:::

詳目顯示

回上一頁
題名:「避險」視角下中國對美國的網路強國戰略研究
書刊名:問題與研究
作者:張凱銘 引用關係
作者(外文):Chang, Kai-ming
出版日期:2018
卷期:57:3
頁次:頁97-137
主題關鍵詞:網路強國美中關係避險戰略網路安全網路衝突Cyber power strategySino-U.S. relationsHedging strategyCyber securityCyber conflict
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:8
  • 點閱點閱:6
期刊論文
1.潘曉霞、黃建濱(2004)。Hedging的交際功能。美中外語,2(7),11-20。  延伸查詢new window
2.Dexian, Cai(2013)。Hedging for Maximum Flexibility: Singapore's Pragmatic Approach to Security Relations with the US and China。Pointer: Journal of the Singapore Armed Forces,39(2),1-12。  new window
3.Kuik, Cheng-Chwee、Idris, Nor Azizan、Nor, Abd Rahim Md(2012)。The China Factor in the U.S. "Reengagement" With Southeast Asia: Drivers and Limits of Converged Hedging。Asian Politics & Policy,4(3),315-344。  new window
4.Roy, Denny(2005)。Southeast Asia and China: Balancing or Bandwagoning?。Contemporary Southeast Asia: A Journal of International and Strategic Affairs,27(2),305-322。  new window
5.周琪、汪曉風(2013)。網絡安全與中美新型大國關係。當代世界,2013(11),30-34。  延伸查詢new window
6.Brooks, Stephen G.、Wohlforth, William C.(2005)。Hard Times for Soft Balancing。International Security,30(1),72-108。  new window
7.蔡明彥、張凱銘(20150700)。「避險」戰略下大國互動模式之研究:以美中亞太戰略競合為例。遠景基金會季刊,16(3),1-68。new window  延伸查詢new window
8.李恒陽(2015)。美國網絡軍事戰略探析。國際政治研究,2015(1),113-134。  延伸查詢new window
9.陳一新(20151000)。美「中」雙方在歐習會的得失及與對兩岸的影響。展望與探索,13(10),1-11。  延伸查詢new window
10.Zhang, Li(2012)。A Chinese Perspective on Cyber War。International Review of the Red Cross,94(886),801-807。  new window
11.宋筱元(20160300)。習近平時期中共的網絡輿論管理。展望與探索,14(3),46-66。  延伸查詢new window
12.汪玉凱(2014)。中央網絡安全和信息化領導小組的由來及其影響。中國信息安全,2014(3),24-28。  延伸查詢new window
13.劉得民(2014)。中國大陸網軍外圍組織現況研究。中共研究,48(7),131-139。  延伸查詢new window
14.Cohen-Almagor, Raphael(2011)。Internet History。International Journal of Technoethics,2(2),45-64。  new window
15.Costello, John(2016)。The Strategic Support Force: China's Information Warfare Service。China Brief,16(3),15-20。  new window
16.Hollis, David M.(2010)。USCYBERCOM: The Need for a Combatant Command versus a Subunified Command。Joint Force Quarterly,58,48-53。  new window
17.Khudayer, Aiesha Y.(2014)。Impact of NSA-PRISM to National Information Security Strategy & Policy。International Journal of Information and Communication Technology Research,4(1),25-31。  new window
18.Kuik, Cheng-Chwee、Lee, Kong Chian(2008)。Rising Dragon, Crouching Tigers?。Biblioasia,3(4),4-13。  new window
19.Pempel, T. J.(2010)。Soft Balancing, Hedging, and Institutional Darwinism: The Economic-Security Nexus and East Asian Regionalism。Journal of East Asian Studies,10(2),209-238。  new window
20.Racicot, Jonathan(2014)。The Past, Present and Future of Chinese Cyber Operations。Canadian Military Journal,14(3),26-37。  new window
21.Sharma, Deepak(2010)。Integrated Network Electronic Warfare: China's New Concept of Information Warfare。Journal of Defence Studies,4(2),36-49。  new window
22.King, Gary、Pan, Jennifer、Roberts, Margaret E.(2017)。How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument。American Political Science Review,111(3),484-501。  new window
23.Art, Robert J.、Brooks, Stephen G.、Wohlforth, William C.、Lieber, Keir A.、Alexander, Gerard(2005)。Correspondence: Striking the Balance。International Security,30(3),177-196。  new window
24.He, Kai、Feng, Huiyun(2008)。If Not Soft Balancing, Then What?。Security Studies,17(2),363-395。  new window
25.He, Kai(2008)。Institutional balancing and international relations theory: Economic interdependence and balance of power strategies in Southeast Asia。European Journal of International Relations,14(3),489-518。  new window
26.Lieber, Keir A.、Alexander, Gerard(2005)。Waiting for Balancing: Why the World Is Not Pushing Back。International Security,30(1),109-139。  new window
27.Medeiros, Evan S.(2005)。Strategic Hedging and the Future of Asia-Pacific Stability。The Washington Quarterly,29(1),145-167。  new window
28.Pape, Robert Anthony(2005)。Soft Balancing Against the United States。International Security,30(1),7-45。  new window
29.Kuik, Cheng-Chwee(2008)。The Essence of Hedging: Malaysia and Singapore's Response to a Rising China。Contemporary Southeast Asia: A Journal of International and Strategic Affairs,30(2),159-185。  new window
研究報告
1.中國互聯網絡信息中心(2017)。第39次中國互聯網絡發展狀況統計報告。北京:中國互聯網絡信息中心。  延伸查詢new window
圖書
1.U.S. Department of Defense(2006)。Quadrennial Defense Review Report 2006。Washington, D. C.:U.S. Department of Defense。  new window
2.Ikenberry, John G.(2002)。America Unrivaled: The Future of the Balance of Power。Ithaca, NY:Cornell University Press。  new window
3.Khalilzad, Zalmay M.(1999)。The United States and a Rising China: Strategic and Military Implications。RAND。  new window
4.Schmidt, Eric、Cohen, Jared、吳佳恆、藍美貞、楊之瑜、鐘玉珏、高仁君(2013)。數位新時代。臺北市:遠流出版社。  延伸查詢new window
5.The White House(2015)。National Security Strategy 2015。Washington, DC:The White House。  new window
6.王德培(2013)。再平衡:中國的優勢與美國的強勢。上海:文匯出版社。  延伸查詢new window
7.Lee, Seungjoo(2012)。The Evolutionary Dynamics of Institutional Balancing in East Asia。East Asia Institute。  new window
8.The White House(2006)。National Security Strategy 2006。Washington, DC:The White House。  new window
9.The White House(2009)。Cyberspace Policy Review。Washington, DC:The White House。  new window
10.U.S. Department of Defense(20110714)。Department of Defense Strategy for Operating in Cyberspace。U.S. Department of Defense。  new window
11.Harold, Scott Warren、Libicki, Martin C.、Cevallos, Astrid Stuth(2016)。Getting to Yes with China in Cyberspace。RAND。  new window
12.國務院新聞辦公室(2010)。中國互聯網狀況。北京:中國國務院新聞辦公室。  延伸查詢new window
13.Martel, Frédéric、林幼嵐(2016)。全球網路戰爭。新北市:稻田。  延伸查詢new window
14.新華網網絡輿情監測分析中心(2017)。2016年度社會熱點事件網絡輿情報告。北京:新華網網絡輿情監測分析中心。  延伸查詢new window
15.Chang, Amy(2015)。Warring State: China's Cybersecurity Strategy。Washington, D.C.:Center for a New American Security。  new window
16.Center for Strategic and International Studies(2014)。Net Losses: Estimating the Global Cost of Cybercrime。Washington, D.C.:Center for Strategic and International Studies。  new window
17.Caton, Jeffrey L.(2015)。Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications。Carlisle:U.S. Army War College。  new window
18.FireEye Corporation(2016)。Red Line Drawn: China Recalculates Its Use of Cyber Espionage。Milpitas:FireEye Corporation。  new window
19.Gueham, Farid(2017)。Digital Sovereignty。Paris:The Fondation pour l'Innovation Politique。  new window
20.Lieberthal, Kenneth G.、Singer, Peter W.(2012)。Cybersecurity and U.S.-China Relations。The Brookings Institution。  new window
21.Lawrence, Susan V.(2013)。U.S.-China Relations: An Overview of Policy Issues。Washington, D.C.:Congressional Research Service。  new window
22.Mandiant Corporation(2013)。APTI: Exposing One of China's Cyber Espionage Units。Washington, D.C.:Mandiant Corporation。  new window
23.Morrison, Wayne M.(2017)。China-U.S. Trade Issues。Washington, D.C.:Congressional Research Service。  new window
24.Patry, Melody(2014)。Brazil: A New Global Internet Referee?。London:Index on Censorship。  new window
25.Raud, Mikk(2016)。China and Cyber: Attitudes, Strategies, Organisation。Tallinn:NATO Cooperative Cyber Defence Centre of Excellence。  new window
26.Steinberg, James B.(2014)。Strategic Reassurance and Resolve: U.S.-China Relations in the Twenty-First Century。New Jersey:Princeton University Press。  new window
27.Scott, James、Spaniel, Drew(2016)。ICIT Briefing: China's Espionage Dynasty。Washington, D.C.:Institute for Critical Infrastructure Technology。  new window
28.Stokes, Mark A.、Hsiao, L. C. Russell(2012)。Countering Chinese Cyber Operations: Opportunities and Challenges for U.S. Interests。Arlington:Project 2049 Institute。  new window
29.Stokes, Mark A.、Lin, Jenny、Hsiao, L. C. Russell(2015)。The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure。Arlington:Project 2049 Institute。  new window
30.Stokes, Mark A.(2015)。The PLA General Staff Department Third Department Second Bureau: An Organizational Overview of U nit 61398。Arlington:Project 2049 Institute。  new window
31.The White House(2011)。International Strategy for Cyberspace。Washington, D. C.:The White House。  new window
32.U.S. Department of Defense(2016)。Military and Security Developments Involving the People's Republic of China 2016。Washington, D. C.:U.S. Department of Defense。  new window
33.U.S. Department of Defense(2004)。National Military Strategy 2004。Washington, D.C.:U.S. Department of Defense。  new window
34.U.S. Department of Defense(2014)。Quadrennial Defense Review Report 2014。Washington, D.C.:U.S. Department of Defense。  new window
35.U.S. Department of Defense(2015)。The Department of Defense Cyber Strategy。Washington, D. C.:U.S. Department of Defense。  new window
36.U.S. Department of the Army(2014)。Field Manual 3-38: Cyber Electromagnetic Activities。Washington, D.C.:U.S. Department of the Army。  new window
37.U.S. Joint Chiefs of Staff(2013)。Joint Publication 3-12 (R): Cyberspace Operations。Washington, D.C.:U.S. Joint Chiefs of Staff。  new window
38.U.S. Joint Chiefs of Staff(2006)。The National Military Strategy for Cyberspace Operations。Washington, D.C.:U.S. Joint Chiefs of Staff。  new window
39.U.S.-China Economic and Security Review Commission(2015)。2015 Report to Congress of the U.S.-China Economic and Security Review Commission。Washington, DC:U.S.-China Economic and Security Review Commission。  new window
40.U.S.-China Economic and Security Review Commission(2016)。2016 Report to Congress of the U.S.-China Economic and Security Review Commission。Washington, D.C.:U.S.-China Economic and Security Review Commission。  new window
41.Wilson, Jordan(2015)。China's Position on the Sony Attack: Implications for the U.S. Response。Washington, D.C.:U.S.-China Economic and Security Review Commission。  new window
42.Waltz, Kenneth N.(2008)。Realism and International Politics。New York:Taylor & Francis。  new window
43.Goh, Evelyn(2005)。Meeting the China Challenge: The U.S. in Southeast Asian Regional Security Strategies。East-West Center。  new window
44.Weitsman, Patricia A.(2004)。Dangerous Alliances: Proponents of Peace, Weapons of War。Stanford University Press。  new window
45.He, Kai(2009)。Institutional Balancing in the Asia Pacific, Economic Interdependence and China's Rise。Routledge。  new window
46.Waltz, Kenneth Neal(1979)。Theory of International Politics。McGraw-Hill。  new window
47.Lieberthal, Kenneth G.、Wang, Jisi(20120312)。Addressing U.S.-China Strategic Distrust。Washington, D.C.:Brookings Institution。  new window
其他
1.關慶豐(20130610)。中美如何通過90多個平臺對話?,http://bjyouth.ynet.com/3.1/1306/10/8068300.html。  延伸查詢new window
2.The Communist Party of China(20131115)。授權發布︰中共中央關於全面深化改革若干重大問題的決定,http://news.xinhuanet.com/politics/2013-11/15/c_118164235.htm。  延伸查詢new window
3.楊婷(20140227)。習近平:把我國從網絡大國建設成為網絡強國,http://news.xinhuanet.com/politics/2014-02/27/c_119538788.htm。  延伸查詢new window
4.(20140717)。習近平巴西談互聯網治理,http://politics.people.com.cn/BIG5/n/2014/0717/c1024-25296103.html。  new window
5.Perlroth, Nicole(20130314)。Cyberattacks a Topic in Obama Call With New Chinese President,http://bits.blogs.nytimes.com/2013/03/14/cyberattacks-prominent-in-obama-call-with-new-chinese-president/?_r=0。  new window
6.Perlroth, Nicole(20140609)。2nd China Army Unit Implicated in Online Spying,http://www.nytimes.com/2014/06/10/technology/private-report-further-details-chinese-cyberattacks.html?_r=0。  new window
7.Sanger, David E.,Barboza, David,Perlroth, Nicole(20130218)。Chinese Army Unit Is Seen as Tied to Hacking Against U.S.,http://www.nytimes.com/2013/02/19/technology/chinas-armyis-seen-as-tied-to-hacking-against-us.html?_r=0。  new window
8.(20161118)。2016年世界互聯網發展烏鎮報告,http://www.wicwuzhen.cn/system/2016/11/18/021373284.shtml。  延伸查詢new window
9.(20151216)。習近平在第二屆世界互聯網大會開幕式上的講話,http://news.xinhuanet.com/politics/2015-12/16/c_1117481089.htm.。  延伸查詢new window
10.U.S. Department of Justice(20151202)。First U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues Summary of Outcomes,https://www.justice.gov/opa/pr/first-us-china-high-level-joint-dialogue-cybercrime-andrelated-issues-summary-outcomes-0。  new window
11.中共官媒批美『中國網絡威脅論』:不要搞唯我獨尊,http://news.dwnews.com/global/big5/news/2013-03-16/59156042.html。  延伸查詢new window
12.中共中央政治局進行第36次集體學習,習近平主持,http://china.cnr.cn/news/20161010/t20161010_523185107.shtml。  延伸查詢new window
13.2017年3月9日外交部發言人耿爽主持例行記者會,http://www.mfa.gov.cn/web/fyrbt_673021/t1444510.shtml。  延伸查詢new window
14.2016年中國半導體記憶體行業市場現狀及發展趨勢預測,http://www.chinaidr.com/tradenews/2016-09/103234.html。  延伸查詢new window
15.中美互聯網巨頭熱議習近平講話,http://politics.people.com.cn/n/2015/0924/c1001-27631110.html。  延伸查詢new window
16.中美半年內兩度商討打擊網絡犯罪,抓獲17名涉兒童色情嫌犯,http://www.thepaper.cn/newsDetail_forward_1482997。  延伸查詢new window
17.中美打擊網絡犯罪及相關事項高級別聯合對話聯絡熱線開通,http://www.cac.gov.cn/2016-08/28/c_1119466923.htm。  延伸查詢new window
18.中美恢復網絡安全對話,https://tinyurl.com/y99szukh。  延伸查詢new window
19.中國Windows10用戶數超過Mac只用了2天,http://digi.163.com/15/0812/06/B0Q3EKAG00162OUT.html。  new window
20.中國經濟發展新趨勢與中美經貿合作新機遇,http://www.fmprc.gov.cn/web/dszlsjt_673036/zls_673040/t1408800.shtml。  延伸查詢new window
21.中國解放軍令大學配合徵五毛黨公文曝光,http://newtalk.tw/news/view/2016-04-11/71990。  延伸查詢new window
22.中國網路監控大軍被懷疑有800萬,https://tinyurl.com/y74heydb。  延伸查詢new window
23.中國戰略支援部隊接收『黑客部隊』提高網路戰能力,https://www.voachinese.com/a/china-cyber-security-20160129/3169386.html。  延伸查詢new window
24.中華人民共和國國民經濟和社會發展第十三個五年規畫綱要,http://www.npc.gov.cn/npc/dbdhhy/12_4/2016-03/18/content_1985670.htm。  延伸查詢new window
25.李克強同世界互聯網大會中外代表座談時強調,促進互聯網共用共治,推動大眾創業萬眾創新,http://news.xinhuanet.com/politics/2014-11/20/c_1113340416.htm。  延伸查詢new window
26.世界互聯網大會觀察:人工智慧、技術創新成絕對主角,http://tech.qq.com/a/20161118/004229.htm。  延伸查詢new window
27.互聯網新聞信息服務單位約談工作規定,http://politics.people.com.cn/n/2015/0429/c1001-26920835.html。  延伸查詢new window
28.中華人民共和國國家安全法,http://www.npc.gov.cn/npc/xinwen/2015-07/07/content_1941161.htm。  new window
29.中華人民共和國網絡安全法,http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm。  new window
30.李克強會見美國哥倫比亞大學校長、法學教授博林格,http://www.safea.gov.cn/content.shtml?id=12748685。  延伸查詢new window
31.尚冰出席第六屆中美互聯網論壇開幕式,http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057709/n3057722/c3651813/content.html。  延伸查詢new window
32.東莞理工學院成立全國首個網絡空間安全學院,http://www.chinanews.com/gn/2017/03-11/8171430.shtml。  延伸查詢new window
33.信息安全國際行為準則(2011),http://wcm.fmprc.gov.cn/pub/chn/gxh/zlb/zcwj/t858317.htm。  new window
34.信息安全國際行為準則(2015),http://www.mfa.gov.en/chn//pds/ziliao/tytj/zcwj/P020150316571763224632.pdf。  new window
35.國家網絡空間安全戰略全文,http://www.cac.gov.cn/2016-12/27/c_1120195926.htm。  延伸查詢new window
36.國家網絡安全事件應急預案,http://news.xinhuanet.com/zgjx/2017-06/28/c_136400422.htm。  延伸查詢new window
37.烏鎮指數:全球人工智能發展報告(精華篇),http://sike.news.cn/hot/pdf/10.pdf。  延伸查詢new window
38.卿昱:解讀中華人民共和國網絡安全法,http://www.cnetsec.com/article/20374.html。  延伸查詢new window
39.背景資料:中美互聯網論壇,http://t.m.china.com.cn/convert/c_uDe56F.html。  延伸查詢new window
40.第二次中美打擊網絡犯罪對話成果清單出爐,http://news.cri.cn/20160616/fbed4663-df67-1e13-4863-82851416907c.html。  延伸查詢new window
41.習近平:中國宣導建設和平、安全、開放、合作的網絡空間,http://news.xinhuanet.com/world/2015-09/24/c_l116663156.htm。  延伸查詢new window
42.第七屆中美互聯網論壇在華盛頓舉行,魯煒提出中美網絡關係五點主張,http://news.xinhuanet.com/world/2014-12/03/c_1113493517.htm。  延伸查詢new window
43.從『數位福建』到『數位中國』習近平擘畫科技發展新高度,http://politics.people.com.cn/nl/2016/0427/c1001-28308778.html。  延伸查詢new window
44.習近平:在第三屆世界互聯網大會開幕式上的視頻講話,http://news.xinhuanet.com/2016-11/16/c_1119925133.htm。  延伸查詢new window
45.習近平:讓互聯網更好造福國家和人民,http://news.xinhuanet.com/politics/2016-04/19/c_1118672059.htm。  延伸查詢new window
46.習近平『南巡』:訪前海察騰訊探母親,http://news.wenweipo.com/2012/12/08/IN1212080018.htm。  延伸查詢new window
47.(20141119)。習近平向首屆世界互聯網大會致賀詞,http://news.xinhuanet.com/politics/2014-11/19/c_1113319278.htm, 。  延伸查詢new window
48.習近平在亞太經合組織第23次領導人非正式會議上的講話,http://news.xinhuanet.com/world/2015-11/19/c_1117201278.htm。  延伸查詢new window
49.習近平在網信工作座談會上的講話全文發表,http://news.xinhuanet.com/politics/2016-04/25/c_1118731175.htm。  延伸查詢new window
50.習近平參觀美國微軟公司總部,http://news.xinhuanet.com/world/2015-09/24/c_1116667179.htm。  延伸查詢new window
51.(20150926)。習近平訪美中方成果清單發佈,http://politics.people.com.cn/n/2015/0926/c1001-27637282.html。  延伸查詢new window
52.習近平親自出馬,主掌中國網絡安全,http://www.bbc.com/zhongwen/trad/china/2014/02/140227_china_xi_web_security。  延伸查詢new window
53.陸決定中止中美網路工作組活動,http://www.chinatimes.com/realtimenews/20140519005093-260409。  延伸查詢new window
54.焦點對話:自乾五是如何煉成的,http://www.voachinese.com/a/VOAWeishi-ProandCon-20160617-The-rise-of-Chinas-volunteer-50-centers-Is-Chinas-education-to-blame/3380445.html。  new window
55.楊潔篪在第六輪中美戰略與經濟對話聯合記者會上的講話,http://finance.takungpao.com.hk/q/2014/0711/2591950.html。  延伸查詢new window
56.(2017)。關於促進移動互聯網健康有序發展的意見,http://news.xinhuanet.com/politics/2017-01/15/c_1120315481.htm。  延伸查詢new window
57.魯煒出席首屆世界互聯網大會並致辭,http://www.chinanews.com/gn/2014/11-19/6793335.shtml。  延伸查詢new window
58.領英騰訊紅杉寬頻聯合發起中美數字經濟合作協會,http://info.3g.qq.com/g/index5/ttnews/yidian.jsp?aid=yidian&id=tech_20151217044055&g_f=23748。  延伸查詢new window
59.網絡強國,習近平呼籲對網絡輿論的引導,http://china.dwnews.com/news/2016-10-09/59774082.html。  延伸查詢new window
60.農村電子商務發展的戰略與政策,http://news.xinhuanet.com/tech/2017-03/09/c_1120593562.htm。  延伸查詢new window
61.Hat-tribution to PLA Unit 61486,https://www.crowdstrike.com/blog/hat-tribution-pla-unit-61486/。  new window
62.Hagel in Singapore on U.S. Security Policy in Asia-Pacific Region,http://iipdigital.usembassy.gov/st/english/texttrans/2013/06/20130601148324.html#ixzz4XMHSZORO。  new window
63.DoD Releases Fiscal Year 2016 Budget Proposal,https://www.defense.gov/News/News-Releases/News-Release-View/Article/605365。  new window
64.DOD Releases Fiscal Year 2014 Budget Proposal,http://dodcio.defense.gov/Portals/0/Documents/Library/2014%20Press%20Release.pdf。  new window
65.Press Release: China, India Now World's Largest Internet Markets,http://www.itu.int/en/mediacentre/Pages/2016-PR35.aspx。  new window
66.Press Briefing by National Security Advisor Tom Donilon,https://obamawhitehouse.archives.gov/the-press-offlce/2013/06/08/press-briefing-national-security-advisor-tom-donilon。  new window
67.Internet 2 China Program,http://www.internet2.edu/communities-groups/intemational-community/internet2-china-program/。  new window
68.Navy Stands up Fleet Cyber Command, Reestablishes U.S. 10th Fleet,http://www.stratcom.mil/Media/News/News-Article-View/Article/983834/navy-stands-up-fleet-cyber-command-reestablishes-us-10th-fleet/。  new window
69.History of HQ Twenty-Fourth Air Force and 624th Operations Center,http://www.24af.af.mil/Portals/11/ documents/About_Us/AFD-140429-035.pdf?ver=2016-04-26-113101-810。  new window
70.Second U.S.-China Cybercrime and Related Issues High Level Joint Dialogue,https://www.justice.gov/opa/pr/second-us-china-cybercrime-and-related-issues-high-level-joint-dialogue。  new window
71.These are the 20 China-exposed Stocks to avoid,http://www.marketwatch.com/story/these-are-the-20-china-exposed-stocks-to-avoid-2015-08-10。  new window
72.Third U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues,https://www.justice.gov/opa/pr/second-us-china-cybercrime-and-related-issues-high-level-joint-dialogue。  new window
73.(20160512)。U.S., China Cyber Group Holds First Talks Since September Pact,http://uk.reuters.com/article/us-usa-china-cyber-idUKKCN0Y22OB。  new window
74.(20130709)。US-China Cyber Security Working Group Meets,http://www.bbc.com/news/world-asia-china-23177538。  new window
75.Busby, Scott。10 Things You Need to Know about U.S. Support for Free Internet,http://iipdigital.usembassy.gov/st/english/article/2014/05/20140530300596.html#ixzz4XMASG4Pj。  new window
76.Akl, Aida。Iran Plans Its Own Sanitized Internet with Chinese Help,https://www.voanews.com/a/iran-plans-its-own-sanitized-internet-with-chinese-help/1713638.html。  new window
77.Aaronson, Susan A.,Elliott, Kimberly A.。A China-U.S. Approach to Digital Trade,http://www.chinausfocus.com/flnance-economy/a-china-us-approach-to-digital-trade。  new window
78.Clinton, Hillary。Remarks on Internet Freedom,https://www.ait.org.tw/en/offlcialtext-ot1004.html。  new window
79.Fortin, Jacey。Russia, Saudi Arabia, China and others fail to Impose Internet Regulations at WCIT,http://www.ibtimes.com/russia-saudi-arabia-china-others-fail-impose-internet-regulations-wcit-931654。  new window
80.Fisher, Max。Russia and the U.S. Election: What We Know and Don't Know,https://www.nytimes.com/2016/12/12/world/europe/russia-trump-election-cia-fbi.html?_r=0。  new window
81.Graham, Jefferson。Google CEO: Open to Returning to China,https://www.usatoday.com/story/tech/2016/06/01/google-ceo-open-returning-china/85247082/。  new window
82.Howell, Catherine,West, Darrell M.。The Internet as a Human Right,https://www.brookings.edu/blog/techtank/2016/11/07/the-internet-as-a-human-right/。  new window
83.Horwitz, Josh。A New Wave of US Internet Companies is Succeeding in China,https://qz.com/435764/a-new-wave-of-us-internet-companies-is-succeeding-in-china-by-giving-the-govemment-what-it-wants/。  new window
84.Kai, Jin。Why China Banned Windows 8,http://thediplomat.com/2014/05/why-china-banned-windows-8/。  new window
85.Kumar, Anugrah。Obama, Xi Jinping Meet in California to Discuss North Korea, Cybersecurity,http://www.christianpost.com/news/obama-xi-jinping-meet-in-california-to-discuss-north-korea-cybersecurity-97603/。  new window
86.Kopan, Tal。Kerry: 'Very Likely' China, Russia Read my Emails,https://edition.cnn.com/2015/08/11/politics/kerry-emails-chinese-russian-hackers/index.html。  new window
87.Lau, Justine。A History of Google in China,http://www.ft.com/cms/s/0/faf86fbc-0009-11ldf-8626-00144feabdc0.html?ft_site=falcon#axzz4dGMpKxlN。  new window
88.Monaco, Lisa O.。Counterterrorism, Cybersecurity, and Homeland Security,http://www.cfr.org/cybersecurity/counterterrorism-cybersecurity-homeland-security/p38642。  new window
89.Margolin, Jack。Russia, China, and the Push for 'Digital Sovereignty',https://theglobalobservatory.org/2016/12/russia-china-digital-sovereignty-shanghai-cooperation-organization/。  new window
90.Nakashima, Ellen,Warrick, Joby。Stuxnet was Work of U.S. and Israeli Experts, Officials Say,https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-ay/2012/06/01/gJQAlnEy6U_story.html?utm_term=.847875342088。  new window
91.Nippard, Cinnamon。International Blogging Conference Puts Internet Press Freedom on the Agenda,http://www.dw.com/en/international-blogging-conference-puts-internet-press-freedom-on-the-agenda/a-5474714。  new window
92.Roberts, Dan。US and China Back off Internet Arms Race but Obama Leaves Sanctions on the Table,https://www.theguardian.com/us-news/2015/sep/25/us-china-cyber-security-obama-xi-jinping-inconclusive-summit。  new window
93.Qun, Wang。Shared Interests and Responsibility: The US and China Must Join to Promote a Rules-based Cyberspace,http://www.huffingtonpost.com/wang-qun/shared-interests-and-resp_b_9873642.html。  new window
94.Reed, Kevin(20121228)。Global Split over Telecom Treaty,https://www.wsws.org/en/articles/2012/12/28/wcit-d28.html。  new window
95.Schmidt, Michael S.,Sanger, David E.。5 in China Army Face U.S. Charges of Cyberattacks,https://www.nytimes.com/2014/05/20/us/us-to-charge-chinese-workers-with-cyberspying.html?_r=0。  new window
96.Sanger, David E.(20120601)。Obama Order Sped up Wave of Cyberattacks against Iran,http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=0。  new window
97.Schmitt, Eric,Shanker, Thom。U.S. Debated Cyberwarfare in Attack Plan on Libya,http://www.nytimes.com/2011/10/18/world/africa/cyber-warfare-against_libya-was-debated-by-us.html。  new window
98.Theohary, Catherine A.,Welt, Cory。Russia and the U.S. Presidential Election,https://fas.org/sgp/crs/natsec/IN10635.pdf。  new window
99.USA Features Media。SECDEF Carter Shifts Focus to Chinese Cyber-espionage as Shangri-La Summit Approaches,http://glitch.news/2016-06-08-secdef-carter-shifts-focus-to-chinese-cyber-espionage-as-shangri-la-summit-approaches.html。  new window
100.Wilson, J. R.。MARFORCYBER: Marines Fight in a New Domain,http://www.defensemedianetwork.com/stories/marforcyber-marines-flght-in-a-new-domain/。  new window
101.Zhu, Xu-Dong,Hong, Rachel。How some of America's Biggest Tech Companies are Expanding into China,http://www.businessinsider.com/us-tech-companies-expanding-into-china-2014-6。  new window
102.Wright, David,Kreissl, Reinhard。European Responses to the Snowden Revelations: A Discussion Paper,http://irissproject.eu/wp-content/uploads/2013/12/IRISS_European-responses-to-the-Snowden-revelations_18-Dec-2013_Final.pdf。  new window
圖書論文
1.Schweller, Randall L.(1999)。Managing the Rise of Great Powers: History and Theory。Engaging China: The Management of an Emerging Power。Routledge。  new window
2.Paul, T. V.(2004)。The Enduring Axioms of Balance of Power Theory。Balance of Power: Theory and Practice in the 21st Century。Stanford:Stanford University Press。  new window
3.Mulvenon, James(2009)。PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability。Beyond the Strait: PLA Missions Other Than Taiwan。Carlisle:The Strategic Studies Institute of the U.S. Army War College。  new window
4.Ruland, Jurgen(2014)。Interregionalism and International Relations: Reanimating an Obsolescent Research Agenda?。Intersecting Interregionalism: Regions, Global Governance and the EU。Dordrecht:Springer。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top