:::

詳目顯示

回上一頁
題名:中美數位霸權競爭之理論、意涵與啟示
書刊名:安全與情報研究
作者:姚宏旻
作者(外文):Yau, Hon-min
出版日期:2020
卷期:3:2
頁次:頁35-74
主題關鍵詞:中美關係網路安全數位霸權國際關係理論葛蘭西霸權Sino-US relationsCybersecurityDigital hegemonyInternational relations theoriesGramscian hegemony
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:11
  • 點閱點閱:6
期刊論文
1.Newmyer, Jacqueline(2010)。The Revolution in Military Affairs with Chinese Characteristics。The Journal of Strategic Studies,33(4),483-504。  new window
2.Bolt, Paul J.、Brenner, Carl N.(2004)。Information Warfare across the Taiwan Strait。Journal of Contemporary China,13(38),129-150。  new window
3.蔡裕明(20011200)。資訊性民族主義--Linux對中國大陸的意義。中國大陸研究,44(12),21-36。new window  延伸查詢new window
4.Hansen, Lene、Nissenbaum, Helen(2009)。Digital disaster, cyber security, and the Copenhagen school。International Studies Quarterly,53(4),1155-1175。  new window
5.Rawnsley, Gary D.(2005)。Old Wine in New Bottles: China-Taiwan Computer-Based 'Information Warfare' and Propaganda。International Affairs,81(5),1061-1078。  new window
6.張登及(20180400)。習時代中共的「銳權力」戰略?概念構成與理論反思。展望與探索,16(4),119-133。  延伸查詢new window
7.Cavelty, Myriam Dunn(2008)。Cyber-terror: Looming Threat or Phantom Menace? The Framing of the US Cyber-threat Debate。Journal of Information Technology & Politics,4(1),19-36。  new window
8.Yau, Hon-Min(2018)。Explaining Taiwan's Cybersecurity Policy Prior to 2016: Effects of Norms and Identities。Issues & Studies,54(2),(1850004)1-(1850004)30。  new window
9.林穎佑(20160900)。中國近期網路作為探討:從控制到攻擊。臺灣國際研究季刊,12(3),51-68。new window  延伸查詢new window
10.Lindsay, Jon R.(2013)。Stuxnet and the limits of cyber warfare。Security Studies,22(3),365-404。  new window
11.Yau, Hon-min(2019)。A critical strategy for Taiwan's cybersecurity: A perspective from critical security studies。Journal of Cyber Policy,4(1),35-55。  new window
12.Shen, Hong(2018)。Building a Digital Silk Road? Situating the Internet in China's Belt and Road Initiative。International Journal of Communication,12,2683-2701。  new window
13.Kreisher, Otto(2007)。Risk to One Is Risk to All。Sea Power,50(12)。  new window
14.Bucci, Steven P.(2009)。A Most dangerous link。US Naval Institute Proceedings,135(10),38-42。  new window
15.鍾兆真、蕭全政(20071200)。美國的網際霸權:網路層、傳輸層與應用層的政治經濟分析。臺灣社會研究季刊,68,297-344。new window  延伸查詢new window
16.Dartnell, Michael(2003)。Weapons of Mass Instruction: Web Activism and the Transformation of Global Security。Millennium,32(3),477-499。  new window
17.Der Derian, James(2003)。The Question of Information Technology in International Relations。Millennium,32(3),441-456。  new window
18.Goldman, Emily O.(2004)。Introduction: Information Resources and Military Performance。Journal of Strategic Studies,27(3),195-219。  new window
19.Greenemeier, Larry(20070524)。Estonian Attacks Raise Concern over Cyber 'Nuclear Winter'。Information Week。  new window
20.Hsiao, Russell(2013)。Critical Node: Taiwan's Cyber Defense and Chinese Cyber-Espionage。China Brief,13(24)。  new window
21.Hwan, Ji-Jen(2007)。China's Military Reform: The Strategic Support Force, Non-Traditional Warfare, and the Impact on Cross-Strait Security。Issues & Studies,53(3)。  new window
22.Hwan, Ji-Jen(2017)。Chinas Cyber Strategy: A Taiwanese Perspective。Korean journal of defense analysis,29(1),95-111。  new window
23.Liff, Adam P.(2012)。Cyberwar: A New 'Absolute Weapon'? The Proliferation of Cyberwarfare Capabilities and Interstate War。Journal of Strategic Studies,35(3),401-428。  new window
24.Baezner, Marie(2018)。Cybersecurity in Sino-American Relations。CSS Analyses in Security Policy,224。  new window
25.Morozov, Evgeny(2009)。Cyber-Scare: The Exaggerated Fears over Digital Warfare。Boston Review,34(4),17-20。  new window
26.Eriksson, Johan、Giacomello, Giampiero(2006)。The Information Revolution, Security, and International Relations: (IR)relevant Theory?。International Political Science Review,27(3),221-244。  new window
研究報告
1.立法院(2017)。立法院公報。台北:中華民國立法院。  延伸查詢new window
2.立法院(2015)。立法院公報。立法院。  延伸查詢new window
學位論文
1.張憶嬋(2006)。開放原始碼軟體商業模式及相關法律問題之探討(碩士論文)。國立政治大學。  延伸查詢new window
圖書
1.Morgenthau, Hans J.、Thompson, Kenneth W.、Clinton, W. David(2005)。Politics among Nations: The Struggle for Power and Peace。McGraw Hill。  new window
2.Clarke, Richard A.、Knake, Robert K.、王文勇(2014)。網路戰爭:下一個國安威脅及因應之道。臺北:國防部史政編譯室編譯處。  延伸查詢new window
3.Morgan, Patrick M.(2003)。Deterrence Now。Cambridge University Press。  new window
4.Abbate, J.(2000)。Inventing the Internet。Cambridge, Mass.:The MIT Press。  new window
5.林中斌(1999)。核霸:透視跨世紀中共戰略武力。臺北:臺灣學生書局。  延伸查詢new window
6.Choucri, Nazli(2012)。Cyberpolitics in International Relations。Cambridge, MA:MIT Press。  new window
7.Schneier, Bruce(2015)。Data and Goliath: The hidden battles to collect your data and control your world。W. W. Norton & Company。  new window
8.Jordan, T.(2002)。Cyberpower: An Introduction to the Politics of Cyberspace。Taylor & Francis。  new window
9.國防部(20190900)。中華民國108年國防報告書。國防部。  延伸查詢new window
10.Zetter, K.(2014)。Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon。Crow Publishing Group。  new window
11.趙坤茂、張雅惠、黃俊穎、黃寶萱(2019)。計算機概論:當代資訊通鑑。全華圖書。  延伸查詢new window
12.Friedman, Thomas(2005)。世界是平的:一部二十一世紀簡史。雅言文化出版股份有限公司。  延伸查詢new window
13.Betz, D. J.、Stevens, T.(2011)。Cyberspace and the State: Toward a Strategy for Cyber-Power。Routledge。  new window
14.Carr, Madeline(2016)。US Power and the Internet in International Relations: The Irony of the Information Age。Palgrave Macmillan。  new window
15.Cavelty, M. D.(2007)。Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age。Taylor & Francis。  new window
16.Chu, M. M.、Kastner, S. L.(2014)。Globalization and Security Relations across the Taiwan Strait: In the Shadow of China。Taylor & Francis。  new window
17.Clark, C.(2011)。The Changing Dynamics of the Relations among China, Taiwan, and the United States。Cambridge Scholars Publisher。  new window
18.Deibert, R.、Palfrey, J.、Rohozinski, R.、Zittrain, J.(2011)。Access Contested: Security, Identity, and Resistance in Asian Cyberspace。MIT Press。  new window
19.Demchak, Chris C.(2011)。Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security。University of Georgia Press。  new window
20.Goverde, Henri、Lentner, Howard H.(2000)。Power in Contemporary Politics: Theories, Practices, Globalizations。Sage。  new window
21.Gray, Colin S.(2013)。Making Strategic Sense of Cyber Power: Why the Sky Is Not Falling。Strategic Studies Institute, US Army War College。  new window
22.Kramer, Franklin D.、Starr, Stuart H.、Wentz, Larry K.(2009)。Cyberpower and National Security。Potomac Books, Inc.。  new window
23.Kremer, Jan-Frederik、Müller, Benedikt(2014)。Cyberspace and International Relations。Springer。  new window
24.Lessig, L.(2008)。Code: And Other Laws of Cyberspace。Basic Books。  new window
25.Mueller, Milton L.(2009)。Ruling the Root: Internet Governance and the Taming of Cyberspace。MIT Press。  new window
26.Nye, Joseph S. Jr.(2010)。Cyber Power。Belfer Center for Science and International Affairs。  new window
27.Parsons, Talcott(1964)。The Theory of Social and Economic Organization。Free Press:Collier Macmillan。  new window
28.Singer, P. W.、Friedman, Allan(2014)。Cybersecurity and Cyberwar: What Everyone Needs to Know?。Oxford University Press。  new window
29.Standage, T.(2014)。The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's on-Line Pioneers。Bloomsbury。  new window
30.吳玉山(1997)。抗衡或扈從:兩岸關係新詮--從前蘇聯看臺灣與中國大陸間的關係。臺北:正中書局。  延伸查詢new window
31.Castells, Manuel(1996)。The Information Age: Economy, Society, and Culture, Vol. 1: The Rise of the Network Society。Blackwell。  new window
32.Nye, Joseph S. Jr.(2011)。The Future of Power。New York:Public Affairs。  new window
其他
1.U. S. Department of Justice(20140519)。U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage,https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor。  new window
2.ICANN。New Generic Top-level Domain--Delegated Strings,https://newgtlds.icann.org/en/program-status/delegated-strings。  new window
3.Broad, William J.,Sanger, David E.(20170314)。U.S. strategy to hobble North Korea was hidden in plain sight,https://www.nytimes.com/2017/03/04/world/asia/left-of-launch-missile-defense.html。  new window
4.Ministry of Foreign Affairs(20170703)。Ministry of National Defense launches new Cybersecurity Command,https://taiwantoday.tw/news.php?unit=2,6,10,15,18&post=117794。  new window
5.Yau, Hon-Min(2015)。Handle with care: The pandora's box of cyber attacks,http://thinking-taiwan.com/thinking-taiwan.com/handle-with-care-pandoras-box-cyber-attacks/index.html。  new window
6.倪浩(2019)。商務部:中國將建立"不可靠實體清單"制度,具體措施近期出臺,https://world.huanqiu.com/article/9CaKrnKkMCF。  延伸查詢new window
7.國家互聯網信息辦公室(2009)。2000年~2001年互聯網大事記,http://www.cac.gov.cn/2009-04/13/c_126500434.htm。  延伸查詢new window
8.國家互聯網信息辦公室(2014)。2006年中國互聯網發展大事記,http://www.cac.gov.cn/2014-02/24/c_126182771.htm。  延伸查詢new window
9.國家互聯網信息辦公室(2016)。國家網路空間安全戰略全文,http://www.cac.gov.cn/2016-12/27/c_1120195926.htm。  延伸查詢new window
10.國家實驗研究院(2014)。From Manufacturing to Intellectual Property! The 4g LTE Standard-Essential Patent Databa,https://www.narlabs.org.tw/en/xmdoc/cont?xsmsid=0I160457997407279810&sid=0I171806216745679608。  new window
11.(20140227)。習近平:把我國從網路大國建設成為網路強國。  延伸查詢new window
12.總統府(2020)。國家資通安全戰略報告--資安即國安,https://www.president.gov.tw/Page/317/969/%E5%9C%8B%E5%AE%B6%E8%B3%87%E9%80%9A%E5%AE%89%E5%85%A8%E6%88%B0%E7%95%A5%E5%A0%B1%E5%91%8A-%E8%B3%87%E5%AE%89%E5%8D%B3%E5%9C%8B%E5%AE%89-。  new window
13.陳曉莉(20150605)。美國人事管理局遭網路攻擊,400萬公務員資料外洩,疑是中國所為,https://www.ithome.com.tw/news/96493。  延伸查詢new window
14.China Post(20160802)。Cabinet Forms Department for Cyber Security。  new window
15.Gold, Michael,Wu, J. R.(20150530)。Taiwan Seeks Stronger Cyber Security Ties with U.S. To Counter China Threat。  new window
16.Jing, Meng(20190526)。Will Trump's Assault on Huawei Create a Digital Iron Curtain?。  new window
17.Li, Xing(20170131)。China's First Ipv6-Only Backbone Network to Connect a Further 1,200 Campuses,https://blog.apnic.net/2017/01/31/chinas-first-ipv6-backbone-network-connect-1200-campuses/。  new window
18.Microsoft。Announcing Windows 10 China Government Edition and the New Surface Pro,https://blogs.windows.com/windowsexperience/2017/05/23/announcing-windows-10-china-government-edition-new-surface-pro/。  new window
19.Northrop Grumman(2014)。Understanding Voice and Data Link Networking,Northrop Grumman。  new window
20.Tanaka, Akito(20190503)。China in Pole Position for 5g Era with a Third of Key Patents,https://asia.nikkei.com/Spotlight/5G-networks/China-in-pole-position-for-5G-era-with-a-third-of-key-patents。  new window
21.Thim, Michal(20150905)。Taiwan's Invisible Frontier: Cyberspace,https://taiwan-in-perspective.com/2015/09/05/taiwans-invisible-frontier-cyberspace/。  new window
22.Tibken, Shara。No, 5g Isn't Going to Make Your 4g Lte Phone Obsolete,https://www.cnet.com/news/no-5g-isnt-going-to-make-your-4g-lte-phone-obsolete/。  new window
23.中國互聯網路信息中心(2016)。中國互聯網路發展狀況統計報告,中國互聯網路信息中心。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
QR Code
QRCODE