:::

詳目顯示

回上一頁
題名:國家安全概念的再思考:以網路科技在當代美國國家安全戰略中的地位與表現為例
書刊名:全球政治評論
作者:張凱銘
作者(外文):Chang, Kai-ming
出版日期:2022
卷期:77
頁次:頁11-17
主題關鍵詞:國家安全網路科技美國
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:14
  • 點閱點閱:3
圖書
1.Tikk-Ringas, Eneken(2012)。Developments in the Field of Information and Telecommunications in the Context of International Security。Geneva:ICT for Peace Foundation。  new window
2.The White House(2018)。National Cyber Strategy。The White House。  new window
3.The White House(2011)。International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World。The White House。  new window
4.U.S. Department of State(2020)。National Strategy for Critical and Emerging Technology。U.S. Department of State。  new window
5.U.S. National Security Commission on Artificial Intelligence(2021)。Final Report。U.S. National Security Commission on Artificial Intelligence。  new window
6.U.S. White House(2003)。The National Strategy to Secure Cyberspace。U.S. White House。  new window
7.The White House(2013)。Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure。  new window
8.Waltz, Kenneth Neal(1979)。Theory of International Politics。McGraw-Hill。  new window
單篇論文
1.G7 Summit(20170411)。G7 Declaration on Responsible States Behavior in Cyberspace,https://www.mofa.go.jp/files/000246367.pdf。  new window
2.U.S. Department of Commerce(19930915)。The National Information Infrastructure: Agenda for Action,https://eric.ed.gov/?id=ED364215,(ED364215)。  new window
3.The White House(2000)。Defending America's Cyberspace: National Plan for Information Systems Protection。  new window
其他
1.American Institute in Taiwan(20190528)。Remarks by AIT Deputy Director Raymond Greene at Opening Ceremony of GCTF on Network Security and Emerging Technologies,https://www.ait.org.tw/remarks-by-ait-deputy-director-greene-at-opening-ceremony-of-gctf-on-network-security-and-emerging-technologies/。  new window
2.Pomerleau, Mark(20170601)。Cyber protection teams assigned to THAAD in South Korea,https://www.fifthdomain.com/home/2017/06/01/cyber-protection-teams-assigned-to-thaad-in-southkorea/。  new window
3.Scheer, Steven(20170626)。U.S. to Work with Israel, Seek other Ties to Combat Cyber Attacks,https://www.reuters.com/article/us-usa-israel-cyber-idUSKBN19H1KE。  new window
4.The White House(2021)。Interim National Security Strategic Guidance,https://www.whitehouse.gov/briefing-room/statements-releases/2021/03/03/interim-national-security-strategic-guidance/。  new window
5.Greene, Andrew(20210302)。Australian-made Loyal Wingman Air Combat Drone with AI-driven Targeting System Completes First Test Flight,https://www.abc.net.au/news/2021-03-02/loyal-wingman-first-flight-australia-boeing/13207388。  new window
6.Entity List,https://www.bis.doc.gov/index.php/policy-guidance/lists-of-parties-of-concern/entity-list。  new window
圖書論文
1.鄭端耀(20110000)。搶救權力平衡理論。國際關係理論。臺北:五南。new window  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE