English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113318/144297 (79%)
Visitors : 51020330      Online Users : 903
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/128958


    Title: 網路地緣政治下美國國家安全之實踐
    The practice of U.S. National Security under cyber geo-politics
    Authors: 黃翊豪
    Huang, Yi-Hao
    Contributors: 黃奎博
    Huang,Kwei-Bo
    黃翊豪
    Huang,Yi-Hao
    Keywords: 國家安全
    美國
    網路地緣政治
    關鍵資訊基礎設施
    United States
    National security
    Cyber geopolitics
    Critical information infrastructure
    Date: 2020
    Issue Date: 2020-03-02 11:31:53 (UTC+8)
    Abstract: 網路時代的進步對於現在國家影響深遠,網路成為了國家對內安全與對外外交的一種手段,如何取得網路使用權並確保穩定地使用是現代國家所要思考的議題。然而網路是一個複雜的複合體,組成成分包括實體的基礎設施、虛擬的網路協定與網路內容,且這些組成成分具有上與下的層級結構;虛擬的數位編碼所構成的世界最終都依附在有形的關鍵資訊基礎設施上,而這些基礎設施存在於我們肉眼所見的世界某處,從深海海床的海底電纜、陸地上的資料中心、太空中心到外太空的衛星。網路世界的資訊在這些設施中傳遞、最後再到終端的使用者裝置上。網路的虛擬世界深深影響著現實的世界,而虛擬世界的根基卻又存在於現實世界中,因此這些虛擬世界的根本便存在著地緣政治的思考。
    確保關鍵基礎設施有助於網路強國美國從根本鞏固國家安全,美國在重要的關鍵資訊基礎設施如海底電纜、資料中心、太空中心在建構上仍存在地緣政治的思考,與潛在對手在海底電纜保持間接連結避免直接連結、資料中心多集中在美國以利資料蒐集及太空中心在地緣上遠離威脅並掌握核心的升空技術以確保美國在人造衛星的技術領先。
    The Internet has far-reaching effected on the states. The Internet has become a means of national internal security and foreign diplomacy.It’s important for modern nations that how to obtain the power of using the Internet and ensuring its stable use. However, the Internet is a complex complex, and its components include physical infrastructure, virtual network protocols and network content, and these components have a hierarchical structure above and below; the world made up of virtual digital coding is ultimately Attached to tangible key information infrastructure that exists somewhere in the world as we see it, from submarine cables on the deep ocean floor, data centers on land, space centers to satellites in outer space. Information from the online world is passed through these facilities and finally to end-user devices. The virtual world of the Internet deeply affects the real world, but the foundation of the virtual world exists in the real world, so there is geopolitical thinking at the root of these virtual worlds.
    Ensuring critical infrastructure helps the Internet powerhouse the United States to fundamentally consolidate national security. The United States still has geopolitical reflections on the construction of important critical information infrastructures such as submarine cables, data centers, and space centers. Maintain indirect links to avoid direct links, data centers are mostly concentrated in the United States to facilitate data collection, and the space center is geographically away from threats and masters core lift-off technologies to ensure that the United States leads the technology of artificial satellites.
    Reference: 壹、中文部分
    一、官方文獻
    國家實驗研究院,「〈福爾摩沙衛星七號發射升空〉」,2019年。
    二、專書
    Babbie,Earl著,李美華譯,《社會科學研究方法(上)》(台北:時英出版社,1999)。
    Barry Buzan and Lene Hansen著,余瀟楓譯,《國際安全研究的演化》(杭州:浙江大學出版社,2011)。
    Brzezinski,Zbigniew著,林添貴譯,《大棋盤 : 全球戰略大思考》(新北市新店區:立緒文化,1998)。
    Kurbalija,Jovan著,陳文生譯,《網路治理概論》(台北:Diplo,2017)。
    呂秋文,《如何撰寫學術論文》(台北:台灣商務印書館,2007)。
    朱浤源,《撰寫博碩士論文實戰手冊》(台北:正中書局,2000)。
    張中勇,《情報與國家安全之研究》(台北:三鋒出版社,1993)。
    葉至誠、葉立誠,《研究方法與論文寫作》(台北:商鼎文化出版社,2001)。
    王玉民,《社會科學研究方法原理》(台北:洪葉文化事業,1995)。
    翁明賢,《全球化時代的國家安全》(新北市新店區:創世文化事業出版社,2003)。
    三、期刊
    樊國楨、韓宜蓁,〈美國關鍵基礎設施防護法案與資訊安全管理技術控制標準化〉,《國防雜誌》,第30卷第4期 (2015),頁97-122。
    李安曜、嚴奇峰,〈國家安全與個人隱私-數位時代的政府監控爭議〉,《中原企管評論》,第14卷第2期 (2015),頁1-18。
    李國榮,〈美軍強化關島基地對我國之影響〉,《國防雜誌》,第21卷第2期,(2006),頁42-51。
    劉振榮,〈人造衛星的發展與展望〉,《科技博物》,第3卷第2期 (1999),頁83-88。
    劉聰德,〈人造衛星所帶動的國家政策〉,《科技發展政策報導》,(2007),頁80-84。
    劉燕青,〈網路空間的控制邏輯〉,《資訊社會研究》,第5期 (2003),頁283-303。
    劉志雲、劉盛,〈基於國家安全的互聯網全球治理〉,《廈門大學學報(哲學社會科學版)》,第2期 (2016),頁11-20。
    梁德昭、朱志平、林凱薰,〈國家主權延伸至網路空間之討論〉,《前瞻科技與管理》,第2卷第2期 (2012),頁1-14。
    陳彥升,〈台灣火箭與太空的故事〉,《新世紀智庫論壇》,第80期 (2017),頁49-54。
    孫中偉、賀軍亮、田建文,〈網絡空間的空間歸屬及其物質性構建的地理認知〉,《世界地理研究》,第2期 (2016),頁148-57。
    尤正才,〈我國現行法規中之『國家安全』概念分析〉,《國家發展研究》,第9卷第2期 (2010),頁27-80。
    汪毓瑋,〈架構2018國家安全防恐防護網〉,《法務部調查局清流雙月刊1月號》,(2018),頁3-25。
    四、網路資源
    「Spacex發衛星提供覆蓋全球wifi 馬斯克擔心被中國擊落」,BBC中文網,2018年2月26日,https://www.bbc.com/zhongwen/trad/world-43201428。
    國際中心/綜合報導,「美國稜鏡計畫監控網路臉書、Google皆入榜」,ETTODAY新聞雲,2013年6月11日,https://www.ettoday.net/news/20130611/220926.htm。
    傅旋,「美國攻打伊拉克的合法性在聯合國體制中探討」,2018年9月30日,http://www.csil.org.tw/csil2011/student/Student200302.pdf。
    簡恒宇,「《境外勢力干預選舉經典案例》美國國會報告:俄羅斯『社群網戰』全方位助選川普、Instagram成最主要工具」,風傳媒,2018年12月18日,https://www.storm.mg/category/k23385。
    中國新聞組,世界日報,「美國圍堵華為海底電纜成新戰場環時引述專家:典型做賊心虛」,聯合新聞網,2019年3月14日,https://udn.com/news/story/6811/3696697。
    陳文生,「全球網路分裂的隱憂與資料在地化政策」,NII產業發展協進會,2017年9月8日,https://www.nii.org.tw/events/ncc/download/VincentChen.pdf。
    陳文生,「資料在地化政策與個人資料保護議題」,NII產業發展協進會,2016年9月12日,https://www.nii.org.tw/Recents/Detail/74。
    陳曉莉,「伊朗核電廠受到stuxnet蠕蟲感染」,iThome,2018年12月14日,https://www.ithome.com.tw/node/63565。
    楊日興,「華為擬智利建海底電纜連結亞洲」,中時電子報,2019年8月29日,https://www.chinatimes.com/realtimenews/20190829001602-260410?chdtv。
    吳世忠,「網絡時代地緣政治的新特征」,2017年12月1日,http://theory.people.com.cn/BIG5/n/2014/0722/c386965-25315258.html。
    林妍溱,「星國史上最大網路攻擊懷疑是政府駭客發動的APT攻擊」,iThome,2018年8月7日,https://www.ithome.com.tw/news/125026 。



    貳、西文部分
    一、官方文獻
    “Critical Infrastructure Sectors,” Department of Homeland Security,December 1,2018, https://www.dhs.gov/cisa/critical-infrastructure-sectors.
    “Communications Sector-Specific Plan an Annex to the Nipp 2013,” Department of Homeland Security,2015, file:///C:/Users/LoTim/Downloads/796518.pdf.
    “Defending America’s Cyberspace,” Washington,DC: The White House, November,2013,https://www.jstor.org/stable/42896475?seq=1.
    “Natioal Cyber Strategy,” The White House, September,2018, https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf .
    “National Security Strategy of the United States of America,” The White House,December 18,2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.
    “National Space Policy of the United States of America,” The White House,Janurary 28,2010, https://www.space.commerce.gov/policy/national-space-policy/.
    “Presidential Decision Directive 63,” The White House,December 13,2018, https://fas.org/irp/offdocs/pdd/pdd-63.htm.
    “Presidential Policy Directive -- Critical Infrastructure Security and Resilience,” The White House, February 12,2013, https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil.
    “U.S. Trade in Goods by Selected Countries and Areas,” United States Census Bureau, 2018, https://www.census.gov/foreign-trade/Press-Release/current_press_release/index.html.
    “What is Cybersecurity?,” Cybersecurity and Infrastructure Security Agency(CISA),November 14,2019, https://www.us-cert.gov/ncas/tips/ST04-001.
    二、專書
    Baudry, Ken, Data Center Handbook(New Jersey: John Wiley & Sons, 2015).
    Carter, Lionel, Douglas, Burnett, Drew, Stephen, Graham, Marle, Hagadorn Lonnie, Deborah Bartlett-McNeil, and Irvine Nigel, Submarine Cables and the Oceans: Connecting the World(London: Banson, 2009).
    Giulio, Douhet, The Command of the Air(Alabama: University of Alabama Press, 2009).
    Graham, Stephen and Simon, Marvin,Telecommunications and the City(New York: Routledge, 2004).
    Howard, Rheingold,The Virtual Community: Surfing the Internet(London: Minerva, 1994).
    Larkin, Dan, The Information Revolution and National Security(PA: Strategic Studies Institute, U.S. Army War College 2000).
    Rattray, Gregory J., "The Cyberterrorist Threat." In The Information Revolution and National Security( PA: Strategic Studies Institute, U.S. Army War College 2000).
    Javier, Lopez, Setola ,Roberto, Stephen D. Wolthusen, and SpringerLink (Online service),Critical Infrastructure Protection Information Infrastructure Models, Analysis, and Defense(Berlin, Heidelberg: Springer Berlin Heidelberg, 2012).
    Mackinder, Halford J., Democratic Ideals and Reality:A Study in the Politics of Reconstruction(New York: Henry Holt and Co.,1950).
    Mahan, Alfred Thayer and Hattendorf, John B., Mahan on Naval Strategy: Selections from the Writings of Rear Admiral Alfred Thayer Mahan (Annapolis, Md: Naval Institute Press, 1991).
    Mahan, Alfred Thayer,The Influence of Sea Power Upon History:1660-1783( New York: Pelican Pub Co Inc., 2003).
    Parker, Geoffrey, Geopolitics: Past, Present, and Future( London: Pinter, 1998).
    Schwartz, J.M., and J.R. Ryan, Picturing Place: Photography and the Geographical Imagination( London: IB Tauris, 2003).
    Seedhouse, Erik, Spaceports around the World, a Global Growth Industry( Daytona Beach, FL, USA: Cham: Springer International 2017).
    Spykman, Nicholas J.,The Geography of the Peace( Hamden, Connecticut: Archon Books 1969).
    Tække, Jesper, Cyberspace as a Space Parallel to Geographical Space, Virtual Space( London: Springer, 2002).
    三、期刊
    Asher, MI, U Keil, HR Anderson, R Beasley, J Crane, F Martinez, EA Mitchell, et al, “International Study of Asthma and Allergies in Childhood (Isaac): Rationale and Methods,” European respiratory journal, Vol. 8, No. 3 (1995), pp. 483-91.
    Bäckstrand, Karin, “Multi-Stakeholder Partnerships for Sustainable Development: Rethinking Legitimacy, Accountability and Effectiveness,” European Environment, Vol. 16, (2006), pp. 290-306.
    Barcomb, Kris E, “From Sea Power to Cyber Power: Learning from the Past to Craft a Strategy for the Future,” Joint Force Quarterly, No. 69 (2013), pp. 78-83.
    B.Sheldon, John, “Geopolitics and Cyber Power:Why Geography Still Matters,” American Foreign Policy Interests, Vol. 36, No. 5 (2014), pp. 286-293.
    Bronk, Chris, “Two Securities: How Contemporary Cyber Geopolitics Impacts Critical Infrastructure Protection,” International Journal of Critical Infrastructure Protection, Vol. 8 (2015), pp. 24-26.
    Bryant, Rebecca, “What Kind of Space Is Cyberspace?,” Minerva - An Internet Journal of Philosophy, Vol. 5 (2001), pp. 138-55.
    Cahnman, Werner J., Nicholas John Spykman, and Helen R. Nicholl, “The Geography of the Peace,” American Sociological Review, Vol. 10 No. 2 (1945), pp. 319-20.
    Cohen, Julie E, “Cyberspace as/and Space,” Columbia Law Review, Vol. 107, No.1 (2007), pp. 210-56.
    Conversino, Mark J, “The Changed Nature of Strategic Air Attack,” Parameters; Carlisle Barracks, Vol. 27, No. 4 (1997), pp. 28-41.
    Deibert, Ronald J., and Rafal Rohozinski, “Risking Security: Policies and Paradoxes of Cyberspace Security,” International Political Sociology, Vol.4, No.1 (2010), pp. 15-32.
    Deibert, Ron, “The Geopolitics of Cyberspace after Snowden,” Current History (2015), pp. 9-15.
    Denning, Dorothy E, “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” Networks and netwars: The future of terror, crime, and militancy, Vol. 239 (2001), pp. 239-88.
    Dizard, Wilson P., “International Policy Issues in Satellite Communications,” Journal of International Affairs, Vol. 39, No. 1 (1985), pp. 121-28.
    Dunn, Myriam, “The Socio-Political Dimensions of Critical Information Infrastructure Protection (Ciip),” International Journal of Critical Infrastructures, Vol. 1, No. 2-3 (2005), pp. 258-68.
    “Fcc Gives Intelsat U.S. License,” Communications Today, Vol. 6, No. 150 (2000).
    Field, Alexandra M., ”Intelsat at a Crossroads. (International Telecommunications Satellite Organization),” Law and Policy in International Business, Vol. 25, No. 4 (1994), pp. 1335-66.
    Friedland, Lewis A, “Electronic Democracy and the New Citizenship,” Media, Culture & Society, Vol. 18, No.2 (1996), pp. 185-212.
    Glosserman, Brad, “A Year of Surprises: The 17th Japan-Us Security Seminar: A Conference Report,” Pacific Forum CSIS. Issues & Insights, No. I-13,15-21,23-35,37-45,47-49,51-61,63-67,69-75,A1-A3,B1-B3,C1-C4 (2011).
    Gosine, Anil, “The Evolution of Data Center Infrastructure in North America.” Control Engineering, Vol. 64, No. 6 (2017), pp. 1-3.
    Gray, Colin S, “The Continued Primacy of Geography,” Orbis, Vol. 40, No. 2 (1996), pp. 247-59.
    “Here We Go Again? Telecoms Infrastructure,” The Economist (US), Vol. 387, No. 8581 (2008).
    J, Knapp Kenneth, Denney Gary D, and Barner Mark E, ”Key Issues in Data Center Security: An Investigation of Government Audit Reports,” Government Information Quarterly, Vol. 28, No. 4 (2011), pp. 533-41.
    Joseph S. Nye, Jr, “Soft Power,” Foreign Policy, No. 80 (1990), pp. 153-71.
    Katkin, Kenneth, “Cable Open Access and Direct Access to Intelsat.(Satellite Systems),” Case Western Reserve Law Review, Vol. 53, No. 1 (2002), pp. 77-142.
    Leithauser, Tom, “Us. Surveillance, Privacy Laws Seen Spurring Data Localization Mandates,” Cybersecurity Policy Report, (2017).
    Lessig, Lawrence, “The Zones of Cyberspace,” Stan. L. Rev., Vol.48 (1995), pp. 1403-11.
    Levy, Steven A., “Intelsat: Technology, Politics and the Transformation of a Regime,” International Organization, Vol. 29, No. 3 (1975), pp. 655-80.
    Lewis, Adam M., David Ward, Lukasz Cyra, and Naouma Kourti, ”European Reference Network for Critical Infrastructure Protection,” International Journal of Critical Infrastructure Protection, Vol. 6, No. 1 (2013), pp. 51-60.
    LLC, Access Intelligence, ”Panamsat Documents Intelsat`s Marketplace Dominance to Fcc,” Communications Today, (1998).
    Mackinder, Halford J., “The Geographical Pivot of History,” The Geographical Journal, Vol. 23, No. 4 (1904), pp. 421-37.
    Malecki, Edward J., “Real People, Virtual Places, and the Spaces in Between,” Socio-Economic Planning Sciences, Vol.58 (2017), pp. 3-12.
    Manuel, Castells, “An Introduction to the Information Age,” City, Vol. 2, No.7 (1997), pp. 6-16.
    Milton, Mueller, Andreas Schmidt, and Brenden Kuerbis, “Internet Security and Networked Governance in International Relations,” International Studies Review, Vol. 15, No. 1 (2013), pp. 86-104.
    Post, David G., and David R. Johnson, “Chaos Prevailing on Every Continent: Towards a New Theory of Decentralized Decision-Making in Complex Systems,” Chicago-Kent Law Review, Vol. 73, No.4 (1998), pp. 1055-99.
    R., Wear David, “Data-Center Protection Plans Should Include Physical Security Issues,” HP Chronicle, Vol. 17, No. 4 (2000), pp. 12-13.
    Robine, Jérémy, and Kavé Salamatian, ”Envisioning Cyber-Geography,” Hérodote, No. 152-153 (2014), pp. 123-39.
    R., Handberg, “Creating Transportation Infrastructure Though State Spaceport Initiatives: Florida and Other Examples,” Technology in Society, Vol. 24, No. 3 (2002), pp. 225-41.
    Rinaldi, Steven M., James P. Peerenboom, and Terrence K. Kelly, “Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies,” IEEE control systems magazine, Vol. 21, No.6 (2001), pp. 11-25.
    Sheldon, John B., “Geopolitics and Cyber Power: Why Geography Still Matters,” American Foreign Policy Interests, Vol.36, No. 5 (2014), pp. 286-93.
    Shim, David, “Remote Sensing Place: Satellite Images as Visual Spatial Imaginaries,” Geoforum, Vol. 51 (2014), pp. 152-60.
    Veel, Kristin, ‘The Irreducibility of Space: Labyrinths, Cities, Cyberspace,” Diacritics, Vol. 33, No. 3 (2018), pp. 151-72.
    Warf, Barney, “Reach out and Touch Someone: At&T`s Global Operations in the 1990s,” The Professional Geographer, Vol. 50, No. 2 (1998), pp. 255-67.
    Waxman, Matthew C, “Cyber-Attacks and the Use of Force: Back to the Future of Article 2 (4),” Yale J. Int`l L. ,Vol. 36 (2011), pp. 421-458.
    Yannakogeorgos, Panayotis A., “Internet Governance and National Security,” Strategic Studies Quarterly,Vol. 6, No. 3 (2012), pp. 102-25.
    Zerbini, Andrea, and Michael Fradley, “Higher Resolution Satellite Imagery of Israel and Palestine: Reassessing the Kyl-Bingaman Amendment,” Space Policy,Vol. 44-45 (2018), pp. 14-28.
    Ziarnick, Brent D. “The Space Campaign: Space-Power Theory Applied to Counterspace Operations,” Air & Space Power Journal,Vol. 18, No. 2 (2004), pp. 61-70.
    四、網路資源
    Arthur, Charles, “Undersea Internet Cables Off Egypt Disrupted as Navy Arrests Three,” The Guardian, March 28, 2013, https://www.theguardian.com/technology/2013/mar/28/egypt-undersea-cable-arrests.
    “Australia Japan Cable and Pacific Crossing Limited Announce a Gigabit Ethernet Service between the Us and Australia,” PR Newswire Asia,August 31,2009, https://www.businesswire.com/news/home/20090831005292/en/Australia-Japan-Cable-Pacific-Crossing-Limited-Announce.
    Barrios, Miguel Ángel, ”Cyber-Geopolitics: A New Field of Study to Understand the Attacks to Critical Infrastructure,” Vision & Global Trends, June 26,2019,https://www.vision-gt.eu/news/cyber-geopolitics-a-new-field-of-study-to-understand-the-attacks-to-critical-infrastructure/.
    Ian Bremmer and David Gordon, “The Geopolitics of Cybersecurity,” Foreign Policy,January 12,2011,https://foreignpolicy.com/2011/01/12/the-geopolitics-of-cybersecurity/.
    Chesaux, Julien, “Why You Should Care About Cyber Geopolitics,” ModernCISO,April 16,2019, https://modernciso.com/2019/04/16/why-you-should-care-about-cyber-geopolitics/.
    “Critical Infrastructure - Submarine Telecommunications Cables,” International Cable Protection Committee, June,2017,https://www.iscpc.org/publications/.
    “Cyberattack on a German Steel-Mill,” Sentryo,May 31,2016,https://www.sentryo.net/cyberattack-on-a-german-steel-mill/.
    “Cybersecurity & Geopolitics,” Oxford Analytica Daily Brief,March 26,2018, http://www.oxan.com/media/2150/oxford-analytica-cybersecurity-and-geopolitics.pdf.
    “Data Center Map,” Data Center Map, https://www.datacentermap.com/datacenters.html.
    “Globe Launches Sea-Us Submarine Cable for Enhanced Internet Connectivity,” Business Mirror,August 12,2017, https://www.pna.gov.ph/articles/1005947.
    Graf, Marlon, Jakub P. Hlavka, and Bonnie L. Triezenberg, “Strong Winds Ahead for Cloud Computing: Can Data Localization Threaten Future Growth?,” The RAND Blog: RAND CORPORATION,April 29,2016, https://www.rand.org/blog/2016/04/strong-winds-ahead-for-cloud-computing-can-data-localization.html.
    Harding, Brian, “China’s Digital Silk Road and Southeast Asia,” Center for Strategic and International Studies,February 15,2019, https://www.csis.org/analysis/chinas-digital-silk-road-and-southeast-asia .
    “Intelsat,” Britannica Online Academic,2019, https://www.britannica.com/technology/satellite-communication/Satellite-applications#ref288219.
    Iulian, Popa, “Cyber Geopolitics and Sovereignty. An Introductory Overview,”October,2014,https://www.researchgate.net/publication/280095109_CYBER_GEOPOLITICS_AND_SOVEREIGNTY_AN_INTRODUCTORY_OVERVIEW.
    James, Matthew, “Australia in Orbit: Space Policy and Programs,” Department of the Parliamentary Library, April 6,1998, https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/Publications_Archive/CIB/CIB9798/98cib12.
    Mauldin, Alan, “A Complete List of Content Providers` Submarine Cable Holdings,” TeleGeography BLOG, November9,2017,https://blog.telegeography.com/telegeographys-content-providers-submarine-cable-holdings-list .
    Manuel, Castells, “Definition - What Does Autonomous System (as) Mean?,” Techopedia, https://www.techopedia.com/definition/11063/autonomous-system-as.
    Mick P. Green and Douglas R. Burnett, “Security of International Submarine Cable Infrastructure: Time to Rethink?,” International Cable Protection Committee, Ltd, Janurary 1,2008, https://doi.org/10.1163/ej.9789004164277.v-594.96 .
    Routley, Nick, “Map: The World’s Network of Submarine Cables, ” Visual Capitalist,August 24,2017, https://www.visualcapitalist.com/submarine-cables/.
    “Satellite Map,” Environmental Systems Research Institute,
    https://maps.esri.com/rc/sat2/index.html.
    Shapshak, Toby, “Google and Facebook to Build Own Undersea Cables around Africa,” Forbes, July 3,2019,https://www.forbes.com/sites/tobyshapshak/2019/07/03/google-and-facebook-to-build-own-undersea-cables-around-africa/.
    “The Future of Space 2060 and Implications for U.S. Strategy: Report on the Space Futures Workshop,” SPACEREF, September 6,2019, http://www.spaceref.com/news/viewsr.html?pid=52822.
    Thielman, Sam, “Facebook Satellite to Beam Internet to Remote Regions in Africa,” The Guardian,October 5,2015, https://www.theguardian.com/technology/2015/oct/05/facebook-mark-zuckerberg-internet-access-africa.
    Timothy W. Martin and Eva Dou, “Global Telecom Carriers Attacked by Suspected Chinese Hackers,” The Wall Street Journal,June 24,2019, https://www.wsj.com/articles/global-telecom-carriers-attacked-by-suspected-chinese-hackers-11561428003?mod=searchresults&page=1&pos=3.
    “Voice of America News / FIND,” Washington: Federal Information & News Dispatch, Inc., August 9,2018,http://search.proquest.com/docview/1927449880/.
    David Brown, ”10 Facts About the Internet`s Undersea Cables,” MENTAL FLOSS, November 12,2015, https://www.mentalfloss.com/article/60150/10-facts-about-internets-undersea-cables.
    “What is Cyber-Security?,” Kaspersky, https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security.
    Description: 碩士
    國立政治大學
    外交學系戰略與國際事務碩士在職專班
    106922020
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0106922020
    Data Type: thesis
    DOI: 10.6814/NCCU202000205
    Appears in Collections:[戰略與國際事務碩士在職專班] 學位論文

    Files in This Item:

    File SizeFormat
    202001.pdf1965KbAdobe PDF267View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback