:::

詳目顯示

回上一頁
題名:川普政府時期的美國國家網路戰略之研究:從威脅平衡理論分析
書刊名:遠景基金會季刊
作者:張凱銘
作者(外文):Chang, Kai-ming
出版日期:2020
卷期:21:1
頁次:頁107-170
主題關鍵詞:網路安全美國國家網路戰略美國外交政策國際網路政治防禦推進CybersecurityThe U.S. national cyber strategyThe U.S. foreign policyInternational cyber politicsDefending forward
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:14
  • 點閱點閱:7
期刊論文
1.Costello, John(2016)。The Strategic Support Force: China's Information Warfare Service。China Brief,16(3),15-20。  new window
2.Racicot, Jonathan(2014)。The Past, Present and Future of Chinese Cyber Operations。Canadian Military Journal,14(3),26-37。  new window
3.Akbanov, Maxat、Vassilakis, Vassilios G.、Logothetis, Michael D.(2019)。WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms。Journal of Telecommunications and Information Technology,1,113-124。  new window
4.Art, Robert J.、Brooks, Stephen G.、Wohlforth, William C.、Lieber, Keir A.、Alexander, Gerard(2005)。Correspondence: Striking the Balance。International Security,30(3),177-196。  new window
5.Pape, Robert Anthony(2005)。Soft Balancing Against the United States。International Security,30(1),7-45。  new window
圖書
1.Martel, Frédéric、林幼嵐(2016)。全球網路戰爭。新北市:稻田。  延伸查詢new window
2.The White House(2011)。International Strategy for Cyberspace。Washington, D. C.:The White House。  new window
3.Mandiant Corporation(2013)。APT1: Exposing One of China's Cyber Espionage Units。Washington, DC:Mandiant Corporation。  new window
4.Walt, Stephen M.(1987)。The Origins of Alliances。Cornell University Press。  new window
5.Lowy Institute(2018)。Asia Power Index 2018。Sydney:Lowy Institute。  new window
6.U.S. Department of Defense(2019)。Military and Security Developments Involving the People's Republic of China 2019。Washington, D.C.:U.S. Department of Defense。  new window
7.Chanlett-Avery, Emma(2017)。North Korean Cyber Capabilities: In Brief。Washington D.C.:Congressional Research Service。  new window
8.Cylance(2014)。Operation Cleaver。Irvine:Cylance。  new window
9.Giles, Keir(2015)。The Next Phase of Russian Information Warfare。Riga:NATO Strategic Communications Centre of Excellence。  new window
10.Maurer, Tim(2011)。Cyber Norm Emergence at the United Nations。Cambridge:Harvard Kennedy School。  new window
11.McLoughlin, Glenn J.、Fergusson, Ian F.(2003)。High Performance Computers and Export Control Policy: Issues for Congress。Washington, D.C.:Congressional Research Service。  new window
12.Muller, Lilly Pijnenburg、Gjesvik, Lars、Friis, Karsten(2018)。Cyberweapons in International Politics。Oslo:Norwegian Institute of International Affairs。  new window
13.Pella, Peter(2018)。The Continuing Quest for Missile Defense: When Lofty Goals Confront Reality。San Rafael:Morgan & Claypool Publishers。  new window
14.Ryan, Johnny(2010)。A History of the Internet and the Digital Future。London:Reaktion Books。  new window
15.European Commission(2019)。EU-China--A Strategic Outlook。Brussels:European Commission。  new window
16.Tikk-Ringas, Eneken(2012)。Developments in the Field of Information and Telecommunications in the Context of International Security。Geneva:ICT for Peace Foundation。  new window
17.USC Center on Public Diplomacy(2018)。The Soft Power 30: A Global Ranking of Soft Power 2018。Los Angeles:USC Center on Public Diplomacy。  new window
18.Executive Office of the President of the United States(2019)。Science & Technology Highlights in the Second Year of the Trump Administration。Washington, D.C.:Executive Office of the President of the United States。  new window
19.U.S. Cyber Command(2018)。Achieve and Maintain Cyberspace Superiority。Fort Meade:U.S. Cyber Command。  new window
20.U.S. Defense Science Board(2017)。Cyber Deterrence Task Force。Washington, D.C.:Office of the Secretary of Defense。  new window
21.U.S. Department of Commerce & U.S. Department of Homeland Security(2018)。A Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats。Washington, D.C.:U.S. Department of Commerce & U.S. Department of Homeland Security。  new window
22.U.S. Department of Commerce、U.S. Department of Homeland Security(2018)。A Report to the President on Supporting the Growth and Sustainment of the Nation's Cybersecurity Workforce。Washington, D.C.:U.S. Department of Commerce:U.S. Department of Homeland Security。  new window
23.U.S. Department of Defense(2011)。Department of Defense Cyberspace Policy Report。Washington, D.C.:U.S. Department of Defense。  new window
24.U.S. Department of Defense(2018)。DoD Cloud Strategy。Washington, D.C.:U.S. Department of Defense。  new window
25.U.S. Department of Defense(2018)。Summary of the 2018 Department of Defense Cyber Strategy。Washington, D.C.:U.S. Department of Defense。  new window
26.U.S. Department of State(2018)。Recommendations to the President on Deterring Adversaries and Better Protecting the American People from Cyber Threats。Washington, D.C.:U.S. Department of State。  new window
27.U.S. Department of State(2018)。Recommendations to the President on Securing America’s Cyber Interests and Deterring Cyber Threats through International Engagement。Washington, D.C.:U.S. Department of State。  new window
28.U.S. Government Accountability Office(2019)。Critical Infrastructure Protection: Actions Needed to Address Significant Cybersecurity Risks Facing the Electric Grid。Washington, D.C.:U.S. Government Accountability Office。  new window
29.U.S. National Science and Technology Council(2019)。2019 Federal Cybersecurity Research and Development Strategic Plan。Washington, D.C.:U.S. National Science and Technology Council。  new window
30.U.S. Office of the Director of National Intelligence(2019)。National Intelligence Strategy 2019。Washington, D.C.:U.S. Office of the Director of National Intelligence。  new window
31.U.S. Office of Management and Budget(2018)。Federal Cybersecurity Risk Determination Report and Action Plan。Washington, D.C.:Office of Management and Budget。  new window
32.The White House(2009)。Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure。The White House。  new window
33.The White House(2017)。National Security Strategy。Washington, DC:The White House。  new window
34.The White House(2018)。National Cyber Strategy。The White House。  new window
35.Walt, Stephen M.(2005)。Taming American Power: The Global Response to U.S. Primacy。W. W. Norton & Company。  new window
36.He, Kai(2009)。Institutional Balancing in the Asia Pacific, Economic Interdependence and China's Rise。Routledge。  new window
37.Waltz, Kenneth Neal(1979)。Theory of International Politics。McGraw-Hill。  new window
單篇論文
1.G7 Summit(20170411)。G7 Declaration on Responsible States Behavior in Cyberspace,https://www.mofa.go.jp/files/000246367.pdf。  new window
其他
1.Stokes, Mark A.(20150727)。The PLA General Staff Department Third Department Second Bureau: An Organizational Overview of Unit 61398,Arlington:2049 Project Institute。,http://www.project2049.net/documents/Stokes_PLA_General_Staff_Department_Unit_61398.pdf。  new window
2.Hat-tribution to PLA Unit 61486,https://www.crowdstrike.com/blog/hat-tribution-pla-unit-61486/。  new window
3.Reed, Kevin(20121228)。Global Split over Telecom Treaty,https://www.wsws.org/en/articles/2012/12/28/wcit-d28.html。  new window
4.(20110526)。國防部證實建網上藍軍稱為提高部隊網絡防護,http://politics.people.com.cn/BIG5/1027/14740509.html。  延伸查詢new window
5.(20190530)。印太資安聯盟成立AIT:資安不只是政治議題,https://www.rti.org.tw/news/view/id/2022452。  延伸查詢new window
6.(20160721)。Transcript: Donald Trump on NATO, Turkey's Coup Attempt and the World,https://www.nytimes.com/2016/07/22/us/politics/donald-trump-foreign-policy-interview.html。  new window
7.(20170223)。Russian Military Admits Significant Cyber-War Effort,https://www.bbc.com/news/world-europe-39062663。  new window
8.American Institute in Taiwan(20190528)。Remarks by AIT Deputy Director Raymond Greene at Opening Ceremony of GCTF on Network Security and Emerging Technologies,https://www.ait.org.tw/remarks-by-ait-deputy-director-greene-at-opening-ceremony-of-gctf-on-network-security-and-emerging-technologies/。  new window
9.Bowcott, Owen(20170823)。Dispute along Cold War Lines Led to Collapse of UN Cyberwarfare Talks,https://www.theguardian.com/world/2017/aug/23/un-cyberwarfare-negotiations-collapsed-in-june-it-emerges。  new window
10.Buchholz, Katharina(20190819)。Which Countries Have Banned Huawei?,https://www.statista.com/chart/17528/countries-which-havebanned-huawei-products/。  new window
11.Busselen, Michael(20190328)。Key Trends from the CrowdStrike 2019 Global Threat Report,https://www.crowdstrike.com/blog/2019-global-threat-report-key-trends/。  new window
12.Constantin, Lucian(20170213)。Recent Malware Attacks on Polish Banks Tied to Wider Hacking Campaign,https://www.networkworld.com/article/3169409/security/recent-malware-attacks-onpolish-banks-tied-to-wider-hacking-campaign.html。  new window
13.(20180830)。Two Birds, One Stone Panda,https://www.crowdstrike.com/blog/two-birds-one-stone-panda/。  new window
14.(20190224)。Meet the Threat Actors-Who are your Cyber Adversaries?,https://www.crowdstrike.com/blog/meetthe-adversaries/。  new window
15.(20191212)。Who is Refined Kitten?,https://www.crowdstrike.com/blog/who-is-refined-kitten/。  new window
16.Cyber Security Agency of Singapore(2017)。Factsheet on ASEAN Cyber Capacity Programme,https://www.csa.gov.sg/news/speeches/media/3bfa3b0aaf264a41b8f7a31551baf2b4.ashx。  new window
17.Cyber Security Agency of Singapore(20181116)。Singapore and the United States Sign Declaration of Intent on Cybersecurity Technical Assistance Programme,https://www.csa.gov.sg/news/press-releases/singapore-and-the-us-sign-doi-oncybersecurity-technical-assistance-programme。  new window
18.Cybersecurity and Infrastructure Security Agency(20191225)。Continuous Diagnostics and Mitigation,https://www.us-cert.gov/cdm/home。  new window
19.Freedberg, Sydney J. Jr.(20180917)。Trump Eases Cyber Ops, But Safeguards Remain: Joint Staff,https://breakingdefense.com/2018/09/trump-eases-cyber-ops-but-safeguards-remainjoint-staff/。  new window
20.Freedom House(20191225)。Freedom in the World in 2019: North Korea,https://freedomhouse.org/report/freedom-world/2019/north-korea。  new window
21.Global Cyber Security Company(20181001)。Hi-Tech Crime Trends 2018,https://www.fintechsecurity.com.hk/slides/01.Dmitry-Annual-Group-IB-report-High-Tech-Crime-Trends.pdf。  new window
22.Goel, Vindu(20190214)。India Proposes Chinese-Style Internet Censorship,https://www.nytimes.com/2019/02/14/technology/india-internet-censorship.html。  new window
23.Goldstein, Phil(20180215)。Cybersecurity FundingWould Jump in Trump's 2019 Budget,https://fedtechmagazine.com/article/2018/02/cybersecurity-funding-would-jump-trumps-2019-budget。  new window
24.Haseltine, Ben(20180605)。Pentagon's Bug Bounty Program Identifies Defense Travel System Vulnerabilities,https://www.governmentciomedia.com/pentagons-bugbounty-program-identifies-defense-travel-system-vulnerabilities-0。  new window
25.Headquarters U.S. Forces, Japan(19600119)。Treaty of Mutual Cooperation and Security between the United States and Japan,https://www.cia.gov/library/readingroom/docs/CIA-RDP07-00469R000100950001-2.pdf。  new window
26.Hymas, Charles(20181009)。China is ahead of Russia as ‘biggest state sponsor of cyber-attacks on the West,https://www.telegraph.co.uk/technology/2018/10/09/china-ahead-russia-biggest-state-sponsor-cyber-attacks-west/。  new window
27.Kim, Youngnam(20180608)。North Korea Uses US Tech for ‘Destructive Cyber Operations,https://www.voanews.com/a/north-korea-us-tech-destructive-cyber-operations/4429922.html。  new window
28.Kochetkova, Kate(20160224)。What is Known about the Lazarus Group: Sony Hack, Military Espionage, Attacks on Korean Banks and other Crimes,https://www.kaspersky.com/blog/operationblockbuster/11407/。  new window
29.LaFrance, Adrienne(20160927)。Trump's Incoherent Ideas About 'the Cyber',https://www.theatlantic.com/technology/archive/2016/09/trumps-incoherent-ideas-about-the-cyber/501839/。  new window
30.Lange, Katie(20180503)。Cybercom Becomes DoD’s 10th Unified Combatant Command,http://www.dodlive.mil/2018/05/03/cybercomto- become-dods-10th-unified-combatant-command/。  new window
31.Lyngaas, Sean(20180410)。DHS 'Cyber Storm' Exercise Tests Manufacturing and Transportation Sectors,https://www.cyberscoop.com/dhs-cyber-storm-jeanette-manfra-critical-infrastructure/。  new window
32.Lyngaas, Sean(20180816)。PPD-20 Elimination Opens Arguments over How U.S. Should Conduct Offensive Hacking Operations,https://www.cyberscoop.com/ppd-20-eliminated-cyber-war-donaldtrump-mike-rounds/。  new window
33.Menn, Joseph(20170825)。Chinese National Arrested in Los Angeles onU.S. Hacking Charge,https://www.reuters.com/article/ususa-cyber-opm/chinese-national-arrested-in-los-angeles-on-u-s-hacking-charge-idUSKCN1B42RM。  new window
34.Meyers, Adam(20181127)。Meet CrowdStrike’s Adversary of the Month for November: Helix Kitten,https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-november-helix-kitten/。  new window
35.Ministry of Foreign Affairs of Japan(20190419)。Joint Statement of the Security Consultative Committee,https://www.mofa.go.jp/files/000470738.pdf。  new window
36.The MITRE Corporation(20200109)。JUST RELEASED: ATT&CK for Industrial Control Systems,https://attack.mitre.org/groups/。  new window
37.Nakashima, Ellen(20190623)。Trump Approved Cyber-Strikes Against Iranian Computer Database Used to Plan Attacks on Oil Tankers,https://www.washingtonpost.com/world/national-security/with-trumps-approval-pentagon-launched-cyber-strikesagainst-iran/2019/06/22/250d3740-950d-11e9-b570-6416efdc0803_story.html。  new window
38.Nye, Joseph S.(20190311)。Rules of the cyber road for America and Russia,https://www.aspistrategist.org.au/rules-ofthe-cyber-road-for-america-and-russia/。  new window
39.Paganini, Pierluigi(20190724)。China-Linked APT15 Group is Using a Previously Undocumented Backdoor,https://securityaffairs.co/wordpress/88824/apt/apt15-okrum-backdoor.html#top。  new window
40.Panda, Ankit(20180909)。What the Recently ConcludedUS-India COMCASA Means,https://thediplomat.com/2018/09/what-therecently-concluded-us-india-comcasa-means/。  new window
41.Perlroth, Nicole,Shane, Scott(20190525)。In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc,https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html。  new window
42.Pomerleau, Mark(20170601)。Cyber protection teams assigned to THAAD in South Korea,https://www.fifthdomain.com/home/2017/06/01/cyber-protection-teams-assigned-to-thaad-in-southkorea/。  new window
43.Pomerleau, Mark(20190716)。What Good are 'Exceptional' Cyber Capabilities without Authority?,https://www.fifthdomain.com/dod/2019/07/16/what-good-are-exceptional-cyber-capabilitieswithout-authority/。  new window
44.Sanger, David E.,Perlroth, Nicole(20190615)。U.S. Escalates Online Attacks on Russia's Power Grid,https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html, 。  new window
45.Sanger, David E.,Broad, William J.(20180116)。Pentagon Suggests Countering Devastating Cyberattacks with Nuclear Arms,https://www.nytimes.com/2018/01/16/us/politics/pentagon-nuclear-review-cyberattack-trump.html?_ga=2.182743974.1450541312.1564318121-1345450338.1537238599。  new window
46.Scheer, Steven(20170626)。U.S. to Work with Israel, Seek other Ties to Combat Cyber Attacks,https://www.reuters.com/article/us-usa-israel-cyber-idUSKBN19H1KE。  new window
47.Seldin, Jeff(20180920)。US Prepared to Strike in Cyberspace,https://www.voanews.com/usa/us-politics/us-prepared-strikecyberspace。  new window
48.Sukumar, Arun M.(20170704)。The UN GGE Failed. Is International Law in Cyberspace Doomed As Well?,https://www.lawfareblog.com/un-gge-failed-international-law-cyberspace-doomed-well。  new window
49.Symantec Corporation(2017)。Internet Security Threat Report,https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf。  new window
50.Thomsen, Jacqueline(20180920)。US to Prioritize Attacks Against Foreign Adversaries under new Cyber Strategy,https://thehill.com/policy/cybersecurity/407670-us-to-launch-offensive-attacks-against-foreign-adversaries-under-new。  new window
51.U.S. Department of Homeland Security(20191225)。Cyber Storm VI: National Cyber Exercise,https://www.dhs.gov/cisa/cyber-storm-vi。  new window
52.U.S. Department of Justice(20170315)。U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts,https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions。  new window
53.U.S. Department of Justice(20171121)。Acting Manhattan U.S. Attorney Announces Charges against Iranian National for Conducting Cyber Attack And 6 Million Extortion Scheme against HBO,https://www.justice.gov/usao-sdny/pr/actingmanhattan-us-attorney-announces-charges-against-iranian-national-conducting。  new window
54.U.S. Department of Justice(20171127)。U.S. Charges Three Chinese Hackers Who Work at Internet Security Firm for Hacking Three Corporations for Commercial Advantage,https://www.justice.gov/opa/pr/us-charges-three-chinese-hackers-whowork- internet-security-firm-hacking-three-corporations。  new window
55.U.S. Department of Justice(20180713)。Grand Jury Indicts 12 RussianIntelligence Officers for Hacking Offenses Related to the 2016 Election,https://www.justice.gov/opa/pr/grand-jury-indicts-12-russian-intelligence-officers-hacking-offensesrelated-2016-election。  new window
56.U.S. Department of Justice(20180906)。North Korean Regime-Backed Programmer Charged with Conspiracy to Conduct Multiple Cyber Attacks and Intrusions,https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-chargedconspiracy-conduct-multiple-cyber-attacks-and。  new window
57.U.S. Department of Justice(20181030)。Chinese Intelligence Officers and Their Recruited Hackers and Insiders Conspired to Steal Sensitive Commercial Aviation and Technological Data for Years,https://www.justice.gov/opa/pr/chinese-intelligence-officers-and-their-recruited-hackers-and-insiders-conspired-steal。  new window
58.Office of Public Affairs, U.S. Department of Justice(20181220)。Two Chinese Hackers Associated with the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information,https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion。  new window
59.U.S. Department of Justice(20190115)。Two Ukrainian Nationals Indicted in Computer Hacking and Securities Fraud Scheme Targeting U.S. Securities and Exchange Commission,https://www.justice.gov/opa/pr/two-ukrainian-nationals-indicted-computer-hacking-and-securities-fraud-scheme-targeting-us。  new window
60.U.S. Department of Justice(20190128)。Chinese Telecommunications Conglomerate Huawei and Huawei CFO Wanzhou Meng Charged with Financial Fraud,https://www.justice.gov/opa/pr/chinese-telecommunications-conglomerate-huaweiand-huawei-cfo-wanzhou-meng-charged-financial。  new window
61.U.S. Department of Justice(20190509)。Member of Sophisticated China-Based Hacking Group Indicted for Series of Computer Intrusions, Including 2015 Data Breach of Health Insurer Anthem Inc. Affecting Over 78 Million People,https://www.justice.gov/opa/pr/member-sophisticated-china-based-hacking-groupindicted-series-computer-intrusions-including。  new window
62.U.S. Department of Justice(20190711)。Newly Unsealed Federal Indictment Charges Software Engineer with Taking Stolen Trade Secrets to China,https://www.justice.gov/opa/pr/ newly-unsealed-federal-indictment-charges-software-engineer-takingstolen- trade-secrets-china。  new window
63.U.S. Department of State(20180730)。Remarks on America's Indo-Pacific Economic Vision,https://www.state.gov/ remarks-on-americas-indo-pacific-economic-vision/。  new window
64.U.S. Department of State(20181220)。Joint Statement by Secretary of State Michael R. Pompeo and Secretary of Homeland Security Kirstjen Nielsen: Chinese Actors Compromise Global Managed Service Providers,https://www.ait.org.tw/joint-statement-by-dos-sec-pompeo-and-dhs-sec-nielsen/。  new window
65.U.S. Department of State(20190419)。Joint Statement of the Security Consultative Committee,https://www.state.gov/u-s-japan-joint-press-statement/。  new window
66.U.S. Federal Bureau of Investigation(20181220)。FBI Director Christopher Wray's Remarks Regarding Indictment of Chinese Hackers,https://www.fbi.gov/news/pressrel/press-releases/fbi-director-christopher-wrays-remarks-regarding-indictment-of-chinese-hackers。  new window
67.U.S. House of Representatives(20190306)。Maintaining U.S. Leadership in Science and Technology: Testimony before the Congress of the United States House of Representatives Committee on Science, Space and Technology,https://docs.house.gov/meetings/SY/SY00/20190306/109030/HHRG-116-SY00-Wstate-KhanM-20190306.pdf。  new window
68.U.S. Office of the Director of National Intelligence(20160209)。Remarks as Delivered by The Honorable James R. Clapper Director of National Intelligence, Senate Select Committee on Intelligence--IC'sWorldwide Threat Assessment Opening Statement,https://www.dni.gov/files/documents/2016-02-09SSCI_open_threat_hearing_transcript.pdf。  new window
69.U.S. Office of Management and Budget(20180201)。Budget of the United States, Fiscal Year 2019: Efficient, Effective, Accountable--An American Budget,https://www.whitehouse.gov/wp-content/uploads/2018/02/budget-fy2019.pdf。  new window
70.U.S. Senate Committee on Armed Services(20180301)。Nominations--Nakasone-Park-White,https://www.armed-services.senate.gov/hearings/18-03-01-nominations_--nakasone---park---white。  new window
71.(20170511)。Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/, 。  new window
72.The White House(20170925)。Presidential Memorandum for the Secretary of Education,https://www.whitehouse.gov/presidential-actions/presidential-memorandum-secretary-education/。  new window
73.The White House(20180108)。Presidential Executive Order on Streamlining and Expediting Requests to Locate Broadband Facilities in Rural America,https://www.whitehouse.gov/presidentialactions/presidential-executive-order-streamlining-expediting-requestslocate-broadband-facilities-rural-america/。  new window
74.The World Bank(20191225)。Fixed Broadband Subscriptions (per 100 people),https://data.worldbank.org/indicator/IT.NET.BBND.P2?locations=KP-US-RU-CN-IR。  new window
75.The World Bank(20191225)。Individuals using the Internet (% of population),https://data.worldbank.org/indicator/IT.NET.USER.ZS?locations=IR-US-CN-KP-RU。  new window
76.Volz, Dustin,Hosenball, Mark(20161117)。Trump Cyber Security Team, Policy Slow to Take Shape: Officials,https://www. reuters.com/article/us-usa-trump-cyber-idUSKBN13B2VI。  new window
圖書論文
1.Jin, Dal Yong(2016)。The Construction of Platform Imperialism in the Globalisation Era。Marx in the Age of Digital Capitalism。Leiden:Brill。  new window
2.鄭端耀(20110000)。搶救權力平衡理論。國際關係理論。臺北:五南。new window  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top