Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/118562
題名: 網路安全與美中關係:理論的分析
Cybersecurity and United States-China Relations: A Theoretical Perspective
作者: 陶俊廷
DAVILA, JUAN MANUEL DE LA TORRE
貢獻者: 盧業中
Lu, Yeh-Chung
陶俊廷
JUAN MANUEL DE LA TORRE DAVILA
關鍵詞: 網路安全
網路強國
網路空間
網路攻擊
Cybersecurity
Cyberpower
Cyberspace
Cyberattacks
日期: 2018
上傳時間: 10-Jul-2018
摘要: 發展迅速的科技大大改變21世紀國際體系中的互動方式。根據此背景,本論文將使用兩個主要理論架構來分析網路安全對中美關係的影響,新現實主義的攻防平衡理論助於了解網路攻擊背後的邏輯,而自由主義認為可以利用和平的手段解決衝突,甚至在網路空間中。網路安全的重要性作為一個在國際關係的新威脅已經帶給許多國家不同尋常的挑戰。就美國和中國而言,網路安全在短時間內產生摩擦和衝突比兩國之間其他的歷史議題還更嚴重。近年來網路攻擊更加劇中美關係的不確定性,導致兩國之間在經濟和政治上互信不足,儘管如此,為何這兩個國家仍然達成協議?研究者認為這一協議背後主要原因是為了避免經濟制裁,對此,新現實主義和自由主義各有不同的觀點。研究者藉著回應四個研究問題,對中美雙方在網路安全的看法,提出具洞察力的見解。除此之外,在理論架構下,研究者解釋了他們會達成此協議的原因,以及中美關係在網路安全上會面臨哪些機會和挑戰。最後,作者說明這些行為導致美國和中國等國外交政策「數位化」的原因。
The rapid development of technology in the 21st century has dramatically changed the way actors in the international system interact, the internet and the threats challenges brought by it have created lack of understanding regarding the implications it has for security. Given this context, this thesis analyzes the impact of cybersecurity in United States-China relations using two of the main theoretical frameworks in international relations: neorealism and liberalism. Neorealism’s offense-defense balance concept contributes to an understanding of the logic behind cyberattacks, while liberalism observes that there is a possibility to overcome conflicts by peaceful means, even in the cyberspace.\nThe importance of cybersecurity as a new threat in international relations has created unusual challenges for states around the world. In the case of the US and China, cybersecurity has generated, in a short period of time, more friction and engagement between the two countries than any other historical issue. Cybersecurity attacks in recent years have increased uncertainty in US-China relations, contributing to a deficit in economic and political trust between these two nations, nevertheless, why do these states still have reached an agreement? I suggest that the main reason behind this decision is the desire to avoid economic sanctions, nevertheless, neorealism and liberalism offer different reasons.\nBy answering four research questions the author gives insightful information about each country’s view on cybersecurity. Furthermore, with the theoretical framework, I explain why they have reached such an agreement and what are the opportunities and challenges for the United States-China relations regarding cybersecurity. Finally I explain why all these actions have led to a “digitalization” of the practices of Foreign Policy of states such as the United States and China
參考文獻: Adler, E. (2002). Handbook of International Relations. in London: SAGE Publications Ltd. Retrieved from http://sk.sagepub.com/reference/hdbk_intlrelations. doi:10.4135/9781848608290\nBader, J. A. (2016). How Xi Jinping Sees The World & And Why. Order From Chaos: Foreign Policy in a Troubled World.\nBaldwin, D. (1997). The Concept Of Security. Review Of International Studies, 23(1), (pp. 5-26). doi:10.1017/S0260210597000053\nBaylis, J. (2008). The Concept of Security in International Relations. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 495-502). Berlin, Heidelberg: Springer Berlin Heidelberg.\nBrauch, H. G. (2008). Introduction: Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 27-43). Berlin, Heidelberg: Springer Berlin Heidelberg.\nBrown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace. The Diplomat.\nBrown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 3: Over a Year Later, What Impact has the 2015 Cyber Agreement had on U.S.-China Relations? The Diplomat.\nBull, H. (1977). The Anarchical Society: A Study of Order in World Politics. New York.\nBuzan, B. (1983). People, States, and Fear: The National Security Problem in International Relations: Wheatsheaf Books.\nBuzan, B. (2008). The Changing Agenda of Military Security. Globalization and Environmental Challenges, (pp. 553-560).\nBuzan, B., Wæver, O., & de Wilde, J. (1998). Security: A New Framework for Analysis: Lynne Rienner Pub.\nChina Internet Network Information Center. (2017). Statistical Report on Internet Development in China. In: CNNIC Beijing.\nChoucri, N. (2012). Cyberpolitics in International Relations: MIT press.\nCoats, D. R. (2017). Worldwide Threat Assessment of the US Intelligence Community. Retrieved from https://www.dni.gov/files/documents/Newsroom/Testimonies/SSCI%20Unclassified%20SFR%20-%20Final.pdf.\nDunne, T., Kurki, M., & Smith, S. (2013). International Relations Theories: Oxford University Press.\nEriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review / Revue internationale de science politique, 27(3), (pp. 221-244).\nFarrell, H., & Glaser, C. L. (2017). The Role of Effects, Saliencies and Norms in US Cyberwar Doctrine. Journal of Cybersecurity, 3(1), (pp 7-17). doi:10.1093/cybsec/tyw015\nFountain, J. (2004). Building the Virtual State: Information Technology and Institutional Change: Brookings Institution Press.\nGerman Federal Ministry of the Interior. (2011). Cyber Security Strategy for Germany. Federal Ministry of the Interior Retrieved from https://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile.\nGierow, H. J. (2014). Cyber Security in China: New Political Leadership Focuses on Boosting National Security Restructuring Internet Regulation. Placing Restrictions on Foreign Software. Developing the PRC`s own IT Standards. China Monitor.\nGlaser, C. L., & Kaufmann, C. (1998). What is the Offense-Defense Balance and how can we Measure it? International Security, 22(4), (pp. 44-82).\nHanson, E. C. (2008). The Information Revolution and World Politics: Rowman & Littlefield Publishers.\nHe, R. (2013) China Opposes and Combats Cyber Attacks. Financial Times.\nHealey, J. (2013). China is a Cyber Victim, too. Foreign Policy(April 16).\nHeginbotham, E., Nixon, M., Morgan, F. E., Hagen, J., Heim, J. L., Engstrom, J., . . . Libicki, M. C. (2015). The US-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017: Rand Corporation.\nHennessey, S. (2017). Deterring Cyberattacks: How to Reduce Vulnerability. Foreign Affairs, 96(6), (pp. 39-46).\nJackson, R. H., & Sørensen, G. (2007). Introduction to International Relations: Theories and Approaches: Oxford University Press.\nJørgensen, K. E. (2017). International relations theory: A new introduction: Macmillan International Higher Education.\nKaplan, F. (2016). Dark Territory: The Secret History of Cyber War: Simon & Schuster.\nKelly, N., & Foran, C. (2015). President Obama and Chinese President Xi Jinping Announce Cybersecurity Agreement. The Atlantic.\nKissinger, H. (2015). World order: Penguin Books.\nKoselleck, R., & Presner, T. S. (2002). The Practice of Conceptual History: Timing history, spacing concepts: Stanford University Press.\nKremer, J.-F., & Müller, B. (2014). SAM: A Framework to Understand Emerging Challenges to States in an Interconnected World. In Cyberspace and International Relations (pp. 41-58): Springer.\nKshetri, N. (2013). Cyber-Victimization and Cybersecurity in China. Commun. ACM, 56(4), (pp 35-37). doi:10.1145/2436256.2436267\nKshetri, N. (2016). Cybersecurity in China. In The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies (pp. 123-143). Cham: Springer International Publishing.\nKshetri, N. (2016). The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies: Springer International Publishing.\nKuehl, D. T. (2009). From Cyberspace to Cyberpower: Defining the Problem. Cyberpower and national security, (pp. 24-42).\nLi, C. (2016). Assessing US-China Relations Under the Obama Administration. Brookings Institution, 5.\nLi, R. (2004). Security Challenge of an Ascendant China: Great Power Emergence and International Stability. Chinese Foreign Policy: Pragmatism and Strategic Behaviour, East Gate, New York, (pp. 23-58).\nLieberthal, K., & Singer, P. W. (2012). Cybersecurity and US-China relations: Brookings.\nLindsay, J. R. (2015). The impact of China on Cybersecurity: Fiction and friction. International Security, 39(3), (pp. 7-47).\nLongdi, X. (2014). China`s Internet Development and Cybersecurity–Policies and Practices. Chinese Cybersecurity and Defense, (pp. 1-54).\nMolyneux, S. (1999). Broadband Internet: Future Applications and Challenges. In J. Vince & R. Earnshaw (Eds.), Digital Convergence: The Information Revolution (pp. 3-12). London: Springer London.\nNye, J. S. (2011). Nuclear Lessons for Cyber Security? (Vol. 5): Strategic Studies Quarterly.\nOECD. (2011). Cybersecurity Policy Making at a Turning Point: OECD Publishing.\nParker, E. (2017). Hack Job: How America Invented Cyberwar. Foreign Affairs, 96(3), (pp. 133-138).\nPei, M. (2014). How China and America See Each Other. Foreign Affairs, 93(2), (pp. 31-32).\nPetallides, C. J. (2012). Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat. Inquiries Journal/Student Pulse, 4(03). Retrieved from http://www.inquiriesjournal.com/a?id=627\nRadu, R. G. (2012). The Monopoly of Violence in the Cyber Space: Challenges of Cyber Security. In E. Fels, J.-F. Kremer, & K. Kronenberg (Eds.), Power in the 21st Century: International Security and International Political Economy in a Changing World (pp. 137-150). Berlin, Heidelberg: Springer Berlin Heidelberg.\nRenard, T. (2015). US-China Cybersecurity Agreement: A Good Case of Cyber Diplomacy. Egmont Commentary, 1 October 2015.\nRomanosky, S. (2016). Examining the Costs and Causes of Cyber Incidents. Journal of Cybersecurity, 2(2), (pp. 121-135). doi:10.1093/cybsec/tyw001\nRulog, H. (2013) China Opposes and Combats Cyber Attacks. Financial Times.\nSegal, A. (2012). U.S. and China in Cyberspace: Uneasy Next Steps. In: Council on Foreign Relations.\nSegal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age: Hachette UK.\nSegal, A. (2017). How China is Preparing for Cyberwar. The Christian Science Monitor.\nSutter, R. G. (2013). US-Chinese Relations: Perilous Past, Pragmatic Present: Rowman & Littlefield Publishers.\nThe International Telecommunication Union (ITU). (2008). Overview of Cybersecurity, Recommendation ITU–T X.1205. Paper presented at the The ITU Plenipotentiary Conference 2010, Guadalajara, Jalisco, Mexico. http://​tinyurl.​com/​boys7dj\nThe International Telecommunication Union (ITU). (2017). Global Cybersecurity Index 2017. In: ITU.\nThe White House. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington D.C.: White House.\nThe White House. (2013). Executive Order on Improving Critical Infrastructure Cybersecurity [Press release]. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity-0\nThe White House. (2015). FACT SHEET: Cyber Threat Intelligence Integration Center. The White House, Office of the Press Secretary Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center.\nThe White House. (2015). Fact Sheet: President Xi Jinping’s State Visit to the United States. Press Release, 25.\nThe World Bank. (2017). Individuals Using the Internet (% of population) [Table]. In (pp. Internet users are individuals who have used the Internet (from any location) in the last 3 months. The Internet can be used via a computer, mobile phone, personal digital assistant, games machine, digital TV etc.).\nThornburgh, N., Forney, M., Bennett, B., Burger, T. J., & Shannon, E. (2005). The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them). Time Magazine, 29, 1098961-1098961.\nU.S. Department of Homeland Security. (2018). Cybersecurity Strategy. Retrieved from https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf.\nU.S. Department of the Treasury. (2009). Fact Sheet: U.S.‐China Strategic and Economic Dialogue. Retrieved from https://www.treasury.gov/initiatives/Documents/SEDfactsheet09.pdf.\nUnited States National Security Council. (2010). Cyberspace Policy Review: Securing America`s Digital Future: Cosimo, Incorporated.\nValeriano, B., & Maness, R. C. (2018). International Relations Theory and Cyber Security. The Oxford Handbook of International Political Theory, (pp. 259).\nVentre, D. (2014). Chinese cybersecurity and defense: John Wiley & Sons.\nVince, J., & Earnshaw, R. (2012). Digital Convergence: The Information Revolution: Springer London.\nVolz, D. (2016). Yahoo Says Hackers Stole Data From 500 Million Accounts in 2014. Reuters. Retrieved from https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-hackers-stole-data-from-500-million-accounts-in-2014-idUSKCN11S16P\nWaltz, K. N. (1979). Theory of International Politics: Waveland Press.\nWeibin, Z. (2017). The Four Stages of Sino-American Cyber Relations. In: China-United States Exchange Foundation.\nWu, X. (2005). Chinese Cyber Nationalism: How China`s Online Public Sphere Affected its Social and Political Transitions. University of Florida,\n中华人民共和国国务院. (2012). 国务院出台意见推进信息化发展切实保障信息安全.
描述: 碩士
國立政治大學
國際研究英語碩士學位學程(IMPIS)
105862016
資料來源: http://thesis.lib.nccu.edu.tw/record/#G1058620161
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File SizeFormat
016101.pdf2.43 MBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.