:::

詳目顯示

回上一頁
題名:美中關係的網路安全問題
書刊名:遠景基金會季刊
作者:林正義
作者(外文):Lin, Cheng-yi
出版日期:2020
卷期:21:4
頁次:頁1-57
主題關鍵詞:網路安全網路間諜網路主權華為美中關係CybersecurityCyber espionageCyber sovereigntyHuaweiU.S.-China relations
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:3
  • 點閱點閱:5
期刊論文
1.Lindsay, Jon R.(2014)。The Impact of China on Cybersecurity: Fiction and Friction。International Security,39(3),7-47。  new window
2.王清安、黃基禎(20190300)。中共對網路空間主權之概念與作為。中國大陸研究,62(1),67-100。new window  延伸查詢new window
3.Gilli, Andrea、Gilli, Mauro(2018)。Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage。International Security,43(3),141-189。  new window
4.耿召(2018)。特朗普時期中美網絡安全合作分析。美國問題研究,2018(2),151-175。  延伸查詢new window
5.耿召(2019)。特朗普政府《國家網絡戰略》:實效與理念並舉。和平與發展,2019(1),116-130。  延伸查詢new window
6.魯傳穎(2019)。中美關係中的網絡安全困境及其影響。現代國際關係,2019(12),16-22。  延伸查詢new window
7.Borghard, Erica D.、Lonergan, Shawn W.(2018)。Confidence Building Measures for the Cyber Domain。Strategic Studies Quarterly,12(3),10-49。  new window
8.朱志平、梁德昭(20160400)。習近平時期美中網路安全競逐。遠景基金會季刊,17(2),1-63。new window  延伸查詢new window
9.林穎佑(20160200)。美「中」網路安全競合情勢分析。亞太評論,2(1),55-70。  延伸查詢new window
10.王軍(2012)。多維視野下的網絡戰:緣起、演進與應對。世界經濟與政治,2012(7),80-98。  延伸查詢new window
11.朱鋒(2019)。貿易戰、科技戰與中美關係的「範式變化」。亞太安全與海洋研究,2019(4),1-14。  延伸查詢new window
12.吳翔、翟玉成(2011)。網絡軍控:倡議、問題與前景。現代國際關係,2011(12),16-20。  延伸查詢new window
13.李崢(2016)。中美網路安全互動:挑戰與機遇。復旦學報,2016(3),147-156。  延伸查詢new window
14.李艷(2018)。網絡空間國際治理中的國家主體與中美網絡關係。現代國際關係,2018(11),41-48。  延伸查詢new window
15.汪曉風(2018)。斯諾登事件後美國網絡情報政策的調整。現代國際關係,2018(11),56-63。  延伸查詢new window
16.唐嵐、史國力(2016)。減少和管理中美在網絡空間的衝突。現代國際關係,2016(10),51-52。  延伸查詢new window
17.張凱銘(20180900)。「避險」視角下中國對美國的網路強國戰略研究。問題與研究,57(3),97-137。new window  延伸查詢new window
18.張凱銘(20200100)。川普政府時期的美國國家網路戰略之研究:從威脅平衡理論分析。遠景基金會季刊,21(1),107-170。new window  延伸查詢new window
19.程玉(2014)。中美雙邊關係中網絡安全問題的成因、摩擦與對策。黨政幹部學刊,2014(7),31-35。  延伸查詢new window
20.程群(2012)。網絡軍備控制的困境與出路。現代國際關係,2012(2),15-21。  延伸查詢new window
21.魯傳穎(2018)。網絡空間大國博弈趨勢和中美對話機制演變。信息安全與通信保密,2018(2),17-19。  延伸查詢new window
22.(2016)。堅持尊重網路主權原則 推動構建網絡空間命運共同體。求是,2016(5)。  延伸查詢new window
圖書
1.Clarke, Richard A.、Knake, Robert K.(2010)。Cyber War: The Next Threat to National Security and What to Do About It。Harper Collins Publishers。  new window
2.Gates, Robert M.(2014)。Duty: Memoirs of a Secretary at War。New York:Alfred A. Knopf。  new window
3.Harold, Scott Warren、Libicki, Martin C.、Cevallos, Astrid Stuth(2016)。Getting to Yes with China in Cyberspace。RAND。  new window
4.Steinberg, James、O'Hanlon, Michael E.(2014)。Strategic Reassurance and Resolve: U.S.-China Relations in the Twenty-First Century。Princeton University Press。  new window
5.U.S. Department of Defense(2016)。Military and Security Developments Involving the People's Republic of China 2016。Washington, D. C.:U.S. Department of Defense。  new window
6.U.S. Department of Defense(2015)。The Department of Defense Cyber Strategy。Washington, D. C.:U.S. Department of Defense。  new window
7.Cheng, Dean(2017)。Cyber dragon: Inside China's information warfare and cyber operations。Praeger。  new window
8.Mandiant Corporation(2013)。APT1: Exposing One of China's Cyber Espionage Units。Washington, DC:Mandiant Corporation。  new window
9.中國國家互聯網信息辦公室(2016)。國家網絡空間安全戰略。  延伸查詢new window
10.Elman, Colin、Jensen, Michael A.(2014)。The Realism Reader。London:Routledge。  new window
11.Inkster, Nigel(2016)。China's Cyber Power。New York:Routledge。  new window
12.The White House(2018)。National Cyber Strategy of the United States of America。The White House。  new window
13.U.S. National Counterintelligence and Security Center(2018)。Foreign Economic Espionage in Cyberspace 2018。Washington, D.C.:National Counterintelligence and Security Center。  new window
14.Bolton, John(2020)。The Room Where It Happened: A White House Memoir。Simon & Schuster。  new window
15.Libicki, Martin C.(2007)。Conquest in Cyberspace: National Security and Information Warfare。Cambridge University Press。  new window
16.U.S. Department of Defense(2019)。Indo-Pacific Strategy Report。Washington, DC:U.S. Department of Defense。  new window
17.Clapper, James R.(2018)。Facts and Fears: Hard Truths from A Life in Intelligence。Random House。  new window
18.Carlin, John P.、Graff, Garret M.(2018)。Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat。Public Affairs。  new window
19.Campbell, Kurt M.(2016)。The Pivot: The Future of American Statecraft in Asia。Hachette Book Group。  new window
20.Gertz, Bill(2017)。iWar: War and Peace in the Information Age。Threshold Editions。  new window
21.Sanger, David E.(2018)。The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age。Scribe Publication。  new window
22.Panetta, Leon(2014)。Worthy Fights: A Memoir of Leadership in War and Peace。Penguin。  new window
23.Poindexter, Dennis F.(2018)。The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests。McFarland & Company, Inc.。  new window
24.U.S. Commission on Enhancing National Cybersecurity(2016)。Report on Securing and Growing the Digital Economy。U.S. Commission on Enhancing National Cybersecurity。  new window
25.Trump, Donald J.(2017)。National Security Strategy of the United States of America (December 2017)。Washington, DC:The White House。  new window
其他
1.王子暉(20140415)。習近平:堅持總體國家安全觀.走中國特色國家安全道路,http://www.xinhuanet.com/politics/2014-04/15/c_1110253910.htm。  延伸查詢new window
2.(20170511)。Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/, 。  new window
3.U.S. Department of Justice Office of Public Affairs(20171006)。First U.S.-China Law Enforcement and Cybersecurity Dialogue Summary of Outcomes,https://www.justice.gov/opa/pr/first-uschina-law-enforcement-and-cybersecurity-dialogue。  new window
4.The White House(20150925)。Fact Sheet: President Xi Jinping's State Visit to the United States,https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states。  new window
5.(20130315)。習近平同奧巴馬通電話 就網路安全等問題交換意見,http://www.cac.gov.cn/2013-03/15/c_133138873.htm。  延伸查詢new window
6.中華人民共和國國家互連網信息辦公室(20140227)。中央網絡安全和信息化領導小組第一次會議召開.習近平發表重要講話,http://www.cac.gov.cn/2014-02/27/c_133148354.htm。  延伸查詢new window
7.中華人民共和國外交部(20151216)。習近平:推進全球互聯網治理體系變革應堅持四原則,http://www.fmprc.gov.cn/web/zyxw/t1324807.shtml。  延伸查詢new window
8.中華人民共和國外交部(20141222)。王毅同美國國務卿克里通電話,http://www.chinanews.com/gn/2014/12-22/6897113.shtml。  延伸查詢new window
9.(20200515)。消息人士 :美若對華為卡脖子,中方反擊清單上將有這些美方公司,https://world.huanqiii.com/article/3yFXkzABKfP。  延伸查詢new window
10.中國國務院新聞辦公室(20190724)。《新時代的中國國防》白皮書全文,http://www.mod.gov.cn/regulatory/2019-07/24/content_4846424.htm。  延伸查詢new window
11.中國石油大學(華東)信息化建設處(20171110)。中國網絡空間安全發展報告(2017)精讀,http://nic.upc.edu.cn/2018/0119/c7453a131181/pagem.htm。  延伸查詢new window
12.中國國家信息中心(20200413)。中國網絡媒體社會價值白皮書,http://www.sic.gov.cn/News/79/10458.htm。  延伸查詢new window
13.張曉松,朱基釵(20180421)。習近平:自主創新推進網路強國建設,http://www.xinhuanet.com/politics/2018-04/21/c_1122719810.htm。  延伸查詢new window
14.(20150929)。The Obama-Xi Cyber Mirage。  new window
15.Bradsher, Keith(20140521)。Retaliatory Attacks, Online。  new window
16.Forsythe, Michael,Sanger, David E.(20151203)。China Says Hacking of U.S. Workers' Data Was Common Crime, Not State Act。  new window
17.Perlez, Jane,Wingfield, Nick(20150924)。Chinese Leader Hears Tough Complaints of American Business。  new window
18.Perlroth, Nicole(20130131)。Hackers in China Attacked The Times for Last 4 Months。  new window
19.Sanger, David E.(20150924)。Hackers Also Stole Fingerprints of 5.6 Million Workers, Personnel Agency Says。  new window
20.Sanger, David E.(20190528)。Huawei Ban Gains Trump a Wall at Last。  new window
21.Sanger, David E.,Barnes, Julian E.,Zhong, Raymond,Santora, Marc(20190127)。U.S. Scrambles to Outrun China in New Arms Race。  new window
22.Sanger, David E.,Perlroth, Nicole(20140323)。U.S. Penetrated Chinese Servers It Saw as Spy Risk。  new window
23.Sanger, David E.,Perlroth, Nicole(20200511)。U.S. to Accuse China of Trying to Steal Data。  new window
24.(20141112)。The U.S. and China Reach a Landmark Climate Deal,https://www.washingtonpost.com/opinions/the-us-and-china-reach-a-landmark-climate-deal/2014/11/12/a1f49f4c-6aa5-11e4-a31c-77759fcleacc_story.html。  new window
25.Wong, Edward,Barnes, Julian E.(20200529)。Many Chinese Graduate Students and Researchers to Lose U.S. Visas。  new window
26.Swanson, Ana,Mozur, Paul,Zhong, Raymond(20200520)。A Tech Fight, U.S. vs. China, Pulls In Taiwan。  new window
27.Swanson, Ana,Mozur, Paul(20191008)。Chinese Entities Blacklisted As U.S. Cites Rights Abuses。  new window
28.Schmidt, Michael S.,Sanger, David E.,Perlroth, Nicole(20140710)。Chinese Hackers Pursue Key Data on U.S. Workers。  new window
29.Budryk, Zack(20190804)。Top aide: China must end 'Seven Deadly Sins' to stop trade war,https://thehill.com/homenews/sunday-talk-shows/456092-top-aide-names-seven-deadly-sins-china-must-end-to-stop-trade-war。  new window
30.Brunnstrom, David(20190531)。Pompeo Tells Germany: Use Huawei and Lose Access to Our Data,https://www.reuters.com/article/us-usa-germany/pompeo-to-germany-use-huawei-and-lose-access-toour-data-idUSKCN1T10HH。  new window
31.Blake, Andrew(20151012)。China Arrests Hackers Following Request from U.S.-Report,https://www.washingtontimes.com/news/2015/oct/12/china-arrests-hackers-following-request-fromus-re/。  new window
32.(20150624)。Obama's Cyber Meltdown,https://www.wsj.com/articles/obamas-cyber-meltdown-1435097288。  new window
33.(20180209)。China, U.S. should make good use of four dialogue pillars: Chinese state councilor,http://www.xinhuanet.com/english/2018-02/09/c_136961876.htm。  new window
34.Huawei(2019)。Huawei's Position Paper on Cyber Security,https://www.huawei.com/en/facts/voices-of-huawei/huawei-releases-its-position-paper-on-cyber-security。  new window
35.Gertz, Bill(20200610)。Pompeo on Chinese Coercion,https://www.washingtontimes.com/news/2020/jun/10/mike-pompeo-accuses-china-of-bullying-hsbc/。  new window
36.Ford, Christopher Ashley(20200316)。The PRC's 'Military-Civil Fusion' Strategy Is a Global Security Threat,https://www.state.gov/the-prcs-military-civil-fiision-strategy-is-a-global-security-threat/。  new window
37.The Center for Strategic and International Studies and the China Institute of Contemporary International Relations(2012)。Bilateral Discussions on Cooperation in Cybersecurity,https://www.csis.org/programs/technology-policy-program/cybersecurity-and-governance/other-projects-cybersecurity/track-1。  new window
38.Li, Yuan(20191105)。China's TikTok Blazes New Ground. That Could Doom It,https://www.nytimes.com/2019/11/05/business/tiktok-china-bytedance.html。  new window
39.O'Keeffe, Kate(20181114)。U.S. Panel Warns China Tech Prowess Threatens U.S. Security,https://www.wsj.com/articles/u-s-panel-warns-china-tech-prowess-threatens-u-s-security-1542171601。  new window
40.Painter, Christopher(20160525)。International Cybersecurity Strategy: Deterring Foreign Threats and Building Global Cyber Norms,https://2009-2017_state.gOv/s/cyberissues/releasesandremarks/257719.htm。  new window
41.Pompeo, Michael R.(20200515)。The United States Protects National Security and the Integrity of 5G Network,https://www.state.gov/the-united-states-protects-national-security-and-the-integrity-of-5g-networks/。  new window
42.Shahbaz, Adrian(20201103)。Fake News, Data Collection, and the Challenge to Democracy,https://freedomhouse.org/report/freedom-net/freedom-net-2018/rise-digital-authoritarianism。  new window
43.Selyukh, Alina,Palmer, Doug(20130328)。U.S. Law to Restrict Government Purchases of Chinese IT Equipment,https://www.reuters.com/article/us-usa-cybersecurity-espionage-idUSBRE92Q18020130328。  new window
44.Segal, Adam(20181206)。A New Old Threat Countering the Return of Chinese Industrial Cyber Espionage,https://www.cfr.org/report/threat-chinese-espionage。  new window
45.Sebenius, Alyza(20190219)。China Has Abandoned a Cybersecurity Truce with the U.S., Report Says,https://www.bloomberg.com/news/articles/2019-02-19/china-abandons-cybersecurity-truce-with-u-s-report-says。  new window
46.Pompeo, Michael R.(20200805)。Announcing the Expansion of the Clean Network to Safeguard America's Assets,https://www.state.gov/announcing-the-expansion-of-the-clean-network-to-safeguard-americas-assets/。  new window
47.U.S. Department of Justice Office of Public Affairs(20161208)。Third U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues,https://www.justice.gov/opa/pr/third-us-china-high-level-joint-dialogue-cybercrime-and-related-issues。  new window
48.U.S. Department of Justice Office of Public Affairs(20160614)。Second U.S.-China Cybercrime and Related Issues High Level Joint Dialogue,https://www.justice.gov/opa/pr/second-us-china-cybercrime-and-related-issues-high-level-joint-dialogue。  new window
49.Strumpf, Dan(20200606)。Huawei Founder Ren Zhengfei Takes Off the Gloves in Fight Against U.S.,https://www.wsj.com/articles/huawei-founder-ren-zhengfei-takes-off-the-gloves-in-fight-against-u-s-11591416028?mod=searchresults&page=1&pos=2。  new window
50.Steinberg, James(20090924)。Administration's Vision of the U.S.-China Relationship,https://web-archive-2017.ait.org.tw/en/administrations-vision-of-the-us-china-relationship.html。  new window
51.The White House(20130212)。Executive Order--Improving Critical Infrastructure Cybersecurity,https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity。  new window
52.U.S. Embassy and Consulates in China(2019)。Department of Commerce Announces the Addition of Huawei to the Entity List,https://china.usembassy-china.org.cn/department-of-commerce-announces-the-addition-of-huawei-to-the-entity-list/。  new window
53.U.S. Department of State(20130712)。U.S.-China Strategic and Economic Dialogue Outcomes of the Strategic Track,https://2009-2017.state.gov/r/pa/prs/ps/2013/07/211861.htm。  new window
54.U.S. Department of Justice Office of Public Affairs,U.S. Department of Homeland Security of Public Affairs(20151202)。First U.S.-China High-Level Joint Dialogue on Cybercrime And Related Issues Summary Of Outcomes,https://www.dhs.gov/news/2015/12/02/first-us-china-high-level-joint-dialogue-cybercrime-and-related-issues-summary。  new window
55.The White House(20160903)。U.S. Fact Sheet for President Obama's Bilateral Meeting with President Xi Jinping,https://obamawhitehouse.archives.gov/the-press-office/2016/09/03/us-fact-sheet-president-obamas-bilateral-meeting-president-xi-jinping。  new window
56.The White House(20150401)。Executive Order--'Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities',https://obamawhitehouse.archives.gov/the-press-office/2015/04/01/executive-order-blocking-property-certain-persons-engaging-significant-m。  new window
57.Yap, Chuin-Wei(20191225)。State Support Helped Fuel Huawei's Global Rise,https://www.wsj.com/articles/state-support-helped-fuel-huaweis-global-rise-11577280736?mod=searchresults&page=1&pos=20。  new window
58.The White House(20190515)。Executive Order on Securing the Information and Communications Technology and Services Supply Chain,https://www.whitehouse.gov/presidential-actions/executive-order-securing-information-communications-technology-services-supply-chain/。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top