English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113822/144841 (79%)
Visitors : 51826648      Online Users : 557
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/99155


    Title: 詞彙共現分析在中國大陸信息作戰領域發展之實證研究
    Other Titles: A Study on Word Co-occurrence Analysis on Information Operation Development in China
    Authors: 陳良駒;傅振華;楊誌瑋
    Chen, Liang-chu;Fu, Chen-hua;Yang, Chih-wei
    Keywords: 信息作戰;文字探勘;詞彙共現分析;策略座標圖
    information operation;text mining;word co-occurrence analysis;strategic diagram
    Date: 2010-06
    Issue Date: 2016-07-19 16:34:37 (UTC+8)
    Abstract: 本文以信息作戰為議題探索核心,以文字探勘為技術實證方法,同時藉由策略座標關係來揭露中國信息作戰領域之發展重點與趨勢。研究發現中國信息作戰知識領域包括「系統應用」、「武器裝備」、「政治作戰」等層面,並針對各層面所專注研議之重要主題進行深度闡釋。研究成果除可瞭解對岸學者於信息作戰議題之資源投入外,亦可做為我國發展資訊作戰相關事務之參照。
    As the US military applied information technologies to retain a crucial victory in the Iraq War, information operation is valued by the militaries in many countries. It has become the military war patterns and the focus of discussion. China is no exception. In recent years, many Chinese scholars have engaged in information operations related researches. It shows that China relies on information network environment to gain concrete results in military operations. In this paper, we focus on the topic of information operations. We applies text mining as research methodology and use relations of strategy coordination to disclose key areas and trends of China’s information operations. We found several China’s information operation knowledge domains – they are “system application”, “weapons”, and “political warfare”. This study also pinpointed several important topics and their interpretations. The results not only help us understand the resources by which Chinese scholars devoted to information operation issues, but also allow us to reference combat-related affairs in our own military.
    Relation: 中國大陸研究, 53(2), 111-146
    Data Type: article
    Appears in Collections:[中國大陸研究 TSSCI] 期刊論文

    Files in This Item:

    File Description SizeFormat
    53(2)p111-146.pdf2606KbAdobe PDF2342View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback