Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/118562
DC FieldValueLanguage
dc.contributor.advisor盧業中zh_TW
dc.contributor.advisorLu, Yeh-Chungen_US
dc.contributor.author陶俊廷zh_TW
dc.contributor.authorJUAN MANUEL DE LA TORRE DAVILAen_US
dc.creator陶俊廷zh_TW
dc.creatorDAVILA, JUAN MANUEL DE LA TORREen_US
dc.date2018en_US
dc.date.accessioned2018-07-10T07:38:01Z-
dc.date.available2018-07-10T07:38:01Z-
dc.date.issued2018-07-10T07:38:01Z-
dc.identifierG1058620161en_US
dc.identifier.urihttp://nccur.lib.nccu.edu.tw/handle/140.119/118562-
dc.description碩士zh_TW
dc.description國立政治大學zh_TW
dc.description國際研究英語碩士學位學程(IMPIS)zh_TW
dc.description105862016zh_TW
dc.description.abstract發展迅速的科技大大改變21世紀國際體系中的互動方式。根據此背景,本論文將使用兩個主要理論架構來分析網路安全對中美關係的影響,新現實主義的攻防平衡理論助於了解網路攻擊背後的邏輯,而自由主義認為可以利用和平的手段解決衝突,甚至在網路空間中。網路安全的重要性作為一個在國際關係的新威脅已經帶給許多國家不同尋常的挑戰。就美國和中國而言,網路安全在短時間內產生摩擦和衝突比兩國之間其他的歷史議題還更嚴重。近年來網路攻擊更加劇中美關係的不確定性,導致兩國之間在經濟和政治上互信不足,儘管如此,為何這兩個國家仍然達成協議?研究者認為這一協議背後主要原因是為了避免經濟制裁,對此,新現實主義和自由主義各有不同的觀點。研究者藉著回應四個研究問題,對中美雙方在網路安全的看法,提出具洞察力的見解。除此之外,在理論架構下,研究者解釋了他們會達成此協議的原因,以及中美關係在網路安全上會面臨哪些機會和挑戰。最後,作者說明這些行為導致美國和中國等國外交政策「數位化」的原因。zh_TW
dc.description.abstractThe rapid development of technology in the 21st century has dramatically changed the way actors in the international system interact, the internet and the threats challenges brought by it have created lack of understanding regarding the implications it has for security. Given this context, this thesis analyzes the impact of cybersecurity in United States-China relations using two of the main theoretical frameworks in international relations: neorealism and liberalism. Neorealism’s offense-defense balance concept contributes to an understanding of the logic behind cyberattacks, while liberalism observes that there is a possibility to overcome conflicts by peaceful means, even in the cyberspace.\nThe importance of cybersecurity as a new threat in international relations has created unusual challenges for states around the world. In the case of the US and China, cybersecurity has generated, in a short period of time, more friction and engagement between the two countries than any other historical issue. Cybersecurity attacks in recent years have increased uncertainty in US-China relations, contributing to a deficit in economic and political trust between these two nations, nevertheless, why do these states still have reached an agreement? I suggest that the main reason behind this decision is the desire to avoid economic sanctions, nevertheless, neorealism and liberalism offer different reasons.\nBy answering four research questions the author gives insightful information about each country’s view on cybersecurity. Furthermore, with the theoretical framework, I explain why they have reached such an agreement and what are the opportunities and challenges for the United States-China relations regarding cybersecurity. Finally I explain why all these actions have led to a “digitalization” of the practices of Foreign Policy of states such as the United States and Chinaen_US
dc.description.tableofcontentsAbstract IV\n摘要 V\nList of Figures VI\nChapter 1 Introduction 1\n1.1 Research motivation and Background 1\n1.2 Research questions and design of the research 8\n1.3 Research limitations 10\n1.4 Structure of the Thesis 10\nChapter 2 Literature Review 13\n2.1 The current environment in IR and the transformation of the security concepts 13\n2.2 Understanding the Cyber Space and Cyber Security 15\n2.2.1 Definitions of Key Concepts 17\n2.2.2 Neorealism 18\n2.2.3 Liberalism 21\n2.3 Development of the United States-China relations in the 21st century 23\n2.4 Summary 25\nChapter 3 The US and China on Cybersecurity: One issue, two different approaches 26\n3.1 The United States and China: Domestic experiences on cybersecurity 27\n3.1.1 The United States 27\n3.1.2 China 33\n3.2 The evolution of the concept of Cybersecurity 38\n3.2.1 The United States approach to Cybersecurity 38\n3.2.2 China’s approach to Cybersecurity 40\n3.3 Summary 44\nChapter 4 Thinking bilaterally: How does the US and China address each other? 45\n4.1 The International response: Do they listen to what some International Organizations say? 45\n4.2 United States and China Cybersecurity Dialogue 47\n4.3 Challenges and Opportunities for the US and China regarding Cybersecurity 57\n4.4 Summary 60\nChapter 5 Walking towards the same goal: finding ways to avoid further conflict 62\n5.1 The United States and China: how to arm the cyber puzzle 62\n5.2 The role of leaders in reaching agreement in trying to set up some rules for the cyberspace. 66\n5.3 The Process of Negotiation: Why did they decide to agree in such a conflictive matter? 68\n5.4 The 2015 agreement in perspective 72\n5.5 Summary 74\nChapter 6 Conclusions 76\n6.1 Future of the cyber world and IR: the case of the United States and China 81\nBibliography 83zh_TW
dc.format.extent2484143 bytes-
dc.format.mimetypeapplication/pdf-
dc.source.urihttp://thesis.lib.nccu.edu.tw/record/#G1058620161en_US
dc.subject網路安全zh_TW
dc.subject網路強國zh_TW
dc.subject網路空間zh_TW
dc.subject網路攻擊zh_TW
dc.subjectCybersecurityen_US
dc.subjectCyberpoweren_US
dc.subjectCyberspaceen_US
dc.subjectCyberattacksen_US
dc.title網路安全與美中關係:理論的分析zh_TW
dc.titleCybersecurity and United States-China Relations: A Theoretical Perspectiveen_US
dc.typethesisen_US
dc.relation.referenceAdler, E. (2002). Handbook of International Relations. in London: SAGE Publications Ltd. Retrieved from http://sk.sagepub.com/reference/hdbk_intlrelations. doi:10.4135/9781848608290\nBader, J. A. (2016). How Xi Jinping Sees The World & And Why. Order From Chaos: Foreign Policy in a Troubled World.\nBaldwin, D. (1997). The Concept Of Security. Review Of International Studies, 23(1), (pp. 5-26). doi:10.1017/S0260210597000053\nBaylis, J. (2008). The Concept of Security in International Relations. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 495-502). Berlin, Heidelberg: Springer Berlin Heidelberg.\nBrauch, H. G. (2008). Introduction: Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 27-43). Berlin, Heidelberg: Springer Berlin Heidelberg.\nBrown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace. The Diplomat.\nBrown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 3: Over a Year Later, What Impact has the 2015 Cyber Agreement had on U.S.-China Relations? The Diplomat.\nBull, H. (1977). The Anarchical Society: A Study of Order in World Politics. New York.\nBuzan, B. (1983). People, States, and Fear: The National Security Problem in International Relations: Wheatsheaf Books.\nBuzan, B. (2008). The Changing Agenda of Military Security. Globalization and Environmental Challenges, (pp. 553-560).\nBuzan, B., Wæver, O., & de Wilde, J. (1998). Security: A New Framework for Analysis: Lynne Rienner Pub.\nChina Internet Network Information Center. (2017). Statistical Report on Internet Development in China. In: CNNIC Beijing.\nChoucri, N. (2012). Cyberpolitics in International Relations: MIT press.\nCoats, D. R. (2017). Worldwide Threat Assessment of the US Intelligence Community. Retrieved from https://www.dni.gov/files/documents/Newsroom/Testimonies/SSCI%20Unclassified%20SFR%20-%20Final.pdf.\nDunne, T., Kurki, M., & Smith, S. (2013). International Relations Theories: Oxford University Press.\nEriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review / Revue internationale de science politique, 27(3), (pp. 221-244).\nFarrell, H., & Glaser, C. L. (2017). The Role of Effects, Saliencies and Norms in US Cyberwar Doctrine. Journal of Cybersecurity, 3(1), (pp 7-17). doi:10.1093/cybsec/tyw015\nFountain, J. (2004). Building the Virtual State: Information Technology and Institutional Change: Brookings Institution Press.\nGerman Federal Ministry of the Interior. (2011). Cyber Security Strategy for Germany. Federal Ministry of the Interior Retrieved from https://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile.\nGierow, H. J. (2014). Cyber Security in China: New Political Leadership Focuses on Boosting National Security Restructuring Internet Regulation. Placing Restrictions on Foreign Software. Developing the PRC`s own IT Standards. China Monitor.\nGlaser, C. L., & Kaufmann, C. (1998). What is the Offense-Defense Balance and how can we Measure it? International Security, 22(4), (pp. 44-82).\nHanson, E. C. (2008). The Information Revolution and World Politics: Rowman & Littlefield Publishers.\nHe, R. (2013) China Opposes and Combats Cyber Attacks. Financial Times.\nHealey, J. (2013). China is a Cyber Victim, too. Foreign Policy(April 16).\nHeginbotham, E., Nixon, M., Morgan, F. E., Hagen, J., Heim, J. L., Engstrom, J., . . . Libicki, M. C. (2015). The US-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017: Rand Corporation.\nHennessey, S. (2017). Deterring Cyberattacks: How to Reduce Vulnerability. Foreign Affairs, 96(6), (pp. 39-46).\nJackson, R. H., & Sørensen, G. (2007). Introduction to International Relations: Theories and Approaches: Oxford University Press.\nJørgensen, K. E. (2017). International relations theory: A new introduction: Macmillan International Higher Education.\nKaplan, F. (2016). Dark Territory: The Secret History of Cyber War: Simon & Schuster.\nKelly, N., & Foran, C. (2015). President Obama and Chinese President Xi Jinping Announce Cybersecurity Agreement. The Atlantic.\nKissinger, H. (2015). World order: Penguin Books.\nKoselleck, R., & Presner, T. S. (2002). The Practice of Conceptual History: Timing history, spacing concepts: Stanford University Press.\nKremer, J.-F., & Müller, B. (2014). SAM: A Framework to Understand Emerging Challenges to States in an Interconnected World. In Cyberspace and International Relations (pp. 41-58): Springer.\nKshetri, N. (2013). Cyber-Victimization and Cybersecurity in China. Commun. ACM, 56(4), (pp 35-37). doi:10.1145/2436256.2436267\nKshetri, N. (2016). Cybersecurity in China. In The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies (pp. 123-143). Cham: Springer International Publishing.\nKshetri, N. (2016). The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies: Springer International Publishing.\nKuehl, D. T. (2009). From Cyberspace to Cyberpower: Defining the Problem. Cyberpower and national security, (pp. 24-42).\nLi, C. (2016). Assessing US-China Relations Under the Obama Administration. Brookings Institution, 5.\nLi, R. (2004). Security Challenge of an Ascendant China: Great Power Emergence and International Stability. Chinese Foreign Policy: Pragmatism and Strategic Behaviour, East Gate, New York, (pp. 23-58).\nLieberthal, K., & Singer, P. W. (2012). Cybersecurity and US-China relations: Brookings.\nLindsay, J. R. (2015). The impact of China on Cybersecurity: Fiction and friction. International Security, 39(3), (pp. 7-47).\nLongdi, X. (2014). China`s Internet Development and Cybersecurity–Policies and Practices. Chinese Cybersecurity and Defense, (pp. 1-54).\nMolyneux, S. (1999). Broadband Internet: Future Applications and Challenges. In J. Vince & R. Earnshaw (Eds.), Digital Convergence: The Information Revolution (pp. 3-12). London: Springer London.\nNye, J. S. (2011). Nuclear Lessons for Cyber Security? (Vol. 5): Strategic Studies Quarterly.\nOECD. (2011). Cybersecurity Policy Making at a Turning Point: OECD Publishing.\nParker, E. (2017). Hack Job: How America Invented Cyberwar. Foreign Affairs, 96(3), (pp. 133-138).\nPei, M. (2014). How China and America See Each Other. Foreign Affairs, 93(2), (pp. 31-32).\nPetallides, C. J. (2012). Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat. Inquiries Journal/Student Pulse, 4(03). Retrieved from http://www.inquiriesjournal.com/a?id=627\nRadu, R. G. (2012). The Monopoly of Violence in the Cyber Space: Challenges of Cyber Security. In E. Fels, J.-F. Kremer, & K. Kronenberg (Eds.), Power in the 21st Century: International Security and International Political Economy in a Changing World (pp. 137-150). Berlin, Heidelberg: Springer Berlin Heidelberg.\nRenard, T. (2015). US-China Cybersecurity Agreement: A Good Case of Cyber Diplomacy. Egmont Commentary, 1 October 2015.\nRomanosky, S. (2016). Examining the Costs and Causes of Cyber Incidents. Journal of Cybersecurity, 2(2), (pp. 121-135). doi:10.1093/cybsec/tyw001\nRulog, H. (2013) China Opposes and Combats Cyber Attacks. Financial Times.\nSegal, A. (2012). U.S. and China in Cyberspace: Uneasy Next Steps. In: Council on Foreign Relations.\nSegal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age: Hachette UK.\nSegal, A. (2017). How China is Preparing for Cyberwar. The Christian Science Monitor.\nSutter, R. G. (2013). US-Chinese Relations: Perilous Past, Pragmatic Present: Rowman & Littlefield Publishers.\nThe International Telecommunication Union (ITU). (2008). Overview of Cybersecurity, Recommendation ITU–T X.1205. Paper presented at the The ITU Plenipotentiary Conference 2010, Guadalajara, Jalisco, Mexico. http://​tinyurl.​com/​boys7dj\nThe International Telecommunication Union (ITU). (2017). Global Cybersecurity Index 2017. In: ITU.\nThe White House. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington D.C.: White House.\nThe White House. (2013). Executive Order on Improving Critical Infrastructure Cybersecurity [Press release]. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity-0\nThe White House. (2015). FACT SHEET: Cyber Threat Intelligence Integration Center. The White House, Office of the Press Secretary Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center.\nThe White House. (2015). Fact Sheet: President Xi Jinping’s State Visit to the United States. Press Release, 25.\nThe World Bank. (2017). Individuals Using the Internet (% of population) [Table]. In (pp. Internet users are individuals who have used the Internet (from any location) in the last 3 months. The Internet can be used via a computer, mobile phone, personal digital assistant, games machine, digital TV etc.).\nThornburgh, N., Forney, M., Bennett, B., Burger, T. J., & Shannon, E. (2005). The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them). Time Magazine, 29, 1098961-1098961.\nU.S. Department of Homeland Security. (2018). Cybersecurity Strategy. Retrieved from https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf.\nU.S. Department of the Treasury. (2009). Fact Sheet: U.S.‐China Strategic and Economic Dialogue. Retrieved from https://www.treasury.gov/initiatives/Documents/SEDfactsheet09.pdf.\nUnited States National Security Council. (2010). Cyberspace Policy Review: Securing America`s Digital Future: Cosimo, Incorporated.\nValeriano, B., & Maness, R. C. (2018). International Relations Theory and Cyber Security. The Oxford Handbook of International Political Theory, (pp. 259).\nVentre, D. (2014). Chinese cybersecurity and defense: John Wiley & Sons.\nVince, J., & Earnshaw, R. (2012). Digital Convergence: The Information Revolution: Springer London.\nVolz, D. (2016). Yahoo Says Hackers Stole Data From 500 Million Accounts in 2014. Reuters. Retrieved from https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-hackers-stole-data-from-500-million-accounts-in-2014-idUSKCN11S16P\nWaltz, K. N. (1979). Theory of International Politics: Waveland Press.\nWeibin, Z. (2017). The Four Stages of Sino-American Cyber Relations. In: China-United States Exchange Foundation.\nWu, X. (2005). Chinese Cyber Nationalism: How China`s Online Public Sphere Affected its Social and Political Transitions. University of Florida,\n中华人民共和国国务院. (2012). 国务院出台意见推进信息化发展切实保障信息安全.zh_TW
dc.identifier.doi10.6814/THE.NCCU.IMPIS.007.2018.A06-
item.grantfulltextrestricted-
item.openairecristypehttp://purl.org/coar/resource_type/c_46ec-
item.openairetypethesis-
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
Appears in Collections:學位論文
Files in This Item:
File SizeFormat
016101.pdf2.43 MBAdobe PDF2View/Open
Show simple item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.