English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 111253/142169 (78%)
Visitors : 48150349      Online Users : 23
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/118745


    Title: 網路戰爭與嚇阻 : 以美國與俄羅斯為例
    Warfare and Deterrence in the Cyber Realm: The Cases of the United States and Russia
    Authors: 倪可思
    Sidman, Nicholas
    Contributors: 林永芳
    Lin, Yung-Fang
    倪可思
    Nicholas Sidman
    Keywords: 網路戰爭
    俄羅斯
    美國
    中國
    東歐
    嚇阻
    Date: 2018
    Issue Date: 2018-07-18 11:14:33 (UTC+8)
    Abstract: 本研究檢視了美國和俄羅斯的網路運作。透過檢視這兩個不同的國家以及與他們網路發展相關的個案,研究者舉例說明威嚇的概念是如何在網路領域中發展起來的。目前各國在網路空間的威嚇上面臨的主要問題是歸因問題,知道有哪些人參與網路運作即屬歸因問題。然而,透過約瑟夫·奈爾(Joseph Nye)對網路運作和威嚇的方法,對美國和俄羅斯的網路行動進行分析,我以實例說明未來眾所周知的攻擊性優勢可能會減少。具體而言,除了組織完善且資金充足的國家之外,其他參與者可能會發現網路運作成本太高、風險太大。這不僅是因為改進了歸因技術,而且還因為各國在網路防禦方面有所改善,並普遍改善了網路衛生。此外,有關網路的雙邊與多邊協議的嘗試可能會進一步減少網路運作攻擊,或至少,減少各種官方情報單位範圍以外的行動。最終,人們會發現與20世紀初的空軍戰力和20世紀中期的核武器類似,各國可能會開發有形和無形的方法來應對網路作戰的威脅。但是,在現今的強權國家如美國,接受有關網路之具有法律約束力的多邊條約和協議的情況下,俄羅斯等其他國家也不願意失去在使混合作戰行動中可行的重要角色。在未來,關於網路的爭論與發展可能涉及兩個明確的陣營,即指那些支持現狀和所謂修正主義的陣營。
    This thesis examines the cyber operations of the United States and Russia. By examining these two separate states, and the individual cases related to their cyber development, I illustrate how notions of deterrence are developing in the cyber realm. A major problem currently facing states with regards to deterrence in cyber space, is attribution. Knowing who engages in what cyber operations is attribution. However, through analysis of United States and Russian cyber operations through the lens of Joseph Nye`s approach to cyber operations and deterrence I illustrate that in the future the well known offensive advantage may lessen. Specifically, those actors besides well-organized and sufficiently funded nation-states may find cyber operations too costly and too risky to be of value. This is as a result of not just improved attribution technology, but also due to improvements in nation-state`s cyber defensive postures and generally improved cyber hygiene. Further, attempts at bilateral and multilateral agreements with regards to cyber may further reduce operations; or at least, reduce operations outside of the purview of the intelligence services of various official actors. Ultimately, it is found that, in similar fashion to air power in the early 20th century and nuclear weapons in the middle of the 20th century, states will likely develop both tangible and intangible approaches to dealing with the threat of cyber operations. However, where status-quo powers like the United States embrace the adoption of legally binding multilateral treaties and agreements regarding cyber, other states such as Russia would rather not potentially lose an important part of what makes Hybrid Warfare operations viable. The debates on and development of cyber may involve two clear camps in the future, those supporting the status-quo and so-called revisionist powers.
    Reference: Acılar, Ali & Markin, Maxim & Nazarbaeva, Elena. (2011). Exploring the Digital Divide: A Case of Russia and Turkey. 584.
    "Active Cyber Defense (ACD)." Information Assurance by the National Security Agency. https://www.iad.gov/iad/programs/iad-initiatives/active-cyber-defense.cfm.
    "Advanced Persistent Threat Groups." FireEye. Accessed March 27, 2018.
    https://www.fireeye.com/current-threats/apt-groups.html.
    Andrew, Christopher M.& Mitrokhin, Vasili. (1999). The Mitrokhin archive : the KGB in Europe and the West. London : Allen Lane 296-297, 298, 308-309, 310.
    Applegate, Scott D. “The Dawn of Kinetic Cyber.” Presented at the 5th International Conference on Cyber Conflict, Tallin, Estonia, 2013.
    https://ccdcoe.org/cycon/2013/proceedings/d2r1s4_applegate.pdf
    APT28—A Window Into Russia’s Cyber Espionage Operations?. Special Report. FireEye, 2014. https://www2.fireeye.com/apt28.html.
    Baylon, Caroline, Roger Brunt, and David Livingstone. “Cyber Security at Civil Nuclear Facilities: Understanding the Risk.” Chatham House. 2015.
    "Assessments: Cyber Resilience Review (CRR)." United States Computer Emergency Readiness Team.
    https://www.us-cert.gov/ccubedvp/assessments.
    Baraniuk, Chris. "Why the Forgotten Soviet Internet Was Doomed from the Start." BBC Future. October 26, 2016.
    http://www.bbc.com/future/story/20161026-why-the-forgotten-soviet-internet-was- doomed-from-the-start.
    Berry, Alex, Josh Homan, and Randi Eitzman. "WannaCry Malware Profile." FireEye. May 23, 2017.
    https://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html.
    Biddle, Stephen. “The Gulf War Debate Redux: Why Skill and Technology Are the Right Answer.” International Security 22, no. 2 (1997): 163-174. doi:10.2307/2539372
    https://www.jstor.org/stable/2539372?seq=1#page_scan_tab_contents
    Blank, Stephen. "Cyber War and Information War a la Russe." In Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press. 89.
    Buchan, Russell. “The International Legal Regulation of State-Sponsored Cyber Espionage.” In International Cyber Norms: Legal, policy & Industry Perspectives edited by Anna- Maria Osula and Henry Rõigas, 65-86. Tallinn: NATO CCD COE Publication, 2016.
    Bumgarner, John and Scott Borg, “Overview by the US-CCU of the Cyber Campaign against Georgia in August of 2008” United States Cyber Consequences Unit, August, 2009, 4, http://www.registan.net/wp- content/uploads/2009/08/US-CCU-Georgia-Cyber- Campaign-Overview.pdf
    Carr, Jeff, “Project Grey Goose Phase II Report: The evolving state of cyber warfare” greylogic, March, 2009, 5
    http://fserror.com/pdf/GreyGoose2.pdf
    Clarke, Richard A. and Robert K. Knake. Cyber War: The Next Threat to National
    Security and What To Do About It. New York, NY: Ecco, 2010: 6
    Clayton, Blake and Adam Segal. “Addressing Cyber Threats to Oil and Gas Suppliers.” Council on Foreign Relations. 2013.
    ComScore. "ComScore Releases Overview of European Internet Usage in September 2011." News release, November 14, 2011.
    https://www.comscore.com/Insights/Press-Releases/2011/11/comScore-Releases- Overview-of-European-Internet-Usage-in-September-2011?cs_edgescape_cc=TW.
    Cordesman, Anthony H. with the assistance of Charles Ayers. Korean Special, Asymetric, and Paramilitary Forces. Washington, DC: Center for Strategic and International Studies, 2016. 29.
    https://csis-prod.s3.amazonaws.com/s3fs- public/publication/160809_Korean_Special_Asymmetric_Paramilitary_Forces.pdf
    Demchak, Chris C. and Peter J. Dombrowski. “Rise of a Cybered Westphalian Age”. Strategic Studies Quarterly, (Spring 2011): 31-62.
    Denning, Dorothy E., and Bradley J. Strawser. "Active Cyber Defense: Applying Air Defense to the Cyber Domain." In Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press.
    "Doctrine of Information Security of the Russian Federation." The Ministry of Foreign Affairs of the Russian Federation. December 5, 2016
    http://www.mid.ru/en/foreign_policy/official_documents/-/asset_publisher/CptICkB6BZ2
    9/content/id/2563163.
    Dunn, Elizabeth Cullen and Michael S. Bobick, AMERICAN ETHNOLOGIST, Vol. 41, No. 3, 405, ISSN 0094- 0496, online ISSN 1548-1425. C 2014 by the American Anthropological Association. All rights reserved. DOI: 10.1111/amet.12086
    https://static1.squarespace.com/static/55f7642be4b07229ccbb16e7/t/5665d74ba976af1373
    1334c6/14495148274 9 8/Dunn_Bobick-2014-Empire+strikes+back_war%26occupation.pdf
    Dzyubenko, Olga. "U.S. Vacates Base in Central Asia as Russia`s Clout Rises." Reuters. June 3, 2014.
    https://www.reuters.com/article/us-kyrgyzstan-usa-manas/u-s-vacates-base-in-central- asia-as-russias-clout- rises-idUSKBN0EE1LH20140603.
    Fahrenkrug, David T. “Countering the Offensive Advantage in Cyberspace: An Integrated
    Defensive Strategy.” Presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2013.
    https://ccdcoe.org/cycon/2012/proceedings/fahrenkrug.pdf
    “Foreign Ministers` Joint Statement on Georgia” U.S Department of State, Office of the Spokesman. August, 2008
    https://web.archive.org/web/20080831110250/http://www.america.gov/st/texttrans- english/2008/August/20080827152352xjsnommis0.9067346.html
    Friedman, George. The Medvedev Doctrine and American Strategy, Stratfor Enterprises LLC., September, 2008
    https://www.stratfor.com/weekly/medvedev_doctrine_and_american_strategy
    Geist, Edward. “Deterrence Stability in the Cyber Age.” Strategic Studies Quarterly, (Winter 2015): 44-62.
    Gellman, Barton, and Ashkan Soltani. "NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say." Washington Post, October 30, 2013. Accessed March 24, 2018.
    https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo- google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166- 11e3-8b74-d89d714ca4dd_story.html?utm_term=.12576195b082.
    Giles, Keir. “’Information Troops’ – a Russian Cyber Command?” Presented at the 3rd International Conference on Cyber Conflict, Tallinn, Estonia, 2011. http://conflictstudies.org.uk/files/Russian_Cyber_Command.pdf
    Giles, Keir, “Russia’s Public Stance on Cyberspace Issues,” presented at the 4th International Conference on Cyber Conflict, Tallinn: Cooperative Cyber Defense Centre of Excellence (2012): 63-74,
    https://ccdcoe.org/publications/2012proceedings/2_1_Giles_RussiasPublicStanceOnCyb
    erInformationWarfare.pdf
    HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group. Special Report. FireEye, 2015.
    https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf
    Harding, Luke, and Alec Luhn. "Putin Says Russian Role in Election Hacking `theoretically Possible`." The Guardian. June 1, 2017.
    https://www.theguardian.com/world/2017/jun/01/putin-says-russian-role-in-election- hacking-theoretically-possible.
    Harold, Scott W. "The U.S.-China Cyber Agreement: A Good First Step." The Rand Blog (blog), August 1, 2016. Accessed March 26, 2018.
    https://www.rand.org/blog/2016/08/the-us-china-cyber-agreement-a-good-first- step.html.
    Hathaway, Oona A. “The Drawbacks and Dangers of Active Defense.” Presented at the 6th International Conference on Cyber Conflict, Tallinn, Estonia, 2014.
    Heickerö, Roland. (2018). FOI Emerging Cyber Threats and Russian Views on Information Warfare and Information Operations.
    Holdsworth, Nick, Russia claims media bias, Variety, August, 2008
    http://variety.com/2008/scene/news/russia-claims-media-bias-1117990468/
    "Iraq War Illegal, Says Annan." BBC News. September 16, 2004.
    http://news.bbc.co.uk/2/hi/middle_east/3661134.stm.
    Junio, Timothy J. “How Probable is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate.” Journal of Strategic Studies, (2013).
    Kramer, Mark. "Policy Memos: The Soviet Roots of Meddling in U.S. Politics." PONARS Eurasia. January 2017.
    http://www.ponarseurasia.org/memo/soviet-roots-meddling- us-politics.
    Kristensen, Hans M., Norris, Robert S., and Ivan Oelrich. “From Counterforce to Minimal Deterrence: A New Nuclear Policy on the Path Toward Eliminating Nuclear Weapons.” Federation of American Scientists and The Natural Resources Defense Council. Occasional Paper No. 7. April 2009.
    https://fas.org/pubs/_docs/occasionalpaper7.pdf
    Kuzio, Taras. (2005). Russian Policy toward Ukraine during Elections. Demokratizatsiya: The Journal of Post-soviet Democratization. 13. 491-517. 10.3200/Demo.13.4.491-518
    http://www.taraskuzio.com/International%20Relations_files/russia_elections_ukraine.pdf
    Lambert, Nicholas. "Brits-Krieg: The Strategy of Economic Warfare." In Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press.
    Libicki, Martin C., Lillian Ablon, Timm Webb. “The Defender’s Dilemma: Charting a Course Toward Cybersecurity.” RAND Corporation. 2016.
    Lindsay, Jon R. “Stuxnet and the Limits of Cyber Warfare.” Security Studies Vol. 22, Issue 3 (2013): 365-404.
    Lotrionte, Catherine. “A Better Defense: Examining the United States’ New Norms-Based Approach to Cyber Deterrence.” Georgetown Journal of International Affairs Special
    Cyber Issue, 3rd ed. (January 2014): 71-84.
    http://journal.georgetown.edu/wp-content/uploads/2015/07/gjia13007_Lotrionte- CYBER-III.pdf
    Mandel, Robert. Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks. Washington, DC: Georgetown University Press, 2017.
    Markoff, John, Before the Gunfire, Cyberattacks, The New York Times, August, 2008 http://www.nytimes.com/2008/08/13/technology/13cyber.html
    Matsakis, Louise. "HACK BRIEF: RUSSIAN HACKERS RELEASE APPARENT IOC EMAILS IN WAKE OF OLYMPICS BAN." Wired. October 1, 2018.
    https://www.wired.com/story/russian-fancy-bears-hackers-release-apparent-ioc-emails/.
    Medvedev, Sergei A. “Offense-Defense Theory Analysis of Russian Cyber Capability.” Master’s Thesis, Naval Postgraduate School, 2015.
    http://calhoun.nps.edu/bitstream/handle/10945/45225/15Mar_Medvedev_Sergei.pdf? sequence=1
    Myers, Steven Lee. “E-Stonia” Accuses Russia of Computer Attacks, The New York Times, May, 2007
    http://www.nytimes.com/2007/05/18/world/europe/18cnd-russia.html
    Nakashima, Ellen, and Craig Timberg. "NSA Officials Worried about the Day Its Potent Hacking Tool Would Get Loose. Then It Did." Washington Post, May 16, 2017. Accessed March 24, 2018.
    https://www.washingtonpost.com/business/technology/nsa-officials-worried-about-the- day-its-potent- hacking-tool-would-get-loose-then-it-did/2017/05/16/50670b16-3978- 11e7-a058-ddbb23c75d82_story.html?utm_term=.4ec69cfa3812.
    Nakashima, Ellen, and Steven Mufson. "U.S., China Vow Not to Engage in Economic Cyberespionage." The Washington Post. September 25, 2015.
    https://www.washingtonpost.com/national/us-china-vow-not-to-engage-in-economic- cyberespionage/2015/09/25/90e74b6a-63b9-11e5-8e9e-dce8a2a2a679_story.html? noredirect=on&utm_term=.87b9f0d10a53.
    Nye, Joseph S. “Deterrence and Dissuasion in Cyberspace.” International Security Vol. 41 Issue 3 (Winter 2016/17): 44-71.
    Orrin Hatch United States Senator for Utah. "Hatch Introduces Legislation to Combat Cybercrime." News release, June 29, 2017. United States Senator Orrin Hatch. https://www.hatch.senate.gov/public/index.cfm/2017/6/hatch-introduces-legislation-to- combat-cybercrime.
    Patterson, Dan. "Cyberweapons Are Now in Play: From US Sabotage of a North Korean Missile Test to Hacked Emergency Sirens in Dallas." TechRepublic.
    https://www.techrepublic.com/article/cyberweapons-are-now-in-play-from-us-sabotage- of-a-north-korean-missile-test-to-hacked-emergency/.
    “Paul Baran and the Origins of the Internet.” Rand Corporation. https://www.rand.org/about/history/baran.list.html
    Perper, Rosie. "Russian Hacking Group Fancy Bear May Have Spied on Germany`s Government." BusinessInsider. February 28, 2018.
    http://www.businessinsider.com/russian-hackers-fancy-bear-germany-cyber-attack-2018- 3
    Persio, Sofia Lotto. "North Korea Executes Official In Charge of Nuclear Test Site: Report.” Newsweek. December 19, 2017. http://www.newsweek.com/north-korea-purges-and- executes-official-charge-nuclear-test-site-report-752196.
    Peters, Benjamin. "The Soviet InterNyet." Aeon. October 17, 2016.
    https://aeon.co/essays/how-the-soviets-invented-the-internet-and-why-it-didn-t-work.
    Peterson, Nolan. "Long at War With Each Other, Ukraine and Russia Trade On.." Newsweek. January 28, 2018.
    http://www.newsweek.com/long-war-each-other-ukraine-and-russia-trade-793142.
    Rivera, Jason, and Forrest Hare. “The Deployment of Attribution Agnostic Cyberdefense Constructs and Internally Based Cyberthreat Countermeasures.” Presented at the 6th International Conference on Cyber Conflict, Tallinn, Estonia
    Rochlin, Gene I. & Chris C. Demchak (2008) The Gulf war: technological and organizational implications, Survival, 33:3, 260-273, DOI: 10.1080/00396339108442594
    https://www.tandfonline.com/doi/abs/10.1080/00396339108442594? %20journalCode=tsur20
    Roigas, Henry “The Ukraine Crisis as a Test for Proposed Cyber Norms.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 135-144. Tallinn: NATO CCD COE Publication, 2015.
    https://ccdcoe.org/sites/default/files/multimedia/pdf/CyberWarinPerspective_Roigas_15.p df
    “Russia to provide $200 mln in urgent aid for S. Ossetia,” Sputnik International. August, 2008 https://sputniknews.com/russia/20080811115961365/
    Sanger, David E., and William J. Broad. "Trump Inherits a Secret Cyberwar Against North Korean Missiles." The New York Times. March 4, 2017.
    https://www.nytimes.com/2017/03/04/world/asia/north-korea-missile-program- sabotage.html.
    Schelling, Thomas C. Arms and Influence. Yale University Press, 1966. http://www.jstor.org/stable/j.ctt5vm52s.
    Schmitt, Michael N. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013. doi:10.1017/CBO9781139169288.
    Schmitt, Michael N. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017. doi:10.1017/9781316822524.
    Slayton, Rebecca. “What is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment.” International Security Vol. 41 Issue 3 (Winter 2016/17): 72-109.
    Stubbs, Jack. "Exclusive: Wannacry Hits Russian Postal Service, Exposes Wider Security Shortcomings." Reuters. May 24, 2017.
    https://www.reuters.com/article/us-cyber-attack-russia-idUSKBN18K26O.
    United Nations. Security Council. "Security Council Rejects Demand For Cessation of Use of Force Against Federal Republic of Yugoslavia." News release, March 26, 1999.
    https://www.un.org/press/en/1999/19990326.sc6659.html.
    United States. The White House. Office of Management and Budget. By Mick Mulvaney. https://www.politico.com/f/?id=0000015f-931e-ded9-a15f-9bdf94370000.
    “Up In Flames: Humanitarian Law Violations and Civilian Victims in the Conflict over South Ossetia” Human Rights Watch, January, 2009
    https://www.hrw.org/report/2009/01/23/flames/humanitarian-law-violations-and-civilian- victims-conflict-over-south.
    "U.S. Cyber Command (USCYBERCOM)." United States Strategic Command. September 30, 2016. Accessed March 27, 2018.
    http://www.stratcom.mil/Media/Factsheets/Factsheet-View/Article/960492/us-cyber %20command-uscybercom/.

    U.S Department of State. Office of the Coordinator for Cyber Issues. "Explanation of Position at the Conclusion of the 2016-2017 UN Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security." News release, June 23, 2017. https://www.state.gov/s/cyberissues/releasesandremarks/272175.htm.
    Väljataga, Ann. "Back to Square One? The Fifth UN GGE Fails to Submit a Conclusive Report at the UN General Assembly." NATO Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia. September 1, 2017.
    https://ccdcoe.org/back-square-one-fifth-un-gge-fails-submit-conclusive-report-un- general-assembly.html.
    Virilio, Paulo. "The Kosovo War Took Place in Orbital Space." Interview by John Armitage. CTheory. October 18, 2000 Accessed March 26, 2018. http://www.ctheory.net/articles.aspx?id=132.
    Waterman, Shaun. Analysis: Who cyber smacked Estonia?, United Press International, June, 2007
    http://www.upi.com/Analysis-Who-cyber-smacked-Estonia/26831181580439/
    Wayne, Shawn. "Russia–Georgia Trade Corridor Agreement Moving Forward." Georgia Today. May 25, 2018.
    http://georgiatoday.ge/news/10455/Russia–Georgia-Trade-Corridor-Agreement-Moving- Forward.
    Weedon, Jen. “Beyond ‘Cyber War’” Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 67-78. Tallinn: NATO CCD COE Publication, 2015.
    Wirtz, James J. “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 29-38. Tallinn: NATO CCD COE Publication, 2015.
    https://ccdcoe.org/sites/default/files/multimedia/pdf/CyberWarinPerspective_Wirtz_03.pdf Zetter, Kim. "An Unprecedented Look at Stuxnet, The World`s First Digital Weapon." Wired. November 3, 2014.
    https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/.
    Zetter, Kim. "How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History." Wired. July 11, 2011.
    https://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/.
    Zunes, Stephen. "U.S. Role in Georgia Crisis." Foreign Policy in Focus. August 14, 2008. https://fpif.org/us_role_in_georgia_crisis/.
    Description: 碩士
    國立政治大學
    國際研究英語碩士學位學程(IMPIS)
    105862022
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0105862022
    Data Type: thesis
    DOI: 10.6814/THE.NCCU.IMPIS.010.2018.A06
    Appears in Collections:[國際研究英語碩士學位學程] 學位論文

    Files in This Item:

    File Description SizeFormat
    202201.pdf569KbAdobe PDF2388View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback