Policy Scrutiny Coordination Outreach Penalties Academic Growth Notes Conclusion Appendix: glossary of terms Index