期刊論文1. | Lindsay, Jon R.(2014)。The Impact of China on Cybersecurity: Fiction and Friction。International Security,39(3),7-47。 |
2. | 王清安、黃基禎(20190300)。中共對網路空間主權之概念與作為。中國大陸研究,62(1),67-100。 延伸查詢 |
3. | Gilli, Andrea、Gilli, Mauro(2018)。Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage。International Security,43(3),141-189。 |
4. | 耿召(2018)。特朗普時期中美網絡安全合作分析。美國問題研究,2018(2),151-175。 延伸查詢 |
5. | 耿召(2019)。特朗普政府《國家網絡戰略》:實效與理念並舉。和平與發展,2019(1),116-130。 延伸查詢 |
6. | 魯傳穎(2019)。中美關係中的網絡安全困境及其影響。現代國際關係,2019(12),16-22。 延伸查詢 |
7. | Borghard, Erica D.、Lonergan, Shawn W.(2018)。Confidence Building Measures for the Cyber Domain。Strategic Studies Quarterly,12(3),10-49。 |
8. | 朱志平、梁德昭(20160400)。習近平時期美中網路安全競逐。遠景基金會季刊,17(2),1-63。 延伸查詢 |
9. | 林穎佑(20160200)。美「中」網路安全競合情勢分析。亞太評論,2(1),55-70。 延伸查詢 |
10. | 王軍(2012)。多維視野下的網絡戰:緣起、演進與應對。世界經濟與政治,2012(7),80-98。 延伸查詢 |
11. | 朱鋒(2019)。貿易戰、科技戰與中美關係的「範式變化」。亞太安全與海洋研究,2019(4),1-14。 延伸查詢 |
12. | 吳翔、翟玉成(2011)。網絡軍控:倡議、問題與前景。現代國際關係,2011(12),16-20。 延伸查詢 |
13. | 李崢(2016)。中美網路安全互動:挑戰與機遇。復旦學報,2016(3),147-156。 延伸查詢 |
14. | 李艷(2018)。網絡空間國際治理中的國家主體與中美網絡關係。現代國際關係,2018(11),41-48。 延伸查詢 |
15. | 汪曉風(2018)。斯諾登事件後美國網絡情報政策的調整。現代國際關係,2018(11),56-63。 延伸查詢 |
16. | 唐嵐、史國力(2016)。減少和管理中美在網絡空間的衝突。現代國際關係,2016(10),51-52。 延伸查詢 |
17. | 張凱銘(20180900)。「避險」視角下中國對美國的網路強國戰略研究。問題與研究,57(3),97-137。 延伸查詢 |
18. | 張凱銘(20200100)。川普政府時期的美國國家網路戰略之研究:從威脅平衡理論分析。遠景基金會季刊,21(1),107-170。 延伸查詢 |
19. | 程玉(2014)。中美雙邊關係中網絡安全問題的成因、摩擦與對策。黨政幹部學刊,2014(7),31-35。 延伸查詢 |
20. | 程群(2012)。網絡軍備控制的困境與出路。現代國際關係,2012(2),15-21。 延伸查詢 |
21. | 魯傳穎(2018)。網絡空間大國博弈趨勢和中美對話機制演變。信息安全與通信保密,2018(2),17-19。 延伸查詢 |
22. | (2016)。堅持尊重網路主權原則 推動構建網絡空間命運共同體。求是,2016(5)。 延伸查詢 |
圖書1. | Clarke, Richard A.、Knake, Robert K.(2010)。Cyber War: The Next Threat to National Security and What to Do About It。Harper Collins Publishers。 |
2. | Gates, Robert M.(2014)。Duty: Memoirs of a Secretary at War。New York:Alfred A. Knopf。 |
3. | Harold, Scott Warren、Libicki, Martin C.、Cevallos, Astrid Stuth(2016)。Getting to Yes with China in Cyberspace。RAND。 |
4. | Steinberg, James、O'Hanlon, Michael E.(2014)。Strategic Reassurance and Resolve: U.S.-China Relations in the Twenty-First Century。Princeton University Press。 |
5. | U.S. Department of Defense(2016)。Military and Security Developments Involving the People's Republic of China 2016。Washington, D. C.:U.S. Department of Defense。 |
6. | U.S. Department of Defense(2015)。The Department of Defense Cyber Strategy。Washington, D. C.:U.S. Department of Defense。 |
7. | Cheng, Dean(2017)。Cyber dragon: Inside China's information warfare and cyber operations。Praeger。 |
8. | Mandiant Corporation(2013)。APT1: Exposing One of China's Cyber Espionage Units。Washington, DC:Mandiant Corporation。 |
9. | 中國國家互聯網信息辦公室(2016)。國家網絡空間安全戰略。 延伸查詢 |
10. | Elman, Colin、Jensen, Michael A.(2014)。The Realism Reader。London:Routledge。 |
11. | Inkster, Nigel(2016)。China's Cyber Power。New York:Routledge。 |
12. | The White House(2018)。National Cyber Strategy of the United States of America。The White House。 |
13. | U.S. National Counterintelligence and Security Center(2018)。Foreign Economic Espionage in Cyberspace 2018。Washington, D.C.:National Counterintelligence and Security Center。 |
14. | Bolton, John(2020)。The Room Where It Happened: A White House Memoir。Simon & Schuster。 |
15. | Libicki, Martin C.(2007)。Conquest in Cyberspace: National Security and Information Warfare。Cambridge University Press。 |
16. | U.S. Department of Defense(2019)。Indo-Pacific Strategy Report。Washington, DC:U.S. Department of Defense。 |
17. | Clapper, James R.(2018)。Facts and Fears: Hard Truths from A Life in Intelligence。Random House。 |
18. | Carlin, John P.、Graff, Garret M.(2018)。Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat。Public Affairs。 |
19. | Campbell, Kurt M.(2016)。The Pivot: The Future of American Statecraft in Asia。Hachette Book Group。 |
20. | Gertz, Bill(2017)。iWar: War and Peace in the Information Age。Threshold Editions。 |
21. | Sanger, David E.(2018)。The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age。Scribe Publication。 |
22. | Panetta, Leon(2014)。Worthy Fights: A Memoir of Leadership in War and Peace。Penguin。 |
23. | Poindexter, Dennis F.(2018)。The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests。McFarland & Company, Inc.。 |
24. | U.S. Commission on Enhancing National Cybersecurity(2016)。Report on Securing and Growing the Digital Economy。U.S. Commission on Enhancing National Cybersecurity。 |
25. | Trump, Donald J.(2017)。National Security Strategy of the United States of America (December 2017)。Washington, DC:The White House。 |
其他1. | 王子暉(20140415)。習近平:堅持總體國家安全觀.走中國特色國家安全道路,http://www.xinhuanet.com/politics/2014-04/15/c_1110253910.htm。 延伸查詢 |
2. | (20170511)。Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/, 。 |
3. | U.S. Department of Justice Office of Public Affairs(20171006)。First U.S.-China Law Enforcement and Cybersecurity Dialogue Summary of Outcomes,https://www.justice.gov/opa/pr/first-uschina-law-enforcement-and-cybersecurity-dialogue。 |
4. | The White House(20150925)。Fact Sheet: President Xi Jinping's State Visit to the United States,https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states。 |
5. | (20130315)。習近平同奧巴馬通電話 就網路安全等問題交換意見,http://www.cac.gov.cn/2013-03/15/c_133138873.htm。 延伸查詢 |
6. | 中華人民共和國國家互連網信息辦公室(20140227)。中央網絡安全和信息化領導小組第一次會議召開.習近平發表重要講話,http://www.cac.gov.cn/2014-02/27/c_133148354.htm。 延伸查詢 |
7. | 中華人民共和國外交部(20151216)。習近平:推進全球互聯網治理體系變革應堅持四原則,http://www.fmprc.gov.cn/web/zyxw/t1324807.shtml。 延伸查詢 |
8. | 中華人民共和國外交部(20141222)。王毅同美國國務卿克里通電話,http://www.chinanews.com/gn/2014/12-22/6897113.shtml。 延伸查詢 |
9. | (20200515)。消息人士 :美若對華為卡脖子,中方反擊清單上將有這些美方公司,https://world.huanqiii.com/article/3yFXkzABKfP。 延伸查詢 |
10. | 中國國務院新聞辦公室(20190724)。《新時代的中國國防》白皮書全文,http://www.mod.gov.cn/regulatory/2019-07/24/content_4846424.htm。 延伸查詢 |
11. | 中國石油大學(華東)信息化建設處(20171110)。中國網絡空間安全發展報告(2017)精讀,http://nic.upc.edu.cn/2018/0119/c7453a131181/pagem.htm。 延伸查詢 |
12. | 中國國家信息中心(20200413)。中國網絡媒體社會價值白皮書,http://www.sic.gov.cn/News/79/10458.htm。 延伸查詢 |
13. | 張曉松,朱基釵(20180421)。習近平:自主創新推進網路強國建設,http://www.xinhuanet.com/politics/2018-04/21/c_1122719810.htm。 延伸查詢 |
14. | (20150929)。The Obama-Xi Cyber Mirage。 |
15. | Bradsher, Keith(20140521)。Retaliatory Attacks, Online。 |
16. | Forsythe, Michael,Sanger, David E.(20151203)。China Says Hacking of U.S. Workers' Data Was Common Crime, Not State Act。 |
17. | Perlez, Jane,Wingfield, Nick(20150924)。Chinese Leader Hears Tough Complaints of American Business。 |
18. | Perlroth, Nicole(20130131)。Hackers in China Attacked The Times for Last 4 Months。 |
19. | Sanger, David E.(20150924)。Hackers Also Stole Fingerprints of 5.6 Million Workers, Personnel Agency Says。 |
20. | Sanger, David E.(20190528)。Huawei Ban Gains Trump a Wall at Last。 |
21. | Sanger, David E.,Barnes, Julian E.,Zhong, Raymond,Santora, Marc(20190127)。U.S. Scrambles to Outrun China in New Arms Race。 |
22. | Sanger, David E.,Perlroth, Nicole(20140323)。U.S. Penetrated Chinese Servers It Saw as Spy Risk。 |
23. | Sanger, David E.,Perlroth, Nicole(20200511)。U.S. to Accuse China of Trying to Steal Data。 |
24. | (20141112)。The U.S. and China Reach a Landmark Climate Deal,https://www.washingtonpost.com/opinions/the-us-and-china-reach-a-landmark-climate-deal/2014/11/12/a1f49f4c-6aa5-11e4-a31c-77759fcleacc_story.html。 |
25. | Wong, Edward,Barnes, Julian E.(20200529)。Many Chinese Graduate Students and Researchers to Lose U.S. Visas。 |
26. | Swanson, Ana,Mozur, Paul,Zhong, Raymond(20200520)。A Tech Fight, U.S. vs. China, Pulls In Taiwan。 |
27. | Swanson, Ana,Mozur, Paul(20191008)。Chinese Entities Blacklisted As U.S. Cites Rights Abuses。 |
28. | Schmidt, Michael S.,Sanger, David E.,Perlroth, Nicole(20140710)。Chinese Hackers Pursue Key Data on U.S. Workers。 |
29. | Budryk, Zack(20190804)。Top aide: China must end 'Seven Deadly Sins' to stop trade war,https://thehill.com/homenews/sunday-talk-shows/456092-top-aide-names-seven-deadly-sins-china-must-end-to-stop-trade-war。 |
30. | Brunnstrom, David(20190531)。Pompeo Tells Germany: Use Huawei and Lose Access to Our Data,https://www.reuters.com/article/us-usa-germany/pompeo-to-germany-use-huawei-and-lose-access-toour-data-idUSKCN1T10HH。 |
31. | Blake, Andrew(20151012)。China Arrests Hackers Following Request from U.S.-Report,https://www.washingtontimes.com/news/2015/oct/12/china-arrests-hackers-following-request-fromus-re/。 |
32. | (20150624)。Obama's Cyber Meltdown,https://www.wsj.com/articles/obamas-cyber-meltdown-1435097288。 |
33. | (20180209)。China, U.S. should make good use of four dialogue pillars: Chinese state councilor,http://www.xinhuanet.com/english/2018-02/09/c_136961876.htm。 |
34. | Huawei(2019)。Huawei's Position Paper on Cyber Security,https://www.huawei.com/en/facts/voices-of-huawei/huawei-releases-its-position-paper-on-cyber-security。 |
35. | Gertz, Bill(20200610)。Pompeo on Chinese Coercion,https://www.washingtontimes.com/news/2020/jun/10/mike-pompeo-accuses-china-of-bullying-hsbc/。 |
36. | Ford, Christopher Ashley(20200316)。The PRC's 'Military-Civil Fusion' Strategy Is a Global Security Threat,https://www.state.gov/the-prcs-military-civil-fiision-strategy-is-a-global-security-threat/。 |
37. | The Center for Strategic and International Studies and the China Institute of Contemporary International Relations(2012)。Bilateral Discussions on Cooperation in Cybersecurity,https://www.csis.org/programs/technology-policy-program/cybersecurity-and-governance/other-projects-cybersecurity/track-1。 |
38. | Li, Yuan(20191105)。China's TikTok Blazes New Ground. That Could Doom It,https://www.nytimes.com/2019/11/05/business/tiktok-china-bytedance.html。 |
39. | O'Keeffe, Kate(20181114)。U.S. Panel Warns China Tech Prowess Threatens U.S. Security,https://www.wsj.com/articles/u-s-panel-warns-china-tech-prowess-threatens-u-s-security-1542171601。 |
40. | Painter, Christopher(20160525)。International Cybersecurity Strategy: Deterring Foreign Threats and Building Global Cyber Norms,https://2009-2017_state.gOv/s/cyberissues/releasesandremarks/257719.htm。 |
41. | Pompeo, Michael R.(20200515)。The United States Protects National Security and the Integrity of 5G Network,https://www.state.gov/the-united-states-protects-national-security-and-the-integrity-of-5g-networks/。 |
42. | Shahbaz, Adrian(20201103)。Fake News, Data Collection, and the Challenge to Democracy,https://freedomhouse.org/report/freedom-net/freedom-net-2018/rise-digital-authoritarianism。 |
43. | Selyukh, Alina,Palmer, Doug(20130328)。U.S. Law to Restrict Government Purchases of Chinese IT Equipment,https://www.reuters.com/article/us-usa-cybersecurity-espionage-idUSBRE92Q18020130328。 |
44. | Segal, Adam(20181206)。A New Old Threat Countering the Return of Chinese Industrial Cyber Espionage,https://www.cfr.org/report/threat-chinese-espionage。 |
45. | Sebenius, Alyza(20190219)。China Has Abandoned a Cybersecurity Truce with the U.S., Report Says,https://www.bloomberg.com/news/articles/2019-02-19/china-abandons-cybersecurity-truce-with-u-s-report-says。 |
46. | Pompeo, Michael R.(20200805)。Announcing the Expansion of the Clean Network to Safeguard America's Assets,https://www.state.gov/announcing-the-expansion-of-the-clean-network-to-safeguard-americas-assets/。 |
47. | U.S. Department of Justice Office of Public Affairs(20161208)。Third U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues,https://www.justice.gov/opa/pr/third-us-china-high-level-joint-dialogue-cybercrime-and-related-issues。 |
48. | U.S. Department of Justice Office of Public Affairs(20160614)。Second U.S.-China Cybercrime and Related Issues High Level Joint Dialogue,https://www.justice.gov/opa/pr/second-us-china-cybercrime-and-related-issues-high-level-joint-dialogue。 |
49. | Strumpf, Dan(20200606)。Huawei Founder Ren Zhengfei Takes Off the Gloves in Fight Against U.S.,https://www.wsj.com/articles/huawei-founder-ren-zhengfei-takes-off-the-gloves-in-fight-against-u-s-11591416028?mod=searchresults&page=1&pos=2。 |
50. | Steinberg, James(20090924)。Administration's Vision of the U.S.-China Relationship,https://web-archive-2017.ait.org.tw/en/administrations-vision-of-the-us-china-relationship.html。 |
51. | The White House(20130212)。Executive Order--Improving Critical Infrastructure Cybersecurity,https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity。 |
52. | U.S. Embassy and Consulates in China(2019)。Department of Commerce Announces the Addition of Huawei to the Entity List,https://china.usembassy-china.org.cn/department-of-commerce-announces-the-addition-of-huawei-to-the-entity-list/。 |
53. | U.S. Department of State(20130712)。U.S.-China Strategic and Economic Dialogue Outcomes of the Strategic Track,https://2009-2017.state.gov/r/pa/prs/ps/2013/07/211861.htm。 |
54. | U.S. Department of Justice Office of Public Affairs,U.S. Department of Homeland Security of Public Affairs(20151202)。First U.S.-China High-Level Joint Dialogue on Cybercrime And Related Issues Summary Of Outcomes,https://www.dhs.gov/news/2015/12/02/first-us-china-high-level-joint-dialogue-cybercrime-and-related-issues-summary。 |
55. | The White House(20160903)。U.S. Fact Sheet for President Obama's Bilateral Meeting with President Xi Jinping,https://obamawhitehouse.archives.gov/the-press-office/2016/09/03/us-fact-sheet-president-obamas-bilateral-meeting-president-xi-jinping。 |
56. | The White House(20150401)。Executive Order--'Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities',https://obamawhitehouse.archives.gov/the-press-office/2015/04/01/executive-order-blocking-property-certain-persons-engaging-significant-m。 |
57. | Yap, Chuin-Wei(20191225)。State Support Helped Fuel Huawei's Global Rise,https://www.wsj.com/articles/state-support-helped-fuel-huaweis-global-rise-11577280736?mod=searchresults&page=1&pos=20。 |
58. | The White House(20190515)。Executive Order on Securing the Information and Communications Technology and Services Supply Chain,https://www.whitehouse.gov/presidential-actions/executive-order-securing-information-communications-technology-services-supply-chain/。 |