學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

題名 網路安全與美中關係:理論的分析
Cybersecurity and United States-China Relations: A Theoretical Perspective
作者 陶俊廷
DAVILA, JUAN MANUEL DE LA TORRE
貢獻者 盧業中
Lu, Yeh-Chung
陶俊廷
JUAN MANUEL DE LA TORRE DAVILA
關鍵詞 網路安全
網路強國
網路空間
網路攻擊
Cybersecurity
Cyberpower
Cyberspace
Cyberattacks
日期 2018
上傳時間 10-Jul-2018 15:38:01 (UTC+8)
摘要 發展迅速的科技大大改變21世紀國際體系中的互動方式。根據此背景,本論文將使用兩個主要理論架構來分析網路安全對中美關係的影響,新現實主義的攻防平衡理論助於了解網路攻擊背後的邏輯,而自由主義認為可以利用和平的手段解決衝突,甚至在網路空間中。網路安全的重要性作為一個在國際關係的新威脅已經帶給許多國家不同尋常的挑戰。就美國和中國而言,網路安全在短時間內產生摩擦和衝突比兩國之間其他的歷史議題還更嚴重。近年來網路攻擊更加劇中美關係的不確定性,導致兩國之間在經濟和政治上互信不足,儘管如此,為何這兩個國家仍然達成協議?研究者認為這一協議背後主要原因是為了避免經濟制裁,對此,新現實主義和自由主義各有不同的觀點。研究者藉著回應四個研究問題,對中美雙方在網路安全的看法,提出具洞察力的見解。除此之外,在理論架構下,研究者解釋了他們會達成此協議的原因,以及中美關係在網路安全上會面臨哪些機會和挑戰。最後,作者說明這些行為導致美國和中國等國外交政策「數位化」的原因。
The rapid development of technology in the 21st century has dramatically changed the way actors in the international system interact, the internet and the threats challenges brought by it have created lack of understanding regarding the implications it has for security. Given this context, this thesis analyzes the impact of cybersecurity in United States-China relations using two of the main theoretical frameworks in international relations: neorealism and liberalism. Neorealism’s offense-defense balance concept contributes to an understanding of the logic behind cyberattacks, while liberalism observes that there is a possibility to overcome conflicts by peaceful means, even in the cyberspace.
The importance of cybersecurity as a new threat in international relations has created unusual challenges for states around the world. In the case of the US and China, cybersecurity has generated, in a short period of time, more friction and engagement between the two countries than any other historical issue. Cybersecurity attacks in recent years have increased uncertainty in US-China relations, contributing to a deficit in economic and political trust between these two nations, nevertheless, why do these states still have reached an agreement? I suggest that the main reason behind this decision is the desire to avoid economic sanctions, nevertheless, neorealism and liberalism offer different reasons.
By answering four research questions the author gives insightful information about each country’s view on cybersecurity. Furthermore, with the theoretical framework, I explain why they have reached such an agreement and what are the opportunities and challenges for the United States-China relations regarding cybersecurity. Finally I explain why all these actions have led to a “digitalization” of the practices of Foreign Policy of states such as the United States and China
參考文獻 Adler, E. (2002). Handbook of International Relations. in London: SAGE Publications Ltd. Retrieved from http://sk.sagepub.com/reference/hdbk_intlrelations. doi:10.4135/9781848608290
Bader, J. A. (2016). How Xi Jinping Sees The World & And Why. Order From Chaos: Foreign Policy in a Troubled World.
Baldwin, D. (1997). The Concept Of Security. Review Of International Studies, 23(1), (pp. 5-26). doi:10.1017/S0260210597000053
Baylis, J. (2008). The Concept of Security in International Relations. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 495-502). Berlin, Heidelberg: Springer Berlin Heidelberg.
Brauch, H. G. (2008). Introduction: Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 27-43). Berlin, Heidelberg: Springer Berlin Heidelberg.
Brown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace. The Diplomat.
Brown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 3: Over a Year Later, What Impact has the 2015 Cyber Agreement had on U.S.-China Relations? The Diplomat.
Bull, H. (1977). The Anarchical Society: A Study of Order in World Politics. New York.
Buzan, B. (1983). People, States, and Fear: The National Security Problem in International Relations: Wheatsheaf Books.
Buzan, B. (2008). The Changing Agenda of Military Security. Globalization and Environmental Challenges, (pp. 553-560).
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A New Framework for Analysis: Lynne Rienner Pub.
China Internet Network Information Center. (2017). Statistical Report on Internet Development in China. In: CNNIC Beijing.
Choucri, N. (2012). Cyberpolitics in International Relations: MIT press.
Coats, D. R. (2017). Worldwide Threat Assessment of the US Intelligence Community. Retrieved from https://www.dni.gov/files/documents/Newsroom/Testimonies/SSCI%20Unclassified%20SFR%20-%20Final.pdf.
Dunne, T., Kurki, M., & Smith, S. (2013). International Relations Theories: Oxford University Press.
Eriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review / Revue internationale de science politique, 27(3), (pp. 221-244).
Farrell, H., & Glaser, C. L. (2017). The Role of Effects, Saliencies and Norms in US Cyberwar Doctrine. Journal of Cybersecurity, 3(1), (pp 7-17). doi:10.1093/cybsec/tyw015
Fountain, J. (2004). Building the Virtual State: Information Technology and Institutional Change: Brookings Institution Press.
German Federal Ministry of the Interior. (2011). Cyber Security Strategy for Germany. Federal Ministry of the Interior Retrieved from https://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile.
Gierow, H. J. (2014). Cyber Security in China: New Political Leadership Focuses on Boosting National Security Restructuring Internet Regulation. Placing Restrictions on Foreign Software. Developing the PRC`s own IT Standards. China Monitor.
Glaser, C. L., & Kaufmann, C. (1998). What is the Offense-Defense Balance and how can we Measure it? International Security, 22(4), (pp. 44-82).
Hanson, E. C. (2008). The Information Revolution and World Politics: Rowman & Littlefield Publishers.
He, R. (2013) China Opposes and Combats Cyber Attacks. Financial Times.
Healey, J. (2013). China is a Cyber Victim, too. Foreign Policy(April 16).
Heginbotham, E., Nixon, M., Morgan, F. E., Hagen, J., Heim, J. L., Engstrom, J., . . . Libicki, M. C. (2015). The US-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017: Rand Corporation.
Hennessey, S. (2017). Deterring Cyberattacks: How to Reduce Vulnerability. Foreign Affairs, 96(6), (pp. 39-46).
Jackson, R. H., & Sørensen, G. (2007). Introduction to International Relations: Theories and Approaches: Oxford University Press.
Jørgensen, K. E. (2017). International relations theory: A new introduction: Macmillan International Higher Education.
Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War: Simon & Schuster.
Kelly, N., & Foran, C. (2015). President Obama and Chinese President Xi Jinping Announce Cybersecurity Agreement. The Atlantic.
Kissinger, H. (2015). World order: Penguin Books.
Koselleck, R., & Presner, T. S. (2002). The Practice of Conceptual History: Timing history, spacing concepts: Stanford University Press.
Kremer, J.-F., & Müller, B. (2014). SAM: A Framework to Understand Emerging Challenges to States in an Interconnected World. In Cyberspace and International Relations (pp. 41-58): Springer.
Kshetri, N. (2013). Cyber-Victimization and Cybersecurity in China. Commun. ACM, 56(4), (pp 35-37). doi:10.1145/2436256.2436267
Kshetri, N. (2016). Cybersecurity in China. In The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies (pp. 123-143). Cham: Springer International Publishing.
Kshetri, N. (2016). The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies: Springer International Publishing.
Kuehl, D. T. (2009). From Cyberspace to Cyberpower: Defining the Problem. Cyberpower and national security, (pp. 24-42).
Li, C. (2016). Assessing US-China Relations Under the Obama Administration. Brookings Institution, 5.
Li, R. (2004). Security Challenge of an Ascendant China: Great Power Emergence and International Stability. Chinese Foreign Policy: Pragmatism and Strategic Behaviour, East Gate, New York, (pp. 23-58).
Lieberthal, K., & Singer, P. W. (2012). Cybersecurity and US-China relations: Brookings.
Lindsay, J. R. (2015). The impact of China on Cybersecurity: Fiction and friction. International Security, 39(3), (pp. 7-47).
Longdi, X. (2014). China`s Internet Development and Cybersecurity–Policies and Practices. Chinese Cybersecurity and Defense, (pp. 1-54).
Molyneux, S. (1999). Broadband Internet: Future Applications and Challenges. In J. Vince & R. Earnshaw (Eds.), Digital Convergence: The Information Revolution (pp. 3-12). London: Springer London.
Nye, J. S. (2011). Nuclear Lessons for Cyber Security? (Vol. 5): Strategic Studies Quarterly.
OECD. (2011). Cybersecurity Policy Making at a Turning Point: OECD Publishing.
Parker, E. (2017). Hack Job: How America Invented Cyberwar. Foreign Affairs, 96(3), (pp. 133-138).
Pei, M. (2014). How China and America See Each Other. Foreign Affairs, 93(2), (pp. 31-32).
Petallides, C. J. (2012). Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat. Inquiries Journal/Student Pulse, 4(03). Retrieved from http://www.inquiriesjournal.com/a?id=627
Radu, R. G. (2012). The Monopoly of Violence in the Cyber Space: Challenges of Cyber Security. In E. Fels, J.-F. Kremer, & K. Kronenberg (Eds.), Power in the 21st Century: International Security and International Political Economy in a Changing World (pp. 137-150). Berlin, Heidelberg: Springer Berlin Heidelberg.
Renard, T. (2015). US-China Cybersecurity Agreement: A Good Case of Cyber Diplomacy. Egmont Commentary, 1 October 2015.
Romanosky, S. (2016). Examining the Costs and Causes of Cyber Incidents. Journal of Cybersecurity, 2(2), (pp. 121-135). doi:10.1093/cybsec/tyw001
Rulog, H. (2013) China Opposes and Combats Cyber Attacks. Financial Times.
Segal, A. (2012). U.S. and China in Cyberspace: Uneasy Next Steps. In: Council on Foreign Relations.
Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age: Hachette UK.
Segal, A. (2017). How China is Preparing for Cyberwar. The Christian Science Monitor.
Sutter, R. G. (2013). US-Chinese Relations: Perilous Past, Pragmatic Present: Rowman & Littlefield Publishers.
The International Telecommunication Union (ITU). (2008). Overview of Cybersecurity, Recommendation ITU–T X.1205. Paper presented at the The ITU Plenipotentiary Conference 2010, Guadalajara, Jalisco, Mexico. http://​tinyurl.​com/​boys7dj
The International Telecommunication Union (ITU). (2017). Global Cybersecurity Index 2017. In: ITU.
The White House. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington D.C.: White House.
The White House. (2013). Executive Order on Improving Critical Infrastructure Cybersecurity [Press release]. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity-0
The White House. (2015). FACT SHEET: Cyber Threat Intelligence Integration Center. The White House, Office of the Press Secretary Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center.
The White House. (2015). Fact Sheet: President Xi Jinping’s State Visit to the United States. Press Release, 25.
The World Bank. (2017). Individuals Using the Internet (% of population) [Table]. In (pp. Internet users are individuals who have used the Internet (from any location) in the last 3 months. The Internet can be used via a computer, mobile phone, personal digital assistant, games machine, digital TV etc.).
Thornburgh, N., Forney, M., Bennett, B., Burger, T. J., & Shannon, E. (2005). The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them). Time Magazine, 29, 1098961-1098961.
U.S. Department of Homeland Security. (2018). Cybersecurity Strategy. Retrieved from https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf.
U.S. Department of the Treasury. (2009). Fact Sheet: U.S.‐China Strategic and Economic Dialogue. Retrieved from https://www.treasury.gov/initiatives/Documents/SEDfactsheet09.pdf.
United States National Security Council. (2010). Cyberspace Policy Review: Securing America`s Digital Future: Cosimo, Incorporated.
Valeriano, B., & Maness, R. C. (2018). International Relations Theory and Cyber Security. The Oxford Handbook of International Political Theory, (pp. 259).
Ventre, D. (2014). Chinese cybersecurity and defense: John Wiley & Sons.
Vince, J., & Earnshaw, R. (2012). Digital Convergence: The Information Revolution: Springer London.
Volz, D. (2016). Yahoo Says Hackers Stole Data From 500 Million Accounts in 2014. Reuters. Retrieved from https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-hackers-stole-data-from-500-million-accounts-in-2014-idUSKCN11S16P
Waltz, K. N. (1979). Theory of International Politics: Waveland Press.
Weibin, Z. (2017). The Four Stages of Sino-American Cyber Relations. In: China-United States Exchange Foundation.
Wu, X. (2005). Chinese Cyber Nationalism: How China`s Online Public Sphere Affected its Social and Political Transitions. University of Florida,
中华人民共和国国务院. (2012). 国务院出台意见推进信息化发展切实保障信息安全.
描述 碩士
國立政治大學
國際研究英語碩士學位學程(IMPIS)
105862016
資料來源 http://thesis.lib.nccu.edu.tw/record/#G1058620161
資料類型 thesis
dc.contributor.advisor 盧業中zh_TW
dc.contributor.advisor Lu, Yeh-Chungen_US
dc.contributor.author (Authors) 陶俊廷zh_TW
dc.contributor.author (Authors) JUAN MANUEL DE LA TORRE DAVILAen_US
dc.creator (作者) 陶俊廷zh_TW
dc.creator (作者) DAVILA, JUAN MANUEL DE LA TORREen_US
dc.date (日期) 2018en_US
dc.date.accessioned 10-Jul-2018 15:38:01 (UTC+8)-
dc.date.available 10-Jul-2018 15:38:01 (UTC+8)-
dc.date.issued (上傳時間) 10-Jul-2018 15:38:01 (UTC+8)-
dc.identifier (Other Identifiers) G1058620161en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/118562-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 國際研究英語碩士學位學程(IMPIS)zh_TW
dc.description (描述) 105862016zh_TW
dc.description.abstract (摘要) 發展迅速的科技大大改變21世紀國際體系中的互動方式。根據此背景,本論文將使用兩個主要理論架構來分析網路安全對中美關係的影響,新現實主義的攻防平衡理論助於了解網路攻擊背後的邏輯,而自由主義認為可以利用和平的手段解決衝突,甚至在網路空間中。網路安全的重要性作為一個在國際關係的新威脅已經帶給許多國家不同尋常的挑戰。就美國和中國而言,網路安全在短時間內產生摩擦和衝突比兩國之間其他的歷史議題還更嚴重。近年來網路攻擊更加劇中美關係的不確定性,導致兩國之間在經濟和政治上互信不足,儘管如此,為何這兩個國家仍然達成協議?研究者認為這一協議背後主要原因是為了避免經濟制裁,對此,新現實主義和自由主義各有不同的觀點。研究者藉著回應四個研究問題,對中美雙方在網路安全的看法,提出具洞察力的見解。除此之外,在理論架構下,研究者解釋了他們會達成此協議的原因,以及中美關係在網路安全上會面臨哪些機會和挑戰。最後,作者說明這些行為導致美國和中國等國外交政策「數位化」的原因。zh_TW
dc.description.abstract (摘要) The rapid development of technology in the 21st century has dramatically changed the way actors in the international system interact, the internet and the threats challenges brought by it have created lack of understanding regarding the implications it has for security. Given this context, this thesis analyzes the impact of cybersecurity in United States-China relations using two of the main theoretical frameworks in international relations: neorealism and liberalism. Neorealism’s offense-defense balance concept contributes to an understanding of the logic behind cyberattacks, while liberalism observes that there is a possibility to overcome conflicts by peaceful means, even in the cyberspace.
The importance of cybersecurity as a new threat in international relations has created unusual challenges for states around the world. In the case of the US and China, cybersecurity has generated, in a short period of time, more friction and engagement between the two countries than any other historical issue. Cybersecurity attacks in recent years have increased uncertainty in US-China relations, contributing to a deficit in economic and political trust between these two nations, nevertheless, why do these states still have reached an agreement? I suggest that the main reason behind this decision is the desire to avoid economic sanctions, nevertheless, neorealism and liberalism offer different reasons.
By answering four research questions the author gives insightful information about each country’s view on cybersecurity. Furthermore, with the theoretical framework, I explain why they have reached such an agreement and what are the opportunities and challenges for the United States-China relations regarding cybersecurity. Finally I explain why all these actions have led to a “digitalization” of the practices of Foreign Policy of states such as the United States and China
en_US
dc.description.tableofcontents Abstract IV
摘要 V
List of Figures VI
Chapter 1 Introduction 1
1.1 Research motivation and Background 1
1.2 Research questions and design of the research 8
1.3 Research limitations 10
1.4 Structure of the Thesis 10
Chapter 2 Literature Review 13
2.1 The current environment in IR and the transformation of the security concepts 13
2.2 Understanding the Cyber Space and Cyber Security 15
2.2.1 Definitions of Key Concepts 17
2.2.2 Neorealism 18
2.2.3 Liberalism 21
2.3 Development of the United States-China relations in the 21st century 23
2.4 Summary 25
Chapter 3 The US and China on Cybersecurity: One issue, two different approaches 26
3.1 The United States and China: Domestic experiences on cybersecurity 27
3.1.1 The United States 27
3.1.2 China 33
3.2 The evolution of the concept of Cybersecurity 38
3.2.1 The United States approach to Cybersecurity 38
3.2.2 China’s approach to Cybersecurity 40
3.3 Summary 44
Chapter 4 Thinking bilaterally: How does the US and China address each other? 45
4.1 The International response: Do they listen to what some International Organizations say? 45
4.2 United States and China Cybersecurity Dialogue 47
4.3 Challenges and Opportunities for the US and China regarding Cybersecurity 57
4.4 Summary 60
Chapter 5 Walking towards the same goal: finding ways to avoid further conflict 62
5.1 The United States and China: how to arm the cyber puzzle 62
5.2 The role of leaders in reaching agreement in trying to set up some rules for the cyberspace. 66
5.3 The Process of Negotiation: Why did they decide to agree in such a conflictive matter? 68
5.4 The 2015 agreement in perspective 72
5.5 Summary 74
Chapter 6 Conclusions 76
6.1 Future of the cyber world and IR: the case of the United States and China 81
Bibliography 83
zh_TW
dc.format.extent 2484143 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G1058620161en_US
dc.subject (關鍵詞) 網路安全zh_TW
dc.subject (關鍵詞) 網路強國zh_TW
dc.subject (關鍵詞) 網路空間zh_TW
dc.subject (關鍵詞) 網路攻擊zh_TW
dc.subject (關鍵詞) Cybersecurityen_US
dc.subject (關鍵詞) Cyberpoweren_US
dc.subject (關鍵詞) Cyberspaceen_US
dc.subject (關鍵詞) Cyberattacksen_US
dc.title (題名) 網路安全與美中關係:理論的分析zh_TW
dc.title (題名) Cybersecurity and United States-China Relations: A Theoretical Perspectiveen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) Adler, E. (2002). Handbook of International Relations. in London: SAGE Publications Ltd. Retrieved from http://sk.sagepub.com/reference/hdbk_intlrelations. doi:10.4135/9781848608290
Bader, J. A. (2016). How Xi Jinping Sees The World & And Why. Order From Chaos: Foreign Policy in a Troubled World.
Baldwin, D. (1997). The Concept Of Security. Review Of International Studies, 23(1), (pp. 5-26). doi:10.1017/S0260210597000053
Baylis, J. (2008). The Concept of Security in International Relations. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 495-502). Berlin, Heidelberg: Springer Berlin Heidelberg.
Brauch, H. G. (2008). Introduction: Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 27-43). Berlin, Heidelberg: Springer Berlin Heidelberg.
Brown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace. The Diplomat.
Brown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 3: Over a Year Later, What Impact has the 2015 Cyber Agreement had on U.S.-China Relations? The Diplomat.
Bull, H. (1977). The Anarchical Society: A Study of Order in World Politics. New York.
Buzan, B. (1983). People, States, and Fear: The National Security Problem in International Relations: Wheatsheaf Books.
Buzan, B. (2008). The Changing Agenda of Military Security. Globalization and Environmental Challenges, (pp. 553-560).
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A New Framework for Analysis: Lynne Rienner Pub.
China Internet Network Information Center. (2017). Statistical Report on Internet Development in China. In: CNNIC Beijing.
Choucri, N. (2012). Cyberpolitics in International Relations: MIT press.
Coats, D. R. (2017). Worldwide Threat Assessment of the US Intelligence Community. Retrieved from https://www.dni.gov/files/documents/Newsroom/Testimonies/SSCI%20Unclassified%20SFR%20-%20Final.pdf.
Dunne, T., Kurki, M., & Smith, S. (2013). International Relations Theories: Oxford University Press.
Eriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review / Revue internationale de science politique, 27(3), (pp. 221-244).
Farrell, H., & Glaser, C. L. (2017). The Role of Effects, Saliencies and Norms in US Cyberwar Doctrine. Journal of Cybersecurity, 3(1), (pp 7-17). doi:10.1093/cybsec/tyw015
Fountain, J. (2004). Building the Virtual State: Information Technology and Institutional Change: Brookings Institution Press.
German Federal Ministry of the Interior. (2011). Cyber Security Strategy for Germany. Federal Ministry of the Interior Retrieved from https://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile.
Gierow, H. J. (2014). Cyber Security in China: New Political Leadership Focuses on Boosting National Security Restructuring Internet Regulation. Placing Restrictions on Foreign Software. Developing the PRC`s own IT Standards. China Monitor.
Glaser, C. L., & Kaufmann, C. (1998). What is the Offense-Defense Balance and how can we Measure it? International Security, 22(4), (pp. 44-82).
Hanson, E. C. (2008). The Information Revolution and World Politics: Rowman & Littlefield Publishers.
He, R. (2013) China Opposes and Combats Cyber Attacks. Financial Times.
Healey, J. (2013). China is a Cyber Victim, too. Foreign Policy(April 16).
Heginbotham, E., Nixon, M., Morgan, F. E., Hagen, J., Heim, J. L., Engstrom, J., . . . Libicki, M. C. (2015). The US-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017: Rand Corporation.
Hennessey, S. (2017). Deterring Cyberattacks: How to Reduce Vulnerability. Foreign Affairs, 96(6), (pp. 39-46).
Jackson, R. H., & Sørensen, G. (2007). Introduction to International Relations: Theories and Approaches: Oxford University Press.
Jørgensen, K. E. (2017). International relations theory: A new introduction: Macmillan International Higher Education.
Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War: Simon & Schuster.
Kelly, N., & Foran, C. (2015). President Obama and Chinese President Xi Jinping Announce Cybersecurity Agreement. The Atlantic.
Kissinger, H. (2015). World order: Penguin Books.
Koselleck, R., & Presner, T. S. (2002). The Practice of Conceptual History: Timing history, spacing concepts: Stanford University Press.
Kremer, J.-F., & Müller, B. (2014). SAM: A Framework to Understand Emerging Challenges to States in an Interconnected World. In Cyberspace and International Relations (pp. 41-58): Springer.
Kshetri, N. (2013). Cyber-Victimization and Cybersecurity in China. Commun. ACM, 56(4), (pp 35-37). doi:10.1145/2436256.2436267
Kshetri, N. (2016). Cybersecurity in China. In The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies (pp. 123-143). Cham: Springer International Publishing.
Kshetri, N. (2016). The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies: Springer International Publishing.
Kuehl, D. T. (2009). From Cyberspace to Cyberpower: Defining the Problem. Cyberpower and national security, (pp. 24-42).
Li, C. (2016). Assessing US-China Relations Under the Obama Administration. Brookings Institution, 5.
Li, R. (2004). Security Challenge of an Ascendant China: Great Power Emergence and International Stability. Chinese Foreign Policy: Pragmatism and Strategic Behaviour, East Gate, New York, (pp. 23-58).
Lieberthal, K., & Singer, P. W. (2012). Cybersecurity and US-China relations: Brookings.
Lindsay, J. R. (2015). The impact of China on Cybersecurity: Fiction and friction. International Security, 39(3), (pp. 7-47).
Longdi, X. (2014). China`s Internet Development and Cybersecurity–Policies and Practices. Chinese Cybersecurity and Defense, (pp. 1-54).
Molyneux, S. (1999). Broadband Internet: Future Applications and Challenges. In J. Vince & R. Earnshaw (Eds.), Digital Convergence: The Information Revolution (pp. 3-12). London: Springer London.
Nye, J. S. (2011). Nuclear Lessons for Cyber Security? (Vol. 5): Strategic Studies Quarterly.
OECD. (2011). Cybersecurity Policy Making at a Turning Point: OECD Publishing.
Parker, E. (2017). Hack Job: How America Invented Cyberwar. Foreign Affairs, 96(3), (pp. 133-138).
Pei, M. (2014). How China and America See Each Other. Foreign Affairs, 93(2), (pp. 31-32).
Petallides, C. J. (2012). Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat. Inquiries Journal/Student Pulse, 4(03). Retrieved from http://www.inquiriesjournal.com/a?id=627
Radu, R. G. (2012). The Monopoly of Violence in the Cyber Space: Challenges of Cyber Security. In E. Fels, J.-F. Kremer, & K. Kronenberg (Eds.), Power in the 21st Century: International Security and International Political Economy in a Changing World (pp. 137-150). Berlin, Heidelberg: Springer Berlin Heidelberg.
Renard, T. (2015). US-China Cybersecurity Agreement: A Good Case of Cyber Diplomacy. Egmont Commentary, 1 October 2015.
Romanosky, S. (2016). Examining the Costs and Causes of Cyber Incidents. Journal of Cybersecurity, 2(2), (pp. 121-135). doi:10.1093/cybsec/tyw001
Rulog, H. (2013) China Opposes and Combats Cyber Attacks. Financial Times.
Segal, A. (2012). U.S. and China in Cyberspace: Uneasy Next Steps. In: Council on Foreign Relations.
Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age: Hachette UK.
Segal, A. (2017). How China is Preparing for Cyberwar. The Christian Science Monitor.
Sutter, R. G. (2013). US-Chinese Relations: Perilous Past, Pragmatic Present: Rowman & Littlefield Publishers.
The International Telecommunication Union (ITU). (2008). Overview of Cybersecurity, Recommendation ITU–T X.1205. Paper presented at the The ITU Plenipotentiary Conference 2010, Guadalajara, Jalisco, Mexico. http://​tinyurl.​com/​boys7dj
The International Telecommunication Union (ITU). (2017). Global Cybersecurity Index 2017. In: ITU.
The White House. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington D.C.: White House.
The White House. (2013). Executive Order on Improving Critical Infrastructure Cybersecurity [Press release]. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity-0
The White House. (2015). FACT SHEET: Cyber Threat Intelligence Integration Center. The White House, Office of the Press Secretary Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center.
The White House. (2015). Fact Sheet: President Xi Jinping’s State Visit to the United States. Press Release, 25.
The World Bank. (2017). Individuals Using the Internet (% of population) [Table]. In (pp. Internet users are individuals who have used the Internet (from any location) in the last 3 months. The Internet can be used via a computer, mobile phone, personal digital assistant, games machine, digital TV etc.).
Thornburgh, N., Forney, M., Bennett, B., Burger, T. J., & Shannon, E. (2005). The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them). Time Magazine, 29, 1098961-1098961.
U.S. Department of Homeland Security. (2018). Cybersecurity Strategy. Retrieved from https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf.
U.S. Department of the Treasury. (2009). Fact Sheet: U.S.‐China Strategic and Economic Dialogue. Retrieved from https://www.treasury.gov/initiatives/Documents/SEDfactsheet09.pdf.
United States National Security Council. (2010). Cyberspace Policy Review: Securing America`s Digital Future: Cosimo, Incorporated.
Valeriano, B., & Maness, R. C. (2018). International Relations Theory and Cyber Security. The Oxford Handbook of International Political Theory, (pp. 259).
Ventre, D. (2014). Chinese cybersecurity and defense: John Wiley & Sons.
Vince, J., & Earnshaw, R. (2012). Digital Convergence: The Information Revolution: Springer London.
Volz, D. (2016). Yahoo Says Hackers Stole Data From 500 Million Accounts in 2014. Reuters. Retrieved from https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-hackers-stole-data-from-500-million-accounts-in-2014-idUSKCN11S16P
Waltz, K. N. (1979). Theory of International Politics: Waveland Press.
Weibin, Z. (2017). The Four Stages of Sino-American Cyber Relations. In: China-United States Exchange Foundation.
Wu, X. (2005). Chinese Cyber Nationalism: How China`s Online Public Sphere Affected its Social and Political Transitions. University of Florida,
中华人民共和国国务院. (2012). 国务院出台意见推进信息化发展切实保障信息安全.
zh_TW
dc.identifier.doi (DOI) 10.6814/THE.NCCU.IMPIS.007.2018.A06-