Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/4591
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChad Dacus-
dc.contributor.authorCarl (Cj) Horn-
dc.date.accessioned2022-05-05T20:07:17Z-
dc.date.available2022-05-05T20:07:17Z-
dc.date.issued2022-05-05-
dc.identifier.citationPublished--Unlimited Distributionen_US
dc.identifier.urihttps://dair.nps.edu/handle/123456789/4591-
dc.descriptionExcerpt from the Proceedings of the Nineteenth Annual Acquisition Research Symposiumen_US
dc.description.abstractThrough cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is better protected from China’s sophisticated hackers. We call for selective interventions in nascent industries—especially those with important implications for national defense. U.S. policymakers must consider both the supply and demand aspects of the “market” for intellectual property theft to make informed decisions as to how to steer resources. This paper offers insight that the supply side of the equation has been given relatively short shrift. We offer a spectrum of potential interventions to address underinvestment in cybersecurity leading to IP theft and discuss where to go from here.en_US
dc.description.sponsorshipAcquisition Research Programen_US
dc.language.isoen_USen_US
dc.publisherAcquisition Research Programen_US
dc.relation.ispartofseriesAcquisition Management;SYM-AM-22-078-
dc.subjectUSTRANSCOM Acquisition (US)en_US
dc.subjectIntellectual Propertyen_US
dc.subjectCybersecurityen_US
dc.subjectIndustrial Policyen_US
dc.titleDefensive Industrial Policy: Cybersecurity Interventions to Reduce Intellectual Property Theften_US
dc.typeTechnical Reporten_US
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File Description SizeFormat 
SYM-AM-22-078.pdfProceedings538.91 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.