圖書1. | Martel, Frédéric、林幼嵐(2016)。全球網路戰爭。新北市:稻田。 延伸查詢 |
2. | The White House(2011)。International Strategy for Cyberspace。Washington, D. C.:The White House。 |
3. | Mandiant Corporation(2013)。APT1: Exposing One of China's Cyber Espionage Units。Washington, DC:Mandiant Corporation。 |
4. | Walt, Stephen M.(1987)。The Origins of Alliances。Cornell University Press。 |
5. | Lowy Institute(2018)。Asia Power Index 2018。Sydney:Lowy Institute。 |
6. | U.S. Department of Defense(2019)。Military and Security Developments Involving the People's Republic of China 2019。Washington, D.C.:U.S. Department of Defense。 |
7. | Chanlett-Avery, Emma(2017)。North Korean Cyber Capabilities: In Brief。Washington D.C.:Congressional Research Service。 |
8. | Cylance(2014)。Operation Cleaver。Irvine:Cylance。 |
9. | Giles, Keir(2015)。The Next Phase of Russian Information Warfare。Riga:NATO Strategic Communications Centre of Excellence。 |
10. | Maurer, Tim(2011)。Cyber Norm Emergence at the United Nations。Cambridge:Harvard Kennedy School。 |
11. | McLoughlin, Glenn J.、Fergusson, Ian F.(2003)。High Performance Computers and Export Control Policy: Issues for Congress。Washington, D.C.:Congressional Research Service。 |
12. | Muller, Lilly Pijnenburg、Gjesvik, Lars、Friis, Karsten(2018)。Cyberweapons in International Politics。Oslo:Norwegian Institute of International Affairs。 |
13. | Pella, Peter(2018)。The Continuing Quest for Missile Defense: When Lofty Goals Confront Reality。San Rafael:Morgan & Claypool Publishers。 |
14. | Ryan, Johnny(2010)。A History of the Internet and the Digital Future。London:Reaktion Books。 |
15. | European Commission(2019)。EU-China--A Strategic Outlook。Brussels:European Commission。 |
16. | Tikk-Ringas, Eneken(2012)。Developments in the Field of Information and Telecommunications in the Context of International Security。Geneva:ICT for Peace Foundation。 |
17. | USC Center on Public Diplomacy(2018)。The Soft Power 30: A Global Ranking of Soft Power 2018。Los Angeles:USC Center on Public Diplomacy。 |
18. | Executive Office of the President of the United States(2019)。Science & Technology Highlights in the Second Year of the Trump Administration。Washington, D.C.:Executive Office of the President of the United States。 |
19. | U.S. Cyber Command(2018)。Achieve and Maintain Cyberspace Superiority。Fort Meade:U.S. Cyber Command。 |
20. | U.S. Defense Science Board(2017)。Cyber Deterrence Task Force。Washington, D.C.:Office of the Secretary of Defense。 |
21. | U.S. Department of Commerce & U.S. Department of Homeland Security(2018)。A Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats。Washington, D.C.:U.S. Department of Commerce & U.S. Department of Homeland Security。 |
22. | U.S. Department of Commerce、U.S. Department of Homeland Security(2018)。A Report to the President on Supporting the Growth and Sustainment of the Nation's Cybersecurity Workforce。Washington, D.C.:U.S. Department of Commerce:U.S. Department of Homeland Security。 |
23. | U.S. Department of Defense(2011)。Department of Defense Cyberspace Policy Report。Washington, D.C.:U.S. Department of Defense。 |
24. | U.S. Department of Defense(2018)。DoD Cloud Strategy。Washington, D.C.:U.S. Department of Defense。 |
25. | U.S. Department of Defense(2018)。Summary of the 2018 Department of Defense Cyber Strategy。Washington, D.C.:U.S. Department of Defense。 |
26. | U.S. Department of State(2018)。Recommendations to the President on Deterring Adversaries and Better Protecting the American People from Cyber Threats。Washington, D.C.:U.S. Department of State。 |
27. | U.S. Department of State(2018)。Recommendations to the President on Securing America’s Cyber Interests and Deterring Cyber Threats through International Engagement。Washington, D.C.:U.S. Department of State。 |
28. | U.S. Government Accountability Office(2019)。Critical Infrastructure Protection: Actions Needed to Address Significant Cybersecurity Risks Facing the Electric Grid。Washington, D.C.:U.S. Government Accountability Office。 |
29. | U.S. National Science and Technology Council(2019)。2019 Federal Cybersecurity Research and Development Strategic Plan。Washington, D.C.:U.S. National Science and Technology Council。 |
30. | U.S. Office of the Director of National Intelligence(2019)。National Intelligence Strategy 2019。Washington, D.C.:U.S. Office of the Director of National Intelligence。 |
31. | U.S. Office of Management and Budget(2018)。Federal Cybersecurity Risk Determination Report and Action Plan。Washington, D.C.:Office of Management and Budget。 |
32. | The White House(2009)。Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure。The White House。 |
33. | The White House(2017)。National Security Strategy。Washington, DC:The White House。 |
34. | The White House(2018)。National Cyber Strategy。The White House。 |
35. | Walt, Stephen M.(2005)。Taming American Power: The Global Response to U.S. Primacy。W. W. Norton & Company。 |
36. | He, Kai(2009)。Institutional Balancing in the Asia Pacific, Economic Interdependence and China's Rise。Routledge。 |
37. | Waltz, Kenneth Neal(1979)。Theory of International Politics。McGraw-Hill。 |
其他1. | Stokes, Mark A.(20150727)。The PLA General Staff Department Third Department Second Bureau: An Organizational Overview of Unit 61398,Arlington:2049 Project Institute。,http://www.project2049.net/documents/Stokes_PLA_General_Staff_Department_Unit_61398.pdf。 |
2. | Hat-tribution to PLA Unit 61486,https://www.crowdstrike.com/blog/hat-tribution-pla-unit-61486/。 |
3. | Reed, Kevin(20121228)。Global Split over Telecom Treaty,https://www.wsws.org/en/articles/2012/12/28/wcit-d28.html。 |
4. | (20110526)。國防部證實建網上藍軍稱為提高部隊網絡防護,http://politics.people.com.cn/BIG5/1027/14740509.html。 延伸查詢 |
5. | (20190530)。印太資安聯盟成立AIT:資安不只是政治議題,https://www.rti.org.tw/news/view/id/2022452。 延伸查詢 |
6. | (20160721)。Transcript: Donald Trump on NATO, Turkey's Coup Attempt and the World,https://www.nytimes.com/2016/07/22/us/politics/donald-trump-foreign-policy-interview.html。 |
7. | (20170223)。Russian Military Admits Significant Cyber-War Effort,https://www.bbc.com/news/world-europe-39062663。 |
8. | American Institute in Taiwan(20190528)。Remarks by AIT Deputy Director Raymond Greene at Opening Ceremony of GCTF on Network Security and Emerging Technologies,https://www.ait.org.tw/remarks-by-ait-deputy-director-greene-at-opening-ceremony-of-gctf-on-network-security-and-emerging-technologies/。 |
9. | Bowcott, Owen(20170823)。Dispute along Cold War Lines Led to Collapse of UN Cyberwarfare Talks,https://www.theguardian.com/world/2017/aug/23/un-cyberwarfare-negotiations-collapsed-in-june-it-emerges。 |
10. | Buchholz, Katharina(20190819)。Which Countries Have Banned Huawei?,https://www.statista.com/chart/17528/countries-which-havebanned-huawei-products/。 |
11. | Busselen, Michael(20190328)。Key Trends from the CrowdStrike 2019 Global Threat Report,https://www.crowdstrike.com/blog/2019-global-threat-report-key-trends/。 |
12. | Constantin, Lucian(20170213)。Recent Malware Attacks on Polish Banks Tied to Wider Hacking Campaign,https://www.networkworld.com/article/3169409/security/recent-malware-attacks-onpolish-banks-tied-to-wider-hacking-campaign.html。 |
13. | (20180830)。Two Birds, One Stone Panda,https://www.crowdstrike.com/blog/two-birds-one-stone-panda/。 |
14. | (20190224)。Meet the Threat Actors-Who are your Cyber Adversaries?,https://www.crowdstrike.com/blog/meetthe-adversaries/。 |
15. | (20191212)。Who is Refined Kitten?,https://www.crowdstrike.com/blog/who-is-refined-kitten/。 |
16. | Cyber Security Agency of Singapore(2017)。Factsheet on ASEAN Cyber Capacity Programme,https://www.csa.gov.sg/news/speeches/media/3bfa3b0aaf264a41b8f7a31551baf2b4.ashx。 |
17. | Cyber Security Agency of Singapore(20181116)。Singapore and the United States Sign Declaration of Intent on Cybersecurity Technical Assistance Programme,https://www.csa.gov.sg/news/press-releases/singapore-and-the-us-sign-doi-oncybersecurity-technical-assistance-programme。 |
18. | Cybersecurity and Infrastructure Security Agency(20191225)。Continuous Diagnostics and Mitigation,https://www.us-cert.gov/cdm/home。 |
19. | Freedberg, Sydney J. Jr.(20180917)。Trump Eases Cyber Ops, But Safeguards Remain: Joint Staff,https://breakingdefense.com/2018/09/trump-eases-cyber-ops-but-safeguards-remainjoint-staff/。 |
20. | Freedom House(20191225)。Freedom in the World in 2019: North Korea,https://freedomhouse.org/report/freedom-world/2019/north-korea。 |
21. | Global Cyber Security Company(20181001)。Hi-Tech Crime Trends 2018,https://www.fintechsecurity.com.hk/slides/01.Dmitry-Annual-Group-IB-report-High-Tech-Crime-Trends.pdf。 |
22. | Goel, Vindu(20190214)。India Proposes Chinese-Style Internet Censorship,https://www.nytimes.com/2019/02/14/technology/india-internet-censorship.html。 |
23. | Goldstein, Phil(20180215)。Cybersecurity FundingWould Jump in Trump's 2019 Budget,https://fedtechmagazine.com/article/2018/02/cybersecurity-funding-would-jump-trumps-2019-budget。 |
24. | Haseltine, Ben(20180605)。Pentagon's Bug Bounty Program Identifies Defense Travel System Vulnerabilities,https://www.governmentciomedia.com/pentagons-bugbounty-program-identifies-defense-travel-system-vulnerabilities-0。 |
25. | Headquarters U.S. Forces, Japan(19600119)。Treaty of Mutual Cooperation and Security between the United States and Japan,https://www.cia.gov/library/readingroom/docs/CIA-RDP07-00469R000100950001-2.pdf。 |
26. | Hymas, Charles(20181009)。China is ahead of Russia as ‘biggest state sponsor of cyber-attacks on the West,https://www.telegraph.co.uk/technology/2018/10/09/china-ahead-russia-biggest-state-sponsor-cyber-attacks-west/。 |
27. | Kim, Youngnam(20180608)。North Korea Uses US Tech for ‘Destructive Cyber Operations,https://www.voanews.com/a/north-korea-us-tech-destructive-cyber-operations/4429922.html。 |
28. | Kochetkova, Kate(20160224)。What is Known about the Lazarus Group: Sony Hack, Military Espionage, Attacks on Korean Banks and other Crimes,https://www.kaspersky.com/blog/operationblockbuster/11407/。 |
29. | LaFrance, Adrienne(20160927)。Trump's Incoherent Ideas About 'the Cyber',https://www.theatlantic.com/technology/archive/2016/09/trumps-incoherent-ideas-about-the-cyber/501839/。 |
30. | Lange, Katie(20180503)。Cybercom Becomes DoD’s 10th Unified Combatant Command,http://www.dodlive.mil/2018/05/03/cybercomto- become-dods-10th-unified-combatant-command/。 |
31. | Lyngaas, Sean(20180410)。DHS 'Cyber Storm' Exercise Tests Manufacturing and Transportation Sectors,https://www.cyberscoop.com/dhs-cyber-storm-jeanette-manfra-critical-infrastructure/。 |
32. | Lyngaas, Sean(20180816)。PPD-20 Elimination Opens Arguments over How U.S. Should Conduct Offensive Hacking Operations,https://www.cyberscoop.com/ppd-20-eliminated-cyber-war-donaldtrump-mike-rounds/。 |
33. | Menn, Joseph(20170825)。Chinese National Arrested in Los Angeles onU.S. Hacking Charge,https://www.reuters.com/article/ususa-cyber-opm/chinese-national-arrested-in-los-angeles-on-u-s-hacking-charge-idUSKCN1B42RM。 |
34. | Meyers, Adam(20181127)。Meet CrowdStrike’s Adversary of the Month for November: Helix Kitten,https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-november-helix-kitten/。 |
35. | Ministry of Foreign Affairs of Japan(20190419)。Joint Statement of the Security Consultative Committee,https://www.mofa.go.jp/files/000470738.pdf。 |
36. | The MITRE Corporation(20200109)。JUST RELEASED: ATT&CK for Industrial Control Systems,https://attack.mitre.org/groups/。 |
37. | Nakashima, Ellen(20190623)。Trump Approved Cyber-Strikes Against Iranian Computer Database Used to Plan Attacks on Oil Tankers,https://www.washingtonpost.com/world/national-security/with-trumps-approval-pentagon-launched-cyber-strikesagainst-iran/2019/06/22/250d3740-950d-11e9-b570-6416efdc0803_story.html。 |
38. | Nye, Joseph S.(20190311)。Rules of the cyber road for America and Russia,https://www.aspistrategist.org.au/rules-ofthe-cyber-road-for-america-and-russia/。 |
39. | Paganini, Pierluigi(20190724)。China-Linked APT15 Group is Using a Previously Undocumented Backdoor,https://securityaffairs.co/wordpress/88824/apt/apt15-okrum-backdoor.html#top。 |
40. | Panda, Ankit(20180909)。What the Recently ConcludedUS-India COMCASA Means,https://thediplomat.com/2018/09/what-therecently-concluded-us-india-comcasa-means/。 |
41. | Perlroth, Nicole,Shane, Scott(20190525)。In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc,https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html。 |
42. | Pomerleau, Mark(20170601)。Cyber protection teams assigned to THAAD in South Korea,https://www.fifthdomain.com/home/2017/06/01/cyber-protection-teams-assigned-to-thaad-in-southkorea/。 |
43. | Pomerleau, Mark(20190716)。What Good are 'Exceptional' Cyber Capabilities without Authority?,https://www.fifthdomain.com/dod/2019/07/16/what-good-are-exceptional-cyber-capabilitieswithout-authority/。 |
44. | Sanger, David E.,Perlroth, Nicole(20190615)。U.S. Escalates Online Attacks on Russia's Power Grid,https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html, 。 |
45. | Sanger, David E.,Broad, William J.(20180116)。Pentagon Suggests Countering Devastating Cyberattacks with Nuclear Arms,https://www.nytimes.com/2018/01/16/us/politics/pentagon-nuclear-review-cyberattack-trump.html?_ga=2.182743974.1450541312.1564318121-1345450338.1537238599。 |
46. | Scheer, Steven(20170626)。U.S. to Work with Israel, Seek other Ties to Combat Cyber Attacks,https://www.reuters.com/article/us-usa-israel-cyber-idUSKBN19H1KE。 |
47. | Seldin, Jeff(20180920)。US Prepared to Strike in Cyberspace,https://www.voanews.com/usa/us-politics/us-prepared-strikecyberspace。 |
48. | Sukumar, Arun M.(20170704)。The UN GGE Failed. Is International Law in Cyberspace Doomed As Well?,https://www.lawfareblog.com/un-gge-failed-international-law-cyberspace-doomed-well。 |
49. | Symantec Corporation(2017)。Internet Security Threat Report,https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf。 |
50. | Thomsen, Jacqueline(20180920)。US to Prioritize Attacks Against Foreign Adversaries under new Cyber Strategy,https://thehill.com/policy/cybersecurity/407670-us-to-launch-offensive-attacks-against-foreign-adversaries-under-new。 |
51. | U.S. Department of Homeland Security(20191225)。Cyber Storm VI: National Cyber Exercise,https://www.dhs.gov/cisa/cyber-storm-vi。 |
52. | U.S. Department of Justice(20170315)。U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts,https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions。 |
53. | U.S. Department of Justice(20171121)。Acting Manhattan U.S. Attorney Announces Charges against Iranian National for Conducting Cyber Attack And 6 Million Extortion Scheme against HBO,https://www.justice.gov/usao-sdny/pr/actingmanhattan-us-attorney-announces-charges-against-iranian-national-conducting。 |
54. | U.S. Department of Justice(20171127)。U.S. Charges Three Chinese Hackers Who Work at Internet Security Firm for Hacking Three Corporations for Commercial Advantage,https://www.justice.gov/opa/pr/us-charges-three-chinese-hackers-whowork- internet-security-firm-hacking-three-corporations。 |
55. | U.S. Department of Justice(20180713)。Grand Jury Indicts 12 RussianIntelligence Officers for Hacking Offenses Related to the 2016 Election,https://www.justice.gov/opa/pr/grand-jury-indicts-12-russian-intelligence-officers-hacking-offensesrelated-2016-election。 |
56. | U.S. Department of Justice(20180906)。North Korean Regime-Backed Programmer Charged with Conspiracy to Conduct Multiple Cyber Attacks and Intrusions,https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-chargedconspiracy-conduct-multiple-cyber-attacks-and。 |
57. | U.S. Department of Justice(20181030)。Chinese Intelligence Officers and Their Recruited Hackers and Insiders Conspired to Steal Sensitive Commercial Aviation and Technological Data for Years,https://www.justice.gov/opa/pr/chinese-intelligence-officers-and-their-recruited-hackers-and-insiders-conspired-steal。 |
58. | Office of Public Affairs, U.S. Department of Justice(20181220)。Two Chinese Hackers Associated with the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information,https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion。 |
59. | U.S. Department of Justice(20190115)。Two Ukrainian Nationals Indicted in Computer Hacking and Securities Fraud Scheme Targeting U.S. Securities and Exchange Commission,https://www.justice.gov/opa/pr/two-ukrainian-nationals-indicted-computer-hacking-and-securities-fraud-scheme-targeting-us。 |
60. | U.S. Department of Justice(20190128)。Chinese Telecommunications Conglomerate Huawei and Huawei CFO Wanzhou Meng Charged with Financial Fraud,https://www.justice.gov/opa/pr/chinese-telecommunications-conglomerate-huaweiand-huawei-cfo-wanzhou-meng-charged-financial。 |
61. | U.S. Department of Justice(20190509)。Member of Sophisticated China-Based Hacking Group Indicted for Series of Computer Intrusions, Including 2015 Data Breach of Health Insurer Anthem Inc. Affecting Over 78 Million People,https://www.justice.gov/opa/pr/member-sophisticated-china-based-hacking-groupindicted-series-computer-intrusions-including。 |
62. | U.S. Department of Justice(20190711)。Newly Unsealed Federal Indictment Charges Software Engineer with Taking Stolen Trade Secrets to China,https://www.justice.gov/opa/pr/ newly-unsealed-federal-indictment-charges-software-engineer-takingstolen- trade-secrets-china。 |
63. | U.S. Department of State(20180730)。Remarks on America's Indo-Pacific Economic Vision,https://www.state.gov/ remarks-on-americas-indo-pacific-economic-vision/。 |
64. | U.S. Department of State(20181220)。Joint Statement by Secretary of State Michael R. Pompeo and Secretary of Homeland Security Kirstjen Nielsen: Chinese Actors Compromise Global Managed Service Providers,https://www.ait.org.tw/joint-statement-by-dos-sec-pompeo-and-dhs-sec-nielsen/。 |
65. | U.S. Department of State(20190419)。Joint Statement of the Security Consultative Committee,https://www.state.gov/u-s-japan-joint-press-statement/。 |
66. | U.S. Federal Bureau of Investigation(20181220)。FBI Director Christopher Wray's Remarks Regarding Indictment of Chinese Hackers,https://www.fbi.gov/news/pressrel/press-releases/fbi-director-christopher-wrays-remarks-regarding-indictment-of-chinese-hackers。 |
67. | U.S. House of Representatives(20190306)。Maintaining U.S. Leadership in Science and Technology: Testimony before the Congress of the United States House of Representatives Committee on Science, Space and Technology,https://docs.house.gov/meetings/SY/SY00/20190306/109030/HHRG-116-SY00-Wstate-KhanM-20190306.pdf。 |
68. | U.S. Office of the Director of National Intelligence(20160209)。Remarks as Delivered by The Honorable James R. Clapper Director of National Intelligence, Senate Select Committee on Intelligence--IC'sWorldwide Threat Assessment Opening Statement,https://www.dni.gov/files/documents/2016-02-09SSCI_open_threat_hearing_transcript.pdf。 |
69. | U.S. Office of Management and Budget(20180201)。Budget of the United States, Fiscal Year 2019: Efficient, Effective, Accountable--An American Budget,https://www.whitehouse.gov/wp-content/uploads/2018/02/budget-fy2019.pdf。 |
70. | U.S. Senate Committee on Armed Services(20180301)。Nominations--Nakasone-Park-White,https://www.armed-services.senate.gov/hearings/18-03-01-nominations_--nakasone---park---white。 |
71. | (20170511)。Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/, 。 |
72. | The White House(20170925)。Presidential Memorandum for the Secretary of Education,https://www.whitehouse.gov/presidential-actions/presidential-memorandum-secretary-education/。 |
73. | The White House(20180108)。Presidential Executive Order on Streamlining and Expediting Requests to Locate Broadband Facilities in Rural America,https://www.whitehouse.gov/presidentialactions/presidential-executive-order-streamlining-expediting-requestslocate-broadband-facilities-rural-america/。 |
74. | The World Bank(20191225)。Fixed Broadband Subscriptions (per 100 people),https://data.worldbank.org/indicator/IT.NET.BBND.P2?locations=KP-US-RU-CN-IR。 |
75. | The World Bank(20191225)。Individuals using the Internet (% of population),https://data.worldbank.org/indicator/IT.NET.USER.ZS?locations=IR-US-CN-KP-RU。 |
76. | Volz, Dustin,Hosenball, Mark(20161117)。Trump Cyber Security Team, Policy Slow to Take Shape: Officials,https://www. reuters.com/article/us-usa-trump-cyber-idUSKBN13B2VI。 |