Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/33704
DC FieldValueLanguage
dc.contributor.advisor林碧炤zh_TW
dc.contributor.advisorLin, Bih-Jawen_US
dc.contributor.author莊明晟zh_TW
dc.contributor.authorChuang, Ming-Chengen_US
dc.creator莊明晟zh_TW
dc.creatorChuang, Ming-Chengen_US
dc.date2005en_US
dc.date.accessioned2009-09-17T09:55:00Z-
dc.date.available2009-09-17T09:55:00Z-
dc.date.issued2009-09-17T09:55:00Z-
dc.identifierG0932530021en_US
dc.identifier.urihttps://nccur.lib.nccu.edu.tw/handle/140.119/33704-
dc.description碩士zh_TW
dc.description國立政治大學zh_TW
dc.description外交研究所zh_TW
dc.description93253002zh_TW
dc.description94zh_TW
dc.description.abstract「資訊科技」的革命並非侷限於更低廉的通信或是更快速的電腦而已,「資訊科技」的革命是從各種角度影響全球的經濟與政治,包括資訊蒐集、分析、傳播等各方面。當前「資訊科技」革命的時代,其基本科技趨勢可以用三句話來概括表達:即能力增加、成本降低及連結性增加。\n 二十世紀以來「資訊科技」的提升,已經讓人無法輕忽其所產生變化的效果。正如同自由主義學者所認為的,這種科技的新進展將會引領我們走向新舊國際關係的分水嶺,舊有的權力政治關係及行為模式將隨著傳播與運輸科技的發展,而形成一種全新的國際關係。\n 資訊科技跨越國界的穿透能力,使得過去我們所認知的空間觀念區需要重新再做建構,國際政治上的地緣政治觀念也需要加以重新詮釋。有形的地理疆界固然使得各國得以壁壘分明的劃地自限,但是一旦此地域觀念被打破,相對的國家安全所面對的環境及挑戰也將截然不同。\n 未來衝突形式將更加混亂分裂,流血程度將大為降低。21世紀的軍事傷亡人數比較起20世紀百萬人在戰場傷亡的人而言,數量上面將會大幅下降許多。大規模武裝力量(伴隨龐大軍事開支)的世代即將告一個段落,也許我們可以期待「資訊效益」(Information dividend)或許比起後冷戰時代所妄想的「和平效益」(peace dividend) 將來得更為貼近真實。透過資訊科技及能力的審慎運用,將能有效防範資訊時代之爭端於未然。zh_TW
dc.description.tableofcontents《章節目錄》\n第一章 導論………………………………………………………………1\n第一節 研究動機…………………………………………………………1\n第二節 研究目的…………………………………………………………3\n第三節 文獻探討…………………………………………………………5\n第四節 研究方法…………………………………………………………9\n第五節 研究範圍與限制…………………………………………………10\n第六節 論文架構…………………………………………………………11\n第二章 資訊科技與安全…………………………………………………13\n第一節 資訊科技的演變…………………………………………………20\n第二節 資訊科技的管理及安全規範……………………………………26\n壹、資訊科技安全的具體目標………………………………………… 27\n貳、維護資訊科技安全的現有機制…………………………………… 28\n第三章 資訊科技趨勢下之新國家安全思維……………………………35\n第一節 資訊科技對於國際關係之影響…………………………………37\n第二節 國家權力內涵及本質的轉變……………………………………45\n第三節 軟權力問題的日益突出…………………………………………47\n第四節 傳統國家安全觀的改變…………………………………………51\n第四章 資訊科技對國家安全之衝擊……………………………………58\n第一節 資訊科技在國家安全中的戰略地位……………………………59\n第二節 資訊科技所造成的非傳統國家安全威脅………………………63\n壹、網際網路的新威脅-病毒、駭客、網路恐怖主義…………………66\n貳、資訊與戰爭結合的新挑戰-戰略資訊戰……………………………69\n第三節 資訊科技影響國家安全之個案研究……………………………74\n第四節 資訊科技協助國家安全之可能擬議……………………………78\n第五章 總結與展望………………………………………………………85\n參考文獻………………………………………………………………… 90\n\n《圖表目錄》\n圖\n圖1-1研究概念架構圖……………………………………………………12\n圖2-1 攻擊的複雜程度 v.s.入侵者具備的知識技術…………………19\n圖4-1 戰略資訊戰示意圖……………………………………………… 72\n\n表\n表2-1 電腦安全事故及弱點統計數量表……………………………… 18\n表3-1 網路使用國家排行榜…………………………………………… 40zh_TW
dc.format.extent46057 bytes-
dc.format.extent82757 bytes-
dc.format.extent69560 bytes-
dc.format.extent243141 bytes-
dc.format.extent358116 bytes-
dc.format.extent368095 bytes-
dc.format.extent390387 bytes-
dc.format.extent172317 bytes-
dc.format.extent161362 bytes-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.language.isoen_US-
dc.source.urihttp://thesis.lib.nccu.edu.tw/record/#G0932530021en_US
dc.subject資訊科技zh_TW
dc.subject國家安全zh_TW
dc.subject國家權力zh_TW
dc.subject網際網路zh_TW
dc.subject資訊戰zh_TW
dc.title資訊科技與國家安全:防範資訊時代之爭端於未然zh_TW
dc.typethesisen
dc.relation.reference《參考文獻》zh_TW
dc.relation.reference英文部分zh_TW
dc.relation.reference壹、英文專書zh_TW
dc.relation.referenceArquilla, John, David F. Ronfeldt, In Athena`s camp : preparing for conflict in the information age. (Santa Monica, Calif.: Rand, 1997)zh_TW
dc.relation.referenceBarrett, Neil, The state of the cybernation : cultural, political and economic implications of the Internet. (London: Kogan Page, 1996)zh_TW
dc.relation.referenceBaxter, John D., LL. B, State security, privacy, and information. (London: Harvester Wheatsheaf, 1990)zh_TW
dc.relation.referenceBiegal, Stuart, Beyond Our Control? Confronting the Limits of Our Legal System in the Age of Cyberspace (Cambridge, Mass.: MIT Press, 2001)zh_TW
dc.relation.referenceBrzezinski, Zbigniew, The choice : global domination or global leadership. (New York: Basic Books, 2004)zh_TW
dc.relation.referenceBuzan, Barry, Ole Waever, Jaap De Wilde, Security: A New Frame Work for Analysis. (Boulder, Colo.: Lynne Rienner Publishers, 1997)zh_TW
dc.relation.referenceCairncross, France, The death of distance: how the communication revolution will change our lives. (Boston, Mass.: Harvard Business School Press, 1997)zh_TW
dc.relation.referenceCopeland, Thomas E. (ed.), The information revolution and national security. (Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2000)zh_TW
dc.relation.referenceCordesman, Anthony H., Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland. (Westport, Conn.: Praeger, 2002)zh_TW
dc.relation.referenceDenning, Dorothy E., Information Warfare and Security. (New York: ACM Press, 1999)zh_TW
dc.relation.referenceDeswarte, Yves, Security and protection in information processing systems. (Mass.: Kluwer Academic Publishers, 2004)zh_TW
dc.relation.referenceKaplan, Morton A., System and Process in International Politics. (New York: R. E. Krieger Pub. Co., 1957)zh_TW
dc.relation.referenceKatzanstein, Peter J., The Culture of National Security: Norms and Identity in World Politics. (New York: Columbia University Press., 1996)zh_TW
dc.relation.referenceKitchin, Rob, Cyberspace: the world in the wires. (Chichester, West Sussex, England ; New York : John Wiley & Sons, 1998)zh_TW
dc.relation.referenceLibicki, Martin C, Defending cyberspace, and other metaphors (Honolulu, Hawaii: University Press of the Pacific, 2002)zh_TW
dc.relation.referenceMolander, Roger C., Andrew S. Riddile (eds.), Strategic information warfare : a new face of war (CA: Rand Company: 1996)zh_TW
dc.relation.referenceMandel, Robert, The changing face of national security : a conceptual analysis. (Conn:Greenwood Press, 1994)zh_TW
dc.relation.referenceMorton, Kaplan A., “System and Process in International Politics,” (New York: R. E. Krieger Pub. Co., 1957)zh_TW
dc.relation.referenceNye, Joseph S., Jr., Soft power: the means to success in world politics. (New York : Public Affairs, 2004)zh_TW
dc.relation.referenceNye, Joseph S., Jr., Bound to Lead: The Changing Nature of American Power. (New York: BasicBooks, 1990.)zh_TW
dc.relation.referencePeltier, Thomas R., Information Security Risk Analysis. (Boca Raton, Fla.: Auerbach, 2001)zh_TW
dc.relation.referenceRosenau, James N., J. P. Singh (eds.), Information technologies and global politics: the changing scope of power and governance. (Albany, N.Y.: State University of New York Press, 2002)zh_TW
dc.relation.referenceShih, Timothy K., Intelligent virtual world : technologies and applications in distributed virtual environment. (N.J.: World Scientific, 2004)zh_TW
dc.relation.referenceSpinello, Richard A., Regulating cyberspace : the policies and technologies of control. (Westport, Conn.: Quorum Books, 2002)zh_TW
dc.relation.referenceToffler, Alvin, Future Shock. (London: Pan Books, 1970)zh_TW
dc.relation.referenceWalters, Robert S., David H. Blake, The politics of Global Economic Relations. (Englewood Cliffs: Prentice Hall, 1992)zh_TW
dc.relation.reference貳、英文學術期刊zh_TW
dc.relation.referenceAdams, James, ”Virtual Defense,” Foreign Affairs, Vol. 80, No. 3 (May/June, 2001), pp. 98-112.zh_TW
dc.relation.referenceBell, Daniel, “The World and the United States in 2013,” Daedalus, Vol. 116, No. 3 (Summer, 1987), pp. 1-21.zh_TW
dc.relation.referenceCoben, Eliot A., “A Revolution in Warfare,” Foreign Affairs, Vol. 72, No. 2 (March/April, 1996), pp. 37-54.zh_TW
dc.relation.referenceCukier, Kenneth Neil, “Who will control the internet?” Foreign Affairs, Vol. 84, No. 6 (Nov/Dec., 2005), pp. 7-13.zh_TW
dc.relation.referenceDeeks, Ashley S., Barbara Berman, Susan W Brenner, James A Lewis, “Combating terrorist uses of the internet,” American Society of International Law. Proceedings of the Annual Meeting. (Washington: 2005), pp. 103-115.zh_TW
dc.relation.referenceGompert, David C., “National Security in the Information Age,” Naval War College Review, Vol. 51, No. 4 (Autumn, 1998), p. 22-41.zh_TW
dc.relation.referenceKeohane, Robert O., Joseph S. Nye, “Power and interdependence in the Information Age,” Foreign Affairs, Vol. 77, No. 5 (September/October, 1998), pp. 81-94.zh_TW
dc.relation.referenceLibicki, Martin C., “Information War, Information Peace,” Journal of International Affairs, Vol. 51, No. 2 (Spring, 1998), pp. 411-428.zh_TW
dc.relation.referenceMathews, Jessica T., “Power Shift”, Foreign Affairs, Vol. 76, No. 1 (January/February, 1997), pp. 50-66.zh_TW
dc.relation.referenceNye, Joseph S., Jr., William A. Owens, “America’s Information Edge,” Foreign Affairs, Vol. 75, No. 2 (March/April, 1996), pp. 20-36.zh_TW
dc.relation.referenceNye, Joseph S., Jr., “Redefining the National Interest,” Foreign Affairs, Vol.78, No. 4 (July/August, 1999), pp. 22-35.zh_TW
dc.relation.referenceOrtis, Cameron, Paul Evans, “The Internet and Asia-Pacific security: old conflicts and new behavior,” The Pacific Review, Vol. 16, No. 4 (December, 2003), pp. 549-554.zh_TW
dc.relation.referenceRasler, Karen, William R. Thompson, “Technological Innovation, Capability Positional Shifts, and Systemic War,” Journal of Conflict Resolution, Vol. 35, No. 3 (September, 1991), pp. 412-442.zh_TW
dc.relation.referenceRosecrance, Richard, “The Rise of the Virtual State,” Foreign Affairs, Vol.75, No. 4 (July/August, 1996), pp. 45-61.zh_TW
dc.relation.referenceRudasill, Lynne, Jessica Moyer, “Cyber-security, cyber-attack, and the development of governmental response: the librarian’s view,” New Library World, 105, (July/August, 2004), pp. 248-255.zh_TW
dc.relation.referenceShapiro, Andrew L., “The Internet,” Foreign Policy, ll5 (Summer, l999), pp. 14-27.zh_TW
dc.relation.referenceShelley, Louise I., “Crime and Corruption in the Digital Age,” Journal of International Affairs, Vol. 51, No. 2 (Spring, 1998), pp. 605-620.zh_TW
dc.relation.referenceStanton, John J., “Terror in Cyberspace,” The American Behavioral Scientist, Vol. 45, No. 6 (February, 2002), pp. 1017-1032.zh_TW
dc.relation.referenceThomas, Timothy L., “Deterring information warfare: A new strategic challenge,” Parameters, 26 (Winter, 1996-1997), pp. 81-91.zh_TW
dc.relation.referenceTomes, Robert R., “Boon or Threat? The Information Revolution and U.S. National Security,” Naval War College Review, Vol. 53, No. 3 (Summer, 2000), pp. 39-60zh_TW
dc.relation.referenceWeiss, Charles, “New Tools and New Challenges”, Georgetown Journal of International Affairs, Vol. 4, Issue. 2 (Summer/Fall, 2003), pp. 107-111.zh_TW
dc.relation.referenceYoung Ja Bae, “Information technology and the empowerment of new actors in international relations,” Journal of International and Area Studies, Vol. 10, No. 2 (Dec., 2003), pp. 79-93.zh_TW
dc.relation.reference3.官方文件zh_TW
dc.relation.referenceBorchgrave, Arnaud de, Frank J. Cilluffo, Sharon L. Cardash, Michele M. Ledgerwood , Cyber threats and information security: meeting the 21st century challenge. (Washington, D.C.: CSIS Press, 2001)zh_TW
dc.relation.referenceL. A. Gordon, M. P. Loeb, W. Lucyshyn,, R. Richardson, 2004 CSI/FBI Computer Crime and Security Survey (Computer Security Institute, June, 2004)zh_TW
dc.relation.referenceThe Commission on America’s National Interests, America’s National Interests. ( July, 2000)zh_TW
dc.relation.referenceU.S. The White House, Defending America’s Cyberspace: National Plan for Information Systems Protection, Version 1.0, An Invitation to a Dialogue, (Washington D. C.: The White House, 2000)zh_TW
dc.relation.referenceU.S. The White House, The National Security Strategy of the United States of America. (Washington D. C.: The White House, 2002)zh_TW
dc.relation.referenceU.S. The White House, The National Strategy to Secure Cyberspace. (Washington D. C.: The White House , 2003)zh_TW
dc.relation.reference中文部分zh_TW
dc.relation.reference壹、中文書籍zh_TW
dc.relation.reference大前研一(Ohmae, Kenichi)著,王德玲、蔣雪芬譯,看不見的新大陸 (臺北市:天下雜誌出版:大和圖書總經銷,2001年)zh_TW
dc.relation.reference艾倫 (Allen, Julia H.)著,孫宇安譯,CERT網路與系統安全實務 (臺北市:臺灣培生教育,2002)zh_TW
dc.relation.reference甘迺迪(Kennedy, Paul)著,張春柏譯,霸權興衰史:1500至2000年的經濟變遷與軍事衝突 (臺北市:五南,1995年)zh_TW
dc.relation.reference卡里查 (Khalilzad, Zalmay M.)、 惠特 (White, John P.)著,蔣永芳、王振坤譯,戰爭中資訊的角色變化(上)、(下) (臺北市:國防部史政編譯局,2000年12月)zh_TW
dc.relation.reference史列芬(Slevin, James)著,王樂成譯,網際網路與社會 (臺北市:弘智文化,2002年)zh_TW
dc.relation.reference休茲(Hughes, Barry B.)著,歐信宏、陳尚懋譯,最新國際政治新論 (臺北縣永和市 : 韋伯文化,2002年)zh_TW
dc.relation.reference多奇(Dodge, Martin)著,江淑琳譯,網際空間的圖像 (臺北縣永和市:韋伯文化國際,2005)zh_TW
dc.relation.reference杜佛勒(Toffler, Alvin)著,傅凌譯,新戰爭論 (臺北市:時報文化,1994年)zh_TW
dc.relation.reference奈伊(Nye, Joseph S., Jr)著,蔡東杰譯,美國霸權的矛盾與未來 (臺北市:左岸文化,2002年)zh_TW
dc.relation.reference阿爾吉拉 (Arquilla, John)、 朗斐德(Ronfeldt, David)編,楊永生譯,網路及網路戰 (臺北市:國防部史政編譯局,民國92年)zh_TW
dc.relation.reference岸田明著,林雯譯,學資訊安全的第1本書 (臺北縣汐止市:博碩文化,2003)zh_TW
dc.relation.reference高德斯坦(Goldstein, Joshua S.)著,歐信宏、胡祖慶譯,國際關係 (臺北市:雙葉書廊,2004年)zh_TW
dc.relation.reference佛萊曼(Friedman, Thomas L.)著,楊振富、潘勛譯,世界是平的 (臺北市:雅言文化,2005)。zh_TW
dc.relation.reference佛萊曼(Friedman, Thomas L.)著,蔡繼光譯,了解全球化:凌志汽車與橄欖樹 (臺北:聯經,2000年)zh_TW
dc.relation.reference陶尼(Downey, John)著,江淑琳譯,科技新城鎮 (臺北縣永和市:韋伯文化,2003)zh_TW
dc.relation.reference羅斯克蘭斯(Rosecrance, Richard)著,李振昌譯,虛擬國家:新世紀的財富與權力 (臺北市:聯經,2000年)zh_TW
dc.relation.reference龍安志(Laurence J. Brahm)編著,劉世平譯,中國的世紀 (臺北市:商周出版:城邦文化發行,2002年)zh_TW
dc.relation.reference薄科維茨(Bruce D. Berkowitz)、戈德曼(Goodman, Allan E.)著,王振坤、高一中譯,最佳的事實:資訊時代的情報 (臺北市:國防部史政編譯局,2001年)zh_TW
dc.relation.reference子衫著,國家的選擇與安全 (上海:上海三聯書店,2005年)zh_TW
dc.relation.reference中國現代國際關係研究所編,信息革命與國際關係 (北京:時事出版社,2002年)zh_TW
dc.relation.reference行政院研究發展考核委員會編,網路使用犯罪問題及預防措施之研究 (臺北市:行政院研考會,民國89年)zh_TW
dc.relation.reference林碧炤著,國際政治與外交政策 (臺北市:五南,1997年)zh_TW
dc.relation.reference汪毓瑋著,新安全威脅下之國家情報工作研究 (臺北市:遠景基金會,2003年)zh_TW
dc.relation.reference孫以清,郭冠廷主編,政治與資訊科技 (臺北市:揚智文化,2003年)zh_TW
dc.relation.reference高大宇、王旭正著,資訊安全 (臺北縣汐止市:博碩文化,2003年)zh_TW
dc.relation.reference馬維野著,全球化時代的國家安全 (武漢:湖北教育出版社,2003年)zh_TW
dc.relation.reference陸忠偉主編,非傳統安全論(北京:時事出版社,2003年),頁9-95。zh_TW
dc.relation.reference翁明賢著,全球化時代的國家安全 (臺北縣新店市:創世文化出版:聯豐書報社總經銷,2003)zh_TW
dc.relation.reference曾章瑞、周茂林、胡瑞舟合著,新世紀國家安全與國防思維 (臺北縣蘆洲市:空大, 民國94年)zh_TW
dc.relation.reference劉台平,島計畫:2008中共發動對台割喉戰 (臺北:時英,民國93年)zh_TW
dc.relation.reference張新華著,信息安全:威脅與戰略 (上海:上海人民出版社,2003年)zh_TW
dc.relation.reference喬良、王湘穗合著,超限戰 (北京:解放軍文藝出版社,1999年)zh_TW
dc.relation.reference國家實驗研究院科技政策研究與資訊中心編,資通安全分析專論彙編:94年度 (臺北市:國研院科技政策中心,民國94年)zh_TW
dc.relation.reference國家安全會議,2006年國家安全報告,(台灣:中華民國總統府,2006年5月20日)zh_TW
dc.relation.reference貳、期刊論文zh_TW
dc.relation.reference王聖智,「『科技創新』概念在霸權領導體系中之角色分析—霸權穩定理論之探討」,國立政治大學外交學系研究所,碩士論文,2004年。zh_TW
dc.relation.reference吳竹君,「資訊時代與外交」,國立政治大學外交學系研究所,碩士論文,2000年。zh_TW
dc.relation.reference高少凡、倪炎元,「國家主權在網路時代所面臨的處境與衝突」,美歐季刊,第14卷第4期 (民國89年冬季號),頁471-501。zh_TW
dc.relation.reference彭慧鸞,「資訊時代國際關係理論與實務之研究」,問題與研究,第39卷第5期 (民國89年5月),頁1-15。zh_TW
dc.relation.reference彭慧鸞,「數位時代的國家安全與全球治理」,問題與研究,第43卷第6期 (民國93年11、12月),頁29-52。zh_TW
dc.relation.reference張祥山著,「非傳統不對稱安全威脅初探」,展望與探索,第4卷第4期 (民國93年4月),頁34-49。zh_TW
dc.relation.reference馬淑貞著,「以網路流量資料探勘協助進行阻斷服務攻擊偵測與防禦之研究」,國立中山大學資訊管理學系在職專班,碩士論文,2005年。zh_TW
dc.relation.reference羅承烈著,「資訊科技與國家安全」,空軍學術月刊,第541期 (2001年12月),頁73-84。zh_TW
dc.relation.reference魏澤民、林志昶著,「資訊時代的國際關係圖像:以Internet為例」,展望與探索,第2卷第2期 (民國93年2月),頁17-33。zh_TW
dc.relation.reference參、研討會資料zh_TW
dc.relation.reference胡毓忠教授,「企業網路安全新方向:資訊安全的因應與突破」,2003年發表於「鐵衛神補—網路安全之運用」研討會。zh_TW
dc.relation.reference肆、網際網路路資源zh_TW
dc.relation.referenceAsia Pacific Computer Emergency Response Team, APCERT) <http://www.apcert.org/index.html>zh_TW
dc.relation.referenceCERT/CC <http://www.cert.org/stats/cert_stats.html>zh_TW
dc.relation.referenceComputer Security Institute <http://www.gocsi.com/press/20040609.jhtml.>zh_TW
dc.relation.referenceForum of Incident Response and Security Teams <http://www.first.org/>zh_TW
dc.relation.reference中華民國資訊管理協會 <http://163.13.226.35/index.asp>zh_TW
dc.relation.reference台灣電腦網路危機處理暨協調中心<http://www.cert.org.tw/document/newsletter/show.php?key=91>zh_TW
dc.relation.reference台灣電腦網路危機處理暨協調中心 <http://www.cert.org.tw/news/>zh_TW
dc.relation.reference行政院國家資通安全會報<http://www.nicst.nat.gov.tw/index.php>zh_TW
dc.relation.reference財團法人資訊工業策進會 <http://www.iii.org.tw/>zh_TW
dc.relation.reference國家資通安全會報技術服務中心 <http://www.icst.org.tw/>zh_TW
item.fulltextWith Fulltext-
item.cerifentitytypePublications-
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_46ec-
item.openairetypethesis-
item.languageiso639-1en_US-
Appears in Collections:學位論文
Files in This Item:
File Description SizeFormat
53002101.pdf44.98 kBAdobe PDF2View/Open
53002102.pdf80.82 kBAdobe PDF2View/Open
53002103.pdf67.93 kBAdobe PDF2View/Open
53002104.pdf237.44 kBAdobe PDF2View/Open
53002105.pdf349.72 kBAdobe PDF2View/Open
53002106.pdf359.47 kBAdobe PDF2View/Open
53002107.pdf381.24 kBAdobe PDF2View/Open
53002108.pdf168.28 kBAdobe PDF2View/Open
53002109.pdf157.58 kBAdobe PDF2View/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.