政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/54971
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113822/144841 (79%)
造访人次 : 51772931      在线人数 : 594
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/54971


    题名: 網路恐怖主義與美國防治政策
    Cyberterrorism and the U.S. Prevention Policies
    作者: 黃書賢
    Huang, Shu Hsien
    贡献者: 姜家雄
    黃書賢
    Huang, Shu Hsien
    关键词: 網路恐怖主義
    美國反恐政策
    網路犯罪
    網路戰爭
    保護關鍵基礎設施
    國土安全部
    網路空間安全國家戰略
    Cyberterrorism
    U.S. Counter-Cyberterrorism Policies
    Cybercrime
    Cyberwar
    Critical Infrastructure Protection
    日期: 2011
    上传时间: 2012-10-30 14:28:46 (UTC+8)
    摘要:   網路恐怖主義(Cyberterrorism)為「網際網路」(Internet)與「恐怖主義」(terrorism)相互結合之產物,指恐怖份子為求引發嚴重破壞,並造成平民死傷,透過網際網路入侵國家關鍵基礎設施(critical infrastructures),並以之要脅政府或人民完成其政治性、宗教性或社會性目標。至2012年7月為止,對於網路恐怖主義相關議題之討論雖已持續約30年之久,然而各界對於網路恐怖主義之「定義」及「威脅性」兩項基本問題,仍然眾說紛紜,無法取得一致共識,而全球各地缺乏網路恐怖攻擊之實際案例之情況,亦使爭辯益加激烈。
      在美國政府方面,經過2001年911事件的重大衝擊,其對於恐怖主義相關議題之敏感程度已大幅提高,並陸續制定多項反恐政策。美國是當前國際反恐行動的領導者,既為軍事與科技大國,同時也是諸多國際恐怖組織策劃攻擊之主要目標,有鑑於此,美國政府致力於防治網路恐怖主義,保護國內關鍵基礎設施不受侵襲,以維持社會安定及國家安全,其因應方式足以成為世界各國制定類似政策之重要參考對象。
      本論文經由探討網路恐怖主義之基本意涵,比較「網路恐怖主義」、「網路犯罪」及「網路戰爭」三個概念之間的差異,嘗試針對網路恐怖主義形成明確之界定;接著綜整各界針對網路恐怖主義威脅性之爭論,以了解網路恐怖主義之真實威脅程度;最後觀察美國自柯林頓(Clinton)政府至今,有關防治網路恐怖主義政策之一系列發展、美國政府如何評估網路恐怖主義之威脅,以及在當前的政策架構之下,為保護國內關鍵基礎設施,其相對應之具體措施為何,試圖對於其整體政策建立客觀評價。
    Cyberterrorism, the convergence of “Internet” and “terrorism,” refers to the specific terrorist activities that were intended to cause massive destruction and casualties, proceeded by intruding the supervisory control and data acquisition (SCADA) systems of national critical infrastructures via the Internet. Even though the discussion of the related issues of Cyberterrorism has continued for nearly 30 years now, neither the definition nor the evaluation of potential threat concerning Cyberterrorism has been settled. No consensus has been achieved. Furthermore, the lack of actual cases of Cyberterrorism attack around the world makes the debates even more intense.
    After the significant impact of September 11, 2001, the U.S. government has substantially raised the degree of sensitivity of the issues related to terrorism and developed a number of counter-terrorism policies. As the leader of the Global War on Terror and the greatest Power in the world, the U.S. is also the main target of many terrorist groups. With its military and scientific capabilities, the practices of the U.S. government on preventing Cyberterrorism, protecting its domestic critical infrastructures from intrusion, and maintaining social stability and national security would be excellent examples to other nations for the development of their own policies.
    To clarify the explicit definition of Cyberterrorism, this research refined the basic meaning of Cyberterrorism and distinguished differences among three related concepts: Cyberterrorism, Cybercrime, and Cyberwar. Moreover, this research sought to induct major arguments brought up by scholars in many intense debates on the extent of Cyberterrorism threat. Last but not least, by observing development of the U.S. related policy frameworks, how the U.S. government evaluates the extent of Cyberterrorism threat, and the corresponding measures for protecting the U.S. domestic critical infrastructures, this research presented an objective assessment on the U.S. overall counter-Cyberterrorism policies.
    參考文獻: 中文部分
    一、專書
    王銘勇,《網路犯罪相關問題之研究》。臺北:司法院,2002。
    方天賜、孫國祥,「民族主義與恐怖主義」,收於張亞中主編,《國際關係總論》,二版,頁193-218。臺北:揚智,2007。
    李明峻,「美國國土安全部的設置與功能」,收於邱稔壤主編,《國際反恐與亞太情勢》。臺北:國立政治大學國際關係研究中心,2004,頁251-285。
    李偉主編,《國際恐怖主義與反恐怖鬥爭年鑑》。北京:時事,2004。
    宋興洲,「科技在恐怖主義與反恐行動中所扮演的角色」,收於姜新立、張錦隆主編,《政治與資訊的交鋒》,頁53-89。臺北:揚智,2010。
    林山田,《刑事法論叢(一)》。臺北:臺灣大學法學院圖書部,1997。
    林宜隆,《網際網路與犯罪問題之研究》。桃園:中央警察大學出版社,2000。
    林義貴,《資訊社會與網路犯罪》。臺北:華立,2005。
    邱伯浩,《恐怖主義與反恐》。臺北:新文京,2006。
    吳永宗,《電腦運用所衍生法律問題之研究》。臺北:司法院,1998。
    馬進保、袁廣林,《高科技犯罪研究》。北京:中國人民公安大學出版社,2008。
    許武峰,《電腦犯罪理論與實務問題研究》。臺北:司法院,1998。
    黃秋龍,《兩岸總體安全下的非傳統威脅》。臺北:法務部調查局展望與探索雜誌社,2010。
    蔡瑋,「冷戰後的國際恐怖主義:趨勢與挑戰」,收於邱稔壤主編,《國際反恐與亞太情勢》。臺北:國立政治大學國際關係研究中心,2004,頁7-29。
    蔡翠紅,《美國國家信息安全戰略》。上海:學林,2009。

    二、期刊論文
    彭慧鸞,「數位時代的國家安全與全球治理」,《問題與研究》,第43卷第6期(民國93年11、12月),頁29-52。

    英文部分
    一、專書
    Bhatnagar, S., Encyclopaedia of Cyber and Computer Hacking, Vol. 1 & 5 (Delhi: Anmol Publications, 2009).
    Brenner, S. W., “Cybercrime: Re-thinking Crime Control Strategies,” in Yvonne Jewkes, ed., Crime Online (Portland: Willan Publishing, 2007), pp. 12-28.
    Clarke R. A., & Knake, R. K., Cyber War: The Next Threat to National Security and What to Do About It (New York: Ecco, 2010).
    Colarik, A. M., Cyber Terrorism: Political and Economic Implications (Hershey, PA: Idea Group, 2006).
    Cordesman A. H., & Cordesman, J. G., Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland (Westport, CT: Praeger, 2002).
    Curran, K., Concannon, K., & McKeever, S., “Cyber Terrorism Attacks,” in Lech J. Janczewski & Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (Hershey, PA: Information Science Reference, 2008), pp. 1-6.
    Dass, N., Globalization of Terror: A Threat to Global Economy (New Delhi: MD Publications, 2008).
    Denning, D. E., “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” in John Arquilla & David Ronfeldt, eds., Networks and Netwars: The Future of Terror, Crime, and Militancy (Santa Monica, CA: RAND, 2001), pp. 239-288.
    Finch, S., “Cyber-terrorism Poses a Serious Threat to Global Security,” in Louise I. Gerdes, ed., Cyber Crime (Farmington Hills, MI: Greenhaven Press, 2009), pp. 35-39.
    Goodman, M. D., “Understanding International ‘Cyberterrorism’: A Law Enforcement Perspective,” in Cecilia S. Gal, Paul B. Kantor, & Bracha Shapira, eds., Security Informatics and Terrorism: Patrolling the Web (Washington, DC: IOS Press, 2008), pp. 8-16.
    Green, J., “The Problem of Cyberterrorism is Exaggerated,” in Louise I. Gerdes, ed., Cyber Crime (Farmington Hills, MI: Greenhaven Press, 2009), pp. 40-50.
    Higgins, G. E., Cybercrime: An Introduction to an Emerging Phenomenon (New York: McGraw-Hill, 2010).
    Jaeger, C., “Cyberterrorism,” in Hossein Bidgoli, ed., The Internet Encyclopedia, Vol. 1 (New York: John Wiley & Sons, 2003), pp. 353-371.
    ________, “Cyberterrorism and Information Security,” in Hossein Bidgoli, ed., Global Perspectives in Information Security: Legal, Social, and International Issues (Hoboken, NJ: John Wiley & Sons, 2009), pp. 127-180.
    Mooney, C., Online Social Networking (Farmington Hills, MI: Lucent Books, 2009).
    National Research Council, Computers at Risk: Safe Computing in the Information Age (Washington, DC: National Academies Press, 1991).
    Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G., Cyberterror: Prospects and Implications (Monterey, CA: Center for the Study of Terrorism and Irregular Warfare, Naval Post Graduate School, 1999).
    O’Brien, K. A., “Information Age Terrorism and Warfare,” in David M. Jones, ed., Globalisation and the New Terror: The Asia Pacific Dimension (Northampton, MA: Edward Elgar Publishing, 2004), pp. 127-158.
    Owen, R. S., “Infrastructures of Cyber Warfare,” in Lech J. Janczewski & Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (Hershey, PA: Information Science Reference, 2008), pp. 35-41.
    Özeren, S., “Cyberterrorism and International Cooperation: General Overview of the Available Mechanisms to Facilitate an Overwhelming Task,” in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, ed., Responses to Cyber Terrorism (Washington, DC: IOS Press, 2008), pp. 70-88.
    Pasley, J. F., “United States Homeland Security in the Information Age,” in Michael Pittaro, ed., Cybercrime: Current Perspectives from InfoTrac®, 2nd ed., (Belmont, CA: Wadsworth, 2010), pp. 127-135.
    Portnoy M., & Goodman, S., eds., Global Initiatives to Secure Cyberspace: An Emerging Landscape (New York: Springer, 2009).
    Rhodes, R., Cyber Meltdown: Bible Prophecy and the Imminent Threat of Cyberterrorism (Eugene, OR: Harvest House, 2011).
    Ross, J. I., Criminal Investigations: Cybercrime (New York: Chelsea House, 2010).
    Schell, B. H., & Martin, C., Cybercrime: A Reference Handbook (Santa Barbara, CA: ABC-CLIO, 2004).
    Stiennon, R., Surviving Cyberwar (Lanham, MD: Government Institutes, 2010).
    Sundaram, P. M. S., & Jaishankar, K., “Cyber Terrorism: Problems, Perspectives, and Prescription” in Frank Schmalleger & Michael Pittaro, eds., Crimes of the Internet (Upper Saddle River, NJ: Pearson Education, 2009), pp. 593-611.
    Taylor, P. A., & Harris, J. Ll., “Hacktivism,” in Hossein Bidgoli, ed., Global Perspectives in Information Security: Legal, Social, and International Issues (Hoboken, NJ: John Wiley & Sons, 2009), pp. 295-317.
    Tikk, E., & Oorn, R., “Legal and Policy Evaluation: International Coordination of Prosecution and Prevention of Cyber Terrorism,” in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, ed., Responses to Cyber Terrorism (Washington, DC: IOS Press, 2008), pp. 89-103.
    Weimann, G., Terror on the Internet: The New Arena, the New Challenges (Washington, DC: United States Institute of Peace, 2006).
    Wilson, C., Computer Attack and Cyberterrorism (New York: Nova Science, 2009).

    二、期刊論文
    Brenner, S. W., “‘At Light Speed’: Attribution and Response to Cybercrime/Terrorism/Warfare,” The Journal of Criminal Law and Criminology, Vol. 97, No. 2 (Winter, 2007), pp. 379-475.
    Cohen, A., “Cyberterrorism: Are We Legally Ready?” Journal of International Business & Law, Vol. IX, No. 1 (Spring 2010), pp. 1-40.
    Conway, M., “What Is Cyberterrorism?” Current History, Vol. 101, No. 659 (December 2002), pp. 436-442.
    Green, J., “The Myth of Cyberterrorism,” Washington Monthly, Vol. 34, No. 11 (November 2002), pp. 8-13.
    Haimes, Y. Y., “Risk of Terrorism to Cyber-Physical and Organizational-Societal Infrastructures,” Public Works Management & Policy, Vol. 6, No. 4 (April 2002), pp. 231-240.
    Jarmon, J., “Cyber-terrorism,” Journal on Terrorism and Security Analysis, Vol. 6 (April 2011), pp. 102-117.
    Jones, A., “Cyber Terrorism: Fact or Fiction,” Computer Fraud and Security, Vol. 2005, No. 6 (June 2005), pp. 4-7.
    Naím, M., “The Five Wars of Globalization,”Foreign Policy, No. 134 (January/February 2003), pp. 28-36.
    Parks, C., “Cyber Terrorism: Hype or Reality?” The Journal of Corporate Accounting & Finance, Vol. 14, No. 5 (July/August 2003), pp. 9-11.
    Stohl, M., “Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?” Crime, Law and Social Change, Vol. 46, No. 4-5 (December 2006), pp. 223-238.
    Thomas, T. L., “Al Qaeda and the Internet: The Danger of ‘Cyberplanning’,” Parameters, Vol. 33, No. 1 (Spring 2003), pp. 112-123.
    Weimann, G., “Cyberterrorism: The Sum of All Fears?” Studies in Conflict & Terrorism, Vol. 28, Iss. 5 (2005), pp. 129-149.

    三、網路資料
    “About the National Counterterrorism Center,” <http://www.nctc.gov/about_us/
    about_nctc.html>(Retrieved on June 28, 2012).
    “About the Office of Infrastructure Protection,” <http://www.dhs.gov/xabout/
    structure/gc_1185203138955.shtm>(Retrieved on June 22, 2012).
    “Air Force Mission,” <http://www.af.mil/main/welcome.asp>(Retrieved on February 19, 2012).
    Arquilla, J., & Ronfeldt, D., “Cyberwar is Coming!” in John Arquilla & David Ronfeldt, eds., In Athena`s Camp: Preparing for Conflict in the Information Age (Santa Monica: RAND, 1997), pp. 23-60, <http://www.rand.org/content/
    dam/rand/pubs/monograph_reports/MR880/MR880.ch2.pdf>(Retrieved on February 23, 2012).
    “Background Note: Estonia,” <http://www.state.gov/r/pa/ei/bgn/5377.htm>(Retrieved on February 29, 2012).
    Caruso, J. T., “Combating Terrorism: Protecting the United States,” before the House Subcommittee on National Security, Veterans Affairs, and International Relations, Washington, DC, March 21, 2002, <http://www.fbi.gov/news/
    testimony/combating-terrorism-protecting-the-united-states>(Retrieved on February 9, 2012).
    Clark, T., “Clinton Outlines Cyberthreat Plan,” <http://news.cnet.com/
    Clinton-outlines-cyberthreat-plan/2100-1023_3-211497.html>(Retrieved on February 1, 2012).
    “Convention on Cybercrime,” <http://conventions.coe.int/Treaty/en/Treaties/Html/
    185.htm>(Retrieved on June 29, 2012).
    “Convention on Cybercrime, CETS No.: 185,” <http://conventions.coe.int/Treaty/
    Commun/ChercheSig.asp?NT=185&CL=ENG>(Retrieved on July 9, 2012).
    Conway, M., “Cyberterrorism and Terrorist ‘Use’ of the Internet,” First Monday, Vol. 7, No. 11 (4 November 2002), <http://www.uic.edu/htbin/cgiwrap/bin/ojs/
    index.php/fm/article/view/1001/922>(Retrieved on February 10, 2012).
    “Critical Infrastructure Sector Partnerships,” <http://www.dhs.gov/files/
    partnerships/editorial_0206.shtm>(Retrieved on June 22, 2012).
    “Cybercrime,” <http://www.interpol.int/content/download/805/6671/version/10/file/
    FHT02.pdf>(Retrieved on February 23, 2012).
    “Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure,” <http://www.whitehouse.gov/assets/
    documents/Cyberspace_Policy_Review_final.pdf>(Retrieved on June 30, 2012).
    “Cyber Storm: Securing Cyber Space,” <http://www.dhs.gov/files/training/
    gc_1204738275985.shtm>(Retrieved on June 29, 2012).
    “Defending America`s Cyberspace: National Plan for Information Systems Protection, Version 1.0,” <http://www.fas.org/irp/offdocs/pdd/CIP-plan.pdf>(Retrieved on June 19, 2012).
    Denning, D. E., “Cyberterrorism,” testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives, May 23, 2000, <http://www.cs.georgetown.edu/~denning/infosec/
    cyberterror.html>(Retrieved on June 19, 2012).
    ________, “Is Cyber Terror Next?” <http://essays.ssrc.org/sept11/essays/denning.
    htm>(Retrieved on June 30, 2012).
    “Department of Defense Dictionary of Military and Associated Terms,” p. 368, <http://ra.defense.gov/documents/rtm/jp1_02.pdf>(Retrieved on June 13, 2012).
    “Estonian DDoS - A Final Analysis,” <http://www.h-online.com/security/news/item/
    Estonian-DDoS-a-final-analysis-732971.html>(Retrieved on March 1, 2012).
    “Executive Order 13010, EO 13010: Critical Infrastructure Protection, July 15, 1996,”<http://www.fas.org/irp/offdocs/eo13010.htm>(Retrieved on June 17, 2012).
    “Executive Order 13231 of October 16, 2001: Critical Infrastructure Protection in the Information Age,” <http://www.fas.org/irp/offdocs/eo/eo-13231.htm>(Retrieved on June 19, 2012).
    “Executive Order 13354 of August 27, 2004: National Counterterrorism Center,” <http://www.fas.org/irp/offdocs/eo/eo-13354.htm>(Retrieved on June 28, 2012).
    Greenwald, G., “Mike McConnell, the WashPost & the Dangers of Sleazy Corporatism,” <http://www.salon.com/2010/03/29/mcconnell_3/>(Retrieved on May 29, 2012).
    Gross, G., “U.S. Cyber War Policy Needs New Focus, Experts Say,” <http://www.
    pcworld.com/article/174711/us_cyber_war_policy_needs_new_focus_experts_say.html>(Retrieved on June 14, 2012).
    “Highlights of the USA PATRIOT Act,” <http://www.justice.gov/archive/ll/
    highlights.htm>(Retrieved on June 20, 2012).
    Hildreth, S. A., “Cyberwarfare,” CRS Report for Congress, <http://www.fas.org/irp/
    crs/RL30735.pdf>(Retrieved on February 20, 2012).
    “Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection, December 17, 2003,” <http://www.dhs.gov/
    xabout/laws/gc_1214597989952.shtm#1>(Retrieved on June 28, 2012).
    Kaplan, E., “Terrorists and the Internet,” <http://www.cfr.org/
    terrorism-and-technology/terrorists-internet/p10005#p6>(Retrieved on January 31, 2012).
    Kirk, J., “Estonia Recovers from Massive DDoS Attack,” <http://www.
    computerworld.com/s/article/9019725/Estonia_recovers_from_massive_DDoS_attack>(Retrieved on March 3, 2012).
    Krasnowski, M., “Two Men Accused of Hacking into Traffic System,” <http://www.
    utsandiego.com/uniontrib/20070121/news_1n21traffic.html>(Retrieved on July 4, 2012).
    Lawson, S., “Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History,” <http://mercatus.org/sites/default/files/publication/
    beyond-cyber-doom-cyber-attack-scenarios-evidence-history_1.pdf>(Retrieved on May 29, 2012).
    Lemos, R., “What are the Real Risks of Cyberterrorism?” <http://www.zdnet.com/
    news/what-are-the-real-risks-of-cyberterrorism/124765>(Retrieved on May 28, 2012).
    Lewis, J. A., “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats,” report submitted to the Center for Strategic and International Studies, CSIS, Washington, DC, <http://csis.org/files/media/csis/pubs/
    021101_risks_of_cyberterror.pdf>(Retrieved on February 9, 2012).
    ________, “Thresholds for Cyberwar,” report submitted to the Center for Strategic and International Studies, CSIS, Washington, DC, <http://csis.org/files/
    publication/101001_ieee_insert.pdf>(Retrieved on February 29, 2012).
    Leyden, J., “Estonia Fines Man for DDoS Attacks: Local Pest rather than International Conspiracy,” <http://www.theregister.co.uk/2008/01/24/
    estonian_ddos_fine/>(Retrieved on June 18, 2012).
    Maynor D., & Graham, R., “SCADA Security and Terrorism: We’re Not Crying Wolf,” <www.blackhat.com/presentations/bh-federal-06/
    BH-Fed-06-Maynor-Graham-up.pdf>(Retrieved on June 13, 2012).
    Moteff, J. D., “Critical Infrastructures: Background, Policy, and Implementation,” CRS report for Congress, <http://www.fas.org/sgp/crs/homesec/RL30153.
    pdf>(Retrieved on June 30, 2012).
    Mueller, R. S., III, “Global Threats to the U.S. and the FBI’s Response,” testimony before the Senate Committee on Intelligence of the United States Senate, February 16, 2005, <http://www.fbi.gov/news/testimony/
    global-threats-to-the-u.s.-and-the-fbis-response-1>(Retrieved on June 4, 2012).
    “National Cyber Security Division,” <http://www.dhs.gov/xabout/structure/
    editorial_0839.shtm>(Retrieved on June 21, 2012).
    “National Infrastructure Coordinating Center,” <http://www.dhs.gov/files/programs/
    gc_1236629756359.shtm>(Retrieved on June 21, 2012).
    “National Infrastructure Protection Plan,” <http://www.dhs.gov/files/programs/
    editorial_0827.shtm#0>(Retrieved on June 28, 2012).
    “National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency, 2009,” <http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf>(Retrieved on June 28, 2012).
    “National Strategy for the Physical Protection of Critical Infrastructure and Key Assets,” <http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf>(Retrieved on June 27, 2012).
    “National Strategy to Secure Cyberspace,” <http://www.us-cert.gov/reading_room/
    cyberspace_strategy.pdf>(Retrieved on June 27, 2012).
    “National Threat Assessment Center,” <http://www.secretservice.gov/ntac.shtml>(Retrieved on July 1, 2012).
    “Newsline - May 3, 2007,” <http://www.rferl.org/content/article/1143864.html>(Retrieved on March 1, 2012).
    O’Hara, T. F., “Cyber Warfare/Cyber Terrorism,” <http://www.dtic.mil/cgi-bin/
    GetTRDoc?AD=ADA424310>(Retrieved on February 1, 2012).
    “Past Events,” <http://www.ccdcoe.org/126.html>(Retrieved on March 1, 2012).
    Pollitt, M. M., “Cyberterrorism: Fact or Fancy?” <http://www.cs.georgetown.edu/
    ~denning/infosec/pollitt.html>(Retrieved on June 19, 2012).
    “President Decision Directives 39: U.S. Policy on Counterterrorism,” <http://www.
    fas.org/irp/offdocs/pdd39.htm>(Retrieved on June 17, 2012).
    “President Decision Directives 62: Combating Terrorism,” <http://www.fas.org/irp/
    offdocs/pdd-62.htm>(Retrieved on June 17, 2012).
    “President Decision Directives 63: Critical Infrastructure Protection,” <http://www.
    fas.org/irp/offdocs/pdd/pdd-63.htm>(Retrieved on June 17, 2012).
    Presidential Commission on Critical Infrastructure Protection, “Critical Foundations: Protecting America’s Infrastructures,” <http://www.fas.org/sgp/library/pccip.
    pdf>(Retrieved on June 7, 2012).
    “Presidential Proclamation - Critical Infrastructure Protection Month,” <http://www.
    whitehouse.gov/the-press-office/
    presidential-proclamation-critical-infrastructure-protection-month>(Retrieved on June 30, 2012).
    “Presidential Proclamation--Critical Infrastructure Protection Month: Critical Infrastructure Protection Month, 2010,” <http://www.whitehouse.gov/
    the-press-office/2010/11/30/
    presidential-proclamation-critical-infrastructure-protection-month>(Retrieved on June 30, 2012).
    “Presidential Proclamation -- Critical Infrastructure Protection Month, 2011,” <http://www.whitehouse.gov/the-press-office/2011/11/30/
    presidential-proclamation-critical-infrastructure-protection-month-2011>(Retrieved on June 30, 2012).
    “Presidential Security Directive 1: Organizing for Homeland Security and Counterterrorism,” <http://www.fas.org/irp/offdocs/psd/psd-1.pdf>(Retrieved on June 30, 2012).
    “Public Law 107-296, Homeland Security Act of 2002,” <http://www.dhs.gov/
    xlibrary/assets/hr_5005_enr.pdf>(Retrieved on June 21, 2012).
    “Public Law 107-305, Cyber Security Research and Development Act,” <http://www.cio.gov/Documents/pl_107_305_nov_27_2002.pdf>(Retrieved on June 20, 2012).
    “Public Law 108-458, Intelligence Reform and Terrorism Prevention Act of 2004,” <http://www.nctc.gov/docs/pl108_458.pdf>(Retrieved on June 28, 2012).
    “Report of the President of the United States on the Status of Federal Critical Infrastructure Protection Activities,” <http://www.fas.org/irp/offdocs/pdd/
    CIP_2001_CongRept.pdf>(Retrieved on June 19, 2012).
    Robichaux, P., “Distributed Denial-of-Service Attacks and You,” <http://technet.
    microsoft.com/en-us/library/cc722931.aspx>(Retrieved on June 26, 2012).
    Rollins, J., & Wilson, C., “Terrorist Capabilities for Cyberattack: Overview and Policy Issues,” CRS Report for Congress, <http://www.fas.org/sgp/crs/terror/
    RL33123.pdf>(Retrieved on July 1, 2012).
    Sanger, D. E., “Obama Order Sped Up Wave of Cyberattacks Against Iran,” <http://www.nytimes.com/2012/06/01/world/middleeast/
    obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all>(Retrieved on July 4, 2012).
    Schmidt, E. E., “The Evolution of U.S. Policies against Terrorism,” <http://www.
    thepresidency.org/storage/documents/Fellows2008/Schmidt.pdf>(Retrieved on June 20, 2012).
    Shea, D. A., “Critical Infrastructure: Control Systems and the Terrorist Threat,” CRS Report for Congress, <http://www.fas.org/irp/crs/RL31534.pdf>(Retrieved on June 7, 2012).
    Singh, A. Kr., & Siddiqui, A. T., “New Face of Terror: Cyber Threats, Emails Containing Viruses,” Asian Journal of Technology & Management Research, Vol. 1, Iss. 1 (January - June 2011), <http://ajtmr.com/papers/vol1issue1/
    CyberTerror.pdf>(Retrieved on July 5, 2012).
    Snow, G. M., “Cybersecurity: Responding to the Threat of Cyber Crime and Terrorism,” statement before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism, Washington, DC, April 12, 2011, <http://www.fbi.
    gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism>(Retrieved on June 4, 2012).
    Sofaer A. D., Goodman, S. E., Cuéllar, M., Drozdova, E. A., Elliott, D. D., Grove, G. D., Lukasik, S. J., Putnam, T. L., & Wilson, G. D., “A Proposal for an International Convention on Cyber Crime and Terrorism,” CISAC Report, August 2000, <http://iis-db.stanford.edu/pubs/11912/sofaergoodman.pdf>(Retrieved on February 12, 2012).
    “Supernatural Horror in Literature by H. P. Lovecraft,” <http://www.hplovecraft.
    com/writings/texts/essays/shil.asp>(Retrieved on June 14, 2012).
    “Synopsis for ‘Live Free or Die Hard’,” <http://www.imdb.com/title/tt0337978/
    synopsis>(Retrieved on June 14, 2012).
    “Terrorism 2002-2005,” p. iv, <http://www.fbi.gov/stats-services/publications/
    terrorism-2002-2005/terror02_05.pdf>(Retrieved on June 18, 2012).
    “Terrorism FAQs,” <https://www.cia.gov/news-information/
    cia-the-war-on-terrorism/terrorism-faqs.html>(Retrieved on June 18, 2012).
    “The Sector-Specific Plans,” <http://www.dhs.gov/files/programs/
    gc_1179866197607.shtm#2>(Retrieved on June 28, 2012).
    “The World Factbook,” <https://www.cia.gov/library/publications/
    the-world-factbook/geos/en.html>(Retrieved on February 29, 2012).
    Trevelyan, M., “Security Experts Split on ‘Cyberterrorism’ Threat,” <http://www.
    reuters.com/article/2008/04/16/us-security-cyberspace-idUSL1692021220080416>(Retrieved on June 1, 2012).
    “United Nations Security Council Resolution 1566, October 2004,” <http://daccess-ods.un.org/access.nsf/Get?Open&DS=S/RES/
    1566%20(2004)&Lang=E&Area=UNDOC>(Retrieved on June 18, 2012).
    “USA PATRIOT Act (H.R. 3162),” <http://epic.org/privacy/terrorism/hr3162.html>(Retrieved on June 20, 2012).
    “U.S. Code Title 22, Ch. 38, Sec. 2656f,” <http://www.gpo.gov/fdsys/pkg/
    USCODE-2011-title22/pdf/USCODE-2011-title22-chap38-sec2656f.pdf>(Retrieved on July 10, 2012).
    U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors,” <http://www.secretservice.gov/ntac/its_report_050516.pdf>(Retrieved on July 1, 2012).
    U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector,” <http://www.secretservice.gov/ntac/its_report_040820.pdf>(Retrieved on July 1, 2012).
    U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Illicit Cyber Activity in the Government Sector,” <http://www.
    secretservice.gov/ntac/final_government_sector2008_0109.pdf>(Retrieved on July 1, 2012).
    U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector,” <http://www.secretservice.gov/ntac/
    final_it_sector_2008_0109.pdf>(Retrieved on July 1, 2012).
    Vandiver, S., “Critical Infrastructure is Society`s Glue,” <http://www.abchs.com/ihs/
    WINTER2010/ihs_articles_column.php>(Retrieved on June 20, 2012).
    Walt, S. M., “Is the Cyber Threat Overblown?” <http://walt.foreignpolicy.com/
    posts/2010/03/30/is_the_cyber_threat_overblown>(Retrieved on May 29, 2012).
    “WarGames,” <http://www.imdb.com/title/tt0086567/>(Retrieved on June 17, 2012).
    Weimann, G., “Cyberterrorism: How Real is the Threat?” <http://www.usip.org/
    files/resources/sr119.pdf>(Retrieved on June 30, 2012).
    ________, “How Modern Terrorism Uses the Internet,” The Journal of International Security Affairs, No. 8 (Spring 2005), <http://www.securityaffairs.org/issues/
    2005/08/weimann.php>(Retrieved on February 23, 2012).
    Wilson, C., “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” CRS Report for Congress, <http://www.fas.org/sgp/
    crs/terror/RL32114.pdf>(Retrieved on February 19, 2012).
    描述: 碩士
    國立政治大學
    外交研究所
    98253027
    100
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0098253027
    数据类型: thesis
    显示于类别:[外交學系] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    302701.pdf1194KbAdobe PDF23914检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈