English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109948/140897 (78%)
Visitors : 46098889      Online Users : 749
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 傳播學院 > 新聞學系 > 學位論文 >  Item 140.119/112141
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/112141


    Title: 恐怖組織「伊斯蘭國」(Islamic State) 傳播策略之研究
    The communication strategies of terrorist organization – A case study of Islamic State(IS)
    Authors: 李毓珊
    Lee, Yoke San
    Contributors: 張京育
    Chang, King Yuh
    李毓珊
    Lee, Yoke San
    Keywords: 伊斯蘭國
    傳播策略
    恐怖主義
    恐怖組織
    恐怖行銷
    Islamic State
    Communication strategies
    Terrorism
    Terrorist organization
    Terror marketing
    Date: 2017
    Issue Date: 2017-08-28 11:21:16 (UTC+8)
    Abstract: 伊斯蘭國2014年6月悍然宣佈建立「哈里發國」後,在短短數年內竄升成為當前最危險、最富有、最具影響力與知名度的恐怖組織,更被聯合國安理會認定為「國際和平與安全面臨前所未有的全球性威脅」。然而,伊斯蘭國並非一群僥倖得逞的暴徒,而是透過各種策略性手段急遽壯大的恐怖強敵。精準的傳播策略是伊斯蘭國快速崛起的重要因素,通過專業與系統性的宣傳機制,特別是社群媒體的運用,成功獲得全球各地的年輕人對組織的認同與支持,繼而加入和移居伊斯蘭國。

    本研究認為,伊斯蘭國的傳播策略與內容主要可分成三大部分:宗教理念與政治訴求的宣傳、對敵對勢力或異教徒的恐嚇威脅,以及吸引外籍人士加入或移居伊斯蘭國。伊斯蘭國通過官方雜誌、自製視頻和社群媒體等多種宣傳管道,宣揚恐怖主義思潮,同時散播恐懼氛圍和塑造社會輿論,進一步擴大組織影響力。

    面對伊斯蘭國的壯大與極端思維的滲透,除了關注其發起的恐怖行動,更需警惕其意識形態的傳播,因此有必要深入探究其傳播策略的實施與運用,瓦解伊斯蘭國在宣傳戰上的優勢地位,遏止該組織繼續擴張。
    In June 2014, Islamic State (IS) formally declared the establishment of “Caliphate” and had become the richest, most dangerous, most influential and well-known terrorist organization in just a few years. At the same time, United Nations Security Council had determined that IS constituted an “unprecedented threat” to international peace and security. However, IS is not a group of “lucky” thugs, but a strong enemy of terror that grows rapidly through a variety of strategic means.

    The effective communication strategies play an important role in the rise of IS. Through the professional and systematic publicity mechanism, especially the use of social media, IS had gained the recognition and support of the youths around the world, as well as the immigration to the regions that controlled by IS.

    This study assumes that the communication strategies and media content of IS can be divided into three parts, which include the propaganda of religious concept and political appeal, the intimidation and threat to hostile forces or Infidel, and the attraction for foreign fighters of joining and immigrating to IS.

    As the expansion of IS and the infiltration of extreme ideology is getting serious nowadays, it is more vigilant to the spread of extreme ideology in addition to concern about the terrorist acts. Thus, it is necessary to discuss further about the implementation of its communication strategies so that the anti-terrorism alliance can collapse the dominance of IS in the propaganda war and impede IS from the continuous expansion.
    Reference: 一、 網絡資料
    三立新聞網,2015,〈回不了家!IS宣傳海報模特 想逃卻被鐵鎚活活打死〉。http://www.setn.com/News.aspx?NewsID=108728,取用日期:2017年7月7日。
    王金雪,2004,〈安理會通過反恐新決議 恐怖主義定義爭論激烈〉。人民網,http://people.com.cn/BIG5/guoji/14549/2907632.html,取用日期:2017年2月19日。
    王衛星,2000,〈早熟的戰爭 晚熟的和平 20世紀,在戰爭中等待和平(軍情展望)〉。環球時報,http://www.people.com.cn/BIG5/paper68/2332/367664.html, 取用日期:2016年12月20日。
    中國新聞網,2015,〈日本13歲男孩遭殺害 媒體稱兇手或受IS視頻影響〉。http://www.chinanews.com/gj/2015/02-27/7085004.shtml, 取用日期:2017年7月7日。
    中國新聞網,2016,〈部分法媒不再刊登恐怖分子照片:不給其「出名」機會〉。http://www.chinanews.com/gj/2016/07-28/7954300.shtml,取用日期:2017年4月23日。
    自由時報,2016,〈反制IS網路戰 歐巴馬政府邀蘋果、FB組正義聯盟〉。http://news.ltn.com.tw/news/world/breakingnews/1612762, 取用日期:2017年7月12日。
    何秉松,2007,〈現代恐怖主義演進之研究〉,《國政研究報告》。http://www.npf.org.tw/2/992 ,取用日期:2016年5月30日。
    李佳恒,2016,〈為阿富汗「量身打造」宣傳策略 伊斯蘭國跨足廣播電台〉。風傳媒,http://www.storm.mg/article/79538, 取用日期:2017年7月2日。
    周戎,2015,〈從「伊斯蘭國」看恐怖主義背後的宗教訴求〉。學習時報,http://dzb.studytimes.cn/Shtml/xxsb/20150817/13831.shtml, 取用日期:2017年7月9日。
    東森新聞雲,2017,〈漂亮幼園老師深信「IS是真諦」 星國以激進思想逮捕她〉。http://www.ettoday.net/news/20170613/943874.htm, 取用日期:2017年7月9日。
    新浪軍事,2014,〈美通過社交媒體對「伊斯蘭國」 發動網宣反擊戰〉。http://mil.news.sina.com.cn/2014-09-08/1350799623.html, 取用日期: 2017年7月12日。
    新浪財經,2015,〈互聯網中立原則在恐怖主義威脅下的道德困境〉。https://finance.sina.cn/usstock/hlwgs/2015-11-20/tech-ifxkwuwx0250163.d.html?vt=4&cid=76556,取用日期: 2017年7月5日。
    趙衍龍,2015,〈日本抓獲一槍支瞄準器走私嫌犯 其電腦中查出IS雜誌〉。環球網,http://world.huanqiu.com/exclusive/2015-12/8175700.html, 取用日期: 2017年7月5日。
    蘋果日報,2016,〈IS外籍戰士敗走回國 法嚴防滲透恐襲〉。http://hk.apple.nextmedia.com/international/art/20160611/19649655,取用日期: 2017年7月10日。
    Abdelaty, Ali, 2016, “Islamic State Identifies Abi al-Hassan al-Muhajer as New Spokesman”. Reuters. Retrieved from http://www.reuters.com/article/us-mideast-crisis-islamicstate-spokesman-idUSKBN13U1Z6. (Date visited: June 12, 2017)
    Abdollah, T., 2016, “Ohio State Attack Echoes Islamic State Group`s Brutal Calls”. FOX News. Retrieved from http://www.foxnews.com/us/2016/11/29/ohio-state-attack-echoes-islamic-state-group-brutal-calls.html. (Date visited: July 7, 2017)
    Berger, J., 2014, “How ISIS Games Twitter”. The Atlantic. Retrieved from https://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-media-strategy/372856/. (Date visited: July 2, 2017)
    BBC, 2016, “Islamic State: Abu Muhammad al-Adnani ‘killed in Aleppo’”. Retrieved from http://www.bbc.com/news/uk-37224570. (Date visited: June 12, 2017)
    Clements, S., 2015, “Inside the Mind-Control Methods the Islamic State Uses to Recruit Teenagers”. Vice. Retrieved from https://www.vice.com/en_us/article/mvxawp/isis-mind-control-young-british-muslims-857. (Date visited: August 1, 2017)
    Doherty, B., 2017, “Yacqub Khayre: Melbourne Siege Gunman`s History of Violent Crime and Drugs”. The Guardian. Retrieved from https://www.theguardian.com/australia-news/2017/jun/06/yacqub-khayre-melbourne-siege-gunmans-history-of-violent-and-drugs. (Date visited: July 7, 2017)
    Edelman, A., 2015, “Lone-wolf Terrorists Could Attack U.S. ‘at any moment,’ Homeland Security Chief Admits”. New York Daily News. Retrieved from http://www.nydailynews.com/news/politics/lone-wolf-terrorists-attack-moment-dhs-chief-article-1.2217118. (Date visited: June 12, 2017)
    English, C., 2017, “Twitter Continues to Wage Its Own War against ISIS”. New York Post. Retrieved from http://nypost.com/2017/03/21/twitter-continues-to-wage-its-own-war-against-isis/. (Date visited: June 30, 2017)
    Jihadology, 2016, “New Video Message from the Islamic State: ‘The Structure of the Caliphate’”. Retrieved from http://jihadology.net/2016/07/06/new-video-message-from-the-islamic-state-the-structure-of-the-caliphate/. (Date visited: June 12, 2017)
    Lesaca, J., 2015, “On Social Media, ISIS Uses Modern Cultural Images to Spread Anti-Modern Values”. Retrieved from https://www.brookings.edu/blog/techtank/2015/09/24/on-social-media-isis-uses-modern-cultural-images-to-spread-anti-modern-values/. (Date visited: June 12, 2017)
    Lukaszewski, J., 1987, The Media and the Terrorist: A Dance of Death. Retrieved from http://www.executive-speaker.com/spch0025.html. (Date visited: May 22, 2017)
    Milmo, C., 2014, “Isis Jihadists Using World Cup and Premier League Hashtags to Promote Extremist Propaganda on Twitter”. The Independent. Retrieved from http://www.independent.co.uk/news/world/middle-east/iraq-crisis-exclusive-isis-jihadists-using-world-cup-and-premier-league-hashtags-to-promote-9555167.html. (Date visited: June 30, 2017)
    National Consortium for the Study of Terrorism and Responses to Terrorism (START), 2016a, Global Terrorism Database [gtd_70to91_0616dist] http://www.start.umd.edu/gtd. (Date visited: February 22, 2017)
    National Consortium for the Study of Terrorism and Responses to Terrorism (START), 2016b, Global Terrorism Database [gtd_92to11_0616dist]. Retrieved from http://www.start.umd.edu/gtd. (Date visited: February 22, 2017)
    Neriah, J., 2014, “The Structure of the Islamic State (ISIS)”. Jerusalem Center for Public Affairs. Retrieved from http://jcpa.org/structure-of-the-islamic-state/. (Date visited: June 5, 2017)
    Ryan, L., 2014, “Why Terrorists Love Twitter”. National Journal. Retrieved from http://www.defenseone.com/threats/2014/06/why-terrorists-love-twitter/85615/.U43vePZCj78.twitter. (Date visited: June 2, 2017)
    The Telegraph, 2015, “Islamic State Launches English-language Radio News Bulletins”. Retrieved from http://www.telegraph.co.uk/news/worldnews/islamic-state/11519977/Islamic-State-launches-English-language-radio-news-bulletins.html. (Date visited: June 30, 2017)

    二、 中文專書
    中國現代國際關係研究所反恐怖研究中心編著,2001,《國際恐怖主義與反恐怖鬥爭》。北京:時事出版社。
    王逸舟,2010,《恐怖主義溯源:中國人的視角(修訂版)》。北京:社會科學文獻出版社。
    江金太,1989,《剖析法國大革命》。臺北:森大圖書。
    李慧智,2003,《反恐學》。北京:人民出版社。
    林泰和,2015,《恐怖主義研究:概念與理論》。臺北:五南圖書。
    南宏師、張浩,2008,《網路傳播學》。北京:國防工業出版社。
    胡聯合,2002,《第三隻眼看恐怖主義》。北京:世界知識出版社。
    張家棟,2012,《恐怖主義與反恐怖——歷史、理論與實踐》。上海:上海人民出版社。
    楊永明,2010,《國際關係》。臺北:前程文化。
    楊潔勉,2002,《國際恐怖主義與當代國際關係:「9·11」事件的衝擊和影響》。貴州:貴州人民出版社。
    趙秉志,2005,〈國際恐怖主義犯罪的歷史與現狀考察〉。頁130,收錄於趙秉志編,《國際恐怖主義犯罪及其防治對策專論》。北京:中國人民公安出版社。
    趙志立,2009,《網路傳播學導論》。成都:四川人民出版社。
    葉至誠、葉立誠,2011,《研究方法與論文寫作》(第三版)。臺北:商鼎數位。
    劉繼南、周積華、段鵬等,2004,《國際戰爭中的大眾傳播》。北京:北京廣播學院出版社。
    Cockburn,周詩婷等譯,2014,《伊斯蘭國:ISIS/IS/ISIL》。臺北:好優文化。(Cockburn, P., 2014, The Jihadis Return: ISIS and The New Sunni Uprising. New York: OR Books.)
    Karlığa,黃思恩譯,2006,〈宗教、恐怖主義、戰爭以及關於全球倫理的需求〉。頁55-76,收錄於Çapan編,《伊斯蘭與恐怖主義》。臺北:希泉出版。(Karlığa, B., 2006, “Religion, Terror, War and The Need for Global Ethics.” Pp. 44-62 in Terror and Suicide Attacks: An Islamic Perspective, edited by Ergün Çapan. New Jersey: The Light Inc.)
    Lasswell,張潔、田青譯,2003,《世界大戰中的宣傳技巧》。北京:中國人民大學出版社。(Lasswell, H., 1971, Propaganda Technique in World War I. Cambridge: The MIT Press.)
    Laurent,張穎綺譯,2015,《ISIS大解密》。臺北:立緒文化。(Laurent, S., 2014, L`Etat Islamique. Paris: Éditions du Seuil.)
    Lister,姜奕暉譯,2016,《「伊斯蘭國」簡論》。北京:中信出版社。(Lister, C. R., 2015, The Islamic State: A Brief Introduction. Washington: Brookings Institution Press.)
    Napoleoni,洪玉珊譯,2015,《這才是伊斯蘭國!:史上最強「暗黑經濟體」,用營銷策略顛覆全球秩序》。臺北:究竟出版社。 (Napoleoni, L., 2014, The
    Islamist Phoenix: The Islamic State and the Redrawing of the Middle East. New York: Seven Stories Press.)
    Seignobos,沈煉之譯,1972,《法國史》。北京:商務印書館。(Seignobos, C., 1946, Histoire sincère de la nation française: essai d`une histoire de l`évolution du peuple française. Paris: Presses universitaires de France.)
    Soyinka,陳雅汝譯,2007,《恐懼的氣氛》。臺北:商周出版。(Soyinka, W., 2004, The Climate of Fear. Chicago : Profile Books Limited.)

    三、 中文期刊論文
    王一帆、梅建明、高賀,2016,〈「伊斯蘭國」宣傳策略分析及抑制措施〉。《雲南行政學院學報》6:68-75。
    白桂梅,2002,〈從國際法角度看國際恐怖主義的界定問題〉。《現代國際關係》 10: 28-34。
    包澄章、孫德剛,2016,〈「伊斯蘭國」組織與中東恐怖主義治理新理念〉。《理論視野》 2:57-62。
    朱蓓蕾,2016,〈「伊斯蘭國」新興恐怖威脅評析〉。《展望與探索》 14(2):17-24。
    李寧,2015,〈「伊斯蘭國」影響下的西方青年極端化現象分析〉。《阿拉伯世界研究》 6:88-106。
    邵志擇,2006,〈恐怖主義與西方媒介的關係〉。《新聞記者》 5:54-56。
    邵培仁,2007,〈媒介恐慌論與媒介恐怖論的興起、演變及理性抉擇〉。《現代傳播》 4:27-29。
    邱佳琪,2013,〈文本分析法在閱讀教學中的應用與建議——以記敘文為例〉。華文世界 112:151-154。
    周明、曾向紅,2016,〈「基地」與「伊斯蘭國」的戰略差異及走勢〉。《外交評論》 4:130-156。
    金衛星,2003,〈國際恐怖主義的歷史演變與界定〉。《蘇州科技學院學報:社會科學版》 20(3): 107-115。
    柳思思,2016,〈「伊斯蘭國」的互聯網攻勢及其影響〉。《現代國際關係》 2:32-40。
    孫冉、唐恬波,2014,〈「伊斯蘭國」極端組織的特點〉。《現代國際關係》 9: 56-59。
    陳佩修,2006,〈國際恐怖主義發展與東南亞安全情勢的演化〉。《全球政治評論》13:21-40。
    陳雙環,2004,《當前中華民國反恐對策之研究》。臺北:國立政治大學外交學系戰略及國際事務研究所碩士論文。
    陳鶴洲,2010,〈觀古、知今、鑑未來──論恐怖主義攻擊思維之演進〉。論文發表於「第六屆『恐怖主義與國家安全』學術暨實務研討會」,桃園:中央警察大學,2010年12月8日。
    張中勇,2002,〈國際恐怖主義的演變與發展〉。《戰略與國際研究季刊》4(1):1-58。
    張家棟,2007,〈現代恐怖主義的四次浪潮〉。《國際觀察》6:62-68。
    張福昌,2011,〈歐美反恐合作剖析:理論與實務〉。論文發表於「第七屆『恐怖主義與國家安全』學術暨實務研討會」,桃園:中央警察大學,2011 年 10 月 31 日。
    游美惠,2000,〈內容分析、文本分析與論述分析在社會研究的運用〉。《調查研究》8:5-42。
    潘光,2009,〈國際反恐合作面臨的新挑戰及其績效評估〉。頁9-24,收錄於「第五屆恐怖主義與國家安全學術研討暨實務座談會論文集」。桃園:中央警察大學恐怖主義研究中心主辦。
    楊恕、徐慧,2004,〈全球化時代的新恐怖主義〉。《蘭州大學學報(社會科學版)》 32(6):6-13。
    簡嘉宏,2012,〈全球化脈絡下的恐怖主義與媒體〉。《國防雜誌》 27(5):3-25。

    四、 英文專書
    Barnett, B., & Reynolds, A., 2009, Terrorism and The Press: An Uneasy Relationship. New York: Peter Lang.
    Chaliand, G., & Blin, A., 2007, The History of Terrorism: from Antiquity to Al Qaeda. California: University of California Press.
    Hoffman, B., 1998, Inside Terrorism. New York: Columbia University Press.
    Hoffman, B., 2002, “The Emergence of the New Terrorism.” Pp. 30-49 in The New Terrorism: Anatomy, Trends and Counter-Strategies, edited by Tan, Andrew and Ramakrishna, Kumar. Singapore: Eastern Universities Press.
    Jowett, G., & O`Donnell, V., 2015, Propaganda & Persuasion (Sixth Edition). California: Sage.
    Kurtz, L. R., 1999, Encyclopedia of Violence, Peace, and Conflict, Three-Volume Set. California: Academic Press.
    Laqueur, W., 1977, Terrorism. London: Sphere Books Ltd.
    Laqueur, W., 1987, The Age of Terrorism. Boston: Little & Brown.
    Laqueur, W., 2001, The New Terrorism: Fanaticism and the Arms of Mass Destruction. London: Phoenix Press.
    Martin, G., 2013, Understanding Terrorism: Challenges, Perspectives, and Issues. California: Sage Publications.
    Schmid, A. P., Albert, J. et al., 1988, Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature. New Jersey: Transaction Books.
    Simon, J., 2016, Lone Wolf Terrorism: Understanding the Growing Threat. New York: Prometheus Books.
    Taylor, R., 2002, The History of Terrorism. California: Lucent Books.
    Thornton, T., 2006, “Terror as a Weapon of Political Agitation.” Pp. 41-63 in Terrorism: Critical Concepts in Political Science, Vol.3, edited by Rapoport, David. London: Routledge.
    Weimann, G., 2006, Terror on the Internet: The New Arena, The New Challenges. Washington: United States Institute of Peace Press.
    Wilkinson, P., 2006, Terrorism versus Democracy: The Liberal State Response (Second Edition). New York: Routledge Taylor & Francis Group.

    五、 英文期刊/官方報告
    Amble, J., 2012, “Combating Terrorism in the New Media Environment”. Studies in Conflict & Terrorism 35:339-353.
    Berger, J., & Morgan, J.,2015, The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter. Washington: The Brookings Project on U.S. Relations with the Islamic World 1-65.
    Bodine-Baron, E., Helmus, T., Magnuson, M., & Winkelman, Z., 2016, Examining ISIS Support and Opposition Networks on Twitter. California: RAND Corporation.
    Fischer, P., Fischer, J., Weisweiler, S. & Frey, D., 2010, “Terrorism as Collective Communication: The Collective Communication Model of Terrorism (CCMT)”. Social and Personality Psychology Compass 4(9): 692-703.
    Ganor, B., 2002, “Defining Terrorism: Is One Man`s Terrorist Another Man`s Freedom Fighter?”. Police Practice and Research 3(4): 287-304.
    Gambhir, H., 2014, “Dabiq: The Strategic Messaging of the Islamic State”. Institute for the Study of War 1-12.
    Jenkins, B., 1974, International Terrorism: A New Kind of Warfare. California: RAND Corporation.
    Jenkins, B., 1980, The Study of Terrorism: Definitional Problems. California: RAND Corporation.
    Kydd, A., & Walter, B., 2006, “The Strategies of Terrorism”. International Security 31(1): 49-80.
    Laqueur, W., 1996, “Postmodern Terrorism”. Foreign Affairs 75(5): 24-36.
    Lynch, M., 2006, “Al-Qaeda’s Media Strategies”. The National Interest 83: 50-56.
    Nacos, B., 2003, “The Terrorist Calculus behind 9-11: A Model for Future Terrorism?”. Studies in Conflict & Terrorism 26: 1-16.
    The Soufan Group, 2017, Foreign Fighters: An Updated Assessment of the Flow of Foreign Fighters into Syria and Iraq. New York: The Soufan Group.
    Weimann, G., 2004, “How Modern Terrorism Uses the Internet”. United States Institute of Peace Special Report 116: 1-12.
    Weimann, G., 2007, “Mass-media Theater”. eJournal USA 1-8.
    Weimann, G., 2014, “New Terrorism and New Media”. Commons Lab of the Woodrow Wilson International Center for Scholars’ Report 1-17.

    六、 官方網站
    BBC News http://www.bbc.com/
    Clarion Project https://clarionproject.org/
    Central Intelligence Agency https://www.cia.gov/index.html
    Conflict Armament Research http://www.conflictarm.com/
    Department of Homeland Security https://www.dhs.gov/
    European Union http://europa.eu/european-union/index_en
    Federal Bureau of Investigation https://www.fbi.gov/
    Forbes https://www.forbes.com/
    Global Terrorism Database https://www.start.umd.edu/gtd/
    Jihadology http://jihadology.net/
    Marist Institute for Public Opinion http://maristpoll.marist.edu/
    National Counterterrorism Center https://www.nctc.gov/
    NATO Standardization Office http://nso.nato.int/nso/
    Rasmussen Reports http://www.rasmussenreports.com/
    The White House https://www.whitehouse.gov/
    United Nations http://www.un.org/en/index.html
    United Nations Office of Legal Affairs http://legal.un.org/ola/
    United States Department of Defense https://www.defense.gov/
    United States Department of State https://www.state.gov/
    中央通訊社 http://www.cna.com.tw/
    Description: 碩士
    國立政治大學
    新聞學系
    102451024
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G1024510243
    Data Type: thesis
    Appears in Collections:[新聞學系] 學位論文

    Files in This Item:

    File SizeFormat
    024301.pdf5562KbAdobe PDF21597View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback