摘要: | 為了探討中國大陸網路安全戰略發展的內涵及其政策成效,本論文歸納中國大陸網路發展的文獻為學術應用、社會監督、經濟發展及政治博奕等四個範疇,進而運用國家安全戰略發展中的一般理論、網路安全相關戰略理論、國家安全與人權保障理論,採取以「中國大陸網路安全法規」、「世界各國網路安全法規」、「新聞媒體報導」為自變項,「網路安全戰略類型」為依變項的研究架構,透過NVivo質性研究電腦分析軟體文本分析及「法律個案」案例分析,探討其間的因果關係。
在資料運用部分,本論文大量採用了中國大陸中央及地方自2001年以來對外公布之各項網路安全法規(包含政策、文件,共計103項法規、47萬8,853字),及利用新聞媒體報導進行分類統計(2016年為22萬8,091則、2017年為23萬9,944則,共計46萬8,035則)。此外,本論文也將世界各國網路安全法規(共計7個國家、52項網路政策法規、94萬9,542字)作為內容分析方法的材料,進行中央與地方、官方與民間、國內與國際等各方位面向的比較,期能解構中國大陸網路安全戰略實質意涵及目標,並進行三個網路安全相關法律個案分析,及採取NVivo質性研究電腦分析軟體實施網路法規文本分析,以對比法規文字與實質政策內涵的差異。
經由上述資料分析,本論文發現中國大陸網路安全戰略可以「攻擊-管制型」(Offensive-Controllable Orientation)特徵為其戰略類型標誌,藉由採取網路監管等手段,以超越司法管轄權的經濟及法律制裁手段,強化自身網路攻擊能力,所展現之「強國安、弱人權」的法規特色及實際案例內涵,說明在國家歷史、社會和經濟的發展因素下,中國大陸以網路人權保障的法治外衣,達到取得國際網路規則主導權等國家利益追求的安全戰略目標,符合現實主義中國家「生存」及「自助」的安全需求。
以上發現,回應了Sonya Sceats、Ian E.Rinehart及Stefan Halper等學者認以追求世界霸權、取得網路的主控權及全球戰略利益為目標,屬於現實主義強調國家追求權力極大化之行為人的主張;並與Li Yuxiao、John Jamison、郭芝榕等學者,強調各項網路管制措施目的在於維持政權穩定及社會秩序需求之安全戰略主張相呼應。
證諸學界對世界各國網路安全戰略的研究文獻,本論文將中國大陸的網路安全定位為具攻擊性的管制戰略模式,或可視為網路安全戰略研究的一個新視角與新模式。
To discuss the connotation and policy performance about the development of China’s cybersecurity strategy, this paper generalized literacy of China’s development in cyberspace into four part, including academic application, social supervision, economic development and political game. Furthermore, it took advantage of theories inclusive of national security strategy development, cybersecurity-related strategy, and relation between national security and human rights, and carry out an research structure which is based on the independent variables composed of not only cybersecurity regulations from China and around the world, but also the reports from media. Through the analysis of NVivo software in qualitative research and individual law enforcement cases, the paper was able to dig into the cause-effect relation between.
In data application, this paper has widely adopted various cybersecurity regulations (including policies and documents) promulgated by the central and local governments, as well as utilizing media reports to conduct classification and statistics. In addition, this paper used cybersecurity regulations from all over the globe as the material of content analysis approach to make various comparison from central-local, official-and-non-official, and domestic-international perspectives in hope of deconstructing the actual meaning and targets of China’s cybersecurity strategy. Furthermore, it also analyzed three individual cases related to cybersecurity and adopted NVivo software in qualitative research to practice literacy analysis of cybersecurity regulations, so that it can discover the difference between usage in regulations and the actual connotation of policies.
Through analyzing the data above, this paper found out that China’s cybersecurity strategy features Offensive-Controllable Orientation as its strategic icon, to exceed the economic sanction and law enforcement in jurisdiction and strengthen its ability to launch cyber-attacks. Based on the feature above which can be concluded as the showcase of the “strong-national-security-and-weak-human-right” specialty and the connotation in specific cases, it explain that under the development factors of the nation’s history, society and economy, China reach to the access of the leading power to set up norms, which can be seen as a security strategic aims which national interests pursues. This act is compatible to the argument in realism that the state would have security needs to survive and self-help.
These findings have responded to arguments from realist scholars such as Sonya Sceats, Ian E.Rinehart and Stefan Halper, claiming that China took pursuing world hegemony, getting the control of the cyberspace and global strategic goals as its aim, and this act can be seen that China is a unitary actor who would maximize its own power. Moreover, it also echoed the notion from Li Yuxiao, John Jamison and Guo, whose security strategic viewpoints emphasized that diverse controlling measurements of cyberspace is aimed to maintain the stability of the regime and needs for order.
Based on the research literacy involving individual cybersecurity strategy of various states, this paper defined China’s cybersecurity as an offensive controllable strategic model, or saw it as a new viewpoint and mode of the study of cybersecurity strategy. |