English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 47249/51115 (92%)
造訪人次 : 14016030      線上人數 : 309
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/45194


    題名: 中國大陸網路安全法規之研究— 攻擊管制型戰略的文本分析
    China's Internet Security Regulations-A Textual Analysis for Its Offensive-controllable Orientation Strategy
    作者: 陳志成
    貢獻者: 國家發展與中國大陸研究所博士班
    關鍵詞: 網路安全
    攻擊型網路安全戰略
    管制型網路安全戰略
    網路戰略
    日期: 2018
    上傳時間: 2019-10-29 09:53:56 (UTC+8)
    摘要: 為了探討中國大陸網路安全戰略發展的內涵及其政策成效,本論文歸納中國大陸網路發展的文獻為學術應用、社會監督、經濟發展及政治博奕等四個範疇,進而運用國家安全戰略發展中的一般理論、網路安全相關戰略理論、國家安全與人權保障理論,採取以「中國大陸網路安全法規」、「世界各國網路安全法規」、「新聞媒體報導」為自變項,「網路安全戰略類型」為依變項的研究架構,透過NVivo質性研究電腦分析軟體文本分析及「法律個案」案例分析,探討其間的因果關係。
    在資料運用部分,本論文大量採用了中國大陸中央及地方自2001年以來對外公布之各項網路安全法規(包含政策、文件,共計103項法規、47萬8,853字),及利用新聞媒體報導進行分類統計(2016年為22萬8,091則、2017年為23萬9,944則,共計46萬8,035則)。此外,本論文也將世界各國網路安全法規(共計7個國家、52項網路政策法規、94萬9,542字)作為內容分析方法的材料,進行中央與地方、官方與民間、國內與國際等各方位面向的比較,期能解構中國大陸網路安全戰略實質意涵及目標,並進行三個網路安全相關法律個案分析,及採取NVivo質性研究電腦分析軟體實施網路法規文本分析,以對比法規文字與實質政策內涵的差異。
    經由上述資料分析,本論文發現中國大陸網路安全戰略可以「攻擊-管制型」(Offensive-Controllable Orientation)特徵為其戰略類型標誌,藉由採取網路監管等手段,以超越司法管轄權的經濟及法律制裁手段,強化自身網路攻擊能力,所展現之「強國安、弱人權」的法規特色及實際案例內涵,說明在國家歷史、社會和經濟的發展因素下,中國大陸以網路人權保障的法治外衣,達到取得國際網路規則主導權等國家利益追求的安全戰略目標,符合現實主義中國家「生存」及「自助」的安全需求。
    以上發現,回應了Sonya Sceats、Ian E.Rinehart及Stefan Halper等學者認以追求世界霸權、取得網路的主控權及全球戰略利益為目標,屬於現實主義強調國家追求權力極大化之行為人的主張;並與Li Yuxiao、John Jamison、郭芝榕等學者,強調各項網路管制措施目的在於維持政權穩定及社會秩序需求之安全戰略主張相呼應。
    證諸學界對世界各國網路安全戰略的研究文獻,本論文將中國大陸的網路安全定位為具攻擊性的管制戰略模式,或可視為網路安全戰略研究的一個新視角與新模式。
    To discuss the connotation and policy performance about the development of China’s cybersecurity strategy, this paper generalized literacy of China’s development in cyberspace into four part, including academic application, social supervision, economic development and political game. Furthermore, it took advantage of theories inclusive of national security strategy development, cybersecurity-related strategy, and relation between national security and human rights, and carry out an research structure which is based on the independent variables composed of not only cybersecurity regulations from China and around the world, but also the reports from media. Through the analysis of NVivo software in qualitative research and individual law enforcement cases, the paper was able to dig into the cause-effect relation between.
    In data application, this paper has widely adopted various cybersecurity regulations (including policies and documents) promulgated by the central and local governments, as well as utilizing media reports to conduct classification and statistics. In addition, this paper used cybersecurity regulations from all over the globe as the material of content analysis approach to make various comparison from central-local, official-and-non-official, and domestic-international perspectives in hope of deconstructing the actual meaning and targets of China’s cybersecurity strategy. Furthermore, it also analyzed three individual cases related to cybersecurity and adopted NVivo software in qualitative research to practice literacy analysis of cybersecurity regulations, so that it can discover the difference between usage in regulations and the actual connotation of policies.
    Through analyzing the data above, this paper found out that China’s cybersecurity strategy features Offensive-Controllable Orientation as its strategic icon, to exceed the economic sanction and law enforcement in jurisdiction and strengthen its ability to launch cyber-attacks. Based on the feature above which can be concluded as the showcase of the “strong-national-security-and-weak-human-right” specialty and the connotation in specific cases, it explain that under the development factors of the nation’s history, society and economy, China reach to the access of the leading power to set up norms, which can be seen as a security strategic aims which national interests pursues. This act is compatible to the argument in realism that the state would have security needs to survive and self-help.
    These findings have responded to arguments from realist scholars such as Sonya Sceats, Ian E.Rinehart and Stefan Halper, claiming that China took pursuing world hegemony, getting the control of the cyberspace and global strategic goals as its aim, and this act can be seen that China is a unitary actor who would maximize its own power. Moreover, it also echoed the notion from Li Yuxiao, John Jamison and Guo, whose security strategic viewpoints emphasized that diverse controlling measurements of cyberspace is aimed to maintain the stability of the regime and needs for order.
    Based on the research literacy involving individual cybersecurity strategy of various states, this paper defined China’s cybersecurity as an offensive controllable strategic model, or saw it as a new viewpoint and mode of the study of cybersecurity strategy.
    顯示於類別:[國家發展與與中國大陸研究所碩博士班] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML132檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋