Publications-學位論文

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 堅守美國理想:美台關係在全球民主中所扮演之角色
Upholding American Ideals: The Role of US-Taiwan Relations in Global Democracy
作者 亞歷山大
Hillier, Alexander Shelton
貢獻者 袁力強
James Yuan
亞歷山大
Alexander Shelton Hillier
關鍵詞 網絡戰
霸權
民主
美台關係
Cyber Warfare
Hegemony
Democracy
US-Taiwan Relations
日期 2022
上傳時間 2-Aug-2023 13:47:41 (UTC+8)
摘要 今天,美國和中國發現自己處於冷戰時期的境地。 民主價值觀和自由世界秩序直接受到共產主義政權攻擊的時代。 儘管美國的核心價值觀和對反對意識形態的立場多年來一直保持不變,但在這個新的數字環境中,它不可避免地會面臨麻煩。 在美國尋求重新確立自己在國際體系中的仁慈力量的過程中,爭奪數字技術的優勢知識至關重要。 如果美國希望重新確立自己的霸主地位,它就必須贏得與中華人民共和國的網絡優勢競賽。 網絡戰與上個世紀的核戰爭一樣重要。 網絡攻擊的建設性和破壞性能力是任命下一個霸主的關鍵。 網絡攻擊徹底改變了間諜活動、宣傳和代理人戰爭等概念。 隨著技術在世界範圍內不斷快速發展,新的漏洞也隨之產生。 美國對保護民主和人權的承諾是其實力和信譽的內在要素。 隨著中國繼續積極向周邊地區擴張,保護台灣主權對於該地區的安全至關重要。 中華民國是東南亞民主和主權的燈塔,美國的上述承諾需要與台灣建立正式關係。 美國必須利用這個機會重塑美國例外論,而不是助長干涉主義。 通過明確支持台灣,美國可以重新坐上霸權寶座,並阻止權力再次向共產主義政權轉移。
Today, the United States and China find themselves in a situation reminiscent of the Cold War. A time in which democratic values and the liberal world order were directly under attack by a communist regime. While America’s core values and stance towards opposing ideologies have stayed the same throughout the years, it will inevitably face troubles within this new digital landscape. The race to secure superior knowledge over digital technologies is paramount in America’s quest to re-establish itself once more as a benevolent force within the international system. If the United States wishes to reassert itself as a hegemon, it must win the race to cyber superiority against the People’s Republic of China. Cyberwarfare is as important as nuclear warfare was in the previous century. The constructive and destructive capabilities of cyberattacks are key in appointing the next hegemon. Cyber attacks have revolutionized concepts such as espionage, propaganda, and proxy warfare. As technology continues to rapidly evolve throughout the world, new vulnerabilities are created. America’s commitment to protecting democracy and human rights is intrinsic to its power and credibility. Protecting Taiwanese sovereignty is integral to the security of the region as China continues to aggressively expand into neighboring areas. The Republic of China is a beacon of democracy and sovereignty in Southeast Asia, and America’s aforementioned commitment necessitates formal relations with Taiwan. The United States must use this opportunity to reinvent American exceptionalism rather than facilitate interventionism. By unequivocally supporting Taiwan, America can reseat itself upon the hegemonic throne and prevent a transfer of power to a communist regime once again.
參考文獻 2009. Globalization of Media – Understanding Media and Culture. https://open.lib.umn.edu/mediaandculture/chapter/13-6-globalization-of-media/.
“Advanced Persistent Threats (APTs) | Threat Actors & Groups.” n.d. Mandiant. Accessed February 18, 2023. https://www.mandiant.com/resources/insights/apt-groups.
Akaha, Tsuneo, Jingdong Yuan, and Wei Liang, eds. 2021. Trump’s America and International Relations in the Indo-Pacific: Theoretical Analysis of Changes & Continuities. N.p.: Springer International Publishing.
Allison, William T. 2008. “The Tet Offensive | A Brief History with Documents | William Thomas Al.” Taylor & Francis eBooks. https://www.taylorfrancis.com/books/mono/10.4324/9780203931776/tet-offensive-william-thomas-allison.
“Anglo-American Strategic Air Power Co-operation in the Cold War and Beyond.” 2022. ProQuest. https://www.proquest.com/openview/4652e9e1c9e3c9ceb97083335b78344d/1?pq-origsite=gscholar&cbl=26498.
Ansari, Saghir A. 2022. “India`s Trade Relations with China in the Era of Globalization.” Sage Journals. https://journals.sagepub.com/doi/10.1177/0015732515110303.
Bhardwaj, Rashmi. n.d. “What Is Stuxnet? What It Is and How It Works.” IP With Ease. Accessed March 2, 2023. https://ipwithease.com/what-is-stuxnet-what-it-is-and-how-it-works/.
Blanton, Stephen D. 1993. “A Study of the United States Navy`s Minesweeping efforts in the Korean War.” Texas Tech. https://ttu-ir.tdl.org/bitstream/handle/2346/60894/31295007673907.pdf;sequence.
Blight, James G. 1987. “The Cuban Missile Crisis Revisited.” jstor. https://doi.org/10.2307/20043297.
Borer, Douglas A. 2007. “Rethinking the Cuban Embargo: An Inductive Analysis.” Oxford Academic. https://academic.oup.com/fpa/article-abstract/3/2/127/1792875.
“Brookings experts on Trump`s National Security Strategy.” 2017. Brookings. https://www.brookings.edu/research/brookings-experts-on-trumps-national-security-strategy/.
Bushberg, Jerrold T., Andres Gannon, and Alyssa Ayres. 2017. “More Prominence for India and the Indo-Pacific in the U.S. National Security Strategy.” Council on Foreign Relations. https://www.cfr.org/blog/more-prominence-india-and-indo-pacific-us-national-security-strategy.
Carmichael, Joe. 2016. “Hacking Experts Say John McAfee`s Cyberattack Warnings Will Make America Safer.” Inverse. https://www.inverse.com/article/16022-hacking-experts-say-john-mcafee-s-cyberattack-warnings-will-make-america-safer.
Carter, Joe. 2016. “5 facts about Captive Nations Week.” ERLC. https://erlc.com/resource-library/articles/5-facts-about-captive-nations-week/.
CHAU, THOMPSON, and CHENG TING. 2022. “Cyber warfare: China attacks force Taiwan to bolster defenses.” Nikkei Asia. https://asia.nikkei.com/Spotlight/Asia-Insight/Cyber-warfare-China-attacks-force-Taiwan-to-bolster-defenses.
Cheung, Louis. 2021. 彩云香江on Twitter: "J-20 cockpit vs F-35 cockpit https://t.co/tLNFdHJ80J". https://twitter.com/louischeung_hk/status/1468419197214490625.
“China says US ‘arrogant and selfish’ after indictmentss.com/News/front/archives/2018/12/22/2003706572.” 2018. Taipei Times. https://www.taipeitimes.com/News/front/archives/2018/12/22/2003706572.
“Chinese Threats in the Quantum Era.” 2023. Booz Allen Hamilton. https://www.boozallen.com/expertise/analytics/quantum-computing/chinese-cyber-threats-in-the-quantum-era.html.
“cold War - Proxy War.” 2022. Gerald Ford Museum. https://www.fordlibrarymuseum.gov/museum/exhibits/coldwar/proxywar.html.
“Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.
“Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.
Daniel, Ellen. 2018. “Thirty years on, what has changed since the Morris Worm?” Verdict. https://www.verdict.co.uk/morris-worm-cyber-security/.
“Defense Primer: U.S. Precision-Guided Munitions.” 2022. CRS Reports. https://crsreports.congress.gov/product/pdf/IF/IF11353.
Garfield, R. 2011. “The impact of the economic crisis and the US embargo on health in Cuba.” American Journal of Public Health. https://ajph.aphapublications.org/doi/abs/10.2105/AJPH.87.1.15.
“GDP growth (annual %) - China | Data.” 2023. World Bank Data. https://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG?locations=CN.
Gunawan, Arief S. 2002. “Five Forces Porter Framework (Ward and Peppard,2002) | Download Scientific Diagram.” ResearchGate. https://www.researchgate.net/figure/Five-Forces-Porter-Framework-Ward-and-Peppard-2002_fig1_304013321.
Halloran, Richard. 2022. “China Hands: Nine Decades of Adventure, Espionage, and Diplomacy in Asia.” Gale Academic Onefile. https://go.gale.com/ps/i.do?id=GALE%7CA126491255&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=00311723&p=AONE&sw=w&userGroupName=anon%7Ef61452ab.
Hanna, Terrell. 2021. “What are social engineering attacks? - Security.” TechTarget. https://www.techtarget.com/searchsecurity/definition/social-engineering.
Harrison, R. 1988. “Economic interdependence, bargaining power, and political influence.” IDEAS/RePEc. https://ideas.repec.org/a/cup/intorg/v42y1988i03p461-483_02.html.
Hill, Michael. 2022. “China`s attack motivations, tactics, and how CISOs can mitigate threats.” CSO Online. https://www.csoonline.com/article/3676075/china-s-attack-motivations-tactics-and-how-cisos-can-mitigate-threats.html.
Hioe, Brian, Mercy A. Kuo, and Dechlan Brennan. 2023. “Taiwan Cabinet Reshuffle Sets the Stage for 2024 Presidential Elections.” The Diplomat. https://thediplomat.com/2023/02/taiwan-cabinet-reshuffle-sets-the-stage-for-2024-presidential-elections/.
Hossain, Kamrul. 2022. “The UNCLOS and the US-China Hegemonic Competition over the South China Sea.” Hein Online. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jeasil6&div=10&id=&page=.
Hwang, Ji-Jen. 2017. “한국학술지인용색인.” 한국학술지인용색인. https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002199620.
Itasari, Endah R. 2022. “LEGAL PROTECTION OF UIGHUR MUSLIM ETHNICS IN CHINA FROM PERSPECTIVE HUMAN RIGHTS.” LamLaj. https://pdfs.semanticscholar.org/bb9c/71812869090f15fa147a95272b256a2b4322.pdf.
Kabeer, N. 2001. “Bargaining Power.” ScienceDirect. https://www.sciencedirect.com/topics/computer-science/bargaining-power.
Kamrany, Nake M. 2012. “Ending the 30-Year War in Afghanistan.” Middle East Institute. https://www.mei.edu/publications/ending-30-year-war-afghanistan.
Katada, Saori N. 2022. “At the crossroads : the TPP, AIIB, and Japan`s foreign economic strategy.” Scholar Space. https://scholarspace.manoa.hawaii.edu/items/c181166e-e43d-4bfe-88a1-a609dcd2d496.
Killion, Ulric. 2009. “The US-China Trade Conflict: A Game Theoretical Analysis.” IDEAS. https://ideas.repec.org/p/guc/wpaper/15.html.
Koivunen, Pia. 2022. “Performing Peace and Friendship.” Degruyter. https://www.degruyter.com/document/doi/10.1515/9783110761160/html?lang=en.
Korolov, Maria. 2017. “How hackers crack passwords and why you can`t stop them.” CSO Online. https://www.csoonline.com/article/3236716/how-hackers-crack-passwords-and-why-you-cant-stop-them.html.
Lebow, Richard N. 1995. “Deterrence and the Cold War.” Political Science Quarterly Vol. 110, no. 2 (Summer): 157-181 (25 pages). https://doi.org/10.2307/2152358.
Lee, Yimou. 2020. “Taiwan says China behind cyberattacks on government agencies, emails.” Reuters. https://www.reuters.com/article/us-taiwan-cyber-china-idUSKCN25F0JK.
Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Scinapse. https://www.scinapse.io/papers/1972914161.
Lyngaas, Sean. 2021. CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.
Lyngaas, Sean. 2022. “At least 24 agencies run Pulse Secure software. How many were hacked is an open question.” CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.
Martin, Katherine C. 2015. “George Orwell and the origin of the term `cold war.`” OUP Blog. https://blog.oup.com/2015/10/george-orwell-cold-war/.
Mattis, Peter, and Sebastian Strangio. 2011. “China`s Misunderstood Spies – The Diplomat.” The Diplomat. https://thediplomat.com/2011/10/chinas-misunderstood-spies/.
“The Morris Worm Virus: How it Works and How to Protect Yourself.” 2022. History-Computer. https://history-computer.com/the-morris-worm-virus-how-it-works-and-how-to-protect-yourself/.
Nance, Brad. 2019. “Using Pulse Connect Secure© to Implement Multi-Factor Authentication Solutions.” U.S. Department of Energy: Office of Scientific and Technical Informaton. https://www.osti.gov/biblio/1550735.
“NATIONAL SECURITY STRATEGY.” 2022. The White House. https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf.
“National Security Strategy 2017.” 2017. National Security Strategy Archive. http://nssarchive.us/national-security-strategy-2017/.
Nemeth, Stephen C. 2014. “Ruling the Sea: Managing Maritime Conflicts through UNCLOS and Exclusive Economic Zones.” Taylor & Francis Online. https://www.tandfonline.com/doi/abs/10.1080/03050629.2014.897233.
Novak, Matt. 2022. “China to Stop Welding Homes Shut Over Covid After Protests.” Gizmodo. https://gizmodo.com/china-relaxes-harshest-covid-19-rules-after-protests-1849862755.
“N S S.” 2017. Trump White House Archive. https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.
Nye, Joseph S. 1990. “Soft Power.” no. No. 80 (Autumn), 153-171 (19 pages). https://doi.org/10.2307/1148580.
Nye, Joseph S. 2022. “American and Chinese Power after the Financial Crisis.” tandfonline. https://www.tandfonline.com/doi/abs/10.1080/0163660X.2010.516634?journalCode=rwaq20.
Patch, Buel W. 2023. “Soviet Peace Offensives: CQR.” CQ Press Library. https://library.cqpress.com/cqresearcher/document.php?id=cqresrre1951080300.
Pearce, Justin. 2012. “Control, politics and identity in the Angolan Civil War.” African Affairs. https://doi.org/10.1093/afraf/ads028.
Porup, JM, and Josh Fruhlinger. 2021. “11 penetration testing tools the pros use.” CSO Online. https://www.csoonline.com/article/2943524/11-penetration-testing-tools-the-pros-use.html.
Rider, Toby C. 2022. “A Campaign of Truth: The State Department, Propaganda, and the Olympic Games, 1950–1952.” MIT. https://direct.mit.edu/jcws/article-abstract/18/2/4/13570/A-Campaign-of-Truth-The-State-Department.
Robinson, Christopher. 2020. “Dr. Ji-Jen Hwang discusses Taiwan’s Cybersecurity Environment versus China’s Cyber Strategy.” The Institute of World Politics. https://www.iwp.edu/past-events/2020/07/09/dr-ji-jen-hwang-discusses-taiwans-cybersecurity-environment-versus-chinas-cyber-strategy/.
Roos, Meghan, Nick Gillespie, Jason Nichols, and Ben Weingarten. 2020. “Chinese Hackers Targeted U.S. COVID Vaccine Research, Prosecutors Allege.” Newsweek. https://www.newsweek.com/two-chinese-hackers-targeted-us-covid-vaccine-research-military-intelligence-prosecutors-allege-1519503.
Satam, Parth. 2022. “`Battle Of 35s`: US F-35 Or China`s J-35 Stealth Aircraft, A Battle Of Equals Or Comparing Apples With Oranges?” EurAsian Times. https://eurasiantimes.com/american-f-35-vs-chinese-j-35-stealth-aircraft-a-battle-of-equals/.
SEITZ, AMANDA, ERIC TUCKER, and MIKE CATALINI. 2022. “How China`s TikTok, Facebook influencers push propaganda.” AP News. https://apnews.com/article/china-tiktok-facebook-influencers-propaganda-81388bca676c560e02a1b493ea9d6760.
Shaikh, Shaan, and Tom Karako. 2021. “S-300 | Missile Threat.” Missile Threat. https://missilethreat.csis.org/defsys/s-300/.
Silk, Jesse A. 2014. “"A Generation That Didn`t Agree": The Paramountcy of Multidimensional Moral Hierarchy in the System of a Down Discography.” DigitalCommons@Cedarville. https://digitalcommons.cedarville.edu/english_seminar_capstone/25/.
Smalley, Suzanne. 2022. “Investors, analysts question Biden`s plan to limit U.S. investments in Chinese tech.” CyberScoop. https://www.cyberscoop.com/biden-admin-limit-investment-china/.
Smalley, Suzanne. 2022. “Commerce lacks intelligence resources to keep U.S. tech from fueling Chinese cyberthreat, experts warn.” CyberScoop. https://www.cyberscoop.com/senate-intel-to-strengthen-intelligence-exports/.
Stone, Jeff. 2020. “US accuses two Chinese hackers of global hacking campaign, targeting coronavirus vaccine research.” CyberScoop. https://www.cyberscoop.com/chinese-hackers-accused-targeting-coronavirus-vaccine-research/.
“Taiwan Independence vs. Unification with the Mainland(1994/12~2022/12).” 2023. Election Study Center, NCCU-Taiwan Independence vs. Unification with the Mainl. https://esc.nccu.edu.tw/PageDoc/Detail?fid=7801&id=6963.
Tang, Frank. 2020. “China GDP: Xi Jinping says `completely possible` to double size of economy by 2035, despite foreign hostility.” South China Morning Post. https://www.scmp.com/economy/china-economy/article/3108767/china-gdp-xi-jinping-says-completely-possible-double-size.
Taylor, Craig. 2020. “Stuxnet.” CyberHoot. https://cyberhoot.com/cybrary/stuxnet/.
“Top 5 Most Notorious Attacks in the History of Cyber Warfare.” 2023. Fortinet. https://www.fortinet.com/resources/cyberglossary/most-notorious-attacks-in-the-history-of-cyber-warfare.
“Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information.” 2018. Department of Justice. https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion.
Ulric, Killion M. 2009. “Relation of game theory to economic history and marginalism.” University Library of Munich. https://ideas.repec.org/p/pra/mprapa/13378.html.
Vavra, Shannon. 2020. “Chinese intelligence-linked hackers are exploiting known flaws to target Washington, US says.” CyberScoop. https://www.cyberscoop.com/chinese-intelligence-hackers-us-government-agencies-ministry-state-security/.
Vavra, Shannon, and Tonya Riley. 2020. “NSA warns defense contractors of recent Chinese government-backed hacking.” CyberScoop. https://www.cyberscoop.com/defense-contractors-chinese-government-hacking-nsa/.
Velde, James V. 2022. “The intellectual mistakes that crippled U.S. cyber policy.” CyberScoop. https://www.cyberscoop.com/intellectual-mistakes-crippled-cyber-policy/?category_news=news.
“The Vietnam War and the My Lai Massacre | AP US History Study Guide from The Gilder Lehrman Institute of American History.” 2023. AP Gilder Lehrman. https://ap.gilderlehrman.org/history-by-era/sixties/essays/vietnam-war-and-my-lai-massacre.
Wagner, R. H. 1988. “Economic interdependence, bargaining power, and political influence.” EconPapers. https://econpapers.repec.org/article/cupintorg/v_3a42_3ay_3a1988_3ai_3a03_3ap_3a461-483_5f02.htm.
Webb, Michael C. 2009. “Hegemonic Stability Theory: An Empirical Assessment.” Cambridge. https://doi.org/10.1017/S0260210500112999.
Williamson, John. 2012. “Is the "Beijing Consensus" Now Dominant? - The National Bureau of Asian Research (NBR).” National Bureau of Asian Research. https://www.nbr.org/publication/is-the-beijing-consensus-now-dominant/.
Wong, Sharon. 2011. “Voice of America in the post-Cold War era.” Opportunities and challenges to external media services via new information and communication technology 73 (4): 343-358. https://doi.org/10.1177/1748048511398599.
Woo, Etienne. 2022. “Narrating the Belt and Road Education Policy: A Critical Policy Discourse Analysis.” NCBI. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9344438/.
“Xi sends condolences to Trump on death of former U.S. President George H.W. Bush.” 2018. Ministry of Foreign Affairs of the People`s Republic of China. https://www.fmprc.gov.cn/mfa_eng/topics_665678/2018zt/xjpcxytjhzz/201812/t20181203_710030.html.
Xu, Chi. 2022. “Digital Gordian Knot, Trade, 11.11: a Special Weekend Edition of Weekly Highlights.” https://www.chinabigidea.info/p/digital-gordian-knot-trade-1111-a.
Zimmerman, Nicholas, Lindsay Maizland, and James M. Lindsay. 2022. “Hong Kong`s Freedoms: What China Promised and How It`s Cracking Down.” Council on Foreign Relations. https://www.cfr.org/backgrounder/hong-kong-freedoms-democracy-protests-china-crackdown.
Zingales, Luigi. 2022. “Causes and Effects of the Lehman Brothers Bankruptcy.” PSU. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=617982783e3bda3388ac4f2305a971fb57f3f841.
描述 碩士
國立政治大學
亞太研究英語碩士學位學程(IMAS)
109926026
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0109926026
資料類型 thesis
dc.contributor.advisor 袁力強zh_TW
dc.contributor.advisor James Yuanen_US
dc.contributor.author (Authors) 亞歷山大zh_TW
dc.contributor.author (Authors) Alexander Shelton Hillieren_US
dc.creator (作者) 亞歷山大zh_TW
dc.creator (作者) Hillier, Alexander Sheltonen_US
dc.date (日期) 2022en_US
dc.date.accessioned 2-Aug-2023 13:47:41 (UTC+8)-
dc.date.available 2-Aug-2023 13:47:41 (UTC+8)-
dc.date.issued (上傳時間) 2-Aug-2023 13:47:41 (UTC+8)-
dc.identifier (Other Identifiers) G0109926026en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/146504-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 亞太研究英語碩士學位學程(IMAS)zh_TW
dc.description (描述) 109926026zh_TW
dc.description.abstract (摘要) 今天,美國和中國發現自己處於冷戰時期的境地。 民主價值觀和自由世界秩序直接受到共產主義政權攻擊的時代。 儘管美國的核心價值觀和對反對意識形態的立場多年來一直保持不變,但在這個新的數字環境中,它不可避免地會面臨麻煩。 在美國尋求重新確立自己在國際體系中的仁慈力量的過程中,爭奪數字技術的優勢知識至關重要。 如果美國希望重新確立自己的霸主地位,它就必須贏得與中華人民共和國的網絡優勢競賽。 網絡戰與上個世紀的核戰爭一樣重要。 網絡攻擊的建設性和破壞性能力是任命下一個霸主的關鍵。 網絡攻擊徹底改變了間諜活動、宣傳和代理人戰爭等概念。 隨著技術在世界範圍內不斷快速發展,新的漏洞也隨之產生。 美國對保護民主和人權的承諾是其實力和信譽的內在要素。 隨著中國繼續積極向周邊地區擴張,保護台灣主權對於該地區的安全至關重要。 中華民國是東南亞民主和主權的燈塔,美國的上述承諾需要與台灣建立正式關係。 美國必須利用這個機會重塑美國例外論,而不是助長干涉主義。 通過明確支持台灣,美國可以重新坐上霸權寶座,並阻止權力再次向共產主義政權轉移。zh_TW
dc.description.abstract (摘要) Today, the United States and China find themselves in a situation reminiscent of the Cold War. A time in which democratic values and the liberal world order were directly under attack by a communist regime. While America’s core values and stance towards opposing ideologies have stayed the same throughout the years, it will inevitably face troubles within this new digital landscape. The race to secure superior knowledge over digital technologies is paramount in America’s quest to re-establish itself once more as a benevolent force within the international system. If the United States wishes to reassert itself as a hegemon, it must win the race to cyber superiority against the People’s Republic of China. Cyberwarfare is as important as nuclear warfare was in the previous century. The constructive and destructive capabilities of cyberattacks are key in appointing the next hegemon. Cyber attacks have revolutionized concepts such as espionage, propaganda, and proxy warfare. As technology continues to rapidly evolve throughout the world, new vulnerabilities are created. America’s commitment to protecting democracy and human rights is intrinsic to its power and credibility. Protecting Taiwanese sovereignty is integral to the security of the region as China continues to aggressively expand into neighboring areas. The Republic of China is a beacon of democracy and sovereignty in Southeast Asia, and America’s aforementioned commitment necessitates formal relations with Taiwan. The United States must use this opportunity to reinvent American exceptionalism rather than facilitate interventionism. By unequivocally supporting Taiwan, America can reseat itself upon the hegemonic throne and prevent a transfer of power to a communist regime once again.en_US
dc.description.tableofcontents Abstract 2
概要 3
Table of Contents 4
Chapter 1: Introduction 6
1.1. Background 6
1.2. Research Question 9
1.3. Purpose 9
1.4. Literature Review 11
1.4.1. Economic Interdependence, Bargaining Power, and Political Influence 13
1.4.2. Attack Motivations 15
1.4.3. Hegemonic Stability 16
1.4.4. The Morris Worm 17
1.4.5. Operation Stuxnet 19
1.4.6. Penetration Tools 20
1.4.7. Quantum Computing 21
1.4.8. Modern Espionage 22
a. USA F-35 / PRC J-20 24
b. Pulse Connect Secure 25
c. Two Chinese Hackers 26
d. NSA warns of PRC 27
e. PRC Targets Washington 28
f. Vaccine Research 29
g. Taiwanese Cybersecurity 31
h. China’s Cyber Strategy: A Taiwanese Perspective 33
i. Taiwan Warns of Chinese Cyberattacks on Government Agencies 34
j. PRC forces ROC to bolster defenses 35
1.4.9. 2017 US NSS 37
1.4.10. 2022 US NSS 38
1.4.11. US Cutting Investment in Chinese Tech 41
1.4.12. Senate Strengthens Exports 42
1.4.13. Intellectual Mistakes That Crippled Cyber Policy 43
1.5. Research Methodology 44
Chapter 2: The Cold War 45
2.1. Nuclear Stalemate 46
2.2. Soft Power 47
2.3. Indirect Warfare & Propaganda 49
2.4. The Angolan Civil War 55
2.5. Economic Warfare 56
2.6. Cold War Conclusion 58
Chapter 3: US Hegemonic Decline 64
3.1. Korean & Vietnam Wars 64
3.2. Bush’s Betrayal 66
3.3. War on Terror 68
3.4. Financial Crisis of 2008 69
3.5. South China Sea 72
3.6. US-China Trade War 76
3.7. Hegemonic Conclusion 77
Chapter 4: The Race to Cyber Superiority 78
4.1. Dangers For Democracies 83
4.2. Cold War 2.0 85
4.3. Redefining US Hegemony & US-Taiwan Relations 91
4.4. Conclusion 94
References 97
zh_TW
dc.format.extent 12206836 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0109926026en_US
dc.subject (關鍵詞) 網絡戰zh_TW
dc.subject (關鍵詞) 霸權zh_TW
dc.subject (關鍵詞) 民主zh_TW
dc.subject (關鍵詞) 美台關係zh_TW
dc.subject (關鍵詞) Cyber Warfareen_US
dc.subject (關鍵詞) Hegemonyen_US
dc.subject (關鍵詞) Democracyen_US
dc.subject (關鍵詞) US-Taiwan Relationsen_US
dc.title (題名) 堅守美國理想:美台關係在全球民主中所扮演之角色zh_TW
dc.title (題名) Upholding American Ideals: The Role of US-Taiwan Relations in Global Democracyen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) 2009. Globalization of Media – Understanding Media and Culture. https://open.lib.umn.edu/mediaandculture/chapter/13-6-globalization-of-media/.
“Advanced Persistent Threats (APTs) | Threat Actors & Groups.” n.d. Mandiant. Accessed February 18, 2023. https://www.mandiant.com/resources/insights/apt-groups.
Akaha, Tsuneo, Jingdong Yuan, and Wei Liang, eds. 2021. Trump’s America and International Relations in the Indo-Pacific: Theoretical Analysis of Changes & Continuities. N.p.: Springer International Publishing.
Allison, William T. 2008. “The Tet Offensive | A Brief History with Documents | William Thomas Al.” Taylor & Francis eBooks. https://www.taylorfrancis.com/books/mono/10.4324/9780203931776/tet-offensive-william-thomas-allison.
“Anglo-American Strategic Air Power Co-operation in the Cold War and Beyond.” 2022. ProQuest. https://www.proquest.com/openview/4652e9e1c9e3c9ceb97083335b78344d/1?pq-origsite=gscholar&cbl=26498.
Ansari, Saghir A. 2022. “India`s Trade Relations with China in the Era of Globalization.” Sage Journals. https://journals.sagepub.com/doi/10.1177/0015732515110303.
Bhardwaj, Rashmi. n.d. “What Is Stuxnet? What It Is and How It Works.” IP With Ease. Accessed March 2, 2023. https://ipwithease.com/what-is-stuxnet-what-it-is-and-how-it-works/.
Blanton, Stephen D. 1993. “A Study of the United States Navy`s Minesweeping efforts in the Korean War.” Texas Tech. https://ttu-ir.tdl.org/bitstream/handle/2346/60894/31295007673907.pdf;sequence.
Blight, James G. 1987. “The Cuban Missile Crisis Revisited.” jstor. https://doi.org/10.2307/20043297.
Borer, Douglas A. 2007. “Rethinking the Cuban Embargo: An Inductive Analysis.” Oxford Academic. https://academic.oup.com/fpa/article-abstract/3/2/127/1792875.
“Brookings experts on Trump`s National Security Strategy.” 2017. Brookings. https://www.brookings.edu/research/brookings-experts-on-trumps-national-security-strategy/.
Bushberg, Jerrold T., Andres Gannon, and Alyssa Ayres. 2017. “More Prominence for India and the Indo-Pacific in the U.S. National Security Strategy.” Council on Foreign Relations. https://www.cfr.org/blog/more-prominence-india-and-indo-pacific-us-national-security-strategy.
Carmichael, Joe. 2016. “Hacking Experts Say John McAfee`s Cyberattack Warnings Will Make America Safer.” Inverse. https://www.inverse.com/article/16022-hacking-experts-say-john-mcafee-s-cyberattack-warnings-will-make-america-safer.
Carter, Joe. 2016. “5 facts about Captive Nations Week.” ERLC. https://erlc.com/resource-library/articles/5-facts-about-captive-nations-week/.
CHAU, THOMPSON, and CHENG TING. 2022. “Cyber warfare: China attacks force Taiwan to bolster defenses.” Nikkei Asia. https://asia.nikkei.com/Spotlight/Asia-Insight/Cyber-warfare-China-attacks-force-Taiwan-to-bolster-defenses.
Cheung, Louis. 2021. 彩云香江on Twitter: "J-20 cockpit vs F-35 cockpit https://t.co/tLNFdHJ80J". https://twitter.com/louischeung_hk/status/1468419197214490625.
“China says US ‘arrogant and selfish’ after indictmentss.com/News/front/archives/2018/12/22/2003706572.” 2018. Taipei Times. https://www.taipeitimes.com/News/front/archives/2018/12/22/2003706572.
“Chinese Threats in the Quantum Era.” 2023. Booz Allen Hamilton. https://www.boozallen.com/expertise/analytics/quantum-computing/chinese-cyber-threats-in-the-quantum-era.html.
“cold War - Proxy War.” 2022. Gerald Ford Museum. https://www.fordlibrarymuseum.gov/museum/exhibits/coldwar/proxywar.html.
“Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.
“Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.
Daniel, Ellen. 2018. “Thirty years on, what has changed since the Morris Worm?” Verdict. https://www.verdict.co.uk/morris-worm-cyber-security/.
“Defense Primer: U.S. Precision-Guided Munitions.” 2022. CRS Reports. https://crsreports.congress.gov/product/pdf/IF/IF11353.
Garfield, R. 2011. “The impact of the economic crisis and the US embargo on health in Cuba.” American Journal of Public Health. https://ajph.aphapublications.org/doi/abs/10.2105/AJPH.87.1.15.
“GDP growth (annual %) - China | Data.” 2023. World Bank Data. https://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG?locations=CN.
Gunawan, Arief S. 2002. “Five Forces Porter Framework (Ward and Peppard,2002) | Download Scientific Diagram.” ResearchGate. https://www.researchgate.net/figure/Five-Forces-Porter-Framework-Ward-and-Peppard-2002_fig1_304013321.
Halloran, Richard. 2022. “China Hands: Nine Decades of Adventure, Espionage, and Diplomacy in Asia.” Gale Academic Onefile. https://go.gale.com/ps/i.do?id=GALE%7CA126491255&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=00311723&p=AONE&sw=w&userGroupName=anon%7Ef61452ab.
Hanna, Terrell. 2021. “What are social engineering attacks? - Security.” TechTarget. https://www.techtarget.com/searchsecurity/definition/social-engineering.
Harrison, R. 1988. “Economic interdependence, bargaining power, and political influence.” IDEAS/RePEc. https://ideas.repec.org/a/cup/intorg/v42y1988i03p461-483_02.html.
Hill, Michael. 2022. “China`s attack motivations, tactics, and how CISOs can mitigate threats.” CSO Online. https://www.csoonline.com/article/3676075/china-s-attack-motivations-tactics-and-how-cisos-can-mitigate-threats.html.
Hioe, Brian, Mercy A. Kuo, and Dechlan Brennan. 2023. “Taiwan Cabinet Reshuffle Sets the Stage for 2024 Presidential Elections.” The Diplomat. https://thediplomat.com/2023/02/taiwan-cabinet-reshuffle-sets-the-stage-for-2024-presidential-elections/.
Hossain, Kamrul. 2022. “The UNCLOS and the US-China Hegemonic Competition over the South China Sea.” Hein Online. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jeasil6&div=10&id=&page=.
Hwang, Ji-Jen. 2017. “한국학술지인용색인.” 한국학술지인용색인. https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002199620.
Itasari, Endah R. 2022. “LEGAL PROTECTION OF UIGHUR MUSLIM ETHNICS IN CHINA FROM PERSPECTIVE HUMAN RIGHTS.” LamLaj. https://pdfs.semanticscholar.org/bb9c/71812869090f15fa147a95272b256a2b4322.pdf.
Kabeer, N. 2001. “Bargaining Power.” ScienceDirect. https://www.sciencedirect.com/topics/computer-science/bargaining-power.
Kamrany, Nake M. 2012. “Ending the 30-Year War in Afghanistan.” Middle East Institute. https://www.mei.edu/publications/ending-30-year-war-afghanistan.
Katada, Saori N. 2022. “At the crossroads : the TPP, AIIB, and Japan`s foreign economic strategy.” Scholar Space. https://scholarspace.manoa.hawaii.edu/items/c181166e-e43d-4bfe-88a1-a609dcd2d496.
Killion, Ulric. 2009. “The US-China Trade Conflict: A Game Theoretical Analysis.” IDEAS. https://ideas.repec.org/p/guc/wpaper/15.html.
Koivunen, Pia. 2022. “Performing Peace and Friendship.” Degruyter. https://www.degruyter.com/document/doi/10.1515/9783110761160/html?lang=en.
Korolov, Maria. 2017. “How hackers crack passwords and why you can`t stop them.” CSO Online. https://www.csoonline.com/article/3236716/how-hackers-crack-passwords-and-why-you-cant-stop-them.html.
Lebow, Richard N. 1995. “Deterrence and the Cold War.” Political Science Quarterly Vol. 110, no. 2 (Summer): 157-181 (25 pages). https://doi.org/10.2307/2152358.
Lee, Yimou. 2020. “Taiwan says China behind cyberattacks on government agencies, emails.” Reuters. https://www.reuters.com/article/us-taiwan-cyber-china-idUSKCN25F0JK.
Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Scinapse. https://www.scinapse.io/papers/1972914161.
Lyngaas, Sean. 2021. CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.
Lyngaas, Sean. 2022. “At least 24 agencies run Pulse Secure software. How many were hacked is an open question.” CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.
Martin, Katherine C. 2015. “George Orwell and the origin of the term `cold war.`” OUP Blog. https://blog.oup.com/2015/10/george-orwell-cold-war/.
Mattis, Peter, and Sebastian Strangio. 2011. “China`s Misunderstood Spies – The Diplomat.” The Diplomat. https://thediplomat.com/2011/10/chinas-misunderstood-spies/.
“The Morris Worm Virus: How it Works and How to Protect Yourself.” 2022. History-Computer. https://history-computer.com/the-morris-worm-virus-how-it-works-and-how-to-protect-yourself/.
Nance, Brad. 2019. “Using Pulse Connect Secure© to Implement Multi-Factor Authentication Solutions.” U.S. Department of Energy: Office of Scientific and Technical Informaton. https://www.osti.gov/biblio/1550735.
“NATIONAL SECURITY STRATEGY.” 2022. The White House. https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf.
“National Security Strategy 2017.” 2017. National Security Strategy Archive. http://nssarchive.us/national-security-strategy-2017/.
Nemeth, Stephen C. 2014. “Ruling the Sea: Managing Maritime Conflicts through UNCLOS and Exclusive Economic Zones.” Taylor & Francis Online. https://www.tandfonline.com/doi/abs/10.1080/03050629.2014.897233.
Novak, Matt. 2022. “China to Stop Welding Homes Shut Over Covid After Protests.” Gizmodo. https://gizmodo.com/china-relaxes-harshest-covid-19-rules-after-protests-1849862755.
“N S S.” 2017. Trump White House Archive. https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.
Nye, Joseph S. 1990. “Soft Power.” no. No. 80 (Autumn), 153-171 (19 pages). https://doi.org/10.2307/1148580.
Nye, Joseph S. 2022. “American and Chinese Power after the Financial Crisis.” tandfonline. https://www.tandfonline.com/doi/abs/10.1080/0163660X.2010.516634?journalCode=rwaq20.
Patch, Buel W. 2023. “Soviet Peace Offensives: CQR.” CQ Press Library. https://library.cqpress.com/cqresearcher/document.php?id=cqresrre1951080300.
Pearce, Justin. 2012. “Control, politics and identity in the Angolan Civil War.” African Affairs. https://doi.org/10.1093/afraf/ads028.
Porup, JM, and Josh Fruhlinger. 2021. “11 penetration testing tools the pros use.” CSO Online. https://www.csoonline.com/article/2943524/11-penetration-testing-tools-the-pros-use.html.
Rider, Toby C. 2022. “A Campaign of Truth: The State Department, Propaganda, and the Olympic Games, 1950–1952.” MIT. https://direct.mit.edu/jcws/article-abstract/18/2/4/13570/A-Campaign-of-Truth-The-State-Department.
Robinson, Christopher. 2020. “Dr. Ji-Jen Hwang discusses Taiwan’s Cybersecurity Environment versus China’s Cyber Strategy.” The Institute of World Politics. https://www.iwp.edu/past-events/2020/07/09/dr-ji-jen-hwang-discusses-taiwans-cybersecurity-environment-versus-chinas-cyber-strategy/.
Roos, Meghan, Nick Gillespie, Jason Nichols, and Ben Weingarten. 2020. “Chinese Hackers Targeted U.S. COVID Vaccine Research, Prosecutors Allege.” Newsweek. https://www.newsweek.com/two-chinese-hackers-targeted-us-covid-vaccine-research-military-intelligence-prosecutors-allege-1519503.
Satam, Parth. 2022. “`Battle Of 35s`: US F-35 Or China`s J-35 Stealth Aircraft, A Battle Of Equals Or Comparing Apples With Oranges?” EurAsian Times. https://eurasiantimes.com/american-f-35-vs-chinese-j-35-stealth-aircraft-a-battle-of-equals/.
SEITZ, AMANDA, ERIC TUCKER, and MIKE CATALINI. 2022. “How China`s TikTok, Facebook influencers push propaganda.” AP News. https://apnews.com/article/china-tiktok-facebook-influencers-propaganda-81388bca676c560e02a1b493ea9d6760.
Shaikh, Shaan, and Tom Karako. 2021. “S-300 | Missile Threat.” Missile Threat. https://missilethreat.csis.org/defsys/s-300/.
Silk, Jesse A. 2014. “"A Generation That Didn`t Agree": The Paramountcy of Multidimensional Moral Hierarchy in the System of a Down Discography.” DigitalCommons@Cedarville. https://digitalcommons.cedarville.edu/english_seminar_capstone/25/.
Smalley, Suzanne. 2022. “Investors, analysts question Biden`s plan to limit U.S. investments in Chinese tech.” CyberScoop. https://www.cyberscoop.com/biden-admin-limit-investment-china/.
Smalley, Suzanne. 2022. “Commerce lacks intelligence resources to keep U.S. tech from fueling Chinese cyberthreat, experts warn.” CyberScoop. https://www.cyberscoop.com/senate-intel-to-strengthen-intelligence-exports/.
Stone, Jeff. 2020. “US accuses two Chinese hackers of global hacking campaign, targeting coronavirus vaccine research.” CyberScoop. https://www.cyberscoop.com/chinese-hackers-accused-targeting-coronavirus-vaccine-research/.
“Taiwan Independence vs. Unification with the Mainland(1994/12~2022/12).” 2023. Election Study Center, NCCU-Taiwan Independence vs. Unification with the Mainl. https://esc.nccu.edu.tw/PageDoc/Detail?fid=7801&id=6963.
Tang, Frank. 2020. “China GDP: Xi Jinping says `completely possible` to double size of economy by 2035, despite foreign hostility.” South China Morning Post. https://www.scmp.com/economy/china-economy/article/3108767/china-gdp-xi-jinping-says-completely-possible-double-size.
Taylor, Craig. 2020. “Stuxnet.” CyberHoot. https://cyberhoot.com/cybrary/stuxnet/.
“Top 5 Most Notorious Attacks in the History of Cyber Warfare.” 2023. Fortinet. https://www.fortinet.com/resources/cyberglossary/most-notorious-attacks-in-the-history-of-cyber-warfare.
“Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information.” 2018. Department of Justice. https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion.
Ulric, Killion M. 2009. “Relation of game theory to economic history and marginalism.” University Library of Munich. https://ideas.repec.org/p/pra/mprapa/13378.html.
Vavra, Shannon. 2020. “Chinese intelligence-linked hackers are exploiting known flaws to target Washington, US says.” CyberScoop. https://www.cyberscoop.com/chinese-intelligence-hackers-us-government-agencies-ministry-state-security/.
Vavra, Shannon, and Tonya Riley. 2020. “NSA warns defense contractors of recent Chinese government-backed hacking.” CyberScoop. https://www.cyberscoop.com/defense-contractors-chinese-government-hacking-nsa/.
Velde, James V. 2022. “The intellectual mistakes that crippled U.S. cyber policy.” CyberScoop. https://www.cyberscoop.com/intellectual-mistakes-crippled-cyber-policy/?category_news=news.
“The Vietnam War and the My Lai Massacre | AP US History Study Guide from The Gilder Lehrman Institute of American History.” 2023. AP Gilder Lehrman. https://ap.gilderlehrman.org/history-by-era/sixties/essays/vietnam-war-and-my-lai-massacre.
Wagner, R. H. 1988. “Economic interdependence, bargaining power, and political influence.” EconPapers. https://econpapers.repec.org/article/cupintorg/v_3a42_3ay_3a1988_3ai_3a03_3ap_3a461-483_5f02.htm.
Webb, Michael C. 2009. “Hegemonic Stability Theory: An Empirical Assessment.” Cambridge. https://doi.org/10.1017/S0260210500112999.
Williamson, John. 2012. “Is the "Beijing Consensus" Now Dominant? - The National Bureau of Asian Research (NBR).” National Bureau of Asian Research. https://www.nbr.org/publication/is-the-beijing-consensus-now-dominant/.
Wong, Sharon. 2011. “Voice of America in the post-Cold War era.” Opportunities and challenges to external media services via new information and communication technology 73 (4): 343-358. https://doi.org/10.1177/1748048511398599.
Woo, Etienne. 2022. “Narrating the Belt and Road Education Policy: A Critical Policy Discourse Analysis.” NCBI. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9344438/.
“Xi sends condolences to Trump on death of former U.S. President George H.W. Bush.” 2018. Ministry of Foreign Affairs of the People`s Republic of China. https://www.fmprc.gov.cn/mfa_eng/topics_665678/2018zt/xjpcxytjhzz/201812/t20181203_710030.html.
Xu, Chi. 2022. “Digital Gordian Knot, Trade, 11.11: a Special Weekend Edition of Weekly Highlights.” https://www.chinabigidea.info/p/digital-gordian-knot-trade-1111-a.
Zimmerman, Nicholas, Lindsay Maizland, and James M. Lindsay. 2022. “Hong Kong`s Freedoms: What China Promised and How It`s Cracking Down.” Council on Foreign Relations. https://www.cfr.org/backgrounder/hong-kong-freedoms-democracy-protests-china-crackdown.
Zingales, Luigi. 2022. “Causes and Effects of the Lehman Brothers Bankruptcy.” PSU. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=617982783e3bda3388ac4f2305a971fb57f3f841.
zh_TW