English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 112721/143689 (78%)
Visitors : 49594364      Online Users : 361
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/146504


    Title: 堅守美國理想:美台關係在全球民主中所扮演之角色
    Upholding American Ideals: The Role of US-Taiwan Relations in Global Democracy
    Authors: 亞歷山大
    Hillier, Alexander Shelton
    Contributors: 袁力強
    James Yuan
    亞歷山大
    Alexander Shelton Hillier
    Keywords: 網絡戰
    霸權
    民主
    美台關係
    Cyber Warfare
    Hegemony
    Democracy
    US-Taiwan Relations
    Date: 2022
    Issue Date: 2023-08-02 13:47:41 (UTC+8)
    Abstract: 今天,美國和中國發現自己處於冷戰時期的境地。 民主價值觀和自由世界秩序直接受到共產主義政權攻擊的時代。 儘管美國的核心價值觀和對反對意識形態的立場多年來一直保持不變,但在這個新的數字環境中,它不可避免地會面臨麻煩。 在美國尋求重新確立自己在國際體系中的仁慈力量的過程中,爭奪數字技術的優勢知識至關重要。 如果美國希望重新確立自己的霸主地位,它就必須贏得與中華人民共和國的網絡優勢競賽。 網絡戰與上個世紀的核戰爭一樣重要。 網絡攻擊的建設性和破壞性能力是任命下一個霸主的關鍵。 網絡攻擊徹底改變了間諜活動、宣傳和代理人戰爭等概念。 隨著技術在世界範圍內不斷快速發展,新的漏洞也隨之產生。 美國對保護民主和人權的承諾是其實力和信譽的內在要素。 隨著中國繼續積極向周邊地區擴張,保護台灣主權對於該地區的安全至關重要。 中華民國是東南亞民主和主權的燈塔,美國的上述承諾需要與台灣建立正式關係。 美國必須利用這個機會重塑美國例外論,而不是助長干涉主義。 通過明確支持台灣,美國可以重新坐上霸權寶座,並阻止權力再次向共產主義政權轉移。
    Today, the United States and China find themselves in a situation reminiscent of the Cold War. A time in which democratic values and the liberal world order were directly under attack by a communist regime. While America’s core values and stance towards opposing ideologies have stayed the same throughout the years, it will inevitably face troubles within this new digital landscape. The race to secure superior knowledge over digital technologies is paramount in America’s quest to re-establish itself once more as a benevolent force within the international system. If the United States wishes to reassert itself as a hegemon, it must win the race to cyber superiority against the People’s Republic of China. Cyberwarfare is as important as nuclear warfare was in the previous century. The constructive and destructive capabilities of cyberattacks are key in appointing the next hegemon. Cyber attacks have revolutionized concepts such as espionage, propaganda, and proxy warfare. As technology continues to rapidly evolve throughout the world, new vulnerabilities are created. America’s commitment to protecting democracy and human rights is intrinsic to its power and credibility. Protecting Taiwanese sovereignty is integral to the security of the region as China continues to aggressively expand into neighboring areas. The Republic of China is a beacon of democracy and sovereignty in Southeast Asia, and America’s aforementioned commitment necessitates formal relations with Taiwan. The United States must use this opportunity to reinvent American exceptionalism rather than facilitate interventionism. By unequivocally supporting Taiwan, America can reseat itself upon the hegemonic throne and prevent a transfer of power to a communist regime once again.
    Reference: 2009. Globalization of Media – Understanding Media and Culture. https://open.lib.umn.edu/mediaandculture/chapter/13-6-globalization-of-media/.
    “Advanced Persistent Threats (APTs) | Threat Actors & Groups.” n.d. Mandiant. Accessed February 18, 2023. https://www.mandiant.com/resources/insights/apt-groups.
    Akaha, Tsuneo, Jingdong Yuan, and Wei Liang, eds. 2021. Trump’s America and International Relations in the Indo-Pacific: Theoretical Analysis of Changes & Continuities. N.p.: Springer International Publishing.
    Allison, William T. 2008. “The Tet Offensive | A Brief History with Documents | William Thomas Al.” Taylor & Francis eBooks. https://www.taylorfrancis.com/books/mono/10.4324/9780203931776/tet-offensive-william-thomas-allison.
    “Anglo-American Strategic Air Power Co-operation in the Cold War and Beyond.” 2022. ProQuest. https://www.proquest.com/openview/4652e9e1c9e3c9ceb97083335b78344d/1?pq-origsite=gscholar&cbl=26498.
    Ansari, Saghir A. 2022. “India`s Trade Relations with China in the Era of Globalization.” Sage Journals. https://journals.sagepub.com/doi/10.1177/0015732515110303.
    Bhardwaj, Rashmi. n.d. “What Is Stuxnet? What It Is and How It Works.” IP With Ease. Accessed March 2, 2023. https://ipwithease.com/what-is-stuxnet-what-it-is-and-how-it-works/.
    Blanton, Stephen D. 1993. “A Study of the United States Navy`s Minesweeping efforts in the Korean War.” Texas Tech. https://ttu-ir.tdl.org/bitstream/handle/2346/60894/31295007673907.pdf;sequence.
    Blight, James G. 1987. “The Cuban Missile Crisis Revisited.” jstor. https://doi.org/10.2307/20043297.
    Borer, Douglas A. 2007. “Rethinking the Cuban Embargo: An Inductive Analysis.” Oxford Academic. https://academic.oup.com/fpa/article-abstract/3/2/127/1792875.
    “Brookings experts on Trump`s National Security Strategy.” 2017. Brookings. https://www.brookings.edu/research/brookings-experts-on-trumps-national-security-strategy/.
    Bushberg, Jerrold T., Andres Gannon, and Alyssa Ayres. 2017. “More Prominence for India and the Indo-Pacific in the U.S. National Security Strategy.” Council on Foreign Relations. https://www.cfr.org/blog/more-prominence-india-and-indo-pacific-us-national-security-strategy.
    Carmichael, Joe. 2016. “Hacking Experts Say John McAfee`s Cyberattack Warnings Will Make America Safer.” Inverse. https://www.inverse.com/article/16022-hacking-experts-say-john-mcafee-s-cyberattack-warnings-will-make-america-safer.
    Carter, Joe. 2016. “5 facts about Captive Nations Week.” ERLC. https://erlc.com/resource-library/articles/5-facts-about-captive-nations-week/.
    CHAU, THOMPSON, and CHENG TING. 2022. “Cyber warfare: China attacks force Taiwan to bolster defenses.” Nikkei Asia. https://asia.nikkei.com/Spotlight/Asia-Insight/Cyber-warfare-China-attacks-force-Taiwan-to-bolster-defenses.
    Cheung, Louis. 2021. 彩云香江on Twitter: "J-20 cockpit vs F-35 cockpit https://t.co/tLNFdHJ80J". https://twitter.com/louischeung_hk/status/1468419197214490625.
    “China says US ‘arrogant and selfish’ after indictmentss.com/News/front/archives/2018/12/22/2003706572.” 2018. Taipei Times. https://www.taipeitimes.com/News/front/archives/2018/12/22/2003706572.
    “Chinese Threats in the Quantum Era.” 2023. Booz Allen Hamilton. https://www.boozallen.com/expertise/analytics/quantum-computing/chinese-cyber-threats-in-the-quantum-era.html.
    “cold War - Proxy War.” 2022. Gerald Ford Museum. https://www.fordlibrarymuseum.gov/museum/exhibits/coldwar/proxywar.html.
    “Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.
    “Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.
    Daniel, Ellen. 2018. “Thirty years on, what has changed since the Morris Worm?” Verdict. https://www.verdict.co.uk/morris-worm-cyber-security/.
    “Defense Primer: U.S. Precision-Guided Munitions.” 2022. CRS Reports. https://crsreports.congress.gov/product/pdf/IF/IF11353.
    Garfield, R. 2011. “The impact of the economic crisis and the US embargo on health in Cuba.” American Journal of Public Health. https://ajph.aphapublications.org/doi/abs/10.2105/AJPH.87.1.15.
    “GDP growth (annual %) - China | Data.” 2023. World Bank Data. https://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG?locations=CN.
    Gunawan, Arief S. 2002. “Five Forces Porter Framework (Ward and Peppard,2002) | Download Scientific Diagram.” ResearchGate. https://www.researchgate.net/figure/Five-Forces-Porter-Framework-Ward-and-Peppard-2002_fig1_304013321.
    Halloran, Richard. 2022. “China Hands: Nine Decades of Adventure, Espionage, and Diplomacy in Asia.” Gale Academic Onefile. https://go.gale.com/ps/i.do?id=GALE%7CA126491255&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=00311723&p=AONE&sw=w&userGroupName=anon%7Ef61452ab.
    Hanna, Terrell. 2021. “What are social engineering attacks? - Security.” TechTarget. https://www.techtarget.com/searchsecurity/definition/social-engineering.
    Harrison, R. 1988. “Economic interdependence, bargaining power, and political influence.” IDEAS/RePEc. https://ideas.repec.org/a/cup/intorg/v42y1988i03p461-483_02.html.
    Hill, Michael. 2022. “China`s attack motivations, tactics, and how CISOs can mitigate threats.” CSO Online. https://www.csoonline.com/article/3676075/china-s-attack-motivations-tactics-and-how-cisos-can-mitigate-threats.html.
    Hioe, Brian, Mercy A. Kuo, and Dechlan Brennan. 2023. “Taiwan Cabinet Reshuffle Sets the Stage for 2024 Presidential Elections.” The Diplomat. https://thediplomat.com/2023/02/taiwan-cabinet-reshuffle-sets-the-stage-for-2024-presidential-elections/.
    Hossain, Kamrul. 2022. “The UNCLOS and the US-China Hegemonic Competition over the South China Sea.” Hein Online. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jeasil6&div=10&id=&page=.
    Hwang, Ji-Jen. 2017. “한국학술지인용색인.” 한국학술지인용색인. https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002199620.
    Itasari, Endah R. 2022. “LEGAL PROTECTION OF UIGHUR MUSLIM ETHNICS IN CHINA FROM PERSPECTIVE HUMAN RIGHTS.” LamLaj. https://pdfs.semanticscholar.org/bb9c/71812869090f15fa147a95272b256a2b4322.pdf.
    Kabeer, N. 2001. “Bargaining Power.” ScienceDirect. https://www.sciencedirect.com/topics/computer-science/bargaining-power.
    Kamrany, Nake M. 2012. “Ending the 30-Year War in Afghanistan.” Middle East Institute. https://www.mei.edu/publications/ending-30-year-war-afghanistan.
    Katada, Saori N. 2022. “At the crossroads : the TPP, AIIB, and Japan`s foreign economic strategy.” Scholar Space. https://scholarspace.manoa.hawaii.edu/items/c181166e-e43d-4bfe-88a1-a609dcd2d496.
    Killion, Ulric. 2009. “The US-China Trade Conflict: A Game Theoretical Analysis.” IDEAS. https://ideas.repec.org/p/guc/wpaper/15.html.
    Koivunen, Pia. 2022. “Performing Peace and Friendship.” Degruyter. https://www.degruyter.com/document/doi/10.1515/9783110761160/html?lang=en.
    Korolov, Maria. 2017. “How hackers crack passwords and why you can`t stop them.” CSO Online. https://www.csoonline.com/article/3236716/how-hackers-crack-passwords-and-why-you-cant-stop-them.html.
    Lebow, Richard N. 1995. “Deterrence and the Cold War.” Political Science Quarterly Vol. 110, no. 2 (Summer): 157-181 (25 pages). https://doi.org/10.2307/2152358.
    Lee, Yimou. 2020. “Taiwan says China behind cyberattacks on government agencies, emails.” Reuters. https://www.reuters.com/article/us-taiwan-cyber-china-idUSKCN25F0JK.
    Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Scinapse. https://www.scinapse.io/papers/1972914161.
    Lyngaas, Sean. 2021. CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.
    Lyngaas, Sean. 2022. “At least 24 agencies run Pulse Secure software. How many were hacked is an open question.” CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.
    Martin, Katherine C. 2015. “George Orwell and the origin of the term `cold war.`” OUP Blog. https://blog.oup.com/2015/10/george-orwell-cold-war/.
    Mattis, Peter, and Sebastian Strangio. 2011. “China`s Misunderstood Spies – The Diplomat.” The Diplomat. https://thediplomat.com/2011/10/chinas-misunderstood-spies/.
    “The Morris Worm Virus: How it Works and How to Protect Yourself.” 2022. History-Computer. https://history-computer.com/the-morris-worm-virus-how-it-works-and-how-to-protect-yourself/.
    Nance, Brad. 2019. “Using Pulse Connect Secure© to Implement Multi-Factor Authentication Solutions.” U.S. Department of Energy: Office of Scientific and Technical Informaton. https://www.osti.gov/biblio/1550735.
    “NATIONAL SECURITY STRATEGY.” 2022. The White House. https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf.
    “National Security Strategy 2017.” 2017. National Security Strategy Archive. http://nssarchive.us/national-security-strategy-2017/.
    Nemeth, Stephen C. 2014. “Ruling the Sea: Managing Maritime Conflicts through UNCLOS and Exclusive Economic Zones.” Taylor & Francis Online. https://www.tandfonline.com/doi/abs/10.1080/03050629.2014.897233.
    Novak, Matt. 2022. “China to Stop Welding Homes Shut Over Covid After Protests.” Gizmodo. https://gizmodo.com/china-relaxes-harshest-covid-19-rules-after-protests-1849862755.
    “N S S.” 2017. Trump White House Archive. https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.
    Nye, Joseph S. 1990. “Soft Power.” no. No. 80 (Autumn), 153-171 (19 pages). https://doi.org/10.2307/1148580.
    Nye, Joseph S. 2022. “American and Chinese Power after the Financial Crisis.” tandfonline. https://www.tandfonline.com/doi/abs/10.1080/0163660X.2010.516634?journalCode=rwaq20.
    Patch, Buel W. 2023. “Soviet Peace Offensives: CQR.” CQ Press Library. https://library.cqpress.com/cqresearcher/document.php?id=cqresrre1951080300.
    Pearce, Justin. 2012. “Control, politics and identity in the Angolan Civil War.” African Affairs. https://doi.org/10.1093/afraf/ads028.
    Porup, JM, and Josh Fruhlinger. 2021. “11 penetration testing tools the pros use.” CSO Online. https://www.csoonline.com/article/2943524/11-penetration-testing-tools-the-pros-use.html.
    Rider, Toby C. 2022. “A Campaign of Truth: The State Department, Propaganda, and the Olympic Games, 1950–1952.” MIT. https://direct.mit.edu/jcws/article-abstract/18/2/4/13570/A-Campaign-of-Truth-The-State-Department.
    Robinson, Christopher. 2020. “Dr. Ji-Jen Hwang discusses Taiwan’s Cybersecurity Environment versus China’s Cyber Strategy.” The Institute of World Politics. https://www.iwp.edu/past-events/2020/07/09/dr-ji-jen-hwang-discusses-taiwans-cybersecurity-environment-versus-chinas-cyber-strategy/.
    Roos, Meghan, Nick Gillespie, Jason Nichols, and Ben Weingarten. 2020. “Chinese Hackers Targeted U.S. COVID Vaccine Research, Prosecutors Allege.” Newsweek. https://www.newsweek.com/two-chinese-hackers-targeted-us-covid-vaccine-research-military-intelligence-prosecutors-allege-1519503.
    Satam, Parth. 2022. “`Battle Of 35s`: US F-35 Or China`s J-35 Stealth Aircraft, A Battle Of Equals Or Comparing Apples With Oranges?” EurAsian Times. https://eurasiantimes.com/american-f-35-vs-chinese-j-35-stealth-aircraft-a-battle-of-equals/.
    SEITZ, AMANDA, ERIC TUCKER, and MIKE CATALINI. 2022. “How China`s TikTok, Facebook influencers push propaganda.” AP News. https://apnews.com/article/china-tiktok-facebook-influencers-propaganda-81388bca676c560e02a1b493ea9d6760.
    Shaikh, Shaan, and Tom Karako. 2021. “S-300 | Missile Threat.” Missile Threat. https://missilethreat.csis.org/defsys/s-300/.
    Silk, Jesse A. 2014. “"A Generation That Didn`t Agree": The Paramountcy of Multidimensional Moral Hierarchy in the System of a Down Discography.” DigitalCommons@Cedarville. https://digitalcommons.cedarville.edu/english_seminar_capstone/25/.
    Smalley, Suzanne. 2022. “Investors, analysts question Biden`s plan to limit U.S. investments in Chinese tech.” CyberScoop. https://www.cyberscoop.com/biden-admin-limit-investment-china/.
    Smalley, Suzanne. 2022. “Commerce lacks intelligence resources to keep U.S. tech from fueling Chinese cyberthreat, experts warn.” CyberScoop. https://www.cyberscoop.com/senate-intel-to-strengthen-intelligence-exports/.
    Stone, Jeff. 2020. “US accuses two Chinese hackers of global hacking campaign, targeting coronavirus vaccine research.” CyberScoop. https://www.cyberscoop.com/chinese-hackers-accused-targeting-coronavirus-vaccine-research/.
    “Taiwan Independence vs. Unification with the Mainland(1994/12~2022/12).” 2023. Election Study Center, NCCU-Taiwan Independence vs. Unification with the Mainl. https://esc.nccu.edu.tw/PageDoc/Detail?fid=7801&id=6963.
    Tang, Frank. 2020. “China GDP: Xi Jinping says `completely possible` to double size of economy by 2035, despite foreign hostility.” South China Morning Post. https://www.scmp.com/economy/china-economy/article/3108767/china-gdp-xi-jinping-says-completely-possible-double-size.
    Taylor, Craig. 2020. “Stuxnet.” CyberHoot. https://cyberhoot.com/cybrary/stuxnet/.
    “Top 5 Most Notorious Attacks in the History of Cyber Warfare.” 2023. Fortinet. https://www.fortinet.com/resources/cyberglossary/most-notorious-attacks-in-the-history-of-cyber-warfare.
    “Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information.” 2018. Department of Justice. https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion.
    Ulric, Killion M. 2009. “Relation of game theory to economic history and marginalism.” University Library of Munich. https://ideas.repec.org/p/pra/mprapa/13378.html.
    Vavra, Shannon. 2020. “Chinese intelligence-linked hackers are exploiting known flaws to target Washington, US says.” CyberScoop. https://www.cyberscoop.com/chinese-intelligence-hackers-us-government-agencies-ministry-state-security/.
    Vavra, Shannon, and Tonya Riley. 2020. “NSA warns defense contractors of recent Chinese government-backed hacking.” CyberScoop. https://www.cyberscoop.com/defense-contractors-chinese-government-hacking-nsa/.
    Velde, James V. 2022. “The intellectual mistakes that crippled U.S. cyber policy.” CyberScoop. https://www.cyberscoop.com/intellectual-mistakes-crippled-cyber-policy/?category_news=news.
    “The Vietnam War and the My Lai Massacre | AP US History Study Guide from The Gilder Lehrman Institute of American History.” 2023. AP Gilder Lehrman. https://ap.gilderlehrman.org/history-by-era/sixties/essays/vietnam-war-and-my-lai-massacre.
    Wagner, R. H. 1988. “Economic interdependence, bargaining power, and political influence.” EconPapers. https://econpapers.repec.org/article/cupintorg/v_3a42_3ay_3a1988_3ai_3a03_3ap_3a461-483_5f02.htm.
    Webb, Michael C. 2009. “Hegemonic Stability Theory: An Empirical Assessment.” Cambridge. https://doi.org/10.1017/S0260210500112999.
    Williamson, John. 2012. “Is the "Beijing Consensus" Now Dominant? - The National Bureau of Asian Research (NBR).” National Bureau of Asian Research. https://www.nbr.org/publication/is-the-beijing-consensus-now-dominant/.
    Wong, Sharon. 2011. “Voice of America in the post-Cold War era.” Opportunities and challenges to external media services via new information and communication technology 73 (4): 343-358. https://doi.org/10.1177/1748048511398599.
    Woo, Etienne. 2022. “Narrating the Belt and Road Education Policy: A Critical Policy Discourse Analysis.” NCBI. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9344438/.
    “Xi sends condolences to Trump on death of former U.S. President George H.W. Bush.” 2018. Ministry of Foreign Affairs of the People`s Republic of China. https://www.fmprc.gov.cn/mfa_eng/topics_665678/2018zt/xjpcxytjhzz/201812/t20181203_710030.html.
    Xu, Chi. 2022. “Digital Gordian Knot, Trade, 11.11: a Special Weekend Edition of Weekly Highlights.” https://www.chinabigidea.info/p/digital-gordian-knot-trade-1111-a.
    Zimmerman, Nicholas, Lindsay Maizland, and James M. Lindsay. 2022. “Hong Kong`s Freedoms: What China Promised and How It`s Cracking Down.” Council on Foreign Relations. https://www.cfr.org/backgrounder/hong-kong-freedoms-democracy-protests-china-crackdown.
    Zingales, Luigi. 2022. “Causes and Effects of the Lehman Brothers Bankruptcy.” PSU. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=617982783e3bda3388ac4f2305a971fb57f3f841.
    Description: 碩士
    國立政治大學
    亞太研究英語碩士學位學程(IMAS)
    109926026
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0109926026
    Data Type: thesis
    Appears in Collections:[亞太研究英語博/碩士學位學程(IDAS/IMAS)] 學位論文

    Files in This Item:

    File Description SizeFormat
    602601.pdf11920KbAdobe PDF297View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback