學術產出-學位論文
文章檢視/開啟
書目匯出
-
題名 堅守美國理想:美台關係在全球民主中所扮演之角色
Upholding American Ideals: The Role of US-Taiwan Relations in Global Democracy作者 亞歷山大
Hillier, Alexander Shelton貢獻者 袁力強
James Yuan
亞歷山大
Alexander Shelton Hillier關鍵詞 網絡戰
霸權
民主
美台關係
Cyber Warfare
Hegemony
Democracy
US-Taiwan Relations日期 2022 上傳時間 2-八月-2023 13:47:41 (UTC+8) 摘要 今天,美國和中國發現自己處於冷戰時期的境地。 民主價值觀和自由世界秩序直接受到共產主義政權攻擊的時代。 儘管美國的核心價值觀和對反對意識形態的立場多年來一直保持不變,但在這個新的數字環境中,它不可避免地會面臨麻煩。 在美國尋求重新確立自己在國際體系中的仁慈力量的過程中,爭奪數字技術的優勢知識至關重要。 如果美國希望重新確立自己的霸主地位,它就必須贏得與中華人民共和國的網絡優勢競賽。 網絡戰與上個世紀的核戰爭一樣重要。 網絡攻擊的建設性和破壞性能力是任命下一個霸主的關鍵。 網絡攻擊徹底改變了間諜活動、宣傳和代理人戰爭等概念。 隨著技術在世界範圍內不斷快速發展,新的漏洞也隨之產生。 美國對保護民主和人權的承諾是其實力和信譽的內在要素。 隨著中國繼續積極向周邊地區擴張,保護台灣主權對於該地區的安全至關重要。 中華民國是東南亞民主和主權的燈塔,美國的上述承諾需要與台灣建立正式關係。 美國必須利用這個機會重塑美國例外論,而不是助長干涉主義。 通過明確支持台灣,美國可以重新坐上霸權寶座,並阻止權力再次向共產主義政權轉移。
Today, the United States and China find themselves in a situation reminiscent of the Cold War. A time in which democratic values and the liberal world order were directly under attack by a communist regime. While America’s core values and stance towards opposing ideologies have stayed the same throughout the years, it will inevitably face troubles within this new digital landscape. The race to secure superior knowledge over digital technologies is paramount in America’s quest to re-establish itself once more as a benevolent force within the international system. If the United States wishes to reassert itself as a hegemon, it must win the race to cyber superiority against the People’s Republic of China. Cyberwarfare is as important as nuclear warfare was in the previous century. The constructive and destructive capabilities of cyberattacks are key in appointing the next hegemon. Cyber attacks have revolutionized concepts such as espionage, propaganda, and proxy warfare. As technology continues to rapidly evolve throughout the world, new vulnerabilities are created. America’s commitment to protecting democracy and human rights is intrinsic to its power and credibility. Protecting Taiwanese sovereignty is integral to the security of the region as China continues to aggressively expand into neighboring areas. The Republic of China is a beacon of democracy and sovereignty in Southeast Asia, and America’s aforementioned commitment necessitates formal relations with Taiwan. The United States must use this opportunity to reinvent American exceptionalism rather than facilitate interventionism. By unequivocally supporting Taiwan, America can reseat itself upon the hegemonic throne and prevent a transfer of power to a communist regime once again.參考文獻 2009. Globalization of Media – Understanding Media and Culture. https://open.lib.umn.edu/mediaandculture/chapter/13-6-globalization-of-media/.“Advanced Persistent Threats (APTs) | Threat Actors & Groups.” n.d. Mandiant. Accessed February 18, 2023. https://www.mandiant.com/resources/insights/apt-groups.Akaha, Tsuneo, Jingdong Yuan, and Wei Liang, eds. 2021. Trump’s America and International Relations in the Indo-Pacific: Theoretical Analysis of Changes & Continuities. N.p.: Springer International Publishing.Allison, William T. 2008. “The Tet Offensive | A Brief History with Documents | William Thomas Al.” Taylor & Francis eBooks. https://www.taylorfrancis.com/books/mono/10.4324/9780203931776/tet-offensive-william-thomas-allison.“Anglo-American Strategic Air Power Co-operation in the Cold War and Beyond.” 2022. ProQuest. https://www.proquest.com/openview/4652e9e1c9e3c9ceb97083335b78344d/1?pq-origsite=gscholar&cbl=26498.Ansari, Saghir A. 2022. “India`s Trade Relations with China in the Era of Globalization.” Sage Journals. https://journals.sagepub.com/doi/10.1177/0015732515110303.Bhardwaj, Rashmi. n.d. “What Is Stuxnet? What It Is and How It Works.” IP With Ease. Accessed March 2, 2023. https://ipwithease.com/what-is-stuxnet-what-it-is-and-how-it-works/.Blanton, Stephen D. 1993. “A Study of the United States Navy`s Minesweeping efforts in the Korean War.” Texas Tech. https://ttu-ir.tdl.org/bitstream/handle/2346/60894/31295007673907.pdf;sequence.Blight, James G. 1987. “The Cuban Missile Crisis Revisited.” jstor. https://doi.org/10.2307/20043297.Borer, Douglas A. 2007. “Rethinking the Cuban Embargo: An Inductive Analysis.” Oxford Academic. https://academic.oup.com/fpa/article-abstract/3/2/127/1792875.“Brookings experts on Trump`s National Security Strategy.” 2017. Brookings. https://www.brookings.edu/research/brookings-experts-on-trumps-national-security-strategy/.Bushberg, Jerrold T., Andres Gannon, and Alyssa Ayres. 2017. “More Prominence for India and the Indo-Pacific in the U.S. National Security Strategy.” Council on Foreign Relations. https://www.cfr.org/blog/more-prominence-india-and-indo-pacific-us-national-security-strategy.Carmichael, Joe. 2016. “Hacking Experts Say John McAfee`s Cyberattack Warnings Will Make America Safer.” Inverse. https://www.inverse.com/article/16022-hacking-experts-say-john-mcafee-s-cyberattack-warnings-will-make-america-safer.Carter, Joe. 2016. “5 facts about Captive Nations Week.” ERLC. https://erlc.com/resource-library/articles/5-facts-about-captive-nations-week/.CHAU, THOMPSON, and CHENG TING. 2022. “Cyber warfare: China attacks force Taiwan to bolster defenses.” Nikkei Asia. https://asia.nikkei.com/Spotlight/Asia-Insight/Cyber-warfare-China-attacks-force-Taiwan-to-bolster-defenses.Cheung, Louis. 2021. 彩云香江on Twitter: "J-20 cockpit vs F-35 cockpit https://t.co/tLNFdHJ80J". https://twitter.com/louischeung_hk/status/1468419197214490625.“China says US ‘arrogant and selfish’ after indictmentss.com/News/front/archives/2018/12/22/2003706572.” 2018. Taipei Times. https://www.taipeitimes.com/News/front/archives/2018/12/22/2003706572.“Chinese Threats in the Quantum Era.” 2023. Booz Allen Hamilton. https://www.boozallen.com/expertise/analytics/quantum-computing/chinese-cyber-threats-in-the-quantum-era.html.“cold War - Proxy War.” 2022. Gerald Ford Museum. https://www.fordlibrarymuseum.gov/museum/exhibits/coldwar/proxywar.html.“Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.“Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.Daniel, Ellen. 2018. “Thirty years on, what has changed since the Morris Worm?” Verdict. https://www.verdict.co.uk/morris-worm-cyber-security/.“Defense Primer: U.S. Precision-Guided Munitions.” 2022. CRS Reports. https://crsreports.congress.gov/product/pdf/IF/IF11353.Garfield, R. 2011. “The impact of the economic crisis and the US embargo on health in Cuba.” American Journal of Public Health. https://ajph.aphapublications.org/doi/abs/10.2105/AJPH.87.1.15.“GDP growth (annual %) - China | Data.” 2023. World Bank Data. https://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG?locations=CN.Gunawan, Arief S. 2002. “Five Forces Porter Framework (Ward and Peppard,2002) | Download Scientific Diagram.” ResearchGate. https://www.researchgate.net/figure/Five-Forces-Porter-Framework-Ward-and-Peppard-2002_fig1_304013321.Halloran, Richard. 2022. “China Hands: Nine Decades of Adventure, Espionage, and Diplomacy in Asia.” Gale Academic Onefile. https://go.gale.com/ps/i.do?id=GALE%7CA126491255&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=00311723&p=AONE&sw=w&userGroupName=anon%7Ef61452ab.Hanna, Terrell. 2021. “What are social engineering attacks? - Security.” TechTarget. https://www.techtarget.com/searchsecurity/definition/social-engineering.Harrison, R. 1988. “Economic interdependence, bargaining power, and political influence.” IDEAS/RePEc. https://ideas.repec.org/a/cup/intorg/v42y1988i03p461-483_02.html.Hill, Michael. 2022. “China`s attack motivations, tactics, and how CISOs can mitigate threats.” CSO Online. https://www.csoonline.com/article/3676075/china-s-attack-motivations-tactics-and-how-cisos-can-mitigate-threats.html.Hioe, Brian, Mercy A. Kuo, and Dechlan Brennan. 2023. “Taiwan Cabinet Reshuffle Sets the Stage for 2024 Presidential Elections.” The Diplomat. https://thediplomat.com/2023/02/taiwan-cabinet-reshuffle-sets-the-stage-for-2024-presidential-elections/.Hossain, Kamrul. 2022. “The UNCLOS and the US-China Hegemonic Competition over the South China Sea.” Hein Online. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jeasil6&div=10&id=&page=.Hwang, Ji-Jen. 2017. “한국학술지인용색인.” 한국학술지인용색인. https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002199620.Itasari, Endah R. 2022. “LEGAL PROTECTION OF UIGHUR MUSLIM ETHNICS IN CHINA FROM PERSPECTIVE HUMAN RIGHTS.” LamLaj. https://pdfs.semanticscholar.org/bb9c/71812869090f15fa147a95272b256a2b4322.pdf.Kabeer, N. 2001. “Bargaining Power.” ScienceDirect. https://www.sciencedirect.com/topics/computer-science/bargaining-power.Kamrany, Nake M. 2012. “Ending the 30-Year War in Afghanistan.” Middle East Institute. https://www.mei.edu/publications/ending-30-year-war-afghanistan.Katada, Saori N. 2022. “At the crossroads : the TPP, AIIB, and Japan`s foreign economic strategy.” Scholar Space. https://scholarspace.manoa.hawaii.edu/items/c181166e-e43d-4bfe-88a1-a609dcd2d496.Killion, Ulric. 2009. “The US-China Trade Conflict: A Game Theoretical Analysis.” IDEAS. https://ideas.repec.org/p/guc/wpaper/15.html.Koivunen, Pia. 2022. “Performing Peace and Friendship.” Degruyter. https://www.degruyter.com/document/doi/10.1515/9783110761160/html?lang=en.Korolov, Maria. 2017. “How hackers crack passwords and why you can`t stop them.” CSO Online. https://www.csoonline.com/article/3236716/how-hackers-crack-passwords-and-why-you-cant-stop-them.html.Lebow, Richard N. 1995. “Deterrence and the Cold War.” Political Science Quarterly Vol. 110, no. 2 (Summer): 157-181 (25 pages). https://doi.org/10.2307/2152358.Lee, Yimou. 2020. “Taiwan says China behind cyberattacks on government agencies, emails.” Reuters. https://www.reuters.com/article/us-taiwan-cyber-china-idUSKCN25F0JK.Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Scinapse. https://www.scinapse.io/papers/1972914161.Lyngaas, Sean. 2021. CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.Lyngaas, Sean. 2022. “At least 24 agencies run Pulse Secure software. How many were hacked is an open question.” CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.Martin, Katherine C. 2015. “George Orwell and the origin of the term `cold war.`” OUP Blog. https://blog.oup.com/2015/10/george-orwell-cold-war/.Mattis, Peter, and Sebastian Strangio. 2011. “China`s Misunderstood Spies – The Diplomat.” The Diplomat. https://thediplomat.com/2011/10/chinas-misunderstood-spies/.“The Morris Worm Virus: How it Works and How to Protect Yourself.” 2022. History-Computer. https://history-computer.com/the-morris-worm-virus-how-it-works-and-how-to-protect-yourself/.Nance, Brad. 2019. “Using Pulse Connect Secure© to Implement Multi-Factor Authentication Solutions.” U.S. Department of Energy: Office of Scientific and Technical Informaton. https://www.osti.gov/biblio/1550735.“NATIONAL SECURITY STRATEGY.” 2022. The White House. https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf.“National Security Strategy 2017.” 2017. National Security Strategy Archive. http://nssarchive.us/national-security-strategy-2017/.Nemeth, Stephen C. 2014. “Ruling the Sea: Managing Maritime Conflicts through UNCLOS and Exclusive Economic Zones.” Taylor & Francis Online. https://www.tandfonline.com/doi/abs/10.1080/03050629.2014.897233.Novak, Matt. 2022. “China to Stop Welding Homes Shut Over Covid After Protests.” Gizmodo. https://gizmodo.com/china-relaxes-harshest-covid-19-rules-after-protests-1849862755.“N S S.” 2017. Trump White House Archive. https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.Nye, Joseph S. 1990. “Soft Power.” no. No. 80 (Autumn), 153-171 (19 pages). https://doi.org/10.2307/1148580.Nye, Joseph S. 2022. “American and Chinese Power after the Financial Crisis.” tandfonline. https://www.tandfonline.com/doi/abs/10.1080/0163660X.2010.516634?journalCode=rwaq20.Patch, Buel W. 2023. “Soviet Peace Offensives: CQR.” CQ Press Library. https://library.cqpress.com/cqresearcher/document.php?id=cqresrre1951080300.Pearce, Justin. 2012. “Control, politics and identity in the Angolan Civil War.” African Affairs. https://doi.org/10.1093/afraf/ads028.Porup, JM, and Josh Fruhlinger. 2021. “11 penetration testing tools the pros use.” CSO Online. https://www.csoonline.com/article/2943524/11-penetration-testing-tools-the-pros-use.html.Rider, Toby C. 2022. “A Campaign of Truth: The State Department, Propaganda, and the Olympic Games, 1950–1952.” MIT. https://direct.mit.edu/jcws/article-abstract/18/2/4/13570/A-Campaign-of-Truth-The-State-Department.Robinson, Christopher. 2020. “Dr. Ji-Jen Hwang discusses Taiwan’s Cybersecurity Environment versus China’s Cyber Strategy.” The Institute of World Politics. https://www.iwp.edu/past-events/2020/07/09/dr-ji-jen-hwang-discusses-taiwans-cybersecurity-environment-versus-chinas-cyber-strategy/.Roos, Meghan, Nick Gillespie, Jason Nichols, and Ben Weingarten. 2020. “Chinese Hackers Targeted U.S. COVID Vaccine Research, Prosecutors Allege.” Newsweek. https://www.newsweek.com/two-chinese-hackers-targeted-us-covid-vaccine-research-military-intelligence-prosecutors-allege-1519503.Satam, Parth. 2022. “`Battle Of 35s`: US F-35 Or China`s J-35 Stealth Aircraft, A Battle Of Equals Or Comparing Apples With Oranges?” EurAsian Times. https://eurasiantimes.com/american-f-35-vs-chinese-j-35-stealth-aircraft-a-battle-of-equals/.SEITZ, AMANDA, ERIC TUCKER, and MIKE CATALINI. 2022. “How China`s TikTok, Facebook influencers push propaganda.” AP News. https://apnews.com/article/china-tiktok-facebook-influencers-propaganda-81388bca676c560e02a1b493ea9d6760.Shaikh, Shaan, and Tom Karako. 2021. “S-300 | Missile Threat.” Missile Threat. https://missilethreat.csis.org/defsys/s-300/.Silk, Jesse A. 2014. “"A Generation That Didn`t Agree": The Paramountcy of Multidimensional Moral Hierarchy in the System of a Down Discography.” DigitalCommons@Cedarville. https://digitalcommons.cedarville.edu/english_seminar_capstone/25/.Smalley, Suzanne. 2022. “Investors, analysts question Biden`s plan to limit U.S. investments in Chinese tech.” CyberScoop. https://www.cyberscoop.com/biden-admin-limit-investment-china/.Smalley, Suzanne. 2022. “Commerce lacks intelligence resources to keep U.S. tech from fueling Chinese cyberthreat, experts warn.” CyberScoop. https://www.cyberscoop.com/senate-intel-to-strengthen-intelligence-exports/.Stone, Jeff. 2020. “US accuses two Chinese hackers of global hacking campaign, targeting coronavirus vaccine research.” CyberScoop. https://www.cyberscoop.com/chinese-hackers-accused-targeting-coronavirus-vaccine-research/.“Taiwan Independence vs. Unification with the Mainland(1994/12~2022/12).” 2023. Election Study Center, NCCU-Taiwan Independence vs. Unification with the Mainl. https://esc.nccu.edu.tw/PageDoc/Detail?fid=7801&id=6963.Tang, Frank. 2020. “China GDP: Xi Jinping says `completely possible` to double size of economy by 2035, despite foreign hostility.” South China Morning Post. https://www.scmp.com/economy/china-economy/article/3108767/china-gdp-xi-jinping-says-completely-possible-double-size.Taylor, Craig. 2020. “Stuxnet.” CyberHoot. https://cyberhoot.com/cybrary/stuxnet/.“Top 5 Most Notorious Attacks in the History of Cyber Warfare.” 2023. Fortinet. https://www.fortinet.com/resources/cyberglossary/most-notorious-attacks-in-the-history-of-cyber-warfare.“Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information.” 2018. Department of Justice. https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion.Ulric, Killion M. 2009. “Relation of game theory to economic history and marginalism.” University Library of Munich. https://ideas.repec.org/p/pra/mprapa/13378.html.Vavra, Shannon. 2020. “Chinese intelligence-linked hackers are exploiting known flaws to target Washington, US says.” CyberScoop. https://www.cyberscoop.com/chinese-intelligence-hackers-us-government-agencies-ministry-state-security/.Vavra, Shannon, and Tonya Riley. 2020. “NSA warns defense contractors of recent Chinese government-backed hacking.” CyberScoop. https://www.cyberscoop.com/defense-contractors-chinese-government-hacking-nsa/.Velde, James V. 2022. “The intellectual mistakes that crippled U.S. cyber policy.” CyberScoop. https://www.cyberscoop.com/intellectual-mistakes-crippled-cyber-policy/?category_news=news.“The Vietnam War and the My Lai Massacre | AP US History Study Guide from The Gilder Lehrman Institute of American History.” 2023. AP Gilder Lehrman. https://ap.gilderlehrman.org/history-by-era/sixties/essays/vietnam-war-and-my-lai-massacre.Wagner, R. H. 1988. “Economic interdependence, bargaining power, and political influence.” EconPapers. https://econpapers.repec.org/article/cupintorg/v_3a42_3ay_3a1988_3ai_3a03_3ap_3a461-483_5f02.htm.Webb, Michael C. 2009. “Hegemonic Stability Theory: An Empirical Assessment.” Cambridge. https://doi.org/10.1017/S0260210500112999.Williamson, John. 2012. “Is the "Beijing Consensus" Now Dominant? - The National Bureau of Asian Research (NBR).” National Bureau of Asian Research. https://www.nbr.org/publication/is-the-beijing-consensus-now-dominant/.Wong, Sharon. 2011. “Voice of America in the post-Cold War era.” Opportunities and challenges to external media services via new information and communication technology 73 (4): 343-358. https://doi.org/10.1177/1748048511398599.Woo, Etienne. 2022. “Narrating the Belt and Road Education Policy: A Critical Policy Discourse Analysis.” NCBI. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9344438/.“Xi sends condolences to Trump on death of former U.S. President George H.W. Bush.” 2018. Ministry of Foreign Affairs of the People`s Republic of China. https://www.fmprc.gov.cn/mfa_eng/topics_665678/2018zt/xjpcxytjhzz/201812/t20181203_710030.html.Xu, Chi. 2022. “Digital Gordian Knot, Trade, 11.11: a Special Weekend Edition of Weekly Highlights.” https://www.chinabigidea.info/p/digital-gordian-knot-trade-1111-a.Zimmerman, Nicholas, Lindsay Maizland, and James M. Lindsay. 2022. “Hong Kong`s Freedoms: What China Promised and How It`s Cracking Down.” Council on Foreign Relations. https://www.cfr.org/backgrounder/hong-kong-freedoms-democracy-protests-china-crackdown.Zingales, Luigi. 2022. “Causes and Effects of the Lehman Brothers Bankruptcy.” PSU. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=617982783e3bda3388ac4f2305a971fb57f3f841. 描述 碩士
國立政治大學
亞太研究英語碩士學位學程(IMAS)
109926026資料來源 http://thesis.lib.nccu.edu.tw/record/#G0109926026 資料類型 thesis dc.contributor.advisor 袁力強 zh_TW dc.contributor.advisor James Yuan en_US dc.contributor.author (作者) 亞歷山大 zh_TW dc.contributor.author (作者) Alexander Shelton Hillier en_US dc.creator (作者) 亞歷山大 zh_TW dc.creator (作者) Hillier, Alexander Shelton en_US dc.date (日期) 2022 en_US dc.date.accessioned 2-八月-2023 13:47:41 (UTC+8) - dc.date.available 2-八月-2023 13:47:41 (UTC+8) - dc.date.issued (上傳時間) 2-八月-2023 13:47:41 (UTC+8) - dc.identifier (其他 識別碼) G0109926026 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/146504 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 亞太研究英語碩士學位學程(IMAS) zh_TW dc.description (描述) 109926026 zh_TW dc.description.abstract (摘要) 今天,美國和中國發現自己處於冷戰時期的境地。 民主價值觀和自由世界秩序直接受到共產主義政權攻擊的時代。 儘管美國的核心價值觀和對反對意識形態的立場多年來一直保持不變,但在這個新的數字環境中,它不可避免地會面臨麻煩。 在美國尋求重新確立自己在國際體系中的仁慈力量的過程中,爭奪數字技術的優勢知識至關重要。 如果美國希望重新確立自己的霸主地位,它就必須贏得與中華人民共和國的網絡優勢競賽。 網絡戰與上個世紀的核戰爭一樣重要。 網絡攻擊的建設性和破壞性能力是任命下一個霸主的關鍵。 網絡攻擊徹底改變了間諜活動、宣傳和代理人戰爭等概念。 隨著技術在世界範圍內不斷快速發展,新的漏洞也隨之產生。 美國對保護民主和人權的承諾是其實力和信譽的內在要素。 隨著中國繼續積極向周邊地區擴張,保護台灣主權對於該地區的安全至關重要。 中華民國是東南亞民主和主權的燈塔,美國的上述承諾需要與台灣建立正式關係。 美國必須利用這個機會重塑美國例外論,而不是助長干涉主義。 通過明確支持台灣,美國可以重新坐上霸權寶座,並阻止權力再次向共產主義政權轉移。 zh_TW dc.description.abstract (摘要) Today, the United States and China find themselves in a situation reminiscent of the Cold War. A time in which democratic values and the liberal world order were directly under attack by a communist regime. While America’s core values and stance towards opposing ideologies have stayed the same throughout the years, it will inevitably face troubles within this new digital landscape. The race to secure superior knowledge over digital technologies is paramount in America’s quest to re-establish itself once more as a benevolent force within the international system. If the United States wishes to reassert itself as a hegemon, it must win the race to cyber superiority against the People’s Republic of China. Cyberwarfare is as important as nuclear warfare was in the previous century. The constructive and destructive capabilities of cyberattacks are key in appointing the next hegemon. Cyber attacks have revolutionized concepts such as espionage, propaganda, and proxy warfare. As technology continues to rapidly evolve throughout the world, new vulnerabilities are created. America’s commitment to protecting democracy and human rights is intrinsic to its power and credibility. Protecting Taiwanese sovereignty is integral to the security of the region as China continues to aggressively expand into neighboring areas. The Republic of China is a beacon of democracy and sovereignty in Southeast Asia, and America’s aforementioned commitment necessitates formal relations with Taiwan. The United States must use this opportunity to reinvent American exceptionalism rather than facilitate interventionism. By unequivocally supporting Taiwan, America can reseat itself upon the hegemonic throne and prevent a transfer of power to a communist regime once again. en_US dc.description.tableofcontents Abstract 2概要 3Table of Contents 4Chapter 1: Introduction 61.1. Background 61.2. Research Question 91.3. Purpose 91.4. Literature Review 111.4.1. Economic Interdependence, Bargaining Power, and Political Influence 131.4.2. Attack Motivations 151.4.3. Hegemonic Stability 161.4.4. The Morris Worm 171.4.5. Operation Stuxnet 191.4.6. Penetration Tools 201.4.7. Quantum Computing 211.4.8. Modern Espionage 22a. USA F-35 / PRC J-20 24b. Pulse Connect Secure 25c. Two Chinese Hackers 26d. NSA warns of PRC 27e. PRC Targets Washington 28f. Vaccine Research 29g. Taiwanese Cybersecurity 31h. China’s Cyber Strategy: A Taiwanese Perspective 33i. Taiwan Warns of Chinese Cyberattacks on Government Agencies 34j. PRC forces ROC to bolster defenses 351.4.9. 2017 US NSS 371.4.10. 2022 US NSS 381.4.11. US Cutting Investment in Chinese Tech 411.4.12. Senate Strengthens Exports 421.4.13. Intellectual Mistakes That Crippled Cyber Policy 431.5. Research Methodology 44Chapter 2: The Cold War 452.1. Nuclear Stalemate 462.2. Soft Power 472.3. Indirect Warfare & Propaganda 492.4. The Angolan Civil War 552.5. Economic Warfare 562.6. Cold War Conclusion 58Chapter 3: US Hegemonic Decline 643.1. Korean & Vietnam Wars 643.2. Bush’s Betrayal 663.3. War on Terror 683.4. Financial Crisis of 2008 693.5. South China Sea 723.6. US-China Trade War 763.7. Hegemonic Conclusion 77Chapter 4: The Race to Cyber Superiority 784.1. Dangers For Democracies 834.2. Cold War 2.0 854.3. Redefining US Hegemony & US-Taiwan Relations 914.4. Conclusion 94References 97 zh_TW dc.format.extent 12206836 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0109926026 en_US dc.subject (關鍵詞) 網絡戰 zh_TW dc.subject (關鍵詞) 霸權 zh_TW dc.subject (關鍵詞) 民主 zh_TW dc.subject (關鍵詞) 美台關係 zh_TW dc.subject (關鍵詞) Cyber Warfare en_US dc.subject (關鍵詞) Hegemony en_US dc.subject (關鍵詞) Democracy en_US dc.subject (關鍵詞) US-Taiwan Relations en_US dc.title (題名) 堅守美國理想:美台關係在全球民主中所扮演之角色 zh_TW dc.title (題名) Upholding American Ideals: The Role of US-Taiwan Relations in Global Democracy en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) 2009. Globalization of Media – Understanding Media and Culture. https://open.lib.umn.edu/mediaandculture/chapter/13-6-globalization-of-media/.“Advanced Persistent Threats (APTs) | Threat Actors & Groups.” n.d. Mandiant. Accessed February 18, 2023. https://www.mandiant.com/resources/insights/apt-groups.Akaha, Tsuneo, Jingdong Yuan, and Wei Liang, eds. 2021. Trump’s America and International Relations in the Indo-Pacific: Theoretical Analysis of Changes & Continuities. N.p.: Springer International Publishing.Allison, William T. 2008. “The Tet Offensive | A Brief History with Documents | William Thomas Al.” Taylor & Francis eBooks. https://www.taylorfrancis.com/books/mono/10.4324/9780203931776/tet-offensive-william-thomas-allison.“Anglo-American Strategic Air Power Co-operation in the Cold War and Beyond.” 2022. ProQuest. https://www.proquest.com/openview/4652e9e1c9e3c9ceb97083335b78344d/1?pq-origsite=gscholar&cbl=26498.Ansari, Saghir A. 2022. “India`s Trade Relations with China in the Era of Globalization.” Sage Journals. https://journals.sagepub.com/doi/10.1177/0015732515110303.Bhardwaj, Rashmi. n.d. “What Is Stuxnet? What It Is and How It Works.” IP With Ease. Accessed March 2, 2023. https://ipwithease.com/what-is-stuxnet-what-it-is-and-how-it-works/.Blanton, Stephen D. 1993. “A Study of the United States Navy`s Minesweeping efforts in the Korean War.” Texas Tech. https://ttu-ir.tdl.org/bitstream/handle/2346/60894/31295007673907.pdf;sequence.Blight, James G. 1987. “The Cuban Missile Crisis Revisited.” jstor. https://doi.org/10.2307/20043297.Borer, Douglas A. 2007. “Rethinking the Cuban Embargo: An Inductive Analysis.” Oxford Academic. https://academic.oup.com/fpa/article-abstract/3/2/127/1792875.“Brookings experts on Trump`s National Security Strategy.” 2017. Brookings. https://www.brookings.edu/research/brookings-experts-on-trumps-national-security-strategy/.Bushberg, Jerrold T., Andres Gannon, and Alyssa Ayres. 2017. “More Prominence for India and the Indo-Pacific in the U.S. National Security Strategy.” Council on Foreign Relations. https://www.cfr.org/blog/more-prominence-india-and-indo-pacific-us-national-security-strategy.Carmichael, Joe. 2016. “Hacking Experts Say John McAfee`s Cyberattack Warnings Will Make America Safer.” Inverse. https://www.inverse.com/article/16022-hacking-experts-say-john-mcafee-s-cyberattack-warnings-will-make-america-safer.Carter, Joe. 2016. “5 facts about Captive Nations Week.” ERLC. https://erlc.com/resource-library/articles/5-facts-about-captive-nations-week/.CHAU, THOMPSON, and CHENG TING. 2022. “Cyber warfare: China attacks force Taiwan to bolster defenses.” Nikkei Asia. https://asia.nikkei.com/Spotlight/Asia-Insight/Cyber-warfare-China-attacks-force-Taiwan-to-bolster-defenses.Cheung, Louis. 2021. 彩云香江on Twitter: "J-20 cockpit vs F-35 cockpit https://t.co/tLNFdHJ80J". https://twitter.com/louischeung_hk/status/1468419197214490625.“China says US ‘arrogant and selfish’ after indictmentss.com/News/front/archives/2018/12/22/2003706572.” 2018. Taipei Times. https://www.taipeitimes.com/News/front/archives/2018/12/22/2003706572.“Chinese Threats in the Quantum Era.” 2023. Booz Allen Hamilton. https://www.boozallen.com/expertise/analytics/quantum-computing/chinese-cyber-threats-in-the-quantum-era.html.“cold War - Proxy War.” 2022. Gerald Ford Museum. https://www.fordlibrarymuseum.gov/museum/exhibits/coldwar/proxywar.html.“Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.“Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1.Daniel, Ellen. 2018. “Thirty years on, what has changed since the Morris Worm?” Verdict. https://www.verdict.co.uk/morris-worm-cyber-security/.“Defense Primer: U.S. Precision-Guided Munitions.” 2022. CRS Reports. https://crsreports.congress.gov/product/pdf/IF/IF11353.Garfield, R. 2011. “The impact of the economic crisis and the US embargo on health in Cuba.” American Journal of Public Health. https://ajph.aphapublications.org/doi/abs/10.2105/AJPH.87.1.15.“GDP growth (annual %) - China | Data.” 2023. World Bank Data. https://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG?locations=CN.Gunawan, Arief S. 2002. “Five Forces Porter Framework (Ward and Peppard,2002) | Download Scientific Diagram.” ResearchGate. https://www.researchgate.net/figure/Five-Forces-Porter-Framework-Ward-and-Peppard-2002_fig1_304013321.Halloran, Richard. 2022. “China Hands: Nine Decades of Adventure, Espionage, and Diplomacy in Asia.” Gale Academic Onefile. https://go.gale.com/ps/i.do?id=GALE%7CA126491255&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=00311723&p=AONE&sw=w&userGroupName=anon%7Ef61452ab.Hanna, Terrell. 2021. “What are social engineering attacks? - Security.” TechTarget. https://www.techtarget.com/searchsecurity/definition/social-engineering.Harrison, R. 1988. “Economic interdependence, bargaining power, and political influence.” IDEAS/RePEc. https://ideas.repec.org/a/cup/intorg/v42y1988i03p461-483_02.html.Hill, Michael. 2022. “China`s attack motivations, tactics, and how CISOs can mitigate threats.” CSO Online. https://www.csoonline.com/article/3676075/china-s-attack-motivations-tactics-and-how-cisos-can-mitigate-threats.html.Hioe, Brian, Mercy A. Kuo, and Dechlan Brennan. 2023. “Taiwan Cabinet Reshuffle Sets the Stage for 2024 Presidential Elections.” The Diplomat. https://thediplomat.com/2023/02/taiwan-cabinet-reshuffle-sets-the-stage-for-2024-presidential-elections/.Hossain, Kamrul. 2022. “The UNCLOS and the US-China Hegemonic Competition over the South China Sea.” Hein Online. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jeasil6&div=10&id=&page=.Hwang, Ji-Jen. 2017. “한국학술지인용색인.” 한국학술지인용색인. https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002199620.Itasari, Endah R. 2022. “LEGAL PROTECTION OF UIGHUR MUSLIM ETHNICS IN CHINA FROM PERSPECTIVE HUMAN RIGHTS.” LamLaj. https://pdfs.semanticscholar.org/bb9c/71812869090f15fa147a95272b256a2b4322.pdf.Kabeer, N. 2001. “Bargaining Power.” ScienceDirect. https://www.sciencedirect.com/topics/computer-science/bargaining-power.Kamrany, Nake M. 2012. “Ending the 30-Year War in Afghanistan.” Middle East Institute. https://www.mei.edu/publications/ending-30-year-war-afghanistan.Katada, Saori N. 2022. “At the crossroads : the TPP, AIIB, and Japan`s foreign economic strategy.” Scholar Space. https://scholarspace.manoa.hawaii.edu/items/c181166e-e43d-4bfe-88a1-a609dcd2d496.Killion, Ulric. 2009. “The US-China Trade Conflict: A Game Theoretical Analysis.” IDEAS. https://ideas.repec.org/p/guc/wpaper/15.html.Koivunen, Pia. 2022. “Performing Peace and Friendship.” Degruyter. https://www.degruyter.com/document/doi/10.1515/9783110761160/html?lang=en.Korolov, Maria. 2017. “How hackers crack passwords and why you can`t stop them.” CSO Online. https://www.csoonline.com/article/3236716/how-hackers-crack-passwords-and-why-you-cant-stop-them.html.Lebow, Richard N. 1995. “Deterrence and the Cold War.” Political Science Quarterly Vol. 110, no. 2 (Summer): 157-181 (25 pages). https://doi.org/10.2307/2152358.Lee, Yimou. 2020. “Taiwan says China behind cyberattacks on government agencies, emails.” Reuters. https://www.reuters.com/article/us-taiwan-cyber-china-idUSKCN25F0JK.Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Scinapse. https://www.scinapse.io/papers/1972914161.Lyngaas, Sean. 2021. CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.Lyngaas, Sean. 2022. “At least 24 agencies run Pulse Secure software. How many were hacked is an open question.” CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/.Martin, Katherine C. 2015. “George Orwell and the origin of the term `cold war.`” OUP Blog. https://blog.oup.com/2015/10/george-orwell-cold-war/.Mattis, Peter, and Sebastian Strangio. 2011. “China`s Misunderstood Spies – The Diplomat.” The Diplomat. https://thediplomat.com/2011/10/chinas-misunderstood-spies/.“The Morris Worm Virus: How it Works and How to Protect Yourself.” 2022. History-Computer. https://history-computer.com/the-morris-worm-virus-how-it-works-and-how-to-protect-yourself/.Nance, Brad. 2019. “Using Pulse Connect Secure© to Implement Multi-Factor Authentication Solutions.” U.S. Department of Energy: Office of Scientific and Technical Informaton. https://www.osti.gov/biblio/1550735.“NATIONAL SECURITY STRATEGY.” 2022. The White House. https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf.“National Security Strategy 2017.” 2017. National Security Strategy Archive. http://nssarchive.us/national-security-strategy-2017/.Nemeth, Stephen C. 2014. “Ruling the Sea: Managing Maritime Conflicts through UNCLOS and Exclusive Economic Zones.” Taylor & Francis Online. https://www.tandfonline.com/doi/abs/10.1080/03050629.2014.897233.Novak, Matt. 2022. “China to Stop Welding Homes Shut Over Covid After Protests.” Gizmodo. https://gizmodo.com/china-relaxes-harshest-covid-19-rules-after-protests-1849862755.“N S S.” 2017. Trump White House Archive. https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.Nye, Joseph S. 1990. “Soft Power.” no. No. 80 (Autumn), 153-171 (19 pages). https://doi.org/10.2307/1148580.Nye, Joseph S. 2022. “American and Chinese Power after the Financial Crisis.” tandfonline. https://www.tandfonline.com/doi/abs/10.1080/0163660X.2010.516634?journalCode=rwaq20.Patch, Buel W. 2023. “Soviet Peace Offensives: CQR.” CQ Press Library. https://library.cqpress.com/cqresearcher/document.php?id=cqresrre1951080300.Pearce, Justin. 2012. “Control, politics and identity in the Angolan Civil War.” African Affairs. https://doi.org/10.1093/afraf/ads028.Porup, JM, and Josh Fruhlinger. 2021. “11 penetration testing tools the pros use.” CSO Online. https://www.csoonline.com/article/2943524/11-penetration-testing-tools-the-pros-use.html.Rider, Toby C. 2022. “A Campaign of Truth: The State Department, Propaganda, and the Olympic Games, 1950–1952.” MIT. https://direct.mit.edu/jcws/article-abstract/18/2/4/13570/A-Campaign-of-Truth-The-State-Department.Robinson, Christopher. 2020. “Dr. Ji-Jen Hwang discusses Taiwan’s Cybersecurity Environment versus China’s Cyber Strategy.” The Institute of World Politics. https://www.iwp.edu/past-events/2020/07/09/dr-ji-jen-hwang-discusses-taiwans-cybersecurity-environment-versus-chinas-cyber-strategy/.Roos, Meghan, Nick Gillespie, Jason Nichols, and Ben Weingarten. 2020. “Chinese Hackers Targeted U.S. COVID Vaccine Research, Prosecutors Allege.” Newsweek. https://www.newsweek.com/two-chinese-hackers-targeted-us-covid-vaccine-research-military-intelligence-prosecutors-allege-1519503.Satam, Parth. 2022. “`Battle Of 35s`: US F-35 Or China`s J-35 Stealth Aircraft, A Battle Of Equals Or Comparing Apples With Oranges?” EurAsian Times. https://eurasiantimes.com/american-f-35-vs-chinese-j-35-stealth-aircraft-a-battle-of-equals/.SEITZ, AMANDA, ERIC TUCKER, and MIKE CATALINI. 2022. “How China`s TikTok, Facebook influencers push propaganda.” AP News. https://apnews.com/article/china-tiktok-facebook-influencers-propaganda-81388bca676c560e02a1b493ea9d6760.Shaikh, Shaan, and Tom Karako. 2021. “S-300 | Missile Threat.” Missile Threat. https://missilethreat.csis.org/defsys/s-300/.Silk, Jesse A. 2014. “"A Generation That Didn`t Agree": The Paramountcy of Multidimensional Moral Hierarchy in the System of a Down Discography.” DigitalCommons@Cedarville. https://digitalcommons.cedarville.edu/english_seminar_capstone/25/.Smalley, Suzanne. 2022. “Investors, analysts question Biden`s plan to limit U.S. investments in Chinese tech.” CyberScoop. https://www.cyberscoop.com/biden-admin-limit-investment-china/.Smalley, Suzanne. 2022. “Commerce lacks intelligence resources to keep U.S. tech from fueling Chinese cyberthreat, experts warn.” CyberScoop. https://www.cyberscoop.com/senate-intel-to-strengthen-intelligence-exports/.Stone, Jeff. 2020. “US accuses two Chinese hackers of global hacking campaign, targeting coronavirus vaccine research.” CyberScoop. https://www.cyberscoop.com/chinese-hackers-accused-targeting-coronavirus-vaccine-research/.“Taiwan Independence vs. Unification with the Mainland(1994/12~2022/12).” 2023. Election Study Center, NCCU-Taiwan Independence vs. Unification with the Mainl. https://esc.nccu.edu.tw/PageDoc/Detail?fid=7801&id=6963.Tang, Frank. 2020. “China GDP: Xi Jinping says `completely possible` to double size of economy by 2035, despite foreign hostility.” South China Morning Post. https://www.scmp.com/economy/china-economy/article/3108767/china-gdp-xi-jinping-says-completely-possible-double-size.Taylor, Craig. 2020. “Stuxnet.” CyberHoot. https://cyberhoot.com/cybrary/stuxnet/.“Top 5 Most Notorious Attacks in the History of Cyber Warfare.” 2023. Fortinet. https://www.fortinet.com/resources/cyberglossary/most-notorious-attacks-in-the-history-of-cyber-warfare.“Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information.” 2018. Department of Justice. https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion.Ulric, Killion M. 2009. “Relation of game theory to economic history and marginalism.” University Library of Munich. https://ideas.repec.org/p/pra/mprapa/13378.html.Vavra, Shannon. 2020. “Chinese intelligence-linked hackers are exploiting known flaws to target Washington, US says.” CyberScoop. https://www.cyberscoop.com/chinese-intelligence-hackers-us-government-agencies-ministry-state-security/.Vavra, Shannon, and Tonya Riley. 2020. “NSA warns defense contractors of recent Chinese government-backed hacking.” CyberScoop. https://www.cyberscoop.com/defense-contractors-chinese-government-hacking-nsa/.Velde, James V. 2022. “The intellectual mistakes that crippled U.S. cyber policy.” CyberScoop. https://www.cyberscoop.com/intellectual-mistakes-crippled-cyber-policy/?category_news=news.“The Vietnam War and the My Lai Massacre | AP US History Study Guide from The Gilder Lehrman Institute of American History.” 2023. AP Gilder Lehrman. https://ap.gilderlehrman.org/history-by-era/sixties/essays/vietnam-war-and-my-lai-massacre.Wagner, R. H. 1988. “Economic interdependence, bargaining power, and political influence.” EconPapers. https://econpapers.repec.org/article/cupintorg/v_3a42_3ay_3a1988_3ai_3a03_3ap_3a461-483_5f02.htm.Webb, Michael C. 2009. “Hegemonic Stability Theory: An Empirical Assessment.” Cambridge. https://doi.org/10.1017/S0260210500112999.Williamson, John. 2012. “Is the "Beijing Consensus" Now Dominant? - The National Bureau of Asian Research (NBR).” National Bureau of Asian Research. https://www.nbr.org/publication/is-the-beijing-consensus-now-dominant/.Wong, Sharon. 2011. “Voice of America in the post-Cold War era.” Opportunities and challenges to external media services via new information and communication technology 73 (4): 343-358. https://doi.org/10.1177/1748048511398599.Woo, Etienne. 2022. “Narrating the Belt and Road Education Policy: A Critical Policy Discourse Analysis.” NCBI. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9344438/.“Xi sends condolences to Trump on death of former U.S. President George H.W. Bush.” 2018. Ministry of Foreign Affairs of the People`s Republic of China. https://www.fmprc.gov.cn/mfa_eng/topics_665678/2018zt/xjpcxytjhzz/201812/t20181203_710030.html.Xu, Chi. 2022. “Digital Gordian Knot, Trade, 11.11: a Special Weekend Edition of Weekly Highlights.” https://www.chinabigidea.info/p/digital-gordian-knot-trade-1111-a.Zimmerman, Nicholas, Lindsay Maizland, and James M. Lindsay. 2022. “Hong Kong`s Freedoms: What China Promised and How It`s Cracking Down.” Council on Foreign Relations. https://www.cfr.org/backgrounder/hong-kong-freedoms-democracy-protests-china-crackdown.Zingales, Luigi. 2022. “Causes and Effects of the Lehman Brothers Bankruptcy.” PSU. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=617982783e3bda3388ac4f2305a971fb57f3f841. zh_TW