Please use this identifier to cite or link to this item:
https://repository.unej.ac.id/xmlui/handle/123456789/59035
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Vira Meisitha, Nadya | - |
dc.contributor.author | Purwanto, Agung | - |
dc.contributor.author | Dwi Eriyanti, Linda | - |
dc.date.accessioned | 2014-08-26T03:37:15Z | - |
dc.date.available | 2014-08-26T03:37:15Z | - |
dc.date.issued | 2014 | - |
dc.identifier.uri | http://repository.unej.ac.id/handle/123456789/59035 | - |
dc.description.abstract | China always gets an accusation related to hacking/cyber attacks on vital sites in the United States. Situations of tension between China and the United States reached the peak when the computer security firm Mandiant. Inc. identified the PLA Unit 61 398 as the perpetrator of cyber attacks against the United States. This means that China is trying to dominate the cyber technology in the sense that China wants to have more capabilities in the areas of cyber technology that cannot be defeated by other countries. Therefore, the aim of this study was to determine the China's motivation to dominate cyber technology. The results showed that China and the United States have the potential to war over the issue of Taiwan, Korea Peninsula, and Diayou Islands as the triggers. It means that the war potentially occurs in China Sea. This motivates China to take over cyber technology as an anticipation of war with the United States in China Sea. | en_US |
dc.publisher | UNEJ | en_US |
dc.relation.ispartofseries | Artikel Ilmiah Hasil Penelitian Mahasiswa; | - |
dc.subject | China | en_US |
dc.subject | United States | en_US |
dc.subject | cyber technology | en_US |
dc.subject | PLA Unit 61398 | en_US |
dc.subject | China Sea | en_US |
dc.title | Motivasi China Menguasai Cyber Teknologi | en_US |
dc.type | Article | en_US |
Appears in Collections: | SRA-Social And Politic |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Nadya Vira Meisitha.pdf | 323.22 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.