:::

詳目顯示

回上一頁
題名:習近平時期美中網路安全競逐
書刊名:遠景基金會季刊
作者:朱志平梁德昭
作者(外文):Chu, Chih-pingLiang, Te-chao
出版日期:2016
卷期:17:2
頁次:頁1-63
主題關鍵詞:網路安全攻勢現實主義新型大國關係美中關係網路犯罪Cyber securityOffensive realismNew type of major power relationsU.S.-China relationsCybercrime
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:3
  • 點閱點閱:31
在習近平於2012 年底中共十八大接班成為中國領導人之前,美國與中國大陸在網路安全領域的齟齬便時有所聞,迄今亦為兩國關係焦點之一。在網路安全領域,美國可說傲視群倫,然隨著中國政經實力崛起之後,已不時傳出對美尋釁之舉。不論是政經領域的竊密、軍事領域的抗衡,甚至是國內立法的管制,中國可說無時不與美國競逐,除實現習近平所謂「網絡強國」之目標外,更有意挑戰美國之領導地位。因此,本文主要目的係從攻勢現實主義視角,結合政經、軍事及國內管制面向之案例,析論美中兩國於習近平時期在網路安全領域之競逐。
Since Xi Jinping became the leader of the People’s Republic of China (PRC) at the 18th National Congress of the Chinese Communist Party (CCP) in 2012, cyber security has been the focus of U.S.-China relations. The U.S. currently holds an obvious advantage in the cyber security field, however, the PRC has been tempted to compete with the U.S. when it comes to cybercrime in the area of economic and political security, military disputes and control over domestic legislation. The PRC aims not only to realize President Xi’s pledge to become a strong cyber power, but also to challenge the leading status of the U.S.. The main purpose of this article is to assess the competitive relationship between the U.S. and the PRC under Xi’s leadership in respect to cyber security via offensive realism. The paper presents case studies on politics, economics, the military and internal control.
期刊論文
1.梁德昭、朱志平、林凱薰(20121100)。國家主權延伸至網路空間之討論。前瞻科技與管理,2(2),1-14。new window  延伸查詢new window
2.左曉棟(2014)。近年中美網絡安全貿易糾紛回顧及其對網路安全審查制度的啟示。中國信息安全,2014(8),69-72。  延伸查詢new window
3.朱莉欣、武蘭(2013)。探秘美國網絡空間安全的法律之盾。中國信息安全,2013(3),76-80。  延伸查詢new window
4.吳任傑(20131100)。中共網軍發展研究。陸軍後勤季刊,102(4),101-116。new window  延伸查詢new window
5.周琪、汪曉風(2013)。網絡安全與中美新型大國關係。當代世界,2013(11),30-34。  延伸查詢new window
6.徐俊勇、崔在華、元芳(2014)。美國網絡空間軍事力量發展情況分析。中國信息安全,2014(1),41-44。  延伸查詢new window
7.陳國輝(20100800)。共軍組建信息保障基地意涵。展望與探索,8(8),21-25。  延伸查詢new window
8.閻曉麗(2014)。對美國起訴中國軍人網路竊密的法律思考。中國信息安全,2014(6),89-91。  延伸查詢new window
9.Lindsay, Jon R.(2014)。The Impact of China on Cybersecurity: Fiction and Friction。International Security,39(3),7-47。  new window
10.Gompert, David C.、Libicki, Martin(2014)。Cyber Warfare and Sino-American Crisis Instability。Survival,56(4),7-22。  new window
圖書
1.Heginbotham, Eric(2015)。The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017。RAND Corporation。  new window
2.Mearsheimer, John J.、Alterman, G.(2001)。The Tragedy of Great Power Politics。W. W. Norton & Company。  new window
其他
1.習近平(20131115)。關於中共中央關於全面深化改革若干重大問題的決定的說明,http://news.xinhuanet.com/politics/2013-11/15/c_118164294.htm。  延伸查詢new window
2.(20120308)。報告:中國網絡戰爭能力危及美國軍隊,http://www.bbc.com/zhongwen/trad/science/2012/03/120308_us_china_cyberwar.shtml。  延伸查詢new window
3.(20121008)。美國認定華為中興威脅其國家安全,http://www.bbc.com/zhongwen/trad/chinese_news/2012/10/121008_us_china_huaweizte。  延伸查詢new window
4.(20130608)。談網路攻擊習近平:中國也是受害者,http://www.ettoday.net/news/20130608/219833.htm。  延伸查詢new window
5.楊婷(20140227)。習近平:把我國從網絡大國建設成為網絡強國,http://news.xinhuanet.com/politics/2014-02/27/c_119538788.htm。  延伸查詢new window
6.(20140520)。國家互聯網信息辦公室公布美國攻擊中國網絡最新數據,http://news.xinhuanet.com/politics/2014-05/20/c_126520505.htm。  延伸查詢new window
7.(20140522)。中央國家機關政府採購電腦對Win8 說''不'',http://zqb.cyol.com/html/2014-05/22/nw.D110000zgqnb_20140522_1-12.htm。  延伸查詢new window
8.(20140522)。國家網信辦:我國將出臺網路安全審查制度,http://www.cac.gov.cn/2014-05/22/c_126534290.htm。  延伸查詢new window
9.(20140711)。柯瑞:中國駭客製造寒蟬效應,http://www.worldjournal.com/266365/article-%E6%9F%AF%E7%91%9E%EF%BC%9A%E4%B8%AD%E5%9C%8B%E9%A7%AD%E5%AE%A2-%E8%A3%BD%E9%80%A0%E5%AF%92%E8%9F%AC%E6%95%88%E6%87%89/?npg=2。  new window
10.(20140717)。習近平巴西談互聯網治理,http://politics.people.com.cn/BIG5/n/2014/0717/c1024-25296103.html。  new window
11.(20150706)。網路安全法(草案),http://www.npc.gov.cn/npc/xinwen/lfgz/flca/2015-07/06/content_1940614.htm。  new window
12.(20150710)。中華人民共和國國家安全法,http://npc.people.com.cn/BIG5/n/2015/0710/c14576-27285049.html。  延伸查詢new window
13.(20151216)。習近平在第二屆世界互聯網大會開幕式上的講話(全文),http://cpc.people.com.cn/BIG5/n1/2015/1216/c64094-27937316.html。  延伸查詢new window
14.(20160407)。美建逾百支網軍主攻中俄,http://news.takungpao.com.hk/world/exclusive/2016-04/3302887.html。  延伸查詢new window
15.中央社(20130516)。美媒點名陸4高校涉及駭客行為,http://www.chinatimes.com/realtimenews/20130516005087-260409。  延伸查詢new window
16.中央社(20130705)。中美網路小組將舉行首次會議,http://www.chinatimes.com/realtimenews/20130705004146-260409。  延伸查詢new window
17.中國互聯網絡資訊中心(20150722)。第36次中國互聯網絡發展狀況統計報告,https://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201507/t20150722_52624.htm。  延伸查詢new window
18.中華人民共和國外交部(20140520)。中方強力反擊美方「起訴」中方人員,http://www.fmprc.gov.cn/web/fyrbt_673021/dhdw_673027/t1157508.shtml。  延伸查詢new window
19.支林飛(20130710)。張業遂和伯恩斯共同主持第三次中美戰略安全對話,http://www.gov.cn/jrzg/2013-07/10/content_2443808.htm。  延伸查詢new window
20.江蔚(20140227)。中央網絡安全和信息化領導小組成立:從網絡大國邁向網絡強國,http://news.xinhuanet.com/2014-02/27/c_119538719.htm。  延伸查詢new window
21.沈丁立(20130617)。美國賊喊捉賊貽害世界,http://opinion.huanqiu.com/opinion_world/2013-06/4031340.html。  延伸查詢new window
22.武竹(20140526)。美國思科路由器預置''後門''意欲何為,http://article.cyol.com/news/content/2014-05/26/content_10138288.htm。  延伸查詢new window
23.柳芳(20150926)。美中首腦達共識不從事網絡商業間諜活動,http://www.epochtimes.com/b5/15/9/26/n4536290.htm。  延伸查詢new window
24.秦安(20130604)。對美國''八大金剛''不能不設防,http://opinion.huanqiu.com/opinion_world/2013-06/3997929.html。  延伸查詢new window
25.程靜(20150212)。美中9月峰會網絡安全或成焦點,http://www.epochtimes.com/b5/15/2/12/n4364927.htm。  延伸查詢new window
26.賈秀東(20130709)。網絡安全不容「霸王條款」,http://paper.people.com.cn/rmrbhwb/html/2013-07/09/content_1265989.htm。  延伸查詢new window
27.管淑平(20110826)。解放軍「駭」美/央視播出「證據」中國賴不掉,http://news.ltn.com.tw/news/world/paper/519296。  延伸查詢new window
28.劉屏,朱建陵(20140520)。涉竊150家公司機密美政府告解放軍5軍官,http://www.chinatimes.com/newspapers/20140520000344-260102。  延伸查詢new window
29.檀有志(20150804)。中國網絡安全法草案的外揚與內抑,http://www.ftchinese.com/story/001063323?full=y。  延伸查詢new window
30.(20130313)。Transcript: President Obama's Exclusive Interview With George Stephanopoulos,http://abcnews.go.com/blogs/politics/2013/03/transcript-president-obamas-interview-with-georgestephanopoulos/。  new window
31.Clapper, James R.(20110310)。Statement for the Record on the Worldwide Threat Assessment of the U.S. Intelligence Community for the Senate Committee on Armed Services,https://www.dni.gov/files/documents/Newsroom/Testimonies/20110310_testimony_clapper.pdf。  new window
32.Abdollah, Tami(20151110)。US official: Charges possible if Chinese hackers keep it up,http://www.businessinsider.com/ap-us-official-charges-possible-if-chinese-hackers-keep-it-up-2015-11。  new window
33.Barboza, David(20130310)。In Wake of Cyberattacks, China Seeks New Rules,http://www.nytimes.com/2013/03/11/world/asia/china-calls-for-global-hacking-rules.html?_r=0。  new window
34.Barboza, David(20140227)。China's President Will Lead a New Effort on Cybersecurity,http://www.nytimes.com/2014/02/28/world/asia/china-announces-new-cybersecurity-push.html。  new window
35.Clapper, James R.(20130312)。Statement for the Record, Worldwide Threat Assessment of the U.S. Intelligence Community,http://www.dni.gov/files/documents/Intelligence%20Reports/2013%20ATA%20SFR%20for%20SSCI%2012%20Mar%202013.pdf。  new window
36.Cook, James(20141006)。FBI Director: China Has Hacked Every Big US Company,http://www.businessinsider.com/fbi-director-china-has-hacked-every-big-us-company-2014-10。  new window
37.Crawford, Jamie(20141121)。The U.S. government thinks China could take down the power grid,http://edition.cnn.com/2014/11/20/politics/nsa-china-power-grid/。  new window
38.Creemers, Rogier(20150410)。Disarming the Great Cannon,https://foreignpolicy.com/2015/04/10/great-cannon-china-internet-cyber-attack-baidu。  new window
39.Daniel, J. Michael,Holleyman, Robert,Niejelow, Alex(20150204)。China's Undermining an Open Internet,http://www.politico.com/magazine/story/2015/02/china-cybersecurity-114875。  new window
40.Gates, Robert M.(20090623)。Memorandum to Secretaries of the Military Departments, Subject: Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations,http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-029.pdf。  new window
41.Deal, Jacqueline Newmyer(20150713)。How the U.S. Should Respond to the Latest Chinese Hack,http://www.nationalreview.com/article/421105/how-us-should-respond-latest-chinesehack-jacqueline-newmyer-deal。  new window
42.Dewey, Caitlin(20130528)。The U.S. weapons systems that experts say were hacked by the Chinese,https://www.washingtonpost.com/blogs/worldviews/wp/2013/05/28/the-u-s-weapons-systems-that-experts-say-were-hacked-by-the-chinese。  new window
43.Gellman, Barton,Poitras, Laura(20130607)。U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program,https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html, 。  new window
44.Gertz, Bill(20130730)。China's Military Preparing for 'People's War' in Cyberspace, Space,http://freebeacon.com/national-security/china-military-preparing-for-peoples-war-in-cyberspace-space/。  new window
45.Groll, Elias(20150902)。The U.S. Hoped Indicting 5 Chinese Hackers Would Deter Beijing's Cyberwarriors. It Hasn't Worked,http://foreignpolicy.com/2015/09/02/the-u-s-hoped-indicting-5-chinese-hackers-would-deter-beijings-cyberwarriors-it-hasntworked。  new window
46.Fergus, Hanson(20140521)。Moving Past Snowden,http://www.brookings.edu/blogs/up-front/posts/2014/05/21-theft-us-intellectual-property-snowden-hanson。  new window
47.Zachary, Keck(20140910)。China's Military Creates New Space Force,http://thediplomat.com/2014/09/chinas-military-createsnew-space-force/。  new window
48.Robert, Kehler, C.(20090819)。Twenty-Fourth Air Force Activation,http://www.24af.af.mil/news/story.asp? id=123163965。  new window
49.Krekel, Bryan,Adams, Patton,Bakos, George(20120307)。Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage,http://origin.www.uscc.gov/sites/default/files/Research/USCC_Report_Chinese_Capabilities_for_Computer_Network_Operations_and_Cyber_%20Espionage.pdf。  new window
50.Landler, Mark,Sanger, David E.(20130311)。U.S. Demands China Block Cyberattacks and Agree to Rules,http://www.nytimes.com/2013/03/12/world/asia/us-demands-that-china-endhacking-and-set-cyber-rules.html?rref=collection%2Ftimestopic%2FDonilon%2C%20Thomas%20E.&action=click&contentCollection=timestopics®ion=stream&module=stream_unit&version=latest&contentPlacement=10&pgtype=collection&_r=0。  new window
51.Logan, Sarah(20150504)。Beijing's Great Cannon exposes vulnerable Chinese tech firms,http://www.lowyinterpreter.org/post/2015/05/04/Beijings-Great-Cannon-exposes-vulnerable-Chinese-tech-firms.aspx。  new window
52.Michael, Maloof, F.(20120701)。China: Pervasive access' to 80% of telecoms,http://www.wnd.com/2012/07/chinese-have-pervasiveaccess-to-80-of-worlds-telecoms/。  new window
53.Mandiant(2013)。APT1: Exposing One of China's Cyber Espionage Unit,http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf, 20130220。  new window
54.Michael, Martina(20130329)。Quarter of U.S. firms in China face data theft: business lobby,http://www.reuters.com/article/uschina-us-hacking-idUSBRE92S02P20130329。  new window
55.Mazzetti, Mark,Sanger, David E.(20130312)。Security Leader Says U.S. Would Retaliate Against Cyberattacks,http://www.nytimes.com/2013/03/13/us/intelligence-official-warns-congress-that-cyberattacks-pose-threat-to-us.html。  new window
56.Mazzetti, Mark,Sanger, David E.(20150724)。U.S. Fears Data Stolen by Chinese Hacker Could Identify Spies,http://www.nytimes.com/2015/07/25/world/asia/us-fears-data-stolen-by-chinese-hacker-could-identify-spies.html。  new window
57.McLeary, Paul,Francis, David(20150409)。Pentagon Says It Is Moving to Protect Its Cyber Flanks,https://foreignpolicy.com/2015/04/09/pentagon-says-it-is-moving-to-protect-its-cyber-flanks/。  new window
58.Mozur, Paul(20150205)。Trade Groups Urge U.S. to Push Against Chinese Regulations,http://bits.blogs.nytimes.com/2015/02/05/trade-groups-urge-u-s-to-push-against-chinese-regulations/?_r=0。  new window
59.Mozur, Paul,Goel, Vindu(20141005)。To Reach China, LinkedIn Plays by Local Rules,http://www.nytimes.com/2014/10/06/technology/to-reach-china-linkedin-plays-by-local-rules.html?_r=0。  new window
60.Nye, Joseph S., Jr.(20120410)。Cyber War and Peace,http://globalpublicsquare.blogs.cnn.com/2012/04/10/nye-cyber-war-andpeace/。  new window
61.Office of Public Affairs,U.S. Department of Justice(20140519)。U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage,http://www.justice.gov/opa/pr/uscharges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor。  new window
62.Office of the Secretary of Defense(20130506)。Annual Report to Congress: Military and Security Developments Involving the People's Republic of China 2013,http://archive.defense.gov/pubs/2013_China_Report_FINAL.pdf。  new window
63.Open Source Center(20111005)。Huawei Annual Report Details Directors, Supervisory Board for First Time,http://fas.org/irp/dni/osc/huawei.pdf。  new window
64.Pennington, Matthew(20150203)。Intel chief warns US tech threatened by China cybertheft,http://bigstory.ap.org/article/9d713a5fd6ab45d6b962bd380023e1d6/intel-chief-warns-us-tech-threatened-china-cybertheft。  new window
65.Perlroth, Nicole(20130314)。Cyberattacks a Topic in Obama Call With New Chinese President,http://bits.blogs.nytimes.com/2013/03/14/cyberattacks-prominent-in-obama-call-with-new-chinese-president/?_r=0。  new window
66.Perlroth, Nicole(20140609)。2nd China Army Unit Implicated in Online Spying,http://www.nytimes.com/2014/06/10/technology/private-report-further-details-chinese-cyberattacks.html?_r=0。  new window
67.Sanger, David E.(20140406)。U.S. Tries Candor to Assure China on Cyberattacks,http://www.nytimes.com/2014/04/07/world/us-tries-candor-to-assure-china-on-cyberattacks.html?_r=0。  new window
68.Sanger, David E.(20150731)。U.S. Decides to Retaliate Against China's Hacking,http://www.nytimes.com/2015/08/01/world/asia/us-decides-to-retaliate-against-chinas-hacking.html。  new window
69.Sanger, David E.(20150919)。U.S. and China Seek Arms Deal for Cyberspace,http://www.nytimes.com/2015/09/20/world/asia/us-and-china-seek-arms-deal-for-cyberspace.html。  new window
70.Sanger, David E.(20150923)。Hackers Took Fingerprints of 5.6 Million U.S. Workers, Government Says,http://www.nytimes.com/2015/09/24/world/asia/hackers-took-fingerprints-of-5-6-million-us-workers-government-says.html。  new window
71.Sanger, David E.(20160424)。U.S. Cyberattacks Target ISIS in a New Line of Combat,http://www.nytimes.com/2016/04/25/us/politics/us-directs-cyberweapons-at-isis-for-firsttime.html?_r=0。  new window
72.Sanger, David E.,Davis, Julie Hirschfeld(20150604)。Hacking Linked to China Exposes Millions of U.S. Workers,http://www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html?_r=0。  new window
73.Sanger, David E.,Davis, Julie Hirschfeld(20150610)。Hackers May Have Obtained Names of Chinese With Ties to U.S. Government,http://www.nytimes.com/2015/06/11/world/asia/hackers-may-have-obtained-names-of-chinese-with-ties-to-us-government.html。  new window
74.Sanger, David E.,Landler, Mark(20130601)。U.S. and China Agree to Hold Regular Talks on Hacking,http://www.nytimes.com/2013/06/02/world/asia/us-and-china-to-hold-talks-onhacking.html。  new window
75.Sanger, David E.,Shanker, Thom(20130203)。Broad Powers Seen for Obama in Cyberstrikes,http://www.nytimes.com/2013/02/04/us/broad-powers-seen-for-obama-in-cyberstrikes.html。  new window
76.Sanger, David E.,Barboza, David,Perlroth, Nicole(20130218)。Chinese Army Unit Is Seen as Tied to Hacking Against U.S.,http://www.nytimes.com/2013/02/19/technology/chinas-armyis-seen-as-tied-to-hacking-against-us.html?_r=0。  new window
77.Sanger, David E.,Perlroth, Nicole,Shear, Michael D.(20150620)。Attack Gave Chinese Hackers Privileged Access to U.S. Systems,http://www.nytimes.com/2015/06/21/us/attack-gave-chin-ese-hackers-privileged-access-to-us-systems.html?_r=0。  new window
78.Schmidt, Michael S.,Sanger, David E.,Perlroth, Nicole(20140709)。Chinese Hackers Pursue Key Data on U.S. Workers,http://www.nytimes.com/2014/07/10/world/asia/chinese-hackers-pursue-key-data-on-us-workers.html?_r=0, 。  new window
79.Segal, Adam(20140519)。Department of Justice Indicts Chinese Hackers: What Next?,http://blogs.cfr.org/asia/2014/05/19/department-of-justice-indicts-chinese-hackers-what-next/。  new window
80.Segal, Adam(20150803)。Revealed: Why China and America are Set to Clash in Cyberspace,http://www.nationalinterest.org/blog/the-buzz/revealed-why-china-america-are-set-clash-cyberspace-13479。  new window
81.Stokes, Mark A.,Lin, Jenny,Hsiao, L. C. Russell(20111111)。The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure,http://project2049.net/documents/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf。  new window
82.United States Army Cyber Command and Second Army(20150415)。Establishment of U.S. Army Cyber Command,http://www.arcyber.army.mil/Organization/ARCYBERHistory。  new window
83.U.S. China Economic,Security Review Commission(20151117)。2015 Report to Congress of the U.S. China Economic and Security Review Commission,http://origin.www.uscc.gov/sites/default/files/annual_reports/2015%20Annual%20Report%20to%20Congress.PDF。  new window
84.United States Department of Defense(20140304)。Quadrennial Defense Review 2014,http://archive.defense.gov/pubs/2014_Quadrennial_Defense_Review.pdf。  new window
85.United States Department of Defense(20150415)。The Department of Defense Cyber Strategy,http://www.defense.gov/News/Special-Reports/0415_Cyber-Strategy。  new window
86.United States Intelligence Community(20160209)。Worldwide Threat Assessment of the US Intelligence Community,http://www.armed-services.senate.gov/imo/media/doc/Clapper_02-09-16.pdf。  new window
87.United States Navy(20100129)。Navy Stands Up Fleet Cyber Command, Reestablishes U.S. 10th Fleet,http://www.navy.mil/submit/display.asp?story_id=50954。  new window
88.United States Office of Personnel Management(20150604)。OPM to Notify Employees of Cybersecurity Incident,https://www.opm.gov/news/releases/2015/06/opm-to-notify-employees-of-cybersecurity-incident/。  new window
89.The White House(20120214)。Remarks by Vice President Biden and Chinese Vice President Xi at the State Department Luncheon,https://www.whitehouse.gov/the-press-office/2012/02/14/remarks-vice-president-biden-and-chinese-vice-president-xi-state-departm。  new window
90.The White House(20150206)。National Security Strategy,https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_strategy_2.pdf。  new window
91.The White House(20150401)。Executive Order 13694 of April 1, 2015: Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities,https://www.gpo.gov/fdsys/pkg/FR-2015-04-02/pdf/2015-07788.pdf。  new window
92.The White House Office of the Press Secretary(20150925)。Remarks by President Obama and President Xi of the People's Republic of China in Joint Press Conference,https://www.whitehouse.gov/the-press-office/2015/09/25/remarks-president-obama-and-president-xi-peoples-republic-china-joint。  new window
93.Stokes, Mark A.(20150727)。The PLA General Staff Department Third Department Second Bureau: An Organizational Overview of Unit 61398,Arlington:2049 Project Institute。,http://www.project2049.net/documents/Stokes_PLA_General_Staff_Department_Unit_61398.pdf。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
QR Code
QRCODE