期刊論文1. | 潘曉霞、黃建濱(2004)。Hedging的交際功能。美中外語,2(7),11-20。 延伸查詢 |
2. | Dexian, Cai(2013)。Hedging for Maximum Flexibility: Singapore's Pragmatic Approach to Security Relations with the US and China。Pointer: Journal of the Singapore Armed Forces,39(2),1-12。 |
3. | Kuik, Cheng-Chwee、Idris, Nor Azizan、Nor, Abd Rahim Md(2012)。The China Factor in the U.S. "Reengagement" With Southeast Asia: Drivers and Limits of Converged Hedging。Asian Politics & Policy,4(3),315-344。 |
4. | Roy, Denny(2005)。Southeast Asia and China: Balancing or Bandwagoning?。Contemporary Southeast Asia: A Journal of International and Strategic Affairs,27(2),305-322。 |
5. | 周琪、汪曉風(2013)。網絡安全與中美新型大國關係。當代世界,2013(11),30-34。 延伸查詢 |
6. | Brooks, Stephen G.、Wohlforth, William C.(2005)。Hard Times for Soft Balancing。International Security,30(1),72-108。 |
7. | 蔡明彥、張凱銘(20150700)。「避險」戰略下大國互動模式之研究:以美中亞太戰略競合為例。遠景基金會季刊,16(3),1-68。 延伸查詢 |
8. | 李恒陽(2015)。美國網絡軍事戰略探析。國際政治研究,2015(1),113-134。 延伸查詢 |
9. | 陳一新(20151000)。美「中」雙方在歐習會的得失及與對兩岸的影響。展望與探索,13(10),1-11。 延伸查詢 |
10. | Zhang, Li(2012)。A Chinese Perspective on Cyber War。International Review of the Red Cross,94(886),801-807。 |
11. | 宋筱元(20160300)。習近平時期中共的網絡輿論管理。展望與探索,14(3),46-66。 延伸查詢 |
12. | 汪玉凱(2014)。中央網絡安全和信息化領導小組的由來及其影響。中國信息安全,2014(3),24-28。 延伸查詢 |
13. | 劉得民(2014)。中國大陸網軍外圍組織現況研究。中共研究,48(7),131-139。 延伸查詢 |
14. | Cohen-Almagor, Raphael(2011)。Internet History。International Journal of Technoethics,2(2),45-64。 |
15. | Costello, John(2016)。The Strategic Support Force: China's Information Warfare Service。China Brief,16(3),15-20。 |
16. | Hollis, David M.(2010)。USCYBERCOM: The Need for a Combatant Command versus a Subunified Command。Joint Force Quarterly,58,48-53。 |
17. | Khudayer, Aiesha Y.(2014)。Impact of NSA-PRISM to National Information Security Strategy & Policy。International Journal of Information and Communication Technology Research,4(1),25-31。 |
18. | Kuik, Cheng-Chwee、Lee, Kong Chian(2008)。Rising Dragon, Crouching Tigers?。Biblioasia,3(4),4-13。 |
19. | Pempel, T. J.(2010)。Soft Balancing, Hedging, and Institutional Darwinism: The Economic-Security Nexus and East Asian Regionalism。Journal of East Asian Studies,10(2),209-238。 |
20. | Racicot, Jonathan(2014)。The Past, Present and Future of Chinese Cyber Operations。Canadian Military Journal,14(3),26-37。 |
21. | Sharma, Deepak(2010)。Integrated Network Electronic Warfare: China's New Concept of Information Warfare。Journal of Defence Studies,4(2),36-49。 |
22. | King, Gary、Pan, Jennifer、Roberts, Margaret E.(2017)。How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument。American Political Science Review,111(3),484-501。 |
23. | Art, Robert J.、Brooks, Stephen G.、Wohlforth, William C.、Lieber, Keir A.、Alexander, Gerard(2005)。Correspondence: Striking the Balance。International Security,30(3),177-196。 |
24. | He, Kai、Feng, Huiyun(2008)。If Not Soft Balancing, Then What?。Security Studies,17(2),363-395。 |
25. | He, Kai(2008)。Institutional balancing and international relations theory: Economic interdependence and balance of power strategies in Southeast Asia。European Journal of International Relations,14(3),489-518。 |
26. | Lieber, Keir A.、Alexander, Gerard(2005)。Waiting for Balancing: Why the World Is Not Pushing Back。International Security,30(1),109-139。 |
27. | Medeiros, Evan S.(2005)。Strategic Hedging and the Future of Asia-Pacific Stability。The Washington Quarterly,29(1),145-167。 |
28. | Pape, Robert Anthony(2005)。Soft Balancing Against the United States。International Security,30(1),7-45。 |
29. | Kuik, Cheng-Chwee(2008)。The Essence of Hedging: Malaysia and Singapore's Response to a Rising China。Contemporary Southeast Asia: A Journal of International and Strategic Affairs,30(2),159-185。 |
圖書1. | U.S. Department of Defense(2006)。Quadrennial Defense Review Report 2006。Washington, D. C.:U.S. Department of Defense。 |
2. | Ikenberry, John G.(2002)。America Unrivaled: The Future of the Balance of Power。Ithaca, NY:Cornell University Press。 |
3. | Khalilzad, Zalmay M.(1999)。The United States and a Rising China: Strategic and Military Implications。RAND。 |
4. | Schmidt, Eric、Cohen, Jared、吳佳恆、藍美貞、楊之瑜、鐘玉珏、高仁君(2013)。數位新時代。臺北市:遠流出版社。 延伸查詢 |
5. | The White House(2015)。National Security Strategy 2015。Washington, DC:The White House。 |
6. | 王德培(2013)。再平衡:中國的優勢與美國的強勢。上海:文匯出版社。 延伸查詢 |
7. | Lee, Seungjoo(2012)。The Evolutionary Dynamics of Institutional Balancing in East Asia。East Asia Institute。 |
8. | The White House(2006)。National Security Strategy 2006。Washington, DC:The White House。 |
9. | The White House(2009)。Cyberspace Policy Review。Washington, DC:The White House。 |
10. | U.S. Department of Defense(20110714)。Department of Defense Strategy for Operating in Cyberspace。U.S. Department of Defense。 |
11. | Harold, Scott Warren、Libicki, Martin C.、Cevallos, Astrid Stuth(2016)。Getting to Yes with China in Cyberspace。RAND。 |
12. | 國務院新聞辦公室(2010)。中國互聯網狀況。北京:中國國務院新聞辦公室。 延伸查詢 |
13. | Martel, Frédéric、林幼嵐(2016)。全球網路戰爭。新北市:稻田。 延伸查詢 |
14. | 新華網網絡輿情監測分析中心(2017)。2016年度社會熱點事件網絡輿情報告。北京:新華網網絡輿情監測分析中心。 延伸查詢 |
15. | Chang, Amy(2015)。Warring State: China's Cybersecurity Strategy。Washington, D.C.:Center for a New American Security。 |
16. | Center for Strategic and International Studies(2014)。Net Losses: Estimating the Global Cost of Cybercrime。Washington, D.C.:Center for Strategic and International Studies。 |
17. | Caton, Jeffrey L.(2015)。Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications。Carlisle:U.S. Army War College。 |
18. | FireEye Corporation(2016)。Red Line Drawn: China Recalculates Its Use of Cyber Espionage。Milpitas:FireEye Corporation。 |
19. | Gueham, Farid(2017)。Digital Sovereignty。Paris:The Fondation pour l'Innovation Politique。 |
20. | Lieberthal, Kenneth G.、Singer, Peter W.(2012)。Cybersecurity and U.S.-China Relations。The Brookings Institution。 |
21. | Lawrence, Susan V.(2013)。U.S.-China Relations: An Overview of Policy Issues。Washington, D.C.:Congressional Research Service。 |
22. | Mandiant Corporation(2013)。APTI: Exposing One of China's Cyber Espionage Units。Washington, D.C.:Mandiant Corporation。 |
23. | Morrison, Wayne M.(2017)。China-U.S. Trade Issues。Washington, D.C.:Congressional Research Service。 |
24. | Patry, Melody(2014)。Brazil: A New Global Internet Referee?。London:Index on Censorship。 |
25. | Raud, Mikk(2016)。China and Cyber: Attitudes, Strategies, Organisation。Tallinn:NATO Cooperative Cyber Defence Centre of Excellence。 |
26. | Steinberg, James B.(2014)。Strategic Reassurance and Resolve: U.S.-China Relations in the Twenty-First Century。New Jersey:Princeton University Press。 |
27. | Scott, James、Spaniel, Drew(2016)。ICIT Briefing: China's Espionage Dynasty。Washington, D.C.:Institute for Critical Infrastructure Technology。 |
28. | Stokes, Mark A.、Hsiao, L. C. Russell(2012)。Countering Chinese Cyber Operations: Opportunities and Challenges for U.S. Interests。Arlington:Project 2049 Institute。 |
29. | Stokes, Mark A.、Lin, Jenny、Hsiao, L. C. Russell(2015)。The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure。Arlington:Project 2049 Institute。 |
30. | Stokes, Mark A.(2015)。The PLA General Staff Department Third Department Second Bureau: An Organizational Overview of U nit 61398。Arlington:Project 2049 Institute。 |
31. | The White House(2011)。International Strategy for Cyberspace。Washington, D. C.:The White House。 |
32. | U.S. Department of Defense(2016)。Military and Security Developments Involving the People's Republic of China 2016。Washington, D. C.:U.S. Department of Defense。 |
33. | U.S. Department of Defense(2004)。National Military Strategy 2004。Washington, D.C.:U.S. Department of Defense。 |
34. | U.S. Department of Defense(2014)。Quadrennial Defense Review Report 2014。Washington, D.C.:U.S. Department of Defense。 |
35. | U.S. Department of Defense(2015)。The Department of Defense Cyber Strategy。Washington, D. C.:U.S. Department of Defense。 |
36. | U.S. Department of the Army(2014)。Field Manual 3-38: Cyber Electromagnetic Activities。Washington, D.C.:U.S. Department of the Army。 |
37. | U.S. Joint Chiefs of Staff(2013)。Joint Publication 3-12 (R): Cyberspace Operations。Washington, D.C.:U.S. Joint Chiefs of Staff。 |
38. | U.S. Joint Chiefs of Staff(2006)。The National Military Strategy for Cyberspace Operations。Washington, D.C.:U.S. Joint Chiefs of Staff。 |
39. | U.S.-China Economic and Security Review Commission(2015)。2015 Report to Congress of the U.S.-China Economic and Security Review Commission。Washington, DC:U.S.-China Economic and Security Review Commission。 |
40. | U.S.-China Economic and Security Review Commission(2016)。2016 Report to Congress of the U.S.-China Economic and Security Review Commission。Washington, D.C.:U.S.-China Economic and Security Review Commission。 |
41. | Wilson, Jordan(2015)。China's Position on the Sony Attack: Implications for the U.S. Response。Washington, D.C.:U.S.-China Economic and Security Review Commission。 |
42. | Waltz, Kenneth N.(2008)。Realism and International Politics。New York:Taylor & Francis。 |
43. | Goh, Evelyn(2005)。Meeting the China Challenge: The U.S. in Southeast Asian Regional Security Strategies。East-West Center。 |
44. | Weitsman, Patricia A.(2004)。Dangerous Alliances: Proponents of Peace, Weapons of War。Stanford University Press。 |
45. | He, Kai(2009)。Institutional Balancing in the Asia Pacific, Economic Interdependence and China's Rise。Routledge。 |
46. | Waltz, Kenneth Neal(1979)。Theory of International Politics。McGraw-Hill。 |
47. | Lieberthal, Kenneth G.、Wang, Jisi(20120312)。Addressing U.S.-China Strategic Distrust。Washington, D.C.:Brookings Institution。 |
其他1. | 關慶豐(20130610)。中美如何通過90多個平臺對話?,http://bjyouth.ynet.com/3.1/1306/10/8068300.html。 延伸查詢 |
2. | The Communist Party of China(20131115)。授權發布︰中共中央關於全面深化改革若干重大問題的決定,http://news.xinhuanet.com/politics/2013-11/15/c_118164235.htm。 延伸查詢 |
3. | 楊婷(20140227)。習近平:把我國從網絡大國建設成為網絡強國,http://news.xinhuanet.com/politics/2014-02/27/c_119538788.htm。 延伸查詢 |
4. | (20140717)。習近平巴西談互聯網治理,http://politics.people.com.cn/BIG5/n/2014/0717/c1024-25296103.html。 |
5. | Perlroth, Nicole(20130314)。Cyberattacks a Topic in Obama Call With New Chinese President,http://bits.blogs.nytimes.com/2013/03/14/cyberattacks-prominent-in-obama-call-with-new-chinese-president/?_r=0。 |
6. | Perlroth, Nicole(20140609)。2nd China Army Unit Implicated in Online Spying,http://www.nytimes.com/2014/06/10/technology/private-report-further-details-chinese-cyberattacks.html?_r=0。 |
7. | Sanger, David E.,Barboza, David,Perlroth, Nicole(20130218)。Chinese Army Unit Is Seen as Tied to Hacking Against U.S.,http://www.nytimes.com/2013/02/19/technology/chinas-armyis-seen-as-tied-to-hacking-against-us.html?_r=0。 |
8. | (20161118)。2016年世界互聯網發展烏鎮報告,http://www.wicwuzhen.cn/system/2016/11/18/021373284.shtml。 延伸查詢 |
9. | (20151216)。習近平在第二屆世界互聯網大會開幕式上的講話,http://news.xinhuanet.com/politics/2015-12/16/c_1117481089.htm.。 延伸查詢 |
10. | U.S. Department of Justice(20151202)。First U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues Summary of Outcomes,https://www.justice.gov/opa/pr/first-us-china-high-level-joint-dialogue-cybercrime-andrelated-issues-summary-outcomes-0。 |
11. | 中共官媒批美『中國網絡威脅論』:不要搞唯我獨尊,http://news.dwnews.com/global/big5/news/2013-03-16/59156042.html。 延伸查詢 |
12. | 中共中央政治局進行第36次集體學習,習近平主持,http://china.cnr.cn/news/20161010/t20161010_523185107.shtml。 延伸查詢 |
13. | 2017年3月9日外交部發言人耿爽主持例行記者會,http://www.mfa.gov.cn/web/fyrbt_673021/t1444510.shtml。 延伸查詢 |
14. | 2016年中國半導體記憶體行業市場現狀及發展趨勢預測,http://www.chinaidr.com/tradenews/2016-09/103234.html。 延伸查詢 |
15. | 中美互聯網巨頭熱議習近平講話,http://politics.people.com.cn/n/2015/0924/c1001-27631110.html。 延伸查詢 |
16. | 中美半年內兩度商討打擊網絡犯罪,抓獲17名涉兒童色情嫌犯,http://www.thepaper.cn/newsDetail_forward_1482997。 延伸查詢 |
17. | 中美打擊網絡犯罪及相關事項高級別聯合對話聯絡熱線開通,http://www.cac.gov.cn/2016-08/28/c_1119466923.htm。 延伸查詢 |
18. | 中美恢復網絡安全對話,https://tinyurl.com/y99szukh。 延伸查詢 |
19. | 中國Windows10用戶數超過Mac只用了2天,http://digi.163.com/15/0812/06/B0Q3EKAG00162OUT.html。 |
20. | 中國經濟發展新趨勢與中美經貿合作新機遇,http://www.fmprc.gov.cn/web/dszlsjt_673036/zls_673040/t1408800.shtml。 延伸查詢 |
21. | 中國解放軍令大學配合徵五毛黨公文曝光,http://newtalk.tw/news/view/2016-04-11/71990。 延伸查詢 |
22. | 中國網路監控大軍被懷疑有800萬,https://tinyurl.com/y74heydb。 延伸查詢 |
23. | 中國戰略支援部隊接收『黑客部隊』提高網路戰能力,https://www.voachinese.com/a/china-cyber-security-20160129/3169386.html。 延伸查詢 |
24. | 中華人民共和國國民經濟和社會發展第十三個五年規畫綱要,http://www.npc.gov.cn/npc/dbdhhy/12_4/2016-03/18/content_1985670.htm。 延伸查詢 |
25. | 李克強同世界互聯網大會中外代表座談時強調,促進互聯網共用共治,推動大眾創業萬眾創新,http://news.xinhuanet.com/politics/2014-11/20/c_1113340416.htm。 延伸查詢 |
26. | 世界互聯網大會觀察:人工智慧、技術創新成絕對主角,http://tech.qq.com/a/20161118/004229.htm。 延伸查詢 |
27. | 互聯網新聞信息服務單位約談工作規定,http://politics.people.com.cn/n/2015/0429/c1001-26920835.html。 延伸查詢 |
28. | 中華人民共和國國家安全法,http://www.npc.gov.cn/npc/xinwen/2015-07/07/content_1941161.htm。 |
29. | 中華人民共和國網絡安全法,http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm。 |
30. | 李克強會見美國哥倫比亞大學校長、法學教授博林格,http://www.safea.gov.cn/content.shtml?id=12748685。 延伸查詢 |
31. | 尚冰出席第六屆中美互聯網論壇開幕式,http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057709/n3057722/c3651813/content.html。 延伸查詢 |
32. | 東莞理工學院成立全國首個網絡空間安全學院,http://www.chinanews.com/gn/2017/03-11/8171430.shtml。 延伸查詢 |
33. | 信息安全國際行為準則(2011),http://wcm.fmprc.gov.cn/pub/chn/gxh/zlb/zcwj/t858317.htm。 |
34. | 信息安全國際行為準則(2015),http://www.mfa.gov.en/chn//pds/ziliao/tytj/zcwj/P020150316571763224632.pdf。 |
35. | 國家網絡空間安全戰略全文,http://www.cac.gov.cn/2016-12/27/c_1120195926.htm。 延伸查詢 |
36. | 國家網絡安全事件應急預案,http://news.xinhuanet.com/zgjx/2017-06/28/c_136400422.htm。 延伸查詢 |
37. | 烏鎮指數:全球人工智能發展報告(精華篇),http://sike.news.cn/hot/pdf/10.pdf。 延伸查詢 |
38. | 卿昱:解讀中華人民共和國網絡安全法,http://www.cnetsec.com/article/20374.html。 延伸查詢 |
39. | 背景資料:中美互聯網論壇,http://t.m.china.com.cn/convert/c_uDe56F.html。 延伸查詢 |
40. | 第二次中美打擊網絡犯罪對話成果清單出爐,http://news.cri.cn/20160616/fbed4663-df67-1e13-4863-82851416907c.html。 延伸查詢 |
41. | 習近平:中國宣導建設和平、安全、開放、合作的網絡空間,http://news.xinhuanet.com/world/2015-09/24/c_l116663156.htm。 延伸查詢 |
42. | 第七屆中美互聯網論壇在華盛頓舉行,魯煒提出中美網絡關係五點主張,http://news.xinhuanet.com/world/2014-12/03/c_1113493517.htm。 延伸查詢 |
43. | 從『數位福建』到『數位中國』習近平擘畫科技發展新高度,http://politics.people.com.cn/nl/2016/0427/c1001-28308778.html。 延伸查詢 |
44. | 習近平:在第三屆世界互聯網大會開幕式上的視頻講話,http://news.xinhuanet.com/2016-11/16/c_1119925133.htm。 延伸查詢 |
45. | 習近平:讓互聯網更好造福國家和人民,http://news.xinhuanet.com/politics/2016-04/19/c_1118672059.htm。 延伸查詢 |
46. | 習近平『南巡』:訪前海察騰訊探母親,http://news.wenweipo.com/2012/12/08/IN1212080018.htm。 延伸查詢 |
47. | (20141119)。習近平向首屆世界互聯網大會致賀詞,http://news.xinhuanet.com/politics/2014-11/19/c_1113319278.htm, 。 延伸查詢 |
48. | 習近平在亞太經合組織第23次領導人非正式會議上的講話,http://news.xinhuanet.com/world/2015-11/19/c_1117201278.htm。 延伸查詢 |
49. | 習近平在網信工作座談會上的講話全文發表,http://news.xinhuanet.com/politics/2016-04/25/c_1118731175.htm。 延伸查詢 |
50. | 習近平參觀美國微軟公司總部,http://news.xinhuanet.com/world/2015-09/24/c_1116667179.htm。 延伸查詢 |
51. | (20150926)。習近平訪美中方成果清單發佈,http://politics.people.com.cn/n/2015/0926/c1001-27637282.html。 延伸查詢 |
52. | 習近平親自出馬,主掌中國網絡安全,http://www.bbc.com/zhongwen/trad/china/2014/02/140227_china_xi_web_security。 延伸查詢 |
53. | 陸決定中止中美網路工作組活動,http://www.chinatimes.com/realtimenews/20140519005093-260409。 延伸查詢 |
54. | 焦點對話:自乾五是如何煉成的,http://www.voachinese.com/a/VOAWeishi-ProandCon-20160617-The-rise-of-Chinas-volunteer-50-centers-Is-Chinas-education-to-blame/3380445.html。 |
55. | 楊潔篪在第六輪中美戰略與經濟對話聯合記者會上的講話,http://finance.takungpao.com.hk/q/2014/0711/2591950.html。 延伸查詢 |
56. | (2017)。關於促進移動互聯網健康有序發展的意見,http://news.xinhuanet.com/politics/2017-01/15/c_1120315481.htm。 延伸查詢 |
57. | 魯煒出席首屆世界互聯網大會並致辭,http://www.chinanews.com/gn/2014/11-19/6793335.shtml。 延伸查詢 |
58. | 領英騰訊紅杉寬頻聯合發起中美數字經濟合作協會,http://info.3g.qq.com/g/index5/ttnews/yidian.jsp?aid=yidian&id=tech_20151217044055&g_f=23748。 延伸查詢 |
59. | 網絡強國,習近平呼籲對網絡輿論的引導,http://china.dwnews.com/news/2016-10-09/59774082.html。 延伸查詢 |
60. | 農村電子商務發展的戰略與政策,http://news.xinhuanet.com/tech/2017-03/09/c_1120593562.htm。 延伸查詢 |
61. | Hat-tribution to PLA Unit 61486,https://www.crowdstrike.com/blog/hat-tribution-pla-unit-61486/。 |
62. | Hagel in Singapore on U.S. Security Policy in Asia-Pacific Region,http://iipdigital.usembassy.gov/st/english/texttrans/2013/06/20130601148324.html#ixzz4XMHSZORO。 |
63. | DoD Releases Fiscal Year 2016 Budget Proposal,https://www.defense.gov/News/News-Releases/News-Release-View/Article/605365。 |
64. | DOD Releases Fiscal Year 2014 Budget Proposal,http://dodcio.defense.gov/Portals/0/Documents/Library/2014%20Press%20Release.pdf。 |
65. | Press Release: China, India Now World's Largest Internet Markets,http://www.itu.int/en/mediacentre/Pages/2016-PR35.aspx。 |
66. | Press Briefing by National Security Advisor Tom Donilon,https://obamawhitehouse.archives.gov/the-press-offlce/2013/06/08/press-briefing-national-security-advisor-tom-donilon。 |
67. | Internet 2 China Program,http://www.internet2.edu/communities-groups/intemational-community/internet2-china-program/。 |
68. | Navy Stands up Fleet Cyber Command, Reestablishes U.S. 10th Fleet,http://www.stratcom.mil/Media/News/News-Article-View/Article/983834/navy-stands-up-fleet-cyber-command-reestablishes-us-10th-fleet/。 |
69. | History of HQ Twenty-Fourth Air Force and 624th Operations Center,http://www.24af.af.mil/Portals/11/ documents/About_Us/AFD-140429-035.pdf?ver=2016-04-26-113101-810。 |
70. | Second U.S.-China Cybercrime and Related Issues High Level Joint Dialogue,https://www.justice.gov/opa/pr/second-us-china-cybercrime-and-related-issues-high-level-joint-dialogue。 |
71. | These are the 20 China-exposed Stocks to avoid,http://www.marketwatch.com/story/these-are-the-20-china-exposed-stocks-to-avoid-2015-08-10。 |
72. | Third U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues,https://www.justice.gov/opa/pr/second-us-china-cybercrime-and-related-issues-high-level-joint-dialogue。 |
73. | (20160512)。U.S., China Cyber Group Holds First Talks Since September Pact,http://uk.reuters.com/article/us-usa-china-cyber-idUKKCN0Y22OB。 |
74. | (20130709)。US-China Cyber Security Working Group Meets,http://www.bbc.com/news/world-asia-china-23177538。 |
75. | Busby, Scott。10 Things You Need to Know about U.S. Support for Free Internet,http://iipdigital.usembassy.gov/st/english/article/2014/05/20140530300596.html#ixzz4XMASG4Pj。 |
76. | Akl, Aida。Iran Plans Its Own Sanitized Internet with Chinese Help,https://www.voanews.com/a/iran-plans-its-own-sanitized-internet-with-chinese-help/1713638.html。 |
77. | Aaronson, Susan A.,Elliott, Kimberly A.。A China-U.S. Approach to Digital Trade,http://www.chinausfocus.com/flnance-economy/a-china-us-approach-to-digital-trade。 |
78. | Clinton, Hillary。Remarks on Internet Freedom,https://www.ait.org.tw/en/offlcialtext-ot1004.html。 |
79. | Fortin, Jacey。Russia, Saudi Arabia, China and others fail to Impose Internet Regulations at WCIT,http://www.ibtimes.com/russia-saudi-arabia-china-others-fail-impose-internet-regulations-wcit-931654。 |
80. | Fisher, Max。Russia and the U.S. Election: What We Know and Don't Know,https://www.nytimes.com/2016/12/12/world/europe/russia-trump-election-cia-fbi.html?_r=0。 |
81. | Graham, Jefferson。Google CEO: Open to Returning to China,https://www.usatoday.com/story/tech/2016/06/01/google-ceo-open-returning-china/85247082/。 |
82. | Howell, Catherine,West, Darrell M.。The Internet as a Human Right,https://www.brookings.edu/blog/techtank/2016/11/07/the-internet-as-a-human-right/。 |
83. | Horwitz, Josh。A New Wave of US Internet Companies is Succeeding in China,https://qz.com/435764/a-new-wave-of-us-internet-companies-is-succeeding-in-china-by-giving-the-govemment-what-it-wants/。 |
84. | Kai, Jin。Why China Banned Windows 8,http://thediplomat.com/2014/05/why-china-banned-windows-8/。 |
85. | Kumar, Anugrah。Obama, Xi Jinping Meet in California to Discuss North Korea, Cybersecurity,http://www.christianpost.com/news/obama-xi-jinping-meet-in-california-to-discuss-north-korea-cybersecurity-97603/。 |
86. | Kopan, Tal。Kerry: 'Very Likely' China, Russia Read my Emails,https://edition.cnn.com/2015/08/11/politics/kerry-emails-chinese-russian-hackers/index.html。 |
87. | Lau, Justine。A History of Google in China,http://www.ft.com/cms/s/0/faf86fbc-0009-11ldf-8626-00144feabdc0.html?ft_site=falcon#axzz4dGMpKxlN。 |
88. | Monaco, Lisa O.。Counterterrorism, Cybersecurity, and Homeland Security,http://www.cfr.org/cybersecurity/counterterrorism-cybersecurity-homeland-security/p38642。 |
89. | Margolin, Jack。Russia, China, and the Push for 'Digital Sovereignty',https://theglobalobservatory.org/2016/12/russia-china-digital-sovereignty-shanghai-cooperation-organization/。 |
90. | Nakashima, Ellen,Warrick, Joby。Stuxnet was Work of U.S. and Israeli Experts, Officials Say,https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-ay/2012/06/01/gJQAlnEy6U_story.html?utm_term=.847875342088。 |
91. | Nippard, Cinnamon。International Blogging Conference Puts Internet Press Freedom on the Agenda,http://www.dw.com/en/international-blogging-conference-puts-internet-press-freedom-on-the-agenda/a-5474714。 |
92. | Roberts, Dan。US and China Back off Internet Arms Race but Obama Leaves Sanctions on the Table,https://www.theguardian.com/us-news/2015/sep/25/us-china-cyber-security-obama-xi-jinping-inconclusive-summit。 |
93. | Qun, Wang。Shared Interests and Responsibility: The US and China Must Join to Promote a Rules-based Cyberspace,http://www.huffingtonpost.com/wang-qun/shared-interests-and-resp_b_9873642.html。 |
94. | Reed, Kevin(20121228)。Global Split over Telecom Treaty,https://www.wsws.org/en/articles/2012/12/28/wcit-d28.html。 |
95. | Schmidt, Michael S.,Sanger, David E.。5 in China Army Face U.S. Charges of Cyberattacks,https://www.nytimes.com/2014/05/20/us/us-to-charge-chinese-workers-with-cyberspying.html?_r=0。 |
96. | Sanger, David E.(20120601)。Obama Order Sped up Wave of Cyberattacks against Iran,http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=0。 |
97. | Schmitt, Eric,Shanker, Thom。U.S. Debated Cyberwarfare in Attack Plan on Libya,http://www.nytimes.com/2011/10/18/world/africa/cyber-warfare-against_libya-was-debated-by-us.html。 |
98. | Theohary, Catherine A.,Welt, Cory。Russia and the U.S. Presidential Election,https://fas.org/sgp/crs/natsec/IN10635.pdf。 |
99. | USA Features Media。SECDEF Carter Shifts Focus to Chinese Cyber-espionage as Shangri-La Summit Approaches,http://glitch.news/2016-06-08-secdef-carter-shifts-focus-to-chinese-cyber-espionage-as-shangri-la-summit-approaches.html。 |
100. | Wilson, J. R.。MARFORCYBER: Marines Fight in a New Domain,http://www.defensemedianetwork.com/stories/marforcyber-marines-flght-in-a-new-domain/。 |
101. | Zhu, Xu-Dong,Hong, Rachel。How some of America's Biggest Tech Companies are Expanding into China,http://www.businessinsider.com/us-tech-companies-expanding-into-china-2014-6。 |
102. | Wright, David,Kreissl, Reinhard。European Responses to the Snowden Revelations: A Discussion Paper,http://irissproject.eu/wp-content/uploads/2013/12/IRISS_European-responses-to-the-Snowden-revelations_18-Dec-2013_Final.pdf。 |