English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109948/140897 (78%)
Visitors : 46087637      Online Users : 1227
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/119958


    Title: 網路戰與國家安全 —以美國網際空間策略為例
    Cyber Warfare and National Security - US Cyberspace Strategy
    Authors: 莊凱婷
    Chuang, Kai-Ting
    Contributors: 姜家雄
    Jiang, Jia-Xiong
    莊凱婷
    Chuang, Kai-Ting
    Keywords: 網路戰
    網際空間
    國家安全
    網路作戰
    網路衝突
    網路力
    Cyber warfare
    Cyberspace
    National security
    Network operation
    Cyber conflict
    Cyber power
    Date: 2018
    Issue Date: 2018-09-03 16:00:00 (UTC+8)
    Abstract: 網路空間(Cyberspace)是由網際網路(Internet)所構連而成的虛擬空間,網路力(Cyber Power),係指在網際空間中的權力,而網路戰爭(Cyber Warfare)則是在這空間所發生的戰爭,國際社會對於網際空間所發生的網路戰爭定義不一,網路戰為一種威懾性較強的作戰方式,不論是金融體系、媒體或是重大公共設施,均可透過網際空間,殲敵於瞬間。網路戰是一種低損耗、高效能的力量,可以最小犧牲獲得最大效益。國家或是組織將透過網際空間將使其軍事力量得到極強的優勢。儘管現今的戰爭型態已不同於過往,戰爭的目的仍是要求得勝利,即使隨著戰爭型態的不同而在戰略的決策上有所差異,這些策略的考量卻都會直接影響問題解決的效率。
    網際網路深入日常生活,將一切串聯成高度便利性的環境的同時,也將個人、團體、國家等安全成正比例地高度暴露。網際空間漸被各國定義為新興戰場,這個虛擬空間與實體空間的緊密鏈結,正隨著科技快速發展與散播,促成權力快速擴散,帶給全球權力平衡強大的衝擊。
    本論文將探討自網路空間發展以來,網路戰與國家安全的關係為何?並以美國網際空間策略為探討案例,以了解在高科技與複雜環境下,身為世界主要強權的美國如何因應國家安全與民主自由的衡量權重,在頻繁不斷的網路衝突中,如何維持國家安全又能避免引發毀滅性的實體軍事戰爭。
    Cyberspace is a virtual space built by the Internet. Cyber Power refers to power in cyberspace, while Cyber Warfare is In the wars that take place in this space, the international community has different definitions of cyber warfare in cyberspace. Cyber warfare is a deterrent mode of warfare, whether it is the financial system, the media, or major public facilities. Through the cyberspace, you are enemies in an instant. Cyber warfare is a low-loss, high-performance force that can achieve maximum benefit with minimal sacrifice. The state or organization will give its military strength a strong advantage through cyberspace. Although today`s war patterns are different from the past, the purpose of war is still to demand victory. Even if there are differences in strategic decision-making with different war patterns, the consideration of these strategies will directly affect the efficiency of problem solving.
    The Internet is deeply rooted in daily life, and everything is connected in a highly convenient environment. At the same time, individuals, groups, countries and other security are highly exposed in a proportional manner. The cyberspace is gradually defined by countries as an emerging battlefield. The tight link between this virtual space and the physical space is rapidly spreading and spreading with technology, which promotes the rapid spread of power and brings a powerful impact on the global balance of power.
    This paper will explore the relationship between cyber warfare and national security since the development of cyberspace. The US cyberspace strategy is used as a case study to understand how the United States, as the world’s major power, responds in high-tech and complex environments. The weight of national security and democratic freedom, in the frequent cyber conflicts, how to maintain national security and avoid devastating physical military wars.
    Reference: 一、中文部分

    【專書】
    包宗和等。《國際關係辭典》。台北:五南出版社,2009年。
    何清漣。《霧鎖中國》。台北:黎明文化,2007年。
    李宗勳。《網路社會與安全治理》。台北:元照出版社,2008年。
    李靜宜譯。約瑟夫‧奈伊(Joseph S.Nye)。《權力大未來》,台北:天下遠見出版股份有限公司,2011年。
    周效坤、楊世松主編。《信息反恐戰》。北京:軍事科學出版社,2005年。
    洪淑貞、王尉慈翻譯,布蘭‧克拉克(Blane Clark)、丹尼‧莫非(Dennis M. Murphy)。《資訊戰入門》。八德市:國防大學,2010年。
    郭建中譯,約翰‧J‧菲亞卡(John J. Flalka)。《另一種形式的戰爭》。台北:海鴿文化,1997年。
    翁明賢等。〈第十四章中國解放軍的信息戰略〉,《新戰略論》。台北:五南出版社,2007年8月。
    崔國平等。《沒有硝煙的戰線》。北京:兵器工業,1998年。
    張建邦、林中斌著。《2010中共軍力評估》。台北:未來書城,2002年。
    國防部史政室譯,里‧阿米斯德(Leigh Armistead)編。《資訊作戰—以柔克剛的戰爭》。台北:國防部史政編譯室,2008年。
    傅凌譯,愛文托佛勒等作。《新戰爭論》,台北:時報文化,1994年。
    楊南芳等譯,瑟勞賽維茲(Carl Von Clausewitz)。《戰爭論》Vom Kriege,台北:貓頭鷹出版社,2001年。
    楊惠娟譯,James Glen Stovall。《網路新聞學:新媒體的運用實務與展望》。台北:五南出版社,2006年。
    楊暉翻譯,麥克爾‧奧漢隆。《技術變革與未來戰爭》。北京:軍事誼文,2009年。
    溫世仁。《九一一之後的世界》。台北:麥田,1998年。
    寧凌、張懷璧、于飛等。《戰略威懾》。北京:軍事誼文,2010年。
    寧凌、張懷璧、李永豐等。《聯合特戰》。北京:軍事誼文,2010年。
    壽曉松、徐經年主編。《軍隊應對非傳統安全威脅研究》。北京:軍事科學出版社,2006年。
    劉錦翔。〈次世代網路對網路戰之影響〉。《前瞻國軍對次世代網路之應用》。台北:國防大學管理學院,2010年。
    劉繼賢。《創新發展的軍事指導理論》。北京:軍事科學出版社,2008年。
    蔡秉松譯,美國陸軍戰爭學院主編。《國家安全議題指導(第1輯)戰爭及戰爭理論》。桃園縣八德市:國防大學,2010年。
    蔡翼等。《崛起東亞》。台北:勒巴克顧問,2009年。

    【期刊論文】
    李育慈譯,Keith B. Alexander。〈網際空間作戰之道〉。《國防譯粹》,38卷8 期,2010年8月,頁37-42。
    周敦彥譯,Willam E. Leigher。〈探究網際空間作戰〉。《國防譯粹》,38卷8期,2010年8月,頁29-36。
    袁平譯,Williams, T. Brett。〈網際空間作戰的十大論點〉。《國防譯粹》,38卷8期,2010年8月,頁4-17。
    張中勇。〈美英反恐評估與對策〉。《戰略安全研析》,2007 年9月,頁22-24。
    張中勇。〈國家關鍵基礎建設防護之概念與實踐〉。《戰略安全研析》,2009年5月,頁37-41。
    曾令權譯,Robert L. Caslen Jr. and Charles A. Flynn。〈卓越任務指揮中心〉。《國防譯粹》,38卷8期,2011年8月,頁77-81。
    黃啟文譯,Balne R. Clark作。〈以資訊戰作為武裝衝突嚇阻手段〉。《國防譯粹》,37卷12期,2010年12月,頁57-63。
    鄒道勻。〈網路社群媒體的發展與影響—以突尼西亞、埃及民主革命為例〉。《軍事社會科學專刊》,第九期(上冊),2011年12月,頁253-279。
    齊珮文譯,James M.Dubik。〈資訊化時代的幹部訓練〉。《國防譯粹》,37卷4期,2010年4月,頁33-40。
    劉慶順譯,Stephen W. Korns。〈網路作戰之新制衡政策〉。《國防譯粹》,36卷10期,2009年10月,頁43-50。
    歐冠宇譯,B. Tom Gjelten作。〈網路和平亦或網路自由-探究網路「限武」之爭〉。《國防譯粹》,38卷8期,2011年8月,頁43-50。

    【網際網路專文】
    “GCHQ",《IT Law Wikia》。http://itlaw.wikia.com/wiki/GCHQ (檢閱日期2012/5/25)
    〈印度欲建1.5萬人網軍,攻防目標直指中巴〉,《華夏經緯網》。http://big5.huaxia.com/js/jswz/2008/00803123.html(檢閱日期2012/4/18)
    〈物聯網〉,《維基百科》。http://zh.wikipedia.org/wiki/%E7%89%A9% E8% 81% 94%E7%BD%91(檢閱日期2012/5/15)
    〈紅旗演習〉,《維基百科》 http://zh.wikipedia.org/wiki/%E7%B4%85 %E6%97%97%E6%BC%94%E7%BF%92 (檢閱日期2012/5/24)
    〈英國秘密情報局〉,《維基百科》。http://zh.wikipedia.org/wiki/%E8%8B%B1%E5%9C%8B%E7%A7%98%E5%AF%86%E6%83%85%E5%A0%B1%E5%B1%80 (檢閱日期2012/5/25)
    〈微軟公司切斷伊朗古巴朝鮮等5國MSN服務〉,《五朝網絡》。http://tc.wangchao.net.cn/hi/detail_19472.html(檢閱日期2012/5/14)
    〈網路戰- 各國網路軍備概覽〉,《百度百科》。http://www.hudong.com/wiki/%E7%BD%91%E7%BB%9C%E6%88%98 (檢閱日期2012/4/18)
    〈網路戰〉,《互動百科》,http://www.hudong.com/wiki/%E7%BD%91%E7%BB%9C%E6%88%98(檢閱日期2012/4/18)
    〈殭屍電腦〉,《維基百科》http://zh.wikipedia.org/wiki/%E5%96%AA%E5 %B1%8D%E9%9B%BB%E8%85%A6(檢閱日期2012/5/14)
    〈邏輯炸彈〉,《維基百科》http://zh.wikipedia.org/wiki/%E9%82%8F%E8% BC%AF%E7%82%B8%E5%BD%88(檢閱日期2012/5/15)
    吳金雄。〈駭客入侵與網路安全〉,《海軍軍官學校》。https://www.google.com.tw/search?sourceid=navclient&aq=f&oq=2002%E5%B9%B4+%E5%A5%A7%E8%96%A9%E7%91%AA+%E5%8F%B0%E7%81%A3+%E7%B6%B2%E8%B7%AF%E6%94%BB%E6%93%8A&hl=zh-TW&ie=UTF-8&rlz=1T4GGHP_zh-TWTW448TW449&q=2002%E5%B9%B4+%E5%A5%A7%E8%96%A9%E7%91%AA+%E5%8F%B0%E7%81%A3+%E7%B6%B2%E8%B7%AF%E6%94%BB%E6%93%8A&gs_upl=0l0l1l38342lllllllllll0 (檢閱日期2012/5/14)
    李華。〈美空軍提高網路戰能力〉,《求是理論網》。http://big5.qstheory.cn/gj/gjgc/201111/t20111122_125275.htm
    楊望,〈SANS ISC建立開放的響應合作機制〉,《中國教育和科研計算機網》,http://www.edu.cn/agencies_7959/20090414/ t20090414_372349.shtml(檢閱日期2012/5/14)
    楊曉軍編。〈泛在網絡〉,《中國電子報》 http://www.people.com.cn/GB/64007/113340/113373/6691931.html(檢閱日期2012/4/18)
    楊鐵虎編。〈印軍正式開通“閃光信使”戰略寬帶網〉,《人民網》。http://military.people.com.cn/BIG5/1077/3612120.html (檢閱日期2012/4/18)
    鄭大誠。〈中共網軍的發展與評估〉,《鄭大誠博士部落格》http://tw.myblog.yahoo.com/jw!0RhCSD.LHwIcZmpXnmtWD_6tdQ--/article?mid= 319&prev=306&l=f&fid=6 (檢閱日期2012/5/18)

    二、外文部分
    【專書】
    Ackerman R., "Funding constraints help define Dutch military networks Signal Online, May 2011.
    Benitez J., "Norway increasing its 2013 defense budget, including 30% boost for cyber security", Atlantic Council, 8 October, 2012.
    Buckland B.S., Schreier F, and Winkler TH., "Democratic Governance and the Challenges of Cybersecurity". Geneva Centre for the Democratic Control of Armed Forces.
    Jeffrey Carr, "Inside Cyber Warfare". USA, O’Reilly Media, 2011.
    Chief of Defence of the Republic of Lithuania, "Lithuanian Military Doctrine". 10 March 2010, pp. 21, 50
    Defensiva Linha, "Brazilian Army prepares its CDCiber, the `Cyber Defence Center`". 8 May 2012
    Diniz G. and Muggah R. A Fine Balance: Mapping Cyber (In)Security in Latin America, Instituto Igarapé, 2012, pp. 13-14
    Dutch Ministry of Security and Justice, The National Cybersecurity Strategy: Success Through Cooperation, 2011.
    Eijndhoven D., "Dutch government to design cyber defense doctrine Infosec Island, 27 February 2011
    Eijndhoven D., "Dutch military intelligence dives into cyber". Argent Consulting, 21 May 2012
    Finish Government Communications Unit, "National cybersecurity strategy to be drafted in 2012". press release 16 March 2012.
    Finnish Government Communications Unit, "Cyber security preparedness". press release 8 March 2011.
    Golubev V., "Fighting cybercrime in CIS: strategies and tactics". Computer Crime Research Center, 29 June 2005.
    Grauman B., "Cyber-Security: The Mexed Question of Global Rules, security and Defence Agenda". 2012.
    Grevatt J., "Indonesia to establish cyber-defence unit", IHS Jane`s, 30 November 2012
    Jackson W., "The big target in cyber war isn`t military anymore". GCN, 12 April 2012.
    Krepinevich, Andrew F., "Cyber warfare – A “Nuclear Option”? ", USA,CSBA, 2012.
    Kuehl, Daniel T., "From Cyberspace to Cyberpower", in Franklin D. Kramer, Stuart Starr, and Larry K. Wentz, eds., Cyberpower and National Security, Washington, DC: National Defense University Press, 2009.
    Lewis, James A., Neuneck, Götz, "The Cyber Index : International Security Trends and Realities".United Nations Institute for Disarmament Research,Geneva, Switzerland, New York and Geneva, 2013.
    Stokes Mark and Hsiao L.C. Russell, "Countering Chinese Cyber Operations: Opportunities and Challenges for U.S. Interests". Project 2049 Institute, 2012.
    Norwegian Ministry of Defence, "The Norwegian Long-term Defence Plan summary", 17 April 2012.
    Sommer P and Brown L, "Reducing System Cybersecurity Risk". OECD, 2011.
    Swiatkowska J., "cyber security in Poland ". 2012.
    R A. "Cyberwar: The Next Threat to National Security and What to Do About It". 2010.
    Wendt Alexander, "Social Theory of International Politics". Cambridge University Press ,2012.

    【政府出版品】
    Australia. Cyber Security Strategy, 2009.
    Austrian Federal Ministry of Defence and Sport, Weissbuch 2008, 2009.
    Belarusian Telegraph Agency, "Belarusian army to combat cyber threats", 7 December 2011.
    Brazilian Ministry of Defence, National Strategy of Defence, 2008.
    Canada, Canada`s Cyber Security Strategy, 2010.
    Caruanaa Paul. "Fighting cybercrime in Malta", Cyber Crime Unit Malta, https://www.terena.org/ activities/tf-csirt/meeting13/Cyber-Crime-Malta-Caruana.pdf
    Grauman B. Cyber-Security: The Vexed Question of Global Rules. 2012, Security and Defence Agenda 2012
    Canada. Canada`s Cyber Security Strategy, 2010, p. 29
    Center for Strategic and International Studies, “Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization”, UNIDIR, 2011.
    Computer Network Operations, Joint Publication 3-13, 2006.
    Darmanin E. "National ICT Strategy and Malta Information Technology Agency", Malta Information Technology Agency, 3 June 2011, http://www.comnet. org.mt/wp-content/uploads/2011/06/MITA-Strategic-Plan-COMNET-Legal- Frameworks-for-ICT-Jun2011-v2.pdf
    Dutch National Cyber Security Centre, Cyber Security Assessment Netherlands, 2011;
    Dutch National Cyber Security Centre, Checklist Security of ICS/SCADA Systems, 2012.
    Dutch Ministry of Defence, Defensie cyber Strategie, 27 June 2012, pp. 4, 6, 11
    Dutch Ministry of Security and Justice, The National Cybersecurity Strategy: Success Through Cooperation, 2011, p. 12.
    Estonian Ministry of Defence, Cyber Security Strategy, 2008. P.6.
    Estonian president calls for greater cooperation on cyber defence, Estonian Review, 2, May 2012.
    European Network and Information Security Agency, "Exercises boost cooperation", 13 June 2012.
    European Network and Information Security Agency, France Country Report, 2011, p.10.
    European Network and Information Security Agency, Greece Country Report, 2011, pp.14, 26.
    European Network and Information Security Agency, Hungary Country Report, 2011, pp.16, 25-26.
    European Network and Information Security Agency, Italy Country Report, 2011, p. 9.
    European Network and Information Security Agency, Italy Country Report 2011, pp.9-10
    European Network and Information Security Agency, Latvia Country Report, 2011, p.9.
    Europoin Network and Information Security Agency, Luxembourg County Report, 2011, pp.5, 10-11
    European Network and Information Security Agency, Malta Country Report, 2011, p. 5
    France Network and Information Security Agency, Information System Defence and Security: France’s Stragic, 2011.
    France, The France White Paper on Defence and National Security, 2008, p3
    German Federal Ministry of the Interior, "Cybersecurity Strategy for Germany ". 2011, pp.8-10.
    Georgian Ministry of Defence, Minister’s Vision 2012-2013, 2012.
    Government of Mauritius, The Information and Communications Technologies Act 2001, Legal Supplement of 2010, 5 August 2010.
    High lechnology Crimes Investigation Division, National Police of Peru. "Msson, visión y valores", www.policiainformatica.gob.pe/nosotros.htm
    Hungarian Ministry of Foreign Affiars, Magyarorszag Nemzeti Biztonsagi strategiaja 2012, p.13.
    Indian Ministry of Communications and Information Technology, Discussion Draft on National Cyber Security Policy, 26 March 2011
    Israeli Prime Minister`s Office, "Cabinet approves the creation of the National Cyber Directorate", 7 August 2011.
    Israeli Ministry of ForeignAffairs, "National Cyber Bureau work plan presented", 7 June 2012.Information Office of the State Council of the People`s Republic of China, China`s National Defense in 2010, 2011
    J.A Lewis and K. Timlin, "Cybersecurity and Cyberwarfare: Preliminary Assessment of National Dorctrine and Organization ". UNIDIR, 2011
    Japanese National Information Security Policy Council, The First National Strategy on Information Security, 2006, p. 1
    Japanese National Information Security Policy Council, The Second National Strategy on Information Security, 2009, p.54
    Japanese Ministry of Defence, Defence of Japan 2010, part l, chp. 1, s 3.
    J. Benitez, "Norway increasing its 2013 defense budget, including 30% boost for cyber security", Atlantic Council, 8 October, 2012.
    J. Swiatkowska, ‘cyber security in Poland`, Atlantic Council, 8 October, 2012.
    Lasme H. “Estonia: cyber window into the future of NATO”, Joint Force Quarterly, no.63, 2011.
    Latvian Ministry of Defence, The State Defence Concept: Executive Summary, 2012, pp. 6-7, 9, http://www.mod.gov.lv/Par_aizsardzibas_nozari/Politikas_planosana/ Koncepcijas/~/media/AM/Par_aizsardzibas_nozari/Plani,%20koncepcijas/2012_va_EN.ashx
    Mauritsius. "Republic of Mauritius", CyberCrime Law, 15 July 2003, www.cybercrimelaw. net/Mauritsius.html
    Ministry of National Defence, Vision of the Polish Armed Forces 2030 2008, p. 14
    Moldova Ministry of Foreign Affairs and European Integration, National Security Concept of the Republic of Moldova, www.mfa.gov.md/img/docs/national- security-concept-of-the-RM.doc
    Morocco Ministry, Trade and New Technologies, Digital Morocco 2013. The National Strategy for Information Society and Digital Economy, 2009, p. 22
    Moldova National Participation Council, "National Security Strategy went into force", 17 October 2011, www.cnp. md/en/working-groups/foreign-security-and-defense-policy/stiri/item/568-strategia-securit % C4 % 8396C8 % 9Bii - na % C8 % 9Bionale-a-intrat-%C3% AEn-vigoare
    NATO launches cyber defence centre in Estonia. Agence France-Presse 14 May 2008.
    New Zealand Defence Force, Statement of Intent 2011-2014, pp. 12, 16.
    Norwegian Ministry of Defence, "The Norwegian Long-term Defence Plan summary", 17 April 2012.
    Parliament, Directorate-General for External Policies. Policy Department cybersecurity and Cyberpower concepts, Conditions and us European capabilities for Cooperation for Action within the EU, 2011, p. 5
    Peru National Office of Electronic Government and Information, http://www.peru. gob.pe /pecert /label .html
    Peru National Office of Electronic Government and Information Technology, "Quienes somos", www.ongei gob.pe/quienes/ongei_ QUIENES.asp.
    Polish Ministry of National Defence, Defence Strategy of the Republic of Poland, 2009, p. 5.
    Prime Minister`s office of Finland. Finnish Security and Defence Policy 2009, 2009, p. 93
    Qatar Supreme Council of Information and Communication Technology, National ICT Plan 2015: Advancing the Digital Agenda.
    Republic of Peru, Resolución Ministerial No 129-2012-PCM, 23 May 2012. http://www.pcm.gob.pe/ normaslegales/2012/RM-129-2012-PCM.pdf The Decree of the Minister of Communication and Information Technology number 26/PER/M.KOMINFO/5/2007 on Securing the Making Use of Internet Protocol Based Telecommunication Network.

    【期刊論文】
    Anand V. "Integrating the Indian military: retrospect and prospect", Journal of Defence Studies, Vol. 2, no. 2, 2008, pp.37
    APCERT Secretariat, APCERT Annual Report 2011, 2011, p. 169.
    Ashton W. "Burma receives advances from its silent suitors in Singapore", Jane`s Intelligence Review, 1 March 1998, p.114.
    "Benelux sign memorandum of understanding on cybersecurity", European Urban Knowledge Network, 12 April 2011, pp.15-17.
    Camillo E Di, Miranda V, and Felician S. "Cyber-Security: Europe e Italia", Osservatorio di politica internazionale, no. 32, 2011, pp.33-44.
    Colombian Ministry of Defence, Ciberseguridad y Ciberdefensa: Una Primera Aproximacion. 2009, pp.12-24.
    "China calls for tightened information security measures", xinhua, 18 July 2012, p11-21.
    "Europe". The Military Balance 2011, International Institute for Strategic Studies, 2011
    G. Diniz and R. Muggah, A Fine Balance: Mapping Cyber (In) Securtiy in Latin America, Igarape Institute and the SeeDec Foundation, 2012, pp.14.
    General Assembly. Developments in the Field of Information and Telecommunications in the Context of International Security: Report of the Secretary-Ceneral, UN document /64/129, 8 July 2009, pp. 7, 9.Ian Buruma. "China in cyberspace ". The New York Review of Books 46.17 (Nov 4, 1999): pp.9-12.
    General Assembly. Developments in the Field of Information and Telecommunications in the Context of International Security: Report of the Secretary-General, Addendum, UN document A/66/152/Add.1, 16 September 2011, pp. 6-7.
    General Assembly, Developments in the Field of Information and Telecommunications in the Context of International Security: Report of the Secretary-General, UN document A/65/154, 20 July 2010, p. 9.
    International Crisis Group, "Burma/Myanmar: How Strong is the Military Regime? ", ICG Asia Report no, 11, 21 December 2000
    Isaacs S. "ICT in education in Madagascar", Survey of ICT and Education in Africa: Madagascar Country Report, World Bank, 2007, pp.77
    Italian Ministry of Economic Development, "Cyber Italy 2012: prima esercitazione nazionale sulla sicurezza informatica", 19 June 2012.
    Jamaica Communication Forensics and Cybercrime Unit, Project Proposal for CFCU 2012, p. 1
    Kelly S. and Cook S. (eds.). Freedom on the Net 2011. "A Global Assessment of Internet and Digital Media", Freedom House, 2011 pp. 214-223.
    Laruelle M.. "Cybersecurity in Central Asia: real issues, false excuse?", Central Asia Policy Brief, no. 2, Elliot School of International Affairs, 2012, p. 3.
    Lewis J.A and Timlin K. "Confidence and international agreement in cybersecurity", Disarmament Forum, no. 4, 2011, pp 51.
    Nye J.S. Cyber Power, Belfer Center for Science and International Affairs, 2010, pp1.
    Ortiz J.U. “Argentina: the challenge of information operations”, IO Shphere, Specical edition 2008: pp 61-62.
    Pham, "Cyber security: do your part!", The Maple Leaf, vol. 15, no. 2, 2 "Canada", in The Military Balance 2012, International Institute for Strategic Studies, 2012, pp. 53
    "Policies and practices on network MIIT", Asia-Pacific Economic Cooperation Workshop on Cybersecurity Policy Development in the APEC Region, 27 March 2011.
    Robins Bill. “The Next World War: The Warriors and Weapons of the New Battlefields in Cyberspace”, RUSI Journal144.6, Dec 1999: 96.
    Stokes Mark A. and L.C. and Hsiao Russell. "Countering Chinese Cyber operations: Opportunities and Challenges for U.S. Interests” , Project 2049 Institute, October 29, 2012, p23-25.
    Schneier Bruce. "In War Against Cyberspace Intruders, Knowledge Is Power", InternetWeek 866, 2001, pp. 25.
    Tabansky L. cal infrastructure protection against cyber threats", Military and Strategic Affairs, vol. 3, no. 2, p. 72.
    Walker B. Basely. "Transparency and confidence-building measures in cyberspace: towards norms of behavior ". Disarmament Forum, no. 4, 2011, p33-35.
    Weitz R.. "Astana backs wider SCO regional role", Eurasia Daily Monitor, vol. 9, no. 120, 25 June 2012.
    Zanders J.-P, Institute Report. Seminar on Cyber Security: What Role for CSP? European Union Institute for Security Studies, 10 March 2009, p124-126.

    【報紙雜誌】
    BBC News. "Internet pioneer Robert Taylor Dies", BBC News Technology, www.bbc.co.uk., April 17, 2017. Accessed on April 20, 2017.
    BBC News. "UK and Kuwait to announce security partnership", BBC, 28 November 2012.
    Comez, K. "Workshop Panama Prevention Headquarters Cyber Security Incident ", RED GEALC, 24 November 2011.
    Daily Nation News. "Kenya signs MoU to boost cyber-security", Daily Nation, 27 February 2012.
    Daily Nation News. "Kenya signs MoU to boost cyber-security", Daily Nation, 27 February 2012.
    Domnitskaya M. "CSTO to combat cyber crime", The Voice of Russia, 16 August 2011.
    Economic Times News. "Indian Navy to have information technology cadre", Economic Times, 12 July 2012.
    Euronews. "Iranian cyber police on web patrol", Euronews, 24 January 2011. http://www.euronews.com/2011/01/24/iranian-cyber-police-on-web-patrol
    Gen. Lorenz, Stephen R. “Lorenz on Leadership -- At War in Cyberspace” , US Fed News Service, Including US State News, Washington, D.C., 23 Dec 2008. Accessed on May 20, 2012.
    Goetz J., Rosenbach M., and Szandar A. "War of the future: national defence in cyberspace", Speigel Online, 11 February 2009.
    Gulf News. "Iran`s cyber police to keep checks on internet use", Gulf News, 24 March
    Jakarta Post. "RI, Australian police to fight cyber crime", Jakarta Post, 1 July 2011.
    Joseph. “India to add muscle to its cyber arsenal”, Times of India, 11 June 2012.
    Knoke F. " Nationales Abwehrzentrum: De Maiziere preist neue Cyber-Zentrale", Speigel Online, 23 February 2011.
    Jain B. “Final touches to cyber security controller in National Security Council”, News Track India, 7 November 2012.
    Lasar M. "Japan has national botnet warriors; why don`t we?", Ars Technica, 21 October 2010.
    Mader G. Austria unveils new security doctrine amid neutrality concerns", Jane`s Defence Weekly, 8 March 2011
    Mathieson DS. "Book review: Strength and Dishonor: Building the Tatmadaw by Maung Aung Myoe", Asia Times, 4 July 2009.
    McCartan B. "Myanmar on the cyber-offensive", Asia Times, 1 October 2008
    Miadhu News. "Maldives Police Service launches cyber crime project", Miadhu, 20 May 2008.
    Miadhu News. "Development of Cyber-crime Department in progress", Miadhu, 26 June yer G. "Norway drafts cyber defense initiative Defence News 27 January 2010
    Mizokami K. "New Japan Self Defense Force initiatives on amphibious warfare. Global Hawk, cyber-terrorism", Japan Security Watch, 28 August 2012.
    O`Dw Jorio L. "Cleaning up Switzerland`s internet sites ", swissinfo.ch, 4 September 2012.
    Olwan R. "New cyber crime law in Jordan", olwan.org, 13 August 2010.
    Oren A. "IDF dependence on technology spawns whole new battlefield", Haaretz, 3 January 2010
    Pandit R. "Army gearing up for cyber warfare" , Times of India, 7 July 2005.
    Perry D. "Austria hires 1600 soldiers for `cyber security", Tom`s Guide, 5 May 2011. Security Technology News.
    Richardson H. "Brazil raises cyber defence game", [it] decisions, 15 June 2011
    Security Technology News. "Iran mobilises cyber hacking army", Security Technology News, 15 March 2011J.
    Smith B. Chapman. "New research centre to boost NZ cybersecurity", New Zealand Herald, 25 September 2012.
    Singh H. and Philip J. Thomas. “Spy game: India readies cyber army to hack into hostile nations’ computer systems”, Economic Times, 6 August 2010 Chazal M. "Local cybercrime centre to serve region", Jordan Times,16 February 2011.
    Sitaula B. "Nepali Police forge ahead to curb cyber crime", People`s Daily Online, 25 January 2010.
    Tanjug News. "Dacic advocates cooperation against cyber crime", Tanjug, 13 September 2012.
    The Daily Star News. "Lebanon to bolster measures against electronic crimes", The Daily Star, 25 September 2012.
    Times of India News. Cyber security panel high on India’s agenda, Times of India, 16 October 2012.
    Weisgerber M. "Japan, U.S. to expand missile defense", cyber cooperation Defense News, 21 June 2011.
    Xinhua News. "India developing cyber defense program", Xinhua, 4 May 2012
    Xinhua News. "Iran`s armed forces to launch `cyber command`: commander", Xinhua, 15 June 2011.
    Ya`ar C. "Gov`t establishes dual cyber security program", Arutz Sheva, 1 November was 2012
    Zaw A. "Than Shwe`s ‘The Art of War’", The Irrawaddy, 1 April 2009

    【網際網路專文】
    Arabian Conference on Information and Communications Security, "Recommendation the Second Arabian Conference on Information and Communications Security September 24-25, 2012", http://www.acics.com.kw/ final % 20re.html
    Australian Defence signals Directorate, "csoc-cyber Security operations Centre", www.dsd.goy.au/infosec/osoc.htm.
    Australian Department of Broadband, Communications and the Digital Economy, "Internet service providers sign up to icode", www.staysmartonline.
    Azam,M. "Cybersecurity regime in Pakistan, still a lot to be done!", Propakistani 17 January 2011, http://propakistani.pk/2011/01/17/cyber-security-regime-in- pakistan-still-a-lot-to-be-done
    Belarusian Ministry of Defence, "The military doctrine of the Republic of Belarus", chp. 2, www.mod.mil.byldoktrina eng.html.
    Brian Stelter, Evan Perez and Pam Brown ,“U.S. set to blame North Korea for Sony hack”, @CNNMoney December 18, 2014 http://money.cnn.com/2014/12/17/media/ the-interview-sony-theater-owners/index.html?sr=gp121714theinterviewrelease530p VODtopNewsLinkMoney. Accessed on December 20, 2014.
    Canadian Security Intelligence Service, "Our priority areas" www.csis. gc.ca/preys/index-eng.asp.
    CERT Australia, “About us", www.cert.gov.au/about.gov.au/news/newsarticles/regular/ internet service providers sign up to icode.
    Communications Commission of Kenya, "Functions of the KE-CIRT/CC", http://www.Cck.go.ke/ industry/information_security/ke-cirt-cc/funxtions,html.
    Croatian Security and Intelligence Agency, “About Security and Intelligence Agency”. www.soa.hr/en/dos/about _us
    Cuban Ministry of The Revolutionary Armed Forces, Doctrina Miliar Cuban. www. cubagob.cu/otras_i…/minfar/doctrina/doctrina_militar.htm: and Cuba, “Preparacion para la defensa”,www.cubagob.cu/ortas_…/mondar/colegio/prepar_defensa.htm;see also” Fighting cyber-attacks is matter of national security: Cuban minister”. Minhua, 25 February 2011.
    Cybersecurity Malays "Corporate information", www.cybersecuritymyen/ about usbrief detail/main/detail/729/findex.html?mytabsmenu=0
    Dutch National Cyber Security Centre, "Services www.ncsc.n/english services.
    Dutch Military Intelligence and Security Service, Annual Report MIVD 2011, 2012 pp. 49-50 57 www.defensie.nl/ stem/handlers general downloadHandler. ashx?filename-/media/jaarverslag mivd 2011 eng tcm46-197882.pdfFiji Police Force, "Cyber crime”www.police.gov.fj/index.php/news/264-cyber-crime.
    Executivebiz."Iranian cyber army second-largest in the world, claims lranian commander", The New New internet, 21 May 2010, p55, 59. http://blog.executivebiz.com/2010/05/iranian-cyber-army-second-largest-in-the-world-claims-iranian-commander/
    Family Online Safety Institute Global Resources Information Directory, "Liechtenstein", 9 August 2011, http://www.fosigrid.org.europe/liechtenstein.
    France Ministry of Defence, “Direction de la Protection et de la Securite de la Defense”, www.defense.gouv.fr/english/portail-defense.
    Gulf News. "Oman unveils cyber-security outfit", Gulf News, 5 April 2010.
    Hamidi Ahmad Zahid. Remarks of Ahmad Zahid Hamidi at the 11th International Institute for Strategic Studies Asia Security Summit, 3 June 2012, www.iiss.org/conferences the-shangri-la-dialogue/shangri-la-dialogue-2012/speeches/fourth-plenary- session/ahmad-zahid-hamidi
    Hamza Security. "Le Maroc se dote de deux instances nationales de sécurité des systèmes d`information`, Hamza Security Blog, 14 November 2011. http://www.hamza.ma/securite-news/le-maroc-se-dote-de-deux-instances-nationales-de-securite-des-systemes-dinformation/
    High lechnology Crimes Investigation Division, National Police of Peru, lechology. Msson, visión y valores", www.policiainformatica.gob.pe/nosotros.htm
    Indian Ministry of Communications and Information Technology, Discussion Draft on National Cyber Security Policy, 26 March 2011; see also India Ministry of Communications and Information Technology, "Cyber security strategy", 7 March 2012, http://deity.go.in/content/strategic-approach.
    India Ministry of Communications and Information Technology, "Cyber security strategy", 7 March 2012, http://deity.go.in/content/strategic-approach.
    InfoMongolia News. "Cyber Security Department to provide the security of the government organizations", InfoMongolia.com, 6 March 2012, http://www.infomongolia.com.
    International Telecommunication Union, ICT Adoption and Prospects in the Arab Region, 2012, p. 61, www.itu.int/dms pub/itu-d/opb/ind/D-IND-AR- 2012-PDF-E.pdf.
    Jacob, M. "Le Maroc a préparé sa stratégie en matière de Cybersécurité" Global Security Mag, October 2009, https://www.globalsecuritymag.fr/Le-Maroc-au coeur-de-la-lutte, 20090930,12977.html.
    Kazakhstan CERT, "KZ-CERT", http://kz-cert.kz/en.
    Kingdom of Saudi Arabia, Bureau of Experts at the Council of Ministers, Anti-Cyber Crime Law (8 Rabi 11428 / 26 March 2007), 1 August 2010, www.saudiembassy.net /announcement/ announcement03260701.aspx.
    Luxembourg for Business, "Luxembourg Conference on Cybersecurity ", 24 November 2011, http://www.investinluxembourg.lu/ict/luxembourg-conference-cybersecurity.
    Malaysia Computer Emergency Response Team, "About us", www.mycert.org. my/en/about/about uWmain/detail 344/index.html
    Malaysian National Security Counci Cyber security awareness among Malaysians", www.mkngovmymkn/default/article_e.php?mod=4&fokus=17
    Malay Mail News. "Malaysia, Morocco partners in cybersecurity", Malay Mail, 27 January 2010.
    Montenegro CIRT, "About us", www.cirt.me/en/about-us.
    Montenegro Ministry for Information Society and Telecommunications, Strategy for Information Society Development in Montenegro from 2009 to 2013, 2009, p. 44, www.gov.me/files/1255505965.pdf.
    Montenegro Ministry of Defence, Draft National Security Strategy, 2008, pp. 7, 13, http://merln.ndu.edu/whitepapers/montenegro National_Security_ Strategy English2008.pdf.
    Morocco News Central. "Morocco, South Korea to boost cooperation in ICT", Morocco News Central, 31 August 2009.
    National Security Council of Georgia, “Cybersecurity”, www.nsc.gov.ge/eng/ Cybersecurity.php.
    NATO News. "NATO and Mongolia agree programme of cooperation", 19 March 2012, https://www.nato.int /cps/en/natolive/news_85430.htm Nazeer A. "Dhiraagu attacks highlight Maldives` cyber crime challenge", Minivan News, 3 January 2011.Hungarian National Cybersecurity Center, “About us”, www.cert-hungary.hu/en/node/6
    NATO launch es cyber defence center in Estonia, Space Way, l4 May 2008, www. spacewar.com/ reports/NATO_launches_cyber_defence centre_in_Estonia _999.html.OAS, "OAS holds regional workshop in Colombia on best practices for cybersecurity and the fight against cybercrime"www.oas.org/jurídico/newsletter/ le_en_19.htm
    OAS CICTE, CICTE`s first cybersecurity program CSIRT held in Brazil", training%20course.asp.
    Painter C. "East Africa workshop to address cyber security", DipNote, July 2011, http://blogs.state-gov/index.php/site/entryleast africa_workshop_cyber security
    Phneah E. "Philippines to set up cybersecurity operations center", ZDNet, 19 November 2012.
    Polish Governmental Computer Security incident Response Team, "About us”, http://cert. gov.pl/portal/ creo/38/77/About _us.html.
    Republic of Peru, Resolución Ministerial No 129-2012-PCM, 23 May 2012. http://www. pcm.gob.pe/normaslegales/2012/RM-129-2012-PCM.pdf
    PRLog. "Cybersecurity centre to open in Portugal", PRLog, 8 March 2012. https://www.prlog.org/11819121-cyber-security-centre-to-open-in-portugal.html
    RESTENA CSIRT, "Welcome to RESTENA-CSIRT", www.restena.lu/csirt
    Rugondihene J. "The issue of cyber security and the level of preparedness in Rwanda", Rwanda Utilities Regulatory Agency, www.rura,gov,rw/EACO/Presentations/Regulators_Assembly/Cybersecurity_rwanda- EACO % 20Congress%20final.ppt
    Sasongko Ashwin. "Cybercrime legislation of Indonesia", presentation by Ashwin Sasongko, Director General of ICT Application, Indonesian Ministry of Communication and Information Technology, at the Octopus Interface Conference, Strasbourg, 23-25 March 2010, http://unpan1.un.org/intradochgroupspublic /documents/UNGCUNPANO404 pdf.
    Sikuka,K. "Southern Africa: region cracks down on cyber crime", All Africa, 12 April 2012. http://allafrica.com/stories/201204120866.html
    United States Trade and Development Agency, "USTDA supports Kenya`s efforts to secure its growing telecommunications infrastructure", 23 September 2011, http://www.ustda.gov/....../2011/SubSaharanAfrica/Kenya/KenyaNationalCyberscurity_ 092311.asp.
    United Nations Economic and Social Commission for Western Asia, National Profile of the Information Society in lebanon, UN document E/ESCWN/ICTD/2011/ 4/Add.1, 15 November 2011.
    Winkel Elizabeth. "Benelux sign memorandum of understanding on cybersecurity", European Urban Knowledge Network, 12 April 2011. http://www.eukn.eu/e-library/project/bericht/eventDetail/benelux-sign-memorandum-of-understanding-on-cyber-security
    Description: 碩士
    國立政治大學
    外交學系戰略與國際事務碩士在職專班
    1009220201
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G1009220201
    Data Type: thesis
    DOI: 10.6814/THE.NCCU.DIPSIS.008.2018.F09
    Appears in Collections:[戰略與國際事務碩士在職專班] 學位論文

    Files in This Item:

    File SizeFormat
    020101.pdf2493KbAdobe PDF21071View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback