政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/65150
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113648/144635 (79%)
Visitors : 51623945      Online Users : 565
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大典藏 > Journals of NCCU > Issues & Studies > Articles >  Item 140.119/65150
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/65150


    Title: 數位時代的國家安全與全球治理
    Other Titles: Digital Security and Global Governance
    Authors: 彭慧鸞
    Poong, Hwei-Luan
    Contributors: 國關中心
    Keywords: 數位安全;國家安全;人民安全;網路安全;網路恐怖主義;不對稱戰爭;全球治理;反恐外交;安全的鑲嵌性
    Digital Security;Network Security;Cyber Security;State Security;Civilian Security;Cyber-Terrorism;Asymmetric Warfare;Global Governance;Anti-Terrorism Diplomacy;Embedded Security
    Date: 2004-12
    Issue Date: 2014-04-01 17:26:27 (UTC+8)
    Abstract: 由於新的戰爭與衝突形式是建立在人類科技不斷創新的基礎上,因此,科技與國際安全議題的聯結將成為國際間建立新秩序,或是進行全球治理的過程中不可忽略的重要課題。如何架構一個以數位科技所衍生的安全問題(以下簡稱為數位安全)為核心的全球治理模式已是當務之急。「九一一事件」的發生,再次提醒了我們,當前人類或國家所面臨的迫切安全威脅,不只來自於門檻較高的核子大戰,也來自於隨時可能出現的不對稱恐怖戰爭。也因為數位科技的無所不在,產生了資訊社會高度依賴數位科技之後的易脆性(vulnerability),而這個易脆性正是國家安全(state security)與人民安全(civilian security)彼此鑲嵌(embedded)的結果。 本研究試圖說明數位科技的不當使用將成為二十一世紀國家安全的新威脅,雖然為了因應數位科技世代所面臨的安全威脅,全球與區域網路安全治理建制已經逐步在形成之中,然而跨國性的數位安全治理仍將因為制度行為者本身安全易脆性的差異性;國家主權的衝擊以及數位科技犯罪的監督不易等因素,無法發揮應有的功能。本研究嘗試提出「鑲嵌安全」的概念,主要目的在於破除「國家安全」與「人民安全」傳統分界,並主張唯有國家行為者與非國家行為者確實認知數位時代「鑲嵌安全」的本質,並將此認知具體落實在政策層面,才可能擺脫前述治理困境,並架構一個全球數位安全網。
    According to conventional wisdom, state security and civilian security are two separate concepts. Those who study state or national security will basically be categorized as scholars of international politics, while those who study civilian security criminologists. However, in the era of informationalization and globalization, one can hardly differentiate the boundary of these two levels of analysis. In view of the emerging unconventional warfare and the high degree of dependency of human beings on informationization, this paper tries to explore a new dimension of security studies that combines these two concepts. The author argues that the interdependence and the nature of embeddedness of the two levels of security under the threat of misuse of information technology necessitate the recognition of the vulnerability of separate security management. Learning about embedded security in the digital era might be the key to global governance of any transnational security issue.
    Relation: 問題與研究, 43(6), 29-52
    Data Type: article
    Appears in Collections:[Issues & Studies] Articles

    Files in This Item:

    File Description SizeFormat
    29-52.pdf1434KbAdobe PDF21317View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback