| 期刊論文1. | Lindsay, Jon R.(2014)。The Impact of China on Cybersecurity: Fiction and Friction。International Security,39(3),7-47。 | 2. | Gompert, David C.、Libicki, Martin(2014)。Cyber Warfare and Sino-American Crisis Instability。Survival,56(4),7-22。 | 3. | Rid, Thomas(2012)。Cyber War Will Not Take Place。The Journal of Strategic Studies,35(1),5-32。 | 4. | 林穎佑(20160900)。中國近期網路作為探討:從控制到攻擊。臺灣國際研究季刊,12(3),51-68。 延伸查詢 | 5. | Gartzke, Erik(2013)。The myth of cyberwar: Bringing war in cyberspace back down to earth。International Security,38(2),41-73。 | 6. | Valeriano, Brandon、Maness, Ryan C.(2014)。The dynamics of cyber conflict between rival antagonists, 2001-11。Journal of Peace Research,51(3),347-360。 | 7. | Farwell, James P.、Rohozinski, Rafal(2011)。Stuxnet and the future of cyber war。Survival,53(1),23-40。 | 8. | Lindsay, Jon R.(2013)。Stuxnet and the limits of cyber warfare。Security Studies,22(3),365-404。 | 9. | Morozov, Evgeny(2009)。Cyber-Scare: The Exaggerated Fears over Digital Warfare。Boston Review,34(4),17-20。 | 10. | Betz, David(2012)。Cyberpower in Strategic Affairs: Neither Unthinkable Nor Blessed。Journal of Strategic Studies,35(5),689-711。 | 11. | Nye, Joseph S.(2011)。Nuclear Lessons for Cyber Security?。Strategic Studies Quarterly,5(4),18-36。 | 12. | Junio, Timothy J.(2013)。How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate。Journal of Strategic Studies,36(1),125-133。 | 13. | Peterson, Dale(2013)。Offensive Cyber Weapons: Construction, Development, and Employment。Journal of Strategic Studies,36(1),120-124。 | 14. | Kello, Lucas(2013)。The Meaning of the Cyber Revolution: Perils to Theory and Statecraft。International Security,38(2),7-40。 | 15. | Lynn, William J. III(20110928)。The Pentagon's Cyberstrategy, One Year Later: Defending against the Next Cyberattack。Foreign Affairs,2011(Sep.)。 | 16. | Olson, Soren(2012)。Shadow Boxing: Cyber Warfare and Strategic Economic Attack。Joint Force Quarterly,66,15-21。 | 17. | Knapp, Kenneth J.、Boulton, William R.(2006)。Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments。Information Systems Management,23(2),76-87。 | 18. | Clark, Wesley K.、Levin, Peter L.(2009)。Securing the Information Highway。Foreign Affairs,88(6),2-10。 | 19. | Maurer, Tim(2011)。The Case for Cyberwarfare。Foreign Policy,2011(Oct.)。 | 20. | Blank, S.(2008)。Web War I: Is Europe's First Information War a New Kind of War?。Comparative Strategy,27(3),227-247。 | 21. | Rid, Thomas(2012)。Think Again: Cyberwar。Foreign Policy,192。 | 22. | 林穎佑(20130300)。大陸網軍與APT攻擊。展望與探索,11(3),95-110。 延伸查詢 | 23. | Burger, Tobias(2014)。Cyber target practice。Strategic Vision,17,9-13。 | 24. | 戴政龍(20131200)。中共「網軍」發展與網絡攻防:兼論我國資通安全之政策規劃。戰略與評估,4(4),97-119。 延伸查詢 | 25. | Bamford, James(2013)。NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar。WIRED,2013(Jun.)。 | 會議論文1. | 張競(2014)。網路空間衝突與戰爭的法理概念。「中國大陸在網路空間戰略的競逐」學術論壇,(會議日期: 2014/07/07)。中共研究雜誌社。 延伸查詢 | 研究報告1. | 立法院外交及國防委員會(2013)。立法院第8屆第3會期外交及國防事務委員會第20次全體委員會議紀錄。立法院外交及國防委員會。 延伸查詢 | 圖書1. | Clarke, Richard A.、Knake, Robert K.(2010)。Cyber War: The Next Threat to National Security and What to Do About It。Harper Collins Publishers。 | 2. | 林中斌(1999)。核霸:透視跨世紀中共戰略武力。臺北:臺灣學生書局。 延伸查詢 | 3. | von Clausewitz, Carl、王洽南(1991)。戰爭論。臺北:國防部史政編譯局。 延伸查詢 | 4. | Lieberthal, Kenneth G.、Singer, Peter W.(2012)。Cybersecurity and U.S.-China Relations。The Brookings Institution。 | 5. | Rid, Thomas(2013)。Cyber War will not Take Place。Hurst/Oxford University Press。 | 6. | Libicki, Martin C.(2007)。Conquest in Cyberspace: National Security and Information Warfare。Cambridge University Press。 | 7. | Singer, P. W.、Friedman, Allan(2014)。Cybersecurity and Cyberwar: What Everyone Needs to Know?。Oxford University Press。 | 8. | Clark, David D.、Berson, T. A.、Lin, Herbert(2014)。At the nexus of cybersecurity and public policy: some basic concepts and issues。National Academies Press。 | 9. | Brito, Jerry、Watkins, Tate(2011)。Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy。Mercatus Center, George Mason University。 | 10. | Nye, Joseph Jr.(2011)。The Future of Power: Its Changing Nature and Use in the 21st Century。Public Affairs。 | 11. | Courville, Shane P.(2007)。Air Force and the cyberspace mission: defending the Air Force's computer network in the future。Center for Strategy and Technology, Air War College, Air University。 | 單篇論文1. | Lindsay, Jon R.,Kello, Lucas。Correspondence: A Cyber Disagreement。 | 其他1. | Rajnovic, Damir(2012)。Cyberspace--What Is It?,https://blogs.cisco.com/security/cyberspace-what-is-it。 | 2. | Bumiller, Elisabeth,Shanker, Thom(20121011)。Panetta Warns of Dire Threat of Cyberattack on U.S.,https://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html。 | 3. | (20190917)。共同強化資安 AIT:台美11月首度網路攻防演練,https://www.cna.com.tw/news/firstnews/201909170216.aspx。 延伸查詢 | 4. | 黃梅茹(20190703)。【中國可能在馬政府時就掌握】國安8大情治人員個資大外洩!整組在國外網站上俗賣350元,https://buzzorange.com/2019/07/03/590k-taiwanese-official-information-leaked/。 延伸查詢 | 5. | TREND LABS趨勢科技全球技術支援與研發中心(20150831)。有本事就來抓我啊~駭客平均躲藏天數205天,https://blog.trendmicro.com.tw/?p=13483。 延伸查詢 | 6. | 台美首網路攻防演練政院資安處:台每月被攻擊3千萬次,https://udn.com/news/story/6656/4143093。 延伸查詢 | 7. | 108年國家資通安全情勢報告,https://nicst.ey.gov.tw/File/3EF8F98ED0EEA3B8?A=C。 延伸查詢 | 圖書論文1. | Sheldon, John B.(2012)。Toward a Theory of Cyber Power Strategic Purpose in Peace and War。Cyberspace and National Security: threats, opportunities, and power in a virtual world。Georgetown University Press。 | 2. | Lin, Herbert(2012)。Operational Considerations in Cyber Attack and Cyber Exploitation。Cyberspace and National Security: threats, opportunities, and power in a virtual world。Georgetown University Press。 | 3. | Reveron, Derek S.(2012)。An Introduction to National Security and Cyberspace。Cyberspace and national security: Threats, opportunities, and power in a virtual world。Georgetown University Press。 | 4. | 林穎佑(2015)。必也正名乎從國家安全論網軍的本質。前瞻台灣未來國家安全戰略:理論與實務。淡江大學臺北校區五樓校友聯誼會館。 延伸查詢 | |