:::

詳目顯示

回上一頁
題名:網路安全對國家安全之重要性:以臺灣的網路安全為例
書刊名:發展與前瞻學報
作者:曾于蓁
作者(外文):Tseng, Yu-chen
出版日期:2020
卷期:30
頁次:頁5-26
主題關鍵詞:網路安全網路戰國家安全非傳統安全CybersecurityCyberwarfareNational securityNon-traditional security
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:7
  • 點閱點閱:136
期刊論文
1.Lindsay, Jon R.(2014)。The Impact of China on Cybersecurity: Fiction and Friction。International Security,39(3),7-47。  new window
2.Gompert, David C.、Libicki, Martin(2014)。Cyber Warfare and Sino-American Crisis Instability。Survival,56(4),7-22。  new window
3.Rid, Thomas(2012)。Cyber War Will Not Take Place。The Journal of Strategic Studies,35(1),5-32。  new window
4.林穎佑(20160900)。中國近期網路作為探討:從控制到攻擊。臺灣國際研究季刊,12(3),51-68。new window  延伸查詢new window
5.Gartzke, Erik(2013)。The myth of cyberwar: Bringing war in cyberspace back down to earth。International Security,38(2),41-73。  new window
6.Valeriano, Brandon、Maness, Ryan C.(2014)。The dynamics of cyber conflict between rival antagonists, 2001-11。Journal of Peace Research,51(3),347-360。  new window
7.Farwell, James P.、Rohozinski, Rafal(2011)。Stuxnet and the future of cyber war。Survival,53(1),23-40。  new window
8.Lindsay, Jon R.(2013)。Stuxnet and the limits of cyber warfare。Security Studies,22(3),365-404。  new window
9.Morozov, Evgeny(2009)。Cyber-Scare: The Exaggerated Fears over Digital Warfare。Boston Review,34(4),17-20。  new window
10.Betz, David(2012)。Cyberpower in Strategic Affairs: Neither Unthinkable Nor Blessed。Journal of Strategic Studies,35(5),689-711。  new window
11.Nye, Joseph S.(2011)。Nuclear Lessons for Cyber Security?。Strategic Studies Quarterly,5(4),18-36。  new window
12.Junio, Timothy J.(2013)。How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate。Journal of Strategic Studies,36(1),125-133。  new window
13.Peterson, Dale(2013)。Offensive Cyber Weapons: Construction, Development, and Employment。Journal of Strategic Studies,36(1),120-124。  new window
14.Kello, Lucas(2013)。The Meaning of the Cyber Revolution: Perils to Theory and Statecraft。International Security,38(2),7-40。  new window
15.Lynn, William J. III(20110928)。The Pentagon's Cyberstrategy, One Year Later: Defending against the Next Cyberattack。Foreign Affairs,2011(Sep.)。  new window
16.Olson, Soren(2012)。Shadow Boxing: Cyber Warfare and Strategic Economic Attack。Joint Force Quarterly,66,15-21。  new window
17.Knapp, Kenneth J.、Boulton, William R.(2006)。Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments。Information Systems Management,23(2),76-87。  new window
18.Clark, Wesley K.、Levin, Peter L.(2009)。Securing the Information Highway。Foreign Affairs,88(6),2-10。  new window
19.Maurer, Tim(2011)。The Case for Cyberwarfare。Foreign Policy,2011(Oct.)。  new window
20.Blank, S.(2008)。Web War I: Is Europe's First Information War a New Kind of War?。Comparative Strategy,27(3),227-247。  new window
21.Rid, Thomas(2012)。Think Again: Cyberwar。Foreign Policy,192。  new window
22.林穎佑(20130300)。大陸網軍與APT攻擊。展望與探索,11(3),95-110。  延伸查詢new window
23.Burger, Tobias(2014)。Cyber target practice。Strategic Vision,17,9-13。  new window
24.戴政龍(20131200)。中共「網軍」發展與網絡攻防:兼論我國資通安全之政策規劃。戰略與評估,4(4),97-119。new window  延伸查詢new window
25.Bamford, James(2013)。NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar。WIRED,2013(Jun.)。  new window
會議論文
1.張競(2014)。網路空間衝突與戰爭的法理概念。「中國大陸在網路空間戰略的競逐」學術論壇,(會議日期: 2014/07/07)。中共研究雜誌社。  延伸查詢new window
研究報告
1.立法院外交及國防委員會(2013)。立法院第8屆第3會期外交及國防事務委員會第20次全體委員會議紀錄。立法院外交及國防委員會。  延伸查詢new window
圖書
1.Clarke, Richard A.、Knake, Robert K.(2010)。Cyber War: The Next Threat to National Security and What to Do About It。Harper Collins Publishers。  new window
2.林中斌(1999)。核霸:透視跨世紀中共戰略武力。臺北:臺灣學生書局。  延伸查詢new window
3.von Clausewitz, Carl、王洽南(1991)。戰爭論。臺北:國防部史政編譯局。  延伸查詢new window
4.Lieberthal, Kenneth G.、Singer, Peter W.(2012)。Cybersecurity and U.S.-China Relations。The Brookings Institution。  new window
5.Rid, Thomas(2013)。Cyber War will not Take Place。Hurst/Oxford University Press。  new window
6.Libicki, Martin C.(2007)。Conquest in Cyberspace: National Security and Information Warfare。Cambridge University Press。  new window
7.Singer, P. W.、Friedman, Allan(2014)。Cybersecurity and Cyberwar: What Everyone Needs to Know?。Oxford University Press。  new window
8.Clark, David D.、Berson, T. A.、Lin, Herbert(2014)。At the nexus of cybersecurity and public policy: some basic concepts and issues。National Academies Press。  new window
9.Brito, Jerry、Watkins, Tate(2011)。Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy。Mercatus Center, George Mason University。  new window
10.Nye, Joseph Jr.(2011)。The Future of Power: Its Changing Nature and Use in the 21st Century。Public Affairs。  new window
11.Courville, Shane P.(2007)。Air Force and the cyberspace mission: defending the Air Force's computer network in the future。Center for Strategy and Technology, Air War College, Air University。  new window
單篇論文
1.Lindsay, Jon R.,Kello, Lucas。Correspondence: A Cyber Disagreement。  new window
其他
1.Rajnovic, Damir(2012)。Cyberspace--What Is It?,https://blogs.cisco.com/security/cyberspace-what-is-it。  new window
2.Bumiller, Elisabeth,Shanker, Thom(20121011)。Panetta Warns of Dire Threat of Cyberattack on U.S.,https://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html。  new window
3.(20190917)。共同強化資安 AIT:台美11月首度網路攻防演練,https://www.cna.com.tw/news/firstnews/201909170216.aspx。  延伸查詢new window
4.黃梅茹(20190703)。【中國可能在馬政府時就掌握】國安8大情治人員個資大外洩!整組在國外網站上俗賣350元,https://buzzorange.com/2019/07/03/590k-taiwanese-official-information-leaked/。  延伸查詢new window
5.TREND LABS趨勢科技全球技術支援與研發中心(20150831)。有本事就來抓我啊~駭客平均躲藏天數205天,https://blog.trendmicro.com.tw/?p=13483。  延伸查詢new window
6.台美首網路攻防演練政院資安處:台每月被攻擊3千萬次,https://udn.com/news/story/6656/4143093。  延伸查詢new window
7.108年國家資通安全情勢報告,https://nicst.ey.gov.tw/File/3EF8F98ED0EEA3B8?A=C。  延伸查詢new window
圖書論文
1.Sheldon, John B.(2012)。Toward a Theory of Cyber Power Strategic Purpose in Peace and War。Cyberspace and National Security: threats, opportunities, and power in a virtual world。Georgetown University Press。  new window
2.Lin, Herbert(2012)。Operational Considerations in Cyber Attack and Cyber Exploitation。Cyberspace and National Security: threats, opportunities, and power in a virtual world。Georgetown University Press。  new window
3.Reveron, Derek S.(2012)。An Introduction to National Security and Cyberspace。Cyberspace and national security: Threats, opportunities, and power in a virtual world。Georgetown University Press。  new window
4.林穎佑(2015)。必也正名乎從國家安全論網軍的本質。前瞻台灣未來國家安全戰略:理論與實務。淡江大學臺北校區五樓校友聯誼會館。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top