English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 118204/149236 (79%)
Visitors : 74392146      Online Users : 10412
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/159082


    Title: 數位時代的國家經濟安全:美國與英國因應中國網路及混合式經濟間諜行為之法律架構比較研究
    National Economic Security in the Digital Age: The United States’ and the United Kingdom’s Legal Frameworks Against Chinese Cyber and Hybrid Economic Espionage
    Authors: 楊愛恩
    Young, Judithanne Oi Yun
    Contributors: 林夏如
    Lin, Syaru Shirley
    楊愛恩
    Young, Judithanne Oi Yun
    Keywords: 網路經濟間諜
    商業機密竊取
    智慧財產權
    Cyber economic espionage
    Trade secret theft
    Intellectual property
    Date: 2025
    Issue Date: 2025-09-01 15:01:29 (UTC+8)
    Abstract: 本論文對美國與英國針對中國國家支持的網路經濟間諜問題之法律回應進行比較分析。由於現行國際法在處理跨國網路經濟間諜方面仍顯不足,各國遂依賴本國法律架構以遏止經濟間諜行為。本研究檢視了若干關鍵法規,包括美國《1996年經濟間諜法》(Economic Espionage Act of 1996)、《2016年保護商業機密法》(Defend Trade Secrets Act of 2016),以及英國《2023年國家安全法》(National Security Act 2023),並探討其他相關的刑事與民事法律。為進一步評估美國與英國法律體系的充分性,本研究亦分析若干案例研究,包括與上述問題相關之公開歸責事件。
    本研究採用比較法之功能性方法,評估兩國法律框架在執行與威懾中國國家支持之網路經濟間諜威脅方面的有效性。英國更新後的間諜罪架構擴大了其應對現代間諜威脅(包括商業機密間諜)的法律權限,惟其制度仍不成熟且缺乏公共透明度。儘管美國擁有較為完善之經濟間諜與商業機密竊取的成文法體系,但仍面臨司法管轄權限制與量刑不一致的問題。
    分析結果發現,兩國制度皆面臨處理網路經濟間諜各面向的挑戰,包括證明中國國家支持的充分證據、偵測與抓捕透過網路遠端作案之行為者等。本論文最後提出具體政策建議,以強化威懾力、促進私部門合作,並提升國際合作水平。此研究旨在促進對各國法律策略如何在數位時代中保護經濟安全、應對經濟間諜威脅的理解。
    This thesis conducts a comparative analysis of the United States' and the United Kingdom's legal responses to the problem of Chinese state-sponsored cyber and hybrid economic espionage. As current international law is insufficient in addressing transnational cyber-enabled economic espionage, states rely on their own national legal frameworks to deter economic espionage. The research examines key statutes, including the United States' Economic Espionage Act of 1996, the Defend Trade Secrets Act of 2016, and the United Kingdom's National Security Act 2023, alongside other applicable criminal and civil laws. To further assess the sufficiency of the United States' and United Kingdom's legal systems, select case studies, including public attributions of incidents associated with the highlighted problem are analyzed too. Applying the functional methodology of comparative law, the study evaluates the effectiveness of each country's legal framework in enforcement and deterrence of the threat of Chinese state-sponsored cyber economic espionage. The United Kingdom's updated espionage offense framework expands the state's legal authority to deal with modern espionage threats, including trade secrets espionage, but is still underdeveloped and lacks public transparency. Although the United States possesses a more developed statutory law framework against economic espionage and theft of trade secrets, it still struggles with jurisdictional limitations and inconsistent sentencing. The analysis finds that both systems face challenges in addressing all facets of cyber and hybrid economic espionage from providing sufficient evidence of Chinese state-sponsorship to detecting and apprehending actors operating remotely through cyberspace. The thesis concludes with targeted policy recommendations to strengthen deterrence, bolster private sector cooperation, and enhance international cooperation. This study seeks to contribute to a greater understanding of national legal strategies in safeguarding economic security against economic espionage threats in the digital age.
    Reference: Akoto, W. (2024). Who spies on whom? Unravelling the puzzle of state-sponsored cyber economic espionage. Journal of Peace Research, 61(1), 59-71.
    Beconcini, P. (2021). The State of Trade Secret Protection in China in Light of the US-China Trade Wars: Trade Secret Protection in China Before and After the US-China Trade Agreement of January 15, 2020, 20 UIC Rev. Intell. Prop. L. 108 (2021). UIC Review of Intellectual Property Law, 20(2), 2.
    Buchan, R. J. (2016). The international legal regulation of cyber espionage. Tallinn Papers, 65-86.
    Center for Responsible Enterprise and Trade (CREATe.org) & PricewaterhouseCoopers. (2014). Economic impact of trade secret theft: A framework for companies to safeguard trade secrets and mitigate potential threats. https://www.innovation-asset.com/hubfs/blog-files/CREATe.org-PwC-Trade-Secret-Theft-FINAL-Feb-2014_01.pdf
    Center, M. I. (2013). APT1: Exposing one of China’s cyber espionage units. Mandian.com.
    Computer Misuse Act 1990, c. 18. https://www.legislation.gov.uk/ukpga/1990/18
    Constantin, L. (2025, January 3). Chinese apt group Winnti stole trade secrets in years-long undetected campaign. CSO Online. https://www.csoonline.com/article/572667/chinese-apt-group-winnti-stole-trade-secrets-in-years-long-undetected-campaign.html
    Corera, G. (2022, July 7). China: MI5 and FBI heads warn of “immense” threat. BBC News. https://www.bbc.com/news/world-asia-china-62064506
    Crown Prosecution Service. (2022). Cyber / online crime. https://www.cps.gov.uk/crime-info/cyber-online-crime
    Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure, 88 Fed. Reg. 51896 (Aug. 4, 2023)
    Dagg, N., Baldwin, S., Clarke, R., & Grant, A. (2025). Trade secrets 2025. Trade Secrets 2025 - UK | Global Practice Guides | Chambers and Partners. https://practiceguides.chambers.com/practice-guides/trade-secrets-2025/uk
    Defend Trade Secrets Act of 2016 (Pub. L. No. 114-153). https://www.congress.gov/bill/114th-congress/senate-bill/1890/text
    Department for Science, Innovation and Technology. (2025, April 9). Cyber Security and Resilience Bill: Policy Statement. GOV.UK. https://www.gov.uk/government/publications/cyber-security-and-resilience-bill-policy-statement/cyber-security-and-resilience-bill-policy-statement
    Detica. (2011). The Cost of Cyber Crime. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/60942/THE-COST-OF-CYBER-CRIME-SUMMARY-FINAL.pdf
    Directive (EU) 2016/943. On the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition, use and disclosure. European Parliament and Council. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016L0943
    Doyle, C. (2016, August 19). Stealing trade secrets and economic espionage: An overview of the Economic Espionage Act [Report]. University of North Texas Libraries, UNT Digital Library. https://digital.library.unt.edu/ark:/67531/metadc958627/
    Economic Espionage Act of 1996, 18 U.S.C. §§ 1831–1839. https://www.congress.gov/104/plaws/publ294/PLAW-104publ294.pdf
    Federal Bureau of Investigation. (n.d.). Cyber incident reporting: A unified message for reporting to the federal government. https://www.fbi.gov/file-repository/cyber-incident-reporting-united-message-final.pdf/view
    Feuer, Katherine. (2015). Protecting government secrets: comparison of the espionage act and the official secrets act. Boston College International and Comparative Law Review, 38(1), 91-[i].
    Fick, N., Miscik, J., Segal, A., & Goldstein, G. M. (2022). Confronting reality in cyberspace: Foreign policy for a fragmented internet. Council on Foreign Relations. https://www.cfr.org/task-force-report/confronting-reality-in-cyberspace
    Foreign & Commonwealth Office, National Cyber Security Centre, & Jeremy Hunt MP. (2018, December 20). UK and allies Reveal Global Scale of Chinese Cyber Campaign. GOV.UK. https://www.gov.uk/government/news/uk-and-allies-reveal-global-scale-of-chinese-cyber-campaign
    Foreign, Commonwealth & Development Office, National Cyber Security Centre, & The Rt Hon Dominic Raab. (2021, July 19). UK and allies hold Chinese state responsible for a pervasive pattern of hacking. GOV.UK. https://www.gov.uk/government/news/uk-and-allies-hold-chinese-state-responsible-for-a-pervasive-pattern-of-hacking
    Foreign, Commonwealth & Development Office, National Cyber Security Centre, Cabinet Office, Home Office, The Rt Hon Lord Cameron, The Rt Hon James Cleverly MP, & The Rt Hon Oliver Dowden CBE MP. (2024, March 25). UK holds China state-affiliated organisations and individuals responsible for malicious cyber activity. GOV.UK. https://www.gov.uk/government/news/uk-holds-china-state-affiliated-organisations-and-individuals-responsible-for-malicious-cyber-activityGOV.UK
    Fraud Act 2006, c. 35. https://www.legislation.gov.uk/ukpga/2006/35
    Gilmore, A., & Latham-Koenig, D. (2025, March 6). In defence of the realm – the national security act 2023 and the role of private investigators. Solicitors Journal. https://www.solicitorsjournal.com/sjarticle/in-defence-of-the-realm--the-national-security-act-2023-and-the-role-of-private-investigators
    Government Digital Service. (2024, August 19). New espionage offences: Factsheet. GOV.UK. https://www.gov.uk/government/publications/national-security-bill-factsheets/espionage-etc-national-security-bill-factsheet
    Grabiszewski, K., & Minor, D. (2018). Economic Espionage. Defence and Peace Economics, 30(3), 269–277. https://doi.org/10.1080/10242694.2018.1477400
    Guo, E., Aloe, J., & Hao, K. (2022, May 11). The US crackdown on Chinese economic espionage is a mess. We have the data to show it. MIT Technology Review. https://www.technologyreview.com/2021/12/02/1040656/china-initative-us-justice-department/
    Hamilton, F. (2023, October 17). China targets 20,000 officials in economic espionage surge. The Times & The Sunday Times. https://www.thetimes.com/business-money/technology/article/china-targets-20-000-officials-in-economic-espionage-surge-hrncc2xkz
    Harnisch, S., & Zettl-Schabath, K. (2023). Secrecy and Norm Emergence in Cyber-Space. The US, China and Russia Interaction and the Governance of Cyber-Espionage. Democracy and Security, 19(1), 82-110.
    https://www3.ntd.com/eu-sanctions-cyber-attackers-for-first-time
    Indictment: United States v. Jiang Lizhi, Qian Chuan, and Fu Qiang (No. 1:20-cr-00154). (2020). U.S. District Court for the District of Columbia.
    Information Commissioner’s Office. (n.d.). Incident reporting under the NIS Regulations. https://ico.org.uk/for-organisations/the-guide-to-nis/incident-reporting/
    Jarvis, D. (2025). Foreign influence registration scheme implementation. GOV.UK. https://www.gov.uk/government/speeches/foreign-influence-registration-scheme-implementation
    Jensen, B. (2023). How the Chinese Communist Party uses cyber espionage to undermine the American economy. CSIS.
    KC, B. J., & Burges, T. (2024). How to prosecute a spy: the National Security Act 2023 in context. Archibold Review, 6, 5-10. https://redlionchambers.co.uk/wp-content/uploads/2024/07/Archbold-Review-Issue-6-2024.pdf
    Kendall, S. (2024). Espionage law in the UK and Australia: Balancing effectiveness and appropriateness. The Cambridge Law Journal, 83(1), 62-98.
    Lifhits, Jenna. (2024). Sentencing economic espionage in an era of great power competition. Georgetown Journal of Law & Public Policy, 22(1), 353-[ii].
    Lincenberg, G. S., & Shakow, P. J. (2014). The Secret No More: The Rise of Economic Espionage Prosecutions and How to Litigate Them. Crim. Just., 29, 15.
    Lotrionte, C. (2015). Countering state-sponsored cyber economic espionage under international law. North Carolina Journal of International Law and Commercial Regulation, 40(2), 443-54.
    Madubuko, C. C., & Chitsungo, C. (2024). The Evolution of China’s Cyber-Espionage Tactics: From Traditional Espionage to AI-Driven Cyber Threats against Critical Infrastructure in the West. American Journal of International Relations, 9(4), 25-50.
    Maness, R. C., Macias, A., Mond, J., Hedgecock, K., Jensen, B., & Ziegler, R. (2023). Expanding the Dyadic Cyber Incident and Campaign Dataset (DCID): Cyber conflict from 2000 to 2021. The Cyber Defense Review, 8(2), 39–55. https://cyberdefensereview.army.mil/Portals/6/Documents/2023_Summer/Maness_Macias%20et%20al%20CDR%20V8N2%20Summer%202023.pdf
    Manion, P. J. (2016). Two Steps Forward, One Step Back: The Defend Trade Secrets Act of 2016 and Why the Computer Fraud and Abuse Act of 1984 Still Matters for Trade Secret Misappropriation. J. Legis., 43, 289.
    Marvin, M. (2023, April 21). Could bespoke malware target your organization?. Portnox. https://www.portnox.com/blog/network-security/could-bespoke-malware-target-your-organization/
    McCallum, K. (2024). Director general Ken McCallum gives latest Threat update. https://www.mi5.gov.uk/director-general-ken-mccallum-gives-latest-threat-update
    Michaels, R. (2006). The Functional Method of Comparative Law. The Oxford Handbook of Comparative Law (pp. 339-382). https://scholarship.law.duke.edu/faculty_scholarship/1249
    Montasari, R. (2023).Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity. Springer International Publishing AG.
    Moynihan, H. (2019, December). The application of international law to state cyberattacks: Sovereignty and non intervention (Research Paper). Chatham House. https://www.chathamhouse.org/sites/default/files/publications/research/2019-11-29-Intl-Law-Cyberattacks.pdf
    Nasheri, H. (2023). State-sponsored economic espionage in cyberspace: Risks and preparedness. In Cybercrime in the pandemic digital age and beyond (pp. 87-107). Cham: Springer International Publishing.
    Nasu, H. (2015). STATE SECRETS LAW AND NATIONAL SECURITY. International and Comparative Law Quarterly, 64(2), 365–404. doi:10.1017/S0020589315000056
    National Counterintelligence and Security Center (2021, August 19). HAFNIUM compromises MS Exchange Servers (No. 1:20-cr-00154). National Counterintelligence and Security Center. https://www.dni.gov/files/NCSC/documents/SafeguardingOurFuture/HAFNIUM%20Compromises%20MS%20Exchange%20Servers.pdf
    National Cyber Security Centre. (2017, April 3). Global targeting of enterprises via managed service providers. NCSC. https://www.ncsc.gov.uk/information/global-targeting-enterprises-managed-service-providers
    National Cyber Security Centre. (2018, December 10). Alert: APT10 continues to target UK organisations across ... NCSC. https://www.ncsc.gov.uk/files/APT10%20advisory%20v2.pdf
    National Cyber Security Centre. (2023, August 23). Categorising UK cyber incidents. https://www.ncsc.gov.uk/information/categorising-uk-cyber-incidents
    National Cyber Security Centre. (2025). Cyber Incident Response. NCSC. https://www.ncsc.gov.uk/schemes/cyber-incident-response
    National Security Act 2023, c. 32. https://www.legislation.gov.uk/ukpga/2023/32/section/2
    Nocturnus, C. (2024). Operation cuckoobees: Cybereason uncovers massive Chinese intellectual property theft operation. Cybersecurity Software. https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation
    O’Connor, I. (2024, July 24). Watch out Europe: China is stealing your chip secrets. CEPA. https://cepa.org/article/watch-out-europe-china-is-stealing-your-chip-secrets/
    Official Secrets Act 1889, 52 & 53 Vict. c. 52. https://www.legislation.gov.uk/ukpga/Vict/52-53/52/enacted
    Official Secrets Act 1911, c. 28. https://www.legislation.gov.uk/ukpga/Geo5/1-2/28
    Official Secrets Act 1920, c. 75. https://www.legislation.gov.uk/ukpga/Geo5/10-11/75
    Official Secrets Act 1989, c. 6. https://www.legislation.gov.uk/ukpga/1989/6
    Pacini, C., & Placid, R. (2009). The importance of state trade secret laws in deterring trade secret espionage. Buffalo Intellectual Property Law Journal, 7(1), 101. https://digitalcommons.law.buffalo.edu/buffaloipjournal/vol7/iss1/4
    Pietsch, I.M. (2023, September 12). Trade secrets misappropriation: A new criminal offence in the UK. Global Policy Watch. https://www.globalpolicywatch.com/2023/09/trade-secrets-misappropriation-a-new-criminal-offence-in-the-uk/
    PwC UK, & BAE Systems. (2017, April). Operation Cloud Hopper. PwC UK. https://www.pwc.co.uk/cyber-security/pdf/pwc-uk-operation-cloud-hopper-report-april-2017.pdf
    Pytlak, A., & Lad, S. (2024, November 22). Confront the cybersecurity challenge. Stimson Center. https://www.stimson.org/2024/confront-the-cybersecurity-challenge/
    Reid, M. (2016). A comparative approach to economic espionage: is any nation effectively dealing with this global threat. U. Miami L. Rev., 70, 757.
    Rowe, B. I. (2020). Transnational state-sponsored cyber economic espionage: a legal quagmire. Security Journal, 33(1), 63-82. https://doi.org/10.1057/s41284-019-00197-3
    Rowe, E. A. (2023). Academic Economic Espionage? William & Mary Law Review, 65(1), 1–77.
    Rubio, M. (2025, May 28). New visa policies put America first, not China. U.S. Department of State. https://www.state.gov/releases/office-of-the-spokesperson/2025/05/new-visa-policies-put-america-first-not-china/
    Ruppert, Kathleen (2010). In G.P. Hastedt (Ed.). Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage [2 volumes] (pp. 577–598). Santa Barbara: ABC-CLIO. https://www.bloomsburycollections.com/encyclopedia-chapter?docid=b-9798216017486&tocid=b-9798216017486-0000185
    Sarclad Ltd v APT Technology [2014] EWHC 2440 (Ch).
    Schmitt, M. N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (2nd ed.). Cambridge: Cambridge University Press.
    Scott, P. F. (2024). ‘State threats’, security, and democracy: the National Security Act 2023. Legal Studies, 44(2), 260–276. doi:10.1017/lst.2023.39
    Siddiqui, Z. (2023). Five eyes intelligence chiefs warn on China’s “theft” of intellectual property | reuters. Reuters. https://www.reuters.com/world/five-eyes-intelligence-chiefs-warn-chinas-theft-intellectual-property-2023-10-18/
    Simon, S. (1998). The Economic Espionage Act and the threat to national security. Berkeley Technology Law Journal, 13(1), 305–318. https://btlj.org/data/articles2015/vol13/13_1_AR/13-berkeley-tech-l-j-0305-0318.pdf
    Skinner, C. P. (2013). An international law response to economic cyber espionage. Conn. L. Rev., 46, 1165.
    The Director of the Serious Fraud Office v. Jiang, [2023] EWHC 1810 (Admin).
    Thomas, R. (2016). Espionage and Secrecy (Routledge Revivals): The Official Secrets Acts 1911-1989 of the United Kingdom. Routledge.
    Trade Secrets (Enforcement, etc.) Regulations 2018, S.I. 2018/597. https://www.legislation.gov.uk/uksi/2018/597
    Trade Wars: Trade Secret Protection in China Before and After the US-China Trade Agreement of January 15, 2020, 20 UIC Rev. Intell. Prop. L. 108 (2021). UIC Review of Intellectual Property Law, 20(2), 2.
    U.S. Attorney’s Office, Northern District of New York. (2023, January 3). GE Power Engineer Sentenced for Conspiracy to Commit Economic Espionage. U.S. Department of Justice. https://www.justice.gov/usao-ndny/pr/former-ge-power-engineer-sentenced-conspiracy-commit-economic-espionage
    U.S. Commission On The Theft Of American Intellectual Property (2013). Commission on the Theft of American Intellectual Property IP Commission Report. United States. https://www.loc.gov/item/lcwaN0009018/.
    U.S. Commission on the Theft of American Intellectual Property. (2017). Commission on the Theft of American Intellectual Property Update To The IP Commission Report. National Bureau of Asian Research. https://www.nbr.org/wp-content/uploads/pdfs/publications/IP_Commission_Report_Update.pdf
    U.S. Department of Justice. (2018, December 20). Two Chinese hackers associated with the Ministry of State Security charged with global computer intrusion campaigns targeting intellectual property and confidential business information (DOJ 18-454) [Press release]. https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion
    U.S. Department of Justice. (2020, September 6). Seven International Cyber Defendants, Including “Apt41” Actors, Charged In Connection With Computer Intrusion Campaigns Against More Than 100 Victims Globally. Archives U.S. Department of Justice. https://www.justice.gov/archives/opa/pr/seven-international-cyber-defendants-including-apt41-actors-charged-connection-computer
    U.S. Department of Justice. (2021) Information About the Department of Justice’s China Initiative and a Compilation of China-Related Prosecutions Since 2018. Archives U.S. Department of Justice. https://www.justice.gov/archives/nsd/information-about-department-justice-s-china-initiative-and-compilation-china-related#:~:text=Background,all%20trade%20secret%20theft%20cases.
    U.S. Department of Justice. (2022, November 16). Chinese government intelligence officer sentenced to 20 years in prison for espionage crimes, attempting to steal trade secrets from Cincinnati Company. Archives U.S. Department of Justice. https://www.justice.gov/archives/opa/pr/chinese-government-intelligence-officer-sentenced-20-years-prison-espionage-crimes-attempting
    U.S. Department of the Treasury. (2024, March 25). Treasury sanctions China-linked hackers for targeting U.S. critical infrastructure. https://home.treasury.gov/news/press-releases/jy2205
    Uniform Trade Secrets Act, §§ 1–12. (1985). https://www.wipo.int/wipolex/en/legislation/details/3934
    United States v. Xu, 114 F.4th 829 (C.A.6 (Ohio), 2024)
    United States v. Yihao Pu, 814 F.3d 818 (7th Cir. 2016)
    United States v. You, 76 F.4th 741 (6th Cir. 2023).
    United States v. Zheng, 113 F.4th 280 (2d Cir. 2024), cert. denied, No. 24-604, 2025 WL 1020366 (U.S. Apr. 7, 2025)
    Valeriano, B. (2022). Dyadic Cyber Incident Dataset v 2.0 [Data set]. Harvard Dataverse. https://doi.org/10.7910/DVN/CQOMYV
    Wang, Q. (2016, December 15). A Comparative Study of Cybercrime in Criminal Law: China, US, England, Singapore and the Council of Europe. http://hdl.handle.net/1765/94604
    Williams, R. D. (2021, October 12). Reckoning with cyberpolicy contradictions in great power politics. Brookings Institution. https://www.brookings.edu/articles/reckoning-with-cyberpolicy-contradictions-in-great-power-politics/
    Wang, Y. (2023). Trade secrets laws and technology spillovers. Research Policy, 52(7), 104794.
    Wang, Y. (2023). Trade secrets laws and technology spillovers. Research Policy, 52(7), 104794.
    Xu v. Corbiere Ltd, [2018] EWCA Civ 1899, [2018] 4 W.L.R. 125 (Eng.).
    Yong, N. (2023, January 16). Industrial espionage: How china sneaks out america’s technology secrets. BBC News. https://www.bbc.com/news/world-asia-china-64206950
    Zhou, L. (2020, August 31). EU sanctions cyber attackers for first time. NTD.
    Zweigert, K., & Kötz, H. (1998). Introduction to comparative law (T. Weir, Trans., 3rd ed.). Oxford University Press.
    Description: 碩士
    國立政治大學
    亞太研究英語碩士學位學程(IMAS)
    112926026
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0112926026
    Data Type: thesis
    Appears in Collections:[亞太研究英語博/碩士學位學程(IDAS/IMAS)] 學位論文

    Files in This Item:

    File Description SizeFormat
    602601.pdf995KbAdobe PDF0View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback