政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/118562
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113822/144841 (79%)
Visitors : 51827568      Online Users : 352
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/118562


    Title: 網路安全與美中關係:理論的分析
    Cybersecurity and United States-China Relations: A Theoretical Perspective
    Authors: 陶俊廷
    DAVILA, JUAN MANUEL DE LA TORRE
    Contributors: 盧業中
    Lu, Yeh-Chung
    陶俊廷
    JUAN MANUEL DE LA TORRE DAVILA
    Keywords: 網路安全
    網路強國
    網路空間
    網路攻擊
    Cybersecurity
    Cyberpower
    Cyberspace
    Cyberattacks
    Date: 2018
    Issue Date: 2018-07-10 15:38:01 (UTC+8)
    Abstract: 發展迅速的科技大大改變21世紀國際體系中的互動方式。根據此背景,本論文將使用兩個主要理論架構來分析網路安全對中美關係的影響,新現實主義的攻防平衡理論助於了解網路攻擊背後的邏輯,而自由主義認為可以利用和平的手段解決衝突,甚至在網路空間中。網路安全的重要性作為一個在國際關係的新威脅已經帶給許多國家不同尋常的挑戰。就美國和中國而言,網路安全在短時間內產生摩擦和衝突比兩國之間其他的歷史議題還更嚴重。近年來網路攻擊更加劇中美關係的不確定性,導致兩國之間在經濟和政治上互信不足,儘管如此,為何這兩個國家仍然達成協議?研究者認為這一協議背後主要原因是為了避免經濟制裁,對此,新現實主義和自由主義各有不同的觀點。研究者藉著回應四個研究問題,對中美雙方在網路安全的看法,提出具洞察力的見解。除此之外,在理論架構下,研究者解釋了他們會達成此協議的原因,以及中美關係在網路安全上會面臨哪些機會和挑戰。最後,作者說明這些行為導致美國和中國等國外交政策「數位化」的原因。
    The rapid development of technology in the 21st century has dramatically changed the way actors in the international system interact, the internet and the threats challenges brought by it have created lack of understanding regarding the implications it has for security. Given this context, this thesis analyzes the impact of cybersecurity in United States-China relations using two of the main theoretical frameworks in international relations: neorealism and liberalism. Neorealism’s offense-defense balance concept contributes to an understanding of the logic behind cyberattacks, while liberalism observes that there is a possibility to overcome conflicts by peaceful means, even in the cyberspace.
    The importance of cybersecurity as a new threat in international relations has created unusual challenges for states around the world. In the case of the US and China, cybersecurity has generated, in a short period of time, more friction and engagement between the two countries than any other historical issue. Cybersecurity attacks in recent years have increased uncertainty in US-China relations, contributing to a deficit in economic and political trust between these two nations, nevertheless, why do these states still have reached an agreement? I suggest that the main reason behind this decision is the desire to avoid economic sanctions, nevertheless, neorealism and liberalism offer different reasons.
    By answering four research questions the author gives insightful information about each country’s view on cybersecurity. Furthermore, with the theoretical framework, I explain why they have reached such an agreement and what are the opportunities and challenges for the United States-China relations regarding cybersecurity. Finally I explain why all these actions have led to a “digitalization” of the practices of Foreign Policy of states such as the United States and China
    Reference: Adler, E. (2002). Handbook of International Relations. in London: SAGE Publications Ltd. Retrieved from http://sk.sagepub.com/reference/hdbk_intlrelations. doi:10.4135/9781848608290
    Bader, J. A. (2016). How Xi Jinping Sees The World & And Why. Order From Chaos: Foreign Policy in a Troubled World.
    Baldwin, D. (1997). The Concept Of Security. Review Of International Studies, 23(1), (pp. 5-26). doi:10.1017/S0260210597000053
    Baylis, J. (2008). The Concept of Security in International Relations. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 495-502). Berlin, Heidelberg: Springer Berlin Heidelberg.
    Brauch, H. G. (2008). Introduction: Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century. In H. G. Brauch, Ú. O. Spring, C. Mesjasz, J. Grin, P. Dunay, N. C. Behera, B. Chourou, P. Kameri-Mbote, & P. H. Liotta (Eds.), Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century (pp. 27-43). Berlin, Heidelberg: Springer Berlin Heidelberg.
    Brown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 1: The US Approach to Cyberspace. The Diplomat.
    Brown, G., & Yung, C. D. (2017). Evaluating the US-China Cybersecurity Agreement, Part 3: Over a Year Later, What Impact has the 2015 Cyber Agreement had on U.S.-China Relations? The Diplomat.
    Bull, H. (1977). The Anarchical Society: A Study of Order in World Politics. New York.
    Buzan, B. (1983). People, States, and Fear: The National Security Problem in International Relations: Wheatsheaf Books.
    Buzan, B. (2008). The Changing Agenda of Military Security. Globalization and Environmental Challenges, (pp. 553-560).
    Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A New Framework for Analysis: Lynne Rienner Pub.
    China Internet Network Information Center. (2017). Statistical Report on Internet Development in China. In: CNNIC Beijing.
    Choucri, N. (2012). Cyberpolitics in International Relations: MIT press.
    Coats, D. R. (2017). Worldwide Threat Assessment of the US Intelligence Community. Retrieved from https://www.dni.gov/files/documents/Newsroom/Testimonies/SSCI%20Unclassified%20SFR%20-%20Final.pdf.
    Dunne, T., Kurki, M., & Smith, S. (2013). International Relations Theories: Oxford University Press.
    Eriksson, J., & Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review / Revue internationale de science politique, 27(3), (pp. 221-244).
    Farrell, H., & Glaser, C. L. (2017). The Role of Effects, Saliencies and Norms in US Cyberwar Doctrine. Journal of Cybersecurity, 3(1), (pp 7-17). doi:10.1093/cybsec/tyw015
    Fountain, J. (2004). Building the Virtual State: Information Technology and Institutional Change: Brookings Institution Press.
    German Federal Ministry of the Interior. (2011). Cyber Security Strategy for Germany. Federal Ministry of the Interior Retrieved from https://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile.
    Gierow, H. J. (2014). Cyber Security in China: New Political Leadership Focuses on Boosting National Security Restructuring Internet Regulation. Placing Restrictions on Foreign Software. Developing the PRC`s own IT Standards. China Monitor.
    Glaser, C. L., & Kaufmann, C. (1998). What is the Offense-Defense Balance and how can we Measure it? International Security, 22(4), (pp. 44-82).
    Hanson, E. C. (2008). The Information Revolution and World Politics: Rowman & Littlefield Publishers.
    He, R. (2013) China Opposes and Combats Cyber Attacks. Financial Times.
    Healey, J. (2013). China is a Cyber Victim, too. Foreign Policy(April 16).
    Heginbotham, E., Nixon, M., Morgan, F. E., Hagen, J., Heim, J. L., Engstrom, J., . . . Libicki, M. C. (2015). The US-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017: Rand Corporation.
    Hennessey, S. (2017). Deterring Cyberattacks: How to Reduce Vulnerability. Foreign Affairs, 96(6), (pp. 39-46).
    Jackson, R. H., & Sørensen, G. (2007). Introduction to International Relations: Theories and Approaches: Oxford University Press.
    Jørgensen, K. E. (2017). International relations theory: A new introduction: Macmillan International Higher Education.
    Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War: Simon & Schuster.
    Kelly, N., & Foran, C. (2015). President Obama and Chinese President Xi Jinping Announce Cybersecurity Agreement. The Atlantic.
    Kissinger, H. (2015). World order: Penguin Books.
    Koselleck, R., & Presner, T. S. (2002). The Practice of Conceptual History: Timing history, spacing concepts: Stanford University Press.
    Kremer, J.-F., & Müller, B. (2014). SAM: A Framework to Understand Emerging Challenges to States in an Interconnected World. In Cyberspace and International Relations (pp. 41-58): Springer.
    Kshetri, N. (2013). Cyber-Victimization and Cybersecurity in China. Commun. ACM, 56(4), (pp 35-37). doi:10.1145/2436256.2436267
    Kshetri, N. (2016). Cybersecurity in China. In The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies (pp. 123-143). Cham: Springer International Publishing.
    Kshetri, N. (2016). The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies: Springer International Publishing.
    Kuehl, D. T. (2009). From Cyberspace to Cyberpower: Defining the Problem. Cyberpower and national security, (pp. 24-42).
    Li, C. (2016). Assessing US-China Relations Under the Obama Administration. Brookings Institution, 5.
    Li, R. (2004). Security Challenge of an Ascendant China: Great Power Emergence and International Stability. Chinese Foreign Policy: Pragmatism and Strategic Behaviour, East Gate, New York, (pp. 23-58).
    Lieberthal, K., & Singer, P. W. (2012). Cybersecurity and US-China relations: Brookings.
    Lindsay, J. R. (2015). The impact of China on Cybersecurity: Fiction and friction. International Security, 39(3), (pp. 7-47).
    Longdi, X. (2014). China`s Internet Development and Cybersecurity–Policies and Practices. Chinese Cybersecurity and Defense, (pp. 1-54).
    Molyneux, S. (1999). Broadband Internet: Future Applications and Challenges. In J. Vince & R. Earnshaw (Eds.), Digital Convergence: The Information Revolution (pp. 3-12). London: Springer London.
    Nye, J. S. (2011). Nuclear Lessons for Cyber Security? (Vol. 5): Strategic Studies Quarterly.
    OECD. (2011). Cybersecurity Policy Making at a Turning Point: OECD Publishing.
    Parker, E. (2017). Hack Job: How America Invented Cyberwar. Foreign Affairs, 96(3), (pp. 133-138).
    Pei, M. (2014). How China and America See Each Other. Foreign Affairs, 93(2), (pp. 31-32).
    Petallides, C. J. (2012). Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat. Inquiries Journal/Student Pulse, 4(03). Retrieved from http://www.inquiriesjournal.com/a?id=627
    Radu, R. G. (2012). The Monopoly of Violence in the Cyber Space: Challenges of Cyber Security. In E. Fels, J.-F. Kremer, & K. Kronenberg (Eds.), Power in the 21st Century: International Security and International Political Economy in a Changing World (pp. 137-150). Berlin, Heidelberg: Springer Berlin Heidelberg.
    Renard, T. (2015). US-China Cybersecurity Agreement: A Good Case of Cyber Diplomacy. Egmont Commentary, 1 October 2015.
    Romanosky, S. (2016). Examining the Costs and Causes of Cyber Incidents. Journal of Cybersecurity, 2(2), (pp. 121-135). doi:10.1093/cybsec/tyw001
    Rulog, H. (2013) China Opposes and Combats Cyber Attacks. Financial Times.
    Segal, A. (2012). U.S. and China in Cyberspace: Uneasy Next Steps. In: Council on Foreign Relations.
    Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age: Hachette UK.
    Segal, A. (2017). How China is Preparing for Cyberwar. The Christian Science Monitor.
    Sutter, R. G. (2013). US-Chinese Relations: Perilous Past, Pragmatic Present: Rowman & Littlefield Publishers.
    The International Telecommunication Union (ITU). (2008). Overview of Cybersecurity, Recommendation ITU–T X.1205. Paper presented at the The ITU Plenipotentiary Conference 2010, Guadalajara, Jalisco, Mexico. http://​tinyurl.​com/​boys7dj
    The International Telecommunication Union (ITU). (2017). Global Cybersecurity Index 2017. In: ITU.
    The White House. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington D.C.: White House.
    The White House. (2013). Executive Order on Improving Critical Infrastructure Cybersecurity [Press release]. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity-0
    The White House. (2015). FACT SHEET: Cyber Threat Intelligence Integration Center. The White House, Office of the Press Secretary Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2015/02/25/fact-sheet-cyber-threat-intelligence-integration-center.
    The White House. (2015). Fact Sheet: President Xi Jinping’s State Visit to the United States. Press Release, 25.
    The World Bank. (2017). Individuals Using the Internet (% of population) [Table]. In (pp. Internet users are individuals who have used the Internet (from any location) in the last 3 months. The Internet can be used via a computer, mobile phone, personal digital assistant, games machine, digital TV etc.).
    Thornburgh, N., Forney, M., Bennett, B., Burger, T. J., & Shannon, E. (2005). The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them). Time Magazine, 29, 1098961-1098961.
    U.S. Department of Homeland Security. (2018). Cybersecurity Strategy. Retrieved from https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf.
    U.S. Department of the Treasury. (2009). Fact Sheet: U.S.‐China Strategic and Economic Dialogue. Retrieved from https://www.treasury.gov/initiatives/Documents/SEDfactsheet09.pdf.
    United States National Security Council. (2010). Cyberspace Policy Review: Securing America`s Digital Future: Cosimo, Incorporated.
    Valeriano, B., & Maness, R. C. (2018). International Relations Theory and Cyber Security. The Oxford Handbook of International Political Theory, (pp. 259).
    Ventre, D. (2014). Chinese cybersecurity and defense: John Wiley & Sons.
    Vince, J., & Earnshaw, R. (2012). Digital Convergence: The Information Revolution: Springer London.
    Volz, D. (2016). Yahoo Says Hackers Stole Data From 500 Million Accounts in 2014. Reuters. Retrieved from https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-hackers-stole-data-from-500-million-accounts-in-2014-idUSKCN11S16P
    Waltz, K. N. (1979). Theory of International Politics: Waveland Press.
    Weibin, Z. (2017). The Four Stages of Sino-American Cyber Relations. In: China-United States Exchange Foundation.
    Wu, X. (2005). Chinese Cyber Nationalism: How China`s Online Public Sphere Affected its Social and Political Transitions. University of Florida,
    中华人民共和国国务院. (2012). 国务院出台意见推进信息化发展切实保障信息安全.
    Description: 碩士
    國立政治大學
    國際研究英語碩士學位學程(IMPIS)
    105862016
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G1058620161
    Data Type: thesis
    DOI: 10.6814/THE.NCCU.IMPIS.007.2018.A06
    Appears in Collections:[International Master`s Program in International Studies] Theses

    Files in This Item:

    File SizeFormat
    016101.pdf2425KbAdobe PDF2265View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback