| 期刊論文1. | Newmyer, Jacqueline(2010)。The Revolution in Military Affairs with Chinese Characteristics。The Journal of Strategic Studies,33(4),483-504。 | 2. | Bolt, Paul J.、Brenner, Carl N.(2004)。Information Warfare across the Taiwan Strait。Journal of Contemporary China,13(38),129-150。 | 3. | 蔡裕明(20011200)。資訊性民族主義--Linux對中國大陸的意義。中國大陸研究,44(12),21-36。 延伸查詢 | 4. | Hansen, Lene、Nissenbaum, Helen(2009)。Digital disaster, cyber security, and the Copenhagen school。International Studies Quarterly,53(4),1155-1175。 | 5. | Rawnsley, Gary D.(2005)。Old Wine in New Bottles: China-Taiwan Computer-Based 'Information Warfare' and Propaganda。International Affairs,81(5),1061-1078。 | 6. | 張登及(20180400)。習時代中共的「銳權力」戰略?概念構成與理論反思。展望與探索,16(4),119-133。 延伸查詢 | 7. | Cavelty, Myriam Dunn(2008)。Cyber-terror: Looming Threat or Phantom Menace? The Framing of the US Cyber-threat Debate。Journal of Information Technology & Politics,4(1),19-36。 | 8. | Yau, Hon-Min(2018)。Explaining Taiwan's Cybersecurity Policy Prior to 2016: Effects of Norms and Identities。Issues & Studies,54(2),(1850004)1-(1850004)30。 | 9. | 林穎佑(20160900)。中國近期網路作為探討:從控制到攻擊。臺灣國際研究季刊,12(3),51-68。 延伸查詢 | 10. | Lindsay, Jon R.(2013)。Stuxnet and the limits of cyber warfare。Security Studies,22(3),365-404。 | 11. | Yau, Hon-min(2019)。A critical strategy for Taiwan's cybersecurity: A perspective from critical security studies。Journal of Cyber Policy,4(1),35-55。 | 12. | Shen, Hong(2018)。Building a Digital Silk Road? Situating the Internet in China's Belt and Road Initiative。International Journal of Communication,12,2683-2701。 | 13. | Kreisher, Otto(2007)。Risk to One Is Risk to All。Sea Power,50(12)。 | 14. | Bucci, Steven P.(2009)。A Most dangerous link。US Naval Institute Proceedings,135(10),38-42。 | 15. | 鍾兆真、蕭全政(20071200)。美國的網際霸權:網路層、傳輸層與應用層的政治經濟分析。臺灣社會研究季刊,68,297-344。 延伸查詢 | 16. | Dartnell, Michael(2003)。Weapons of Mass Instruction: Web Activism and the Transformation of Global Security。Millennium,32(3),477-499。 | 17. | Der Derian, James(2003)。The Question of Information Technology in International Relations。Millennium,32(3),441-456。 | 18. | Goldman, Emily O.(2004)。Introduction: Information Resources and Military Performance。Journal of Strategic Studies,27(3),195-219。 | 19. | Greenemeier, Larry(20070524)。Estonian Attacks Raise Concern over Cyber 'Nuclear Winter'。Information Week。 | 20. | Hsiao, Russell(2013)。Critical Node: Taiwan's Cyber Defense and Chinese Cyber-Espionage。China Brief,13(24)。 | 21. | Hwan, Ji-Jen(2007)。China's Military Reform: The Strategic Support Force, Non-Traditional Warfare, and the Impact on Cross-Strait Security。Issues & Studies,53(3)。 | 22. | Hwan, Ji-Jen(2017)。Chinas Cyber Strategy: A Taiwanese Perspective。Korean journal of defense analysis,29(1),95-111。 | 23. | Liff, Adam P.(2012)。Cyberwar: A New 'Absolute Weapon'? The Proliferation of Cyberwarfare Capabilities and Interstate War。Journal of Strategic Studies,35(3),401-428。 | 24. | Baezner, Marie(2018)。Cybersecurity in Sino-American Relations。CSS Analyses in Security Policy,224。 | 25. | Morozov, Evgeny(2009)。Cyber-Scare: The Exaggerated Fears over Digital Warfare。Boston Review,34(4),17-20。 | 26. | Eriksson, Johan、Giacomello, Giampiero(2006)。The Information Revolution, Security, and International Relations: (IR)relevant Theory?。International Political Science Review,27(3),221-244。 | 研究報告1. | 立法院(2017)。立法院公報。台北:中華民國立法院。 延伸查詢 | 2. | 立法院(2015)。立法院公報。立法院。 延伸查詢 | 學位論文1. | 張憶嬋(2006)。開放原始碼軟體商業模式及相關法律問題之探討(碩士論文)。國立政治大學。 延伸查詢 | 圖書1. | Morgenthau, Hans J.、Thompson, Kenneth W.、Clinton, W. David(2005)。Politics among Nations: The Struggle for Power and Peace。McGraw Hill。 | 2. | Clarke, Richard A.、Knake, Robert K.、王文勇(2014)。網路戰爭:下一個國安威脅及因應之道。臺北:國防部史政編譯室編譯處。 延伸查詢 | 3. | Morgan, Patrick M.(2003)。Deterrence Now。Cambridge University Press。 | 4. | Abbate, J.(2000)。Inventing the Internet。Cambridge, Mass.:The MIT Press。 | 5. | 林中斌(1999)。核霸:透視跨世紀中共戰略武力。臺北:臺灣學生書局。 延伸查詢 | 6. | Choucri, Nazli(2012)。Cyberpolitics in International Relations。Cambridge, MA:MIT Press。 | 7. | Schneier, Bruce(2015)。Data and Goliath: The hidden battles to collect your data and control your world。W. W. Norton & Company。 | 8. | Jordan, T.(2002)。Cyberpower: An Introduction to the Politics of Cyberspace。Taylor & Francis。 | 9. | 國防部(20190900)。中華民國108年國防報告書。國防部。 延伸查詢 | 10. | Zetter, K.(2014)。Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon。Crow Publishing Group。 | 11. | 趙坤茂、張雅惠、黃俊穎、黃寶萱(2019)。計算機概論:當代資訊通鑑。全華圖書。 延伸查詢 | 12. | Friedman, Thomas(2005)。世界是平的:一部二十一世紀簡史。雅言文化出版股份有限公司。 延伸查詢 | 13. | Betz, D. J.、Stevens, T.(2011)。Cyberspace and the State: Toward a Strategy for Cyber-Power。Routledge。 | 14. | Carr, Madeline(2016)。US Power and the Internet in International Relations: The Irony of the Information Age。Palgrave Macmillan。 | 15. | Cavelty, M. D.(2007)。Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age。Taylor & Francis。 | 16. | Chu, M. M.、Kastner, S. L.(2014)。Globalization and Security Relations across the Taiwan Strait: In the Shadow of China。Taylor & Francis。 | 17. | Clark, C.(2011)。The Changing Dynamics of the Relations among China, Taiwan, and the United States。Cambridge Scholars Publisher。 | 18. | Deibert, R.、Palfrey, J.、Rohozinski, R.、Zittrain, J.(2011)。Access Contested: Security, Identity, and Resistance in Asian Cyberspace。MIT Press。 | 19. | Demchak, Chris C.(2011)。Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security。University of Georgia Press。 | 20. | Goverde, Henri、Lentner, Howard H.(2000)。Power in Contemporary Politics: Theories, Practices, Globalizations。Sage。 | 21. | Gray, Colin S.(2013)。Making Strategic Sense of Cyber Power: Why the Sky Is Not Falling。Strategic Studies Institute, US Army War College。 | 22. | Kramer, Franklin D.、Starr, Stuart H.、Wentz, Larry K.(2009)。Cyberpower and National Security。Potomac Books, Inc.。 | 23. | Kremer, Jan-Frederik、Müller, Benedikt(2014)。Cyberspace and International Relations。Springer。 | 24. | Lessig, L.(2008)。Code: And Other Laws of Cyberspace。Basic Books。 | 25. | Mueller, Milton L.(2009)。Ruling the Root: Internet Governance and the Taming of Cyberspace。MIT Press。 | 26. | Nye, Joseph S. Jr.(2010)。Cyber Power。Belfer Center for Science and International Affairs。 | 27. | Parsons, Talcott(1964)。The Theory of Social and Economic Organization。Free Press:Collier Macmillan。 | 28. | Singer, P. W.、Friedman, Allan(2014)。Cybersecurity and Cyberwar: What Everyone Needs to Know?。Oxford University Press。 | 29. | Standage, T.(2014)。The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's on-Line Pioneers。Bloomsbury。 | 30. | 吳玉山(1997)。抗衡或扈從:兩岸關係新詮--從前蘇聯看臺灣與中國大陸間的關係。臺北:正中書局。 延伸查詢 | 31. | Castells, Manuel(1996)。The Information Age: Economy, Society, and Culture, Vol. 1: The Rise of the Network Society。Blackwell。 | 32. | Nye, Joseph S. Jr.(2011)。The Future of Power。New York:Public Affairs。 | 其他1. | U. S. Department of Justice(20140519)。U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage,https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor。 | 2. | ICANN。New Generic Top-level Domain--Delegated Strings,https://newgtlds.icann.org/en/program-status/delegated-strings。 | 3. | Broad, William J.,Sanger, David E.(20170314)。U.S. strategy to hobble North Korea was hidden in plain sight,https://www.nytimes.com/2017/03/04/world/asia/left-of-launch-missile-defense.html。 | 4. | Ministry of Foreign Affairs(20170703)。Ministry of National Defense launches new Cybersecurity Command,https://taiwantoday.tw/news.php?unit=2,6,10,15,18&post=117794。 | 5. | Yau, Hon-Min(2015)。Handle with care: The pandora's box of cyber attacks,http://thinking-taiwan.com/thinking-taiwan.com/handle-with-care-pandoras-box-cyber-attacks/index.html。 | 6. | 倪浩(2019)。商務部:中國將建立"不可靠實體清單"制度,具體措施近期出臺,https://world.huanqiu.com/article/9CaKrnKkMCF。 延伸查詢 | 7. | 國家互聯網信息辦公室(2009)。2000年~2001年互聯網大事記,http://www.cac.gov.cn/2009-04/13/c_126500434.htm。 延伸查詢 | 8. | 國家互聯網信息辦公室(2014)。2006年中國互聯網發展大事記,http://www.cac.gov.cn/2014-02/24/c_126182771.htm。 延伸查詢 | 9. | 國家互聯網信息辦公室(2016)。國家網路空間安全戰略全文,http://www.cac.gov.cn/2016-12/27/c_1120195926.htm。 延伸查詢 | 10. | 國家實驗研究院(2014)。From Manufacturing to Intellectual Property! The 4g LTE Standard-Essential Patent Databa,https://www.narlabs.org.tw/en/xmdoc/cont?xsmsid=0I160457997407279810&sid=0I171806216745679608。 | 11. | (20140227)。習近平:把我國從網路大國建設成為網路強國。 延伸查詢 | 12. | 總統府(2020)。國家資通安全戰略報告--資安即國安,https://www.president.gov.tw/Page/317/969/%E5%9C%8B%E5%AE%B6%E8%B3%87%E9%80%9A%E5%AE%89%E5%85%A8%E6%88%B0%E7%95%A5%E5%A0%B1%E5%91%8A-%E8%B3%87%E5%AE%89%E5%8D%B3%E5%9C%8B%E5%AE%89-。 | 13. | 陳曉莉(20150605)。美國人事管理局遭網路攻擊,400萬公務員資料外洩,疑是中國所為,https://www.ithome.com.tw/news/96493。 延伸查詢 | 14. | China Post(20160802)。Cabinet Forms Department for Cyber Security。 | 15. | Gold, Michael,Wu, J. R.(20150530)。Taiwan Seeks Stronger Cyber Security Ties with U.S. To Counter China Threat。 | 16. | Jing, Meng(20190526)。Will Trump's Assault on Huawei Create a Digital Iron Curtain?。 | 17. | Li, Xing(20170131)。China's First Ipv6-Only Backbone Network to Connect a Further 1,200 Campuses,https://blog.apnic.net/2017/01/31/chinas-first-ipv6-backbone-network-connect-1200-campuses/。 | 18. | Microsoft。Announcing Windows 10 China Government Edition and the New Surface Pro,https://blogs.windows.com/windowsexperience/2017/05/23/announcing-windows-10-china-government-edition-new-surface-pro/。 | 19. | Northrop Grumman(2014)。Understanding Voice and Data Link Networking,Northrop Grumman。 | 20. | Tanaka, Akito(20190503)。China in Pole Position for 5g Era with a Third of Key Patents,https://asia.nikkei.com/Spotlight/5G-networks/China-in-pole-position-for-5G-era-with-a-third-of-key-patents。 | 21. | Thim, Michal(20150905)。Taiwan's Invisible Frontier: Cyberspace,https://taiwan-in-perspective.com/2015/09/05/taiwans-invisible-frontier-cyberspace/。 | 22. | Tibken, Shara。No, 5g Isn't Going to Make Your 4g Lte Phone Obsolete,https://www.cnet.com/news/no-5g-isnt-going-to-make-your-4g-lte-phone-obsolete/。 | 23. | 中國互聯網路信息中心(2016)。中國互聯網路發展狀況統計報告,中國互聯網路信息中心。 延伸查詢 | |