China\'s Quest. The History of the Foreign Relations of the People\'s Republic of China - John Garver

(Steven Felgate) #1

848 { Notes to pages 697–706


2006, pp. 1–13. Mark Liang, “Chinese Patent Quality: Running the Numbers and Possible
Remedies,” John Marshall Review of Intellectual Property Law, no. 478 (2012), available at
http://repository.jmls.edu/cgi/viewcontent.cgi?article=1282&context=ripl. “Patents, Yes;
Ideas, Maybe,” The Economist, October 14, 2010.


  1. Nicholas Eftimiades, Chinese Intelligence Operations, Annapolis, MD:  Naval
    Institute Press, 1994.

  2. “China’s Cyber Activities that Target the United States,” 2009 Report to Congress
    of the U.S.-China Economic and Security Review Commission, 111th Congress, 1st
    Session, November 2009, Washington, DC:  US Government Printing Office, 2009,
    pp. 167–83. Josh Rogin, “The Top 10 Chinese Cyber Attacks (That We Know Of ),” The
    Cable, Foreign Policy, January 22, 2010, available at http://foreignpolicy.com/2010/01/22/
    the-top-10-chinese-cyber-attacks-that-we-know-of/. Brian Prince, “McAfee:  Night
    Dragon Cyber-Attack Unsophisticated but Effective,” IT Security and Network Security
    News, February 10, 2011, available at http://www.eweek.com/c/a/Security/McAfee-N
    ight-Dragon-Cyber-Attack-Unsophisticated-But-Effective-303870. Sean Noonan,
    “China and Its Double-edged Cyber-sword,” Stratfor, December 9, 2010, available at
    https://www.stratfor.com/weekly/20101208-china-and-its-double-edged-cyber-sword.
    Seymour M. Hersh, “The Online Threat,” Ne w  Yo rk e r, November 1, 2010. James Glanz,
    “Vast Hacking by a China Fearful of the Web,” New York Times, December 5, 2010. John
    Markoff, “Researchers Spy on Computer Spies, Tracing Data Theft to China,” New York
    Times, April 6, 2010. Mandiant Intelligence Center Report, February 2013, available at
    http://intelreport.mandiant.com/.

  3. “Indigenous Innovation and Intellectual Property Rights,” 2011 Report to Congress
    of the U.S.-China Economic and Security Review Commission, 112th Congress, 1st Session,
    November 2011, Washington, DC: US Government Printing Office, 2011, pp. 70–87.

  4. “China’s 12th Five-Year Plan and Technology Development and Transfer to China,”
    2011 Report to Congress, pp.  88–103. James McGregor, China’s Drive for ‘Indigenous
    Innovation’:  A  Web of Industrial Policies, Global Intellectual Property Center, Global
    Regulatory Cooperation Project US Chamber of Commerce, n.d. [2010], available at
    https://www.uschamber.com/sites/default/files/legacy/reports/100728chinareport_0.pdf.

  5. World Development Indicators.

  6. Bob Davis, “How China Chases Innovation,” Wall Street Journal, September
    30, 2013.

  7. Dan Breznitz and Michael Murphree, Run of the Red Queen:  Government,
    Innovation, Globalization, and Economic Growth in China, New Haven: Yale University
    Press, 2011.

  8. Galina Hale, Bart Hobijin, “The U.S. Content of ’ ‘Made in China,’ ” FRBSF [Federa l
    Reserve Bank of San Francisco] Economic Letter, August 8, 2011.


Chapter 26. Reassuring and Unnerving the Neighbors: Japan


  1. Regarding Japan’s post–Cold War defense strategy and posture, see Reinhard
    Drifte, Japan’s Security Relations with China since 1989: From Balancing to Bandwagoning?,
    London: Routledge, 2003. Richard J. Samuels, Securing Japan: Tokyo’s Grand Strategy and
    the Future of East Asia, Ithaca, NY: Cornell University Press, 2007.

  2. Wen-chung Liao, China’s Blue Waters Strategy in the 21st Century, Chinese Council
    of Advanced Policy Studies, September 1995, Taipei, Taiwan.

Free download pdf