(3.236.231.61) 您好!臺灣時間:2021/05/15 21:24
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:湯君年
研究生(外文):Chun-Nien Tang
論文名稱:網路恐怖主義對國際網路安全之影響
論文名稱(外文):The Influence of Cyberterrorism to International Internet Security
指導教授:黃秋龍黃秋龍引用關係
指導教授(外文):Ciou-Long Huang
口試委員:洪陸訓蔡萬助黃奎博
口試委員(外文):Hong, Liou-SyunWan-Jhu CaiKwei-Bo Huang
口試日期:2011/05/30
學位類別:碩士
校院名稱:國防大學政治作戰學院
系所名稱:政治研究所
學門:社會及行為科學學門
學類:政治學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:141
中文關鍵詞:網路恐怖主義網路襲擊網路犯罪網路戰駭客
外文關鍵詞:Cyber-terrorismCyber AttackCybercrimeCyber WarfareHack
相關次數:
  • 被引用被引用:6
  • 點閱點閱:1953
  • 評分評分:
  • 下載下載:419
  • 收藏至我的研究室書目清單書目收藏:3
近年來,網路恐怖主義等網路襲擊議題廣為受到重視,其行為主體從個體、組織、國家、次國家行為者等,皆可發現其蹤跡及影響力,彷彿是一顆未爆彈,威脅現今的國際關係與國家安全。有趣的是,網路科技發展尚未達到一百年的時間,但相較於過去文藝復興、科學革命、工業革命時期,網路劇烈的改變了人類的生活環境與生活模式;進一步,影響了各層次的運作方式,促使行為體之間的互動更加頻繁,互動模式更加複雜。
冷戰結束後,層出不窮的脫序事件影響了全世界,尤其恐怖主義震驚國際舞台後,伊拉克戰爭、中東戰爭等反恐行動一幕幕跟著演出,原先既有的國際秩序受到嚴重挑戰。國際社會長期處於發展不均的情況下,第三世界國家、次國家行為者、弱勢團體試圖透過不對稱的攻擊方式發聲,於是其行為往往超乎國家認知的「理性範圍」內,導致這股新興力量大大的威脅國際安全,不僅造成人員傷亡,更造成各界損失慘重。尤其近十年來,這股新興勢力在新式科技的助力下,網路戰(Cyber-warfare)、電腦犯罪(Computer crime)、網路恐怖主義如雨後春筍般發跡,導致許多學者開始高度關注網路襲擊相關議題,並試圖找出解決之道。
當今全球化、科技化的時代下,握有新技術支援的網路恐怖主義,不僅影響現今國際社會的安全,還可能連帶影響政治、經濟、軍事、戰略等多重複合層面,促使國際組織、國家間、公私部門職能開始出現有別於冷戰時期恐怖平衡的國際關係。網路恐怖主義彷彿一股催化劑般,造成國際政治、經濟、安全等區塊燃起了一股新的化學變化,然而面臨新的挑戰時,現存的國際組織,甚至各國家本身,尚未擁有共識來應對與處理新式威脅或不確定因素。換言之,網路恐怖主義仍有許多灰色地帶等待我們加以討論與釐清、探索及研究。

In the recent years, Cyber-terrorism and other related cyber attack issues have been taken seriously. From individuals, organizations, sub-national group to nations, we all can find the cases and its powerful impact. Therefore, Cyber-terrorism is such a bomb to threaten our international relations and national security nowadays. However, the most interesting part is that the development of internet technology has not been over one hundred years yet, but it already has changed the human beings’ environment and model of life comparing to Renaissance, Scientific Revolution, and Industrial Revolution. Furthermore, it changes the mode of operation of all the levels, having the actors interact with others more frequently, more complicated.
After the Cold War, unleashed conflicts challenged the world peace, especially terrorism astonished all the nations in the international society, causing the Iraq war, Middle East war, and other counter-terrorism actions to response to these violence, our existing world order desolated seriously. Because the international society has been under an uneven development, the developing countries, sub-national groups, and under-privileged groups try to use asymmetrical warfare way to speak up for themselves. That is why the result of these attacks is usually over our rational conscience, threatening the international security and contributing to large-scale losses. In the recent ten years, this emerging security threat has combined with new technologies and popped up in a new form, such as Cyber-warfare, Computer Crime, and Cyber-terrorism, and more and more scholars and security experts start to study these cyber-attacks and dedicate to find out the solution.
Until now, under a globalization and technologization era, transformed Cyber-terrorism with new technologies support not only influences the international social security but also politics, economics, military etc., a security complex idea, having the function of international organization, nations, and public and private departments changed, different from the relations of balance of terror in the Cold War or one superpower and many minor powers in Post-Cold War. Cyber-terrorism is such as a catalyze igniting a new chemical change in politics, economics, security and other sectors; however, while the nations are facing new challenges, even the existing international organizations and nations themselves still do not have enough power or consensus to deal with this new threat or other uncertainties. In other words, Cyber-terrorism is an indefinite idea that we need to discuss, explore, and study more
目錄

目錄 …………………………………………………………………………………I
表目錄………………………………………………………………………………III
圖目錄………………………………………………………………………………IV

第一章、 緒論………………………………………………………………………1
第一節 研究背景……………………………………………………2
第二節 文獻探討……………………………………………………6
第三節 問題意識……………………………………………………8
第四節 研究目的與範圍……………………………………………11
第五節 研究途徑與方法……………………………………………12
第六節 相關理論說明與應用………………………………………15
第七節 研究流程……………………………………………………17
第二章、 網路恐怖主義的本質、定義與內涵……………………………………21
第一節 網路恐怖主義的本質………………………………………21
第二節 網路恐怖主義現階段的定義與內涵………………………35
第三節 網路襲擊的動機、目標與方法………………………………44
第三章、 網路恐怖主義對國際網路安全之影響…………………………………55
第一節 網路恐怖主義如何衝擊國際網路安全……………………55
第二節 網路恐怖主義對相關層面之影響…………………………67
第四章、 國際網路安全之合作與建構……………………………………………87
第一節 網路安全納入國家安全戰略思維…………………………88
第二節 相關理論對國際網路安全戰略之應用與啟發……………93
第三節 既有理論對國際網路安全策略建構之作用………………99
第四節 制度化跨國反網路恐怖主義之實踐與啟發……………105
第五節 他國經驗與我國應對之作為……………………………111
第五章、 結論……………………………………………………………………119
第一節 研究總結……………………………………………………119
第二節 政策建議……………………………………………………120
參考文獻……………………………………………………………………………123


表目錄

表1-1、研究流程表……………………………………………………………………17
表1-2、本文研究過程解構表…………………………………………………………18
表2-1、網路科技發展表………………………………………………………………23
表2-2、早期網路襲擊案例……………………………………………………………30
表2-3、各方學者對網路恐怖主義的定義……………………………………………39
表2-4、作者對網路恐怖主義的定義…………………………………………………43
表2-5、干預安全措施與系統運作之順序……………………………………………46
表2-6、常見的網路襲擊手法…………………………………………………………51
表3-1、2008年聯邦調查局針對電腦犯罪與網路安全評鑑報告…………………61
表3-2、網路恐怖主義與恐怖主義對關鍵基礎建設之威脅…………………………72
表3-3、2001至2010年美國聯邦調查局敘述網路威脅來源與目的之統整表……83
表4-1、新興網路恐怖主義威脅管道與當今資訊科技的弱點………………………89
表4-2、2003年美國反網路恐怖主義之戰略指導方針……………………………101
表4-3、美國對網路安全戰略的思維………………………………………………102
表4-4、評論美國網路安全戰略的缺點……………………………………………104
表4-5、組織層次體系與網絡組織的比較…………………………………………110


圖目錄

圖2-1、蓋達組織劫機與脅持約翰遜作為人質的影片畫面圖………………………48
圖2-2、惡意網站………………………………………………………………………52
圖2-3、電子郵件轉寄惡意程式網址…………………………………………………53
圖3-1、1998年美國肯亞大使館遭恐怖襲擊後的圖片與1995年恐怖分
子攻擊世貿前的錄影存證………………………………………………58
圖3-2、駭客組織:匿名(Anonymous)發表威脅聲明的影片畫面圖………………63
圖3-3、恐怖組織與相關行為體主要分佈圖…………………………………………66
圖3-4、聯邦調查局截獲重要加密訊息………………………………………………67
圖3-5、2010年各部門遭受網路襲擊之比例圖……………………………………80
圖3-6、2000年至2010年美國網路犯罪投訴中心接獲案例之統計圖……………80
圖3-7、前十大國家的網路犯罪比例分佈圖…………………………………………81
圖4-1、個資外洩後轉貼病毒連結給其他使用者的情形……………………………91
圖4-2、點選不知名網址導致電腦中毒的情形………………………………………91
圖4-3、輸入使用者名稱和密碼來遠端控制個人電腦………………………………92







參考文獻

一、中文部分
(一)官方文件
中華民國行政院,2010。《2010 資通安全政策白皮書》(台北:行政院科技顧問組》。

(二)專書
中國現代國際關系研究所反恐怖研究中心,2002。《世界主要國家和地區反恐怖政
策與錯事》。北京:時事出版社。
王崑義,1997。《恐怖與危機-美利衝突的戰略分析》。臺北:漢斯出版社。
王逸舟,1999。《全球化時代的國際安全》。上海:人民出版社。
王逸舟,2002。《恐怖主義溯源》。北京:社會科學文獻出版。
石之瑜,2002。《恐怖主義溯源》。北京:社會科學文獻出版社。
吳東野,2003。《九一一與國際反恐》。台北:財團法人兩岸交流基金會。
李宗勳,2008。《網路社會與安全治理》。台北:元照出版有限公司。
李偉,2006。《國際恐怖主義鬥爭年鑑》。北京:時事出版社。
李偉主編,2005。《國際恐怖主義與反恐鬥爭年鑑》。北京:時事出版社。
李慎明、王逸舟,2009。《2010年全球政治與安全報告》。北京:社會科學文獻出版社。
李慧智,2003。《反恐學》。北京:人民出版社。
汪毓瑋編著,2007。《國際重要恐怖活動與各國反制作為大事紀》。台北:幼獅文
化。
周效坤、楊世松主編,2006。《信息反恐論》。北京:軍事科學出版社。
易君博,2003。《政治理論與研究方法》。台北:三民書局。
林碧炤,2003。《國際政治與外交政策》。臺北:五南圖書出版社。
俞正樑等著,2009。《全球化時代的國際關係》。上海:復旦大學出版社。
胡聯合,2001。《當代世界恐怖主義與對策》。北京:東方出版社。
范明強,2005。《社會學視野中的恐怖主義》。北京:解放軍出版社。
倪世雄。2008。《當代國際關係理論》。台北:五南書局。
翁明賢,2002。《全球化時代的國家安全》。臺北:創世文化事業出版社。
張亞中主編,2007。《國際關係總論》。台北:揚智文化事業股份有限公司。
張家棟。2007年。《恐怖主義論》。北京:時事出版社。
曹雄源。2009年。《戰略解碼:美國國家安全戰略的佈局》。臺北:五南圖書公司。
眾鵬,2004。《大國安全觀比較》。北京:時事出版社。
陸忠偉,2003。《非傳統安全論》。北京:時事出版社。
黃秋龍,2009。《非傳統安全論與政策應用》。台北:結構群文化事業有限公司。
黃秋龍,2010。《兩岸總體安全下的非傳統威脅》。台北:法務部調查局展望與探索雜誌社。
楊伯淑、安東尼‧麥克格魯,2004。《全球化與反全球化》。北京:社會科學文獻出版社。
楊洁勉,2003。《國際合作反恐》。北京:時事出版社。
蔡萬助,2008。《2008年解放軍研究論壇彙編》。國防大學出版。
蘇進強,2002。《911事件後全球戰略評估》。臺北:台灣英文新聞股份有限公司。楊洁勉,2003。《國際合作反恐──超級地緣政治的思考》。北京:時報出版社。

(三)專書譯著
Akbar S. Ahmed著,蔡百詮譯。2003年。《今日的伊斯蘭:穆斯林世界導論》(Islam
Today: A Short Introduction to the Muslim World)。台北:商周出版。
Chava Frankfort-Nachmias著,潘明宏、陳志瑋譯,2003。《社會科學研究方法》
(Research Methods in the Social Sciences)。臺北:韋伯文化國際。
Harry Henderson著,李聯榮、戴艷麗譯,2003。《全球恐怖主義》(Global
Terrorism)。北京:中國社會科學出版社。
Ian O. Lesser著,程克雄譯,2001。《反新恐怖主義》(Countering The New
Terrorism)。北京:新華出版社。
Robert Kagan著,楊紫涵譯,2002。《當前威脅:美國外交與國防政策的危機與
契機》(Present Danger: Crisis and Opportunity in American Foreign and
Defense Policy)。臺北:國防部史政編譯室。
James Smith和 M.、William C. Thomas著,謝豐安、吳福生譯,2002。《恐怖主義
威脅與美國政府的回應》(The Terrorism Threat and U.S. Government Response: Operational and Organizational Factors)。臺北:國防部史政編譯室。
U.S. White House出版,國防部史政編譯室譯,2003。《確保安全網路空間的國家
戰略》(The National Strategy to Secure Cyberspace)。台北:國防部史政編譯
室。

(四)期刊譯著
Richard Weitz著,高一中譯,2010/6。〈網路作戰威脅日增〉(Firewall: The Growing
Threat of Cyber Warfare),《國防譯粹》,第37卷5期,頁35。

(五)期刊論文
王崑義,2010。〈非傳統安全與台灣軍事戰略的變革〉,《台灣國際研究季刊》,
第6卷第2期,頁4-15。
巨克毅,2004年。〈國際恐怖主義蓋達組織的意識形態與策略之分析〉。《全球政治
評論》,第3期,頁1-17。
李宗勳,2004。〈從全球化觀點看政府公共安全治理模式〉,《中國行政評論》,第
13卷第3期,頁75-118。
李宗勳,2004。〈反恐危機管理之新視野與跨域機制〉,《井學叢刊》,第35卷
第2期,頁17-48。
汪舒明,2008年。〈“基地”組織的復興與重構〉。《國際問題研究》,第2期,頁
65-69。
張中勇,2009年。〈孟買恐怖襲擊事件及其影響之後續觀察—─印巴之危機處理
對策〉。《戰略安全研析》,第45期,頁24-27。
黃秋龍,2010。〈非戰爭性軍事行動對制度創新之啟發〉,《國防雜誌》,第25
卷第2期,頁23-47。

(六)學位論文
郭懷舜,2007。《「威爾斯學派」之批判安全研究》。臺北:國立中山大學政治學
研究所碩士論文。
游寶珠,2001。《恐怖主義與國際法》。臺北:國立臺灣海洋大學海洋法律研究所
碩士論文。
蔡育岱,2008。《人類安全:安全研究之新議程》。台北:國立政治大學外交系
博士論文。

(七)研討會論文
徐正祥,2004年。〈中東恐怖組織之源起與發展〉,「第二屆恐怖主義與國家安全
學術研討暨實務」座談會。桃園:中央警察大學恐怖主義研究中心主辦。
傅仁坤、張益銘,2008年。〈中亞區域安全與上海合作組織的發展—─兼論四股
恐怖勢力〉。「第四屆恐怖主義與國家安全學術研討暨實務」座談會。桃園:
中央警察大學恐怖主義研究中心主辦。
童振源,2003/11/3-4。〈反恐戰爭下的全球經貿格局發展〉,「第三屆兩岸遠景論壇
全球化趨勢下的反恐與兩岸關係」研討會。台北:財團法人兩岸交流遠景基
金會等。
潘光,2003/11/3-4。〈全球反恐形勢與中國的反恐國際合作〉,「第三屆兩岸遠景論
壇 全球化趨勢下的反恐與兩岸關係」研討會。台北:財團法人兩岸交流遠
景基金會等。
潘光,2009年。〈國際反恐合作面臨的新挑戰及其績效評估〉。「第五屆恐怖主義
與國家安全學術研討暨實務」座談會。桃園:中央警察大學恐怖主義研究中
心主辦。

(八)網際網路
王金雪,〈美國將與英國和加拿大合作舉行反恐演習〉,《人民網》,2005/3/18,
http://world.people.com.cn/BIG5/1029/3253675.html (瀏覽日期:2010/12/8) 。 ,
幻冽,〈民國一百年!台灣版千禧蟲危機〉,《電腦不難》,2009/5/17,
http://pcnoproblem.twbbs.org/y2k/ (瀏覽日期:2010/2/5)。
〈中國茉莉花革命〉,《維基百科》, http://zh.wikipedia.org/zh-hant/%E4%B8%AD%E5%9C%8B%E8%8C%89%E8%8E%89%E8%8A%B1%E9%9D%A9%E5%91%BD (瀏覽日期:2010/5/7)。
〈2011多莫傑多沃國際機場炸彈襲擊事件〉,《維基百科》,
http://zh.wikipedia.org/zh-hk/2011%E5%B9%B4%E5%A4%9A%E8%8E%AB%E5%82%91%E5%A4%9A%E6%B2%83%E5%9C%8B%E9%9A%9B%E6%A9%9F%E5%A0%B4%E7%82%B8%E5%BD%88%E8%A5%B2%E6%93%8A (瀏覽日期:2011/4/2)。
Mercury,〈中共軍方網路駭客攻擊資訊匯整〉,《尖端科技軍武論壇》,2009/1/1,
http://www.dtmonline.com/forum/cgi-bin/topic.cgi?forum=2&topic=598&show=0&start=60&man=&max=yes (瀏覽日期:2010/12/1)。

二、英文部分
(一)官方文件
EastWest Institute. 2010. Russia, the United States, and Cyber Diplomacy: Opening
Door. New York: EastWest Institute.
Internet Crime Complaint Center. 2010. 2009 Internet Crime Report.
Washington, D. C.: Internet Crime Complaint Center.
National Counterterrorism Center. 2010. Counterterrorism Calendar 2010. Washington
D. C.: National Counterterrorism Center.
U.S. Department of Defense. 2010. Quadrennial Defense Review Report.
Washington D. C.: U.S. Department of Defense.
U.S. Department of States. 2005. Country Reports on Terrorism,Chapter 6:
Terrorist Group. Washington D. C.: U.S. Department of States.
U.S. Department of States. 2009. Country Reports on Terrorism. Washington: D. C.:
U.S. Department of States.
U.S. Office of Homeland Security. 2002. National Strategy for Homeland Security.
United States: U.S. Office of Homeland Security.
U.S. Office of Homeland Security, 2009. National Infrastructure Protection Plan, United
States: U.S. Office of Homeland Security.
(二)專書
Issac, Alan C.. 1987. An Introduction to Politics. Chicago: Scott Foresman &
Company.
Baylis, John and Steve Smith. 2005. The Globalization of World Politics: An Introduction to International Relations. New York: Oxford University Press.
Buckley, Mary and Rick Fawn. 2003. Global Responses to Terrorism: 9/11, the War in Afghanistan and Beyond. New York: Routledge.
Congressional Research Service. 2004. CRS Report for Congress: Cybercrime:
The Council of Europe Convention. Washington, D. C.: CRS.
Congressional Research Service. 2008. CRS Report for Congress: Bonets,
Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Washington, D. C.: CRS.
Coady , C. A. J and Igor Primoratz, 2004,. Terrorism: The Philosophical Issues. New York: Palgrave Macmillan.
Whittaker, David J.. 2001. The Terrorism Reader. London: Routledge.
Gareau, Frederick H.. 2004. State Terrorism and the United States: From Counterinsurgency to the War on Terrorism. GA: Clarity Press, Inc..
Gus, Martin. 2006. Understanding Terrorism: Challenges, Perspectives, and Issues, London: Sage Publications. Inc..
Hamilton, Daniel S.. 2006. Terrorism and International Relations. Lisbon: Calouste Gulbenkian Foundation.
Jordan, Robert S.. 2001. International Organizations: A Comparative Approach to the Management of Cooperation. Westport Connecticut: Praeger.
Katona, Peter, Michael D. Intriligator., and John P. Sullivan. 2006. Countering Terrorism and WMD: Creating a Global Counter-terrorism Networ. New York: Routledge.
Kegley Jr., Charles W. and Eugene R. Withhkopf. 2004. World Politics: Trends & Transformation. California: Thomson Wadsworth.
Pamala L., Griset and Sue Mahan. 2003. Terrorism in Perspective. California: Thousands Oaks.
Saul, Ben. 2006. Defining Terrorism in International Law. New York: Oxford University Press.
Simonsen, Clifford E. and Jeremy R. Spindlove . 2007. Terrorism Today: The Past, The Players, The Future. New Jersey: Pearson Prentice Hall.
Sloan, Stephen. 2006. Terrorism: The Present Threat in Context. New York: Berg.
The Creative Studio at Deloitte. 2010. 2010 Financial Services Global Security Study.
London: The Creative Studio at Deloitte.

(三)專書論文
Amant, Kirk St.. 2008. “International Outsourcing, Personal Data, and Cyber
Terrorism: Approaches for Oversight.” in Ann Shaver and Heidi Hormel, eds..
Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 112-119.
Ariely, Gil. 2008. “Knowledge Management, Terrorism, and Cyber Terrorism.” in
Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 7-16.
Arnes, Andre, 2008, “Large-Scale Monitoring of Critical Digital Infrastructures.” in
Ann Shaver and Heidi Hormel, eds., Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 273-280.
Brunst, Phillip W.. 2008. “Use of Internet by Terrorists.” in Centre of Excellence
Defence Against Terrorism, Ankara, Turkey, eds.. Responses to Cyber Terrorism
(Amsterdam: ISO Press). pp. 34-60.
Chochliouros, Ioannis P., Stergious P. Chochliouros, Anastasia S. Spiliopoulou, and
Evita Lampadari. 2008. “Public Key Infrastructures as a Means for Increasing
Network Security.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 281-290.
Cridland, Clare. 2008. “The History of the Internet: The Interwoven Domain of
Enabling Technologies and Cultural Interaction.” in Centre of Excellence
Defence Against Terrorism, Ankara, Turkey, eds.. Responses to Cyber Terrorism (Amsterdam: ISO Press). pp. 1-7.
Curran, Kevin, Peter Breslin, Kevin McLaughlin, and Gary Tracey. 2008. “Hacking
and Eavesdropping.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and
Cyber Terrorism (Hershey: Information Science Reference). pp.
307-317.
Curran, Kevin, Kevin Concannon, and Sean McKeever. 2008. “Cyber Terrorism
Attacks.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 1-6.
Disterer, Georg, Ame Alles, and Axel Hervatin. 2008. “Denial-of-Service (DOS)
Attacks: Prevention, Instrusion Detection, and Mitigation.” in Ann Shaver and
Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 262-272.
Everard, Lt. Paul. 2008. “NATO and Cyber Terrorism.” in Centre of
Excellence Defence Against Terrorism, Ankara, Turkey, eds.. Responses to Cyber
Terrorism (Amsterdam: ISO Press). pp. 118-127.
Fagnot, Isabelle J.. 2008. “Behavioral Information Security.” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science
Reference. pp. 199-205.
Gandal, Neil. 2008. “An Introduction to Key Themes in the Economics of Cyber
Security.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 78-82.
Goodman, Seymour E.. 2008. “Critical Information Infrastructure Protection,” in
Centre of Excellence Defence Against Terrorism, Ankara, Turkey, eds..
Responses to Cyber Terrorism (Amsterdam: ISO Press). pp. 24-33.
Gupta, Manish and H.R. Rao. 2008. “Role of FS-ISAC in Countering Cyber
Terrorism,” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 83-90.
Jennex, E. Murray. 2008. “Cyber War Defense: Systems Development with Integrated
Security” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 241-253.
Jennex, Murray E.. 2008. “A Model for Emergency Response Systems,” in Ann
Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey:
Information Science Reference). pp. 383-391.
Kiltz, Stefan, Andreas Lang, and Jana Dittmann. 2008. “Malware: Specialized Trojan
Horse.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 154-160.
Knapp, Kenneth J. and William R. Boulton. 2008. “Ten Information Warfare Trends,”
in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 17-25.
Knop, Dr. Katharina von. 2008. “Institutionalization of a Wed-focused, Multinational
Counter-terrorism Campaign-Building a Collective Open Source Intelligent
System, A Discussion Paper.” in Centre of Excellence Defence Against
Terrorism, Ankara, Turkey, eds.. Responses to Cyber Terrorism (Amsterdam ISO
Press, pp. 8-23.
Leipnik, Mark R.. 2008. “Use of Geographic Information Systems in Cyber Warfare
and Cyber Counterterrorism.” in Ann Shaver and Heidi Hormel, eds.. Cyber
Warfare and Cyber Terrorism (Hershey: Information Science
Reference). pp. 291-297.
Liberati, Deiego. 2008. “Identification Through Data Mining,” in Ann Shaver and
Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 374-380.
Mishra, Alok and Deepti Mishra. 2008. “Cyber Stalking: A Challenge for Web
Security,” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 216-225.
Nugent, John H. and Mahesh Raisinghni. 2008. “Bits and Bytes vs. Bullets and
Bombs: A New Form of Warfare.” in Ann Shaver and Heidi Hormel, eds.. Cyber
Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 26-34.
Owen, Robert S.. 2008. “Infratructures of Cyber Warfare.” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 35-41.
Ozeren, Superintendent Suleyman. 2008. “Cyberterrorism and International
Cooperation: General Overview of the Available Mechanisms to Facilitate an
Overwhelming Task.” in Centre of Excellence Defence Against Terrorism,
Ankara, Turkey, eds.. Responses to Cyber Terrorism (Amsterdam: ISO Press). pp. 70-88.
Politis, Dionysios V. and Konstantions P. Theodoridis. 2008. “Spam, Spim, and
Illegal Advertisement.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare
and Cyber Terrorism (Hershey: Information Science Reference). pp. 146-153.
Robotis, Konstantions and Theodoros Tzouramanis. 2008. “Electronic Money
Management in Modern Online Businesses.” in Ann Shaver and Heidi Hormel,
eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 129-137.
Rowe, Neil C.. 2008. “Deception in Defense of Computer Systems from Cyber
Attacks.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 97-104.
Rowe, Neil C.. 2008. “Ethics of Cyber War Attacks.” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 105-111.
Rowe, Neil C. and Custy E. John. 2008. “Deception in Cyber Attacks.” in Ann Shaver
and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 91-96.
Saleh, Kassem, Imran Zualkernan, and Ibrahim AI Kattan. 2008. “A Roadmap for
Delivering Trustworthy IT Processes.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 57-75.
Schneidewind, Norman F.. 2008. “Cyber Security Models,” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp.228-240.
Shahar, Yael. 2008. “The Internet as a Tool for Intelligence and Counter-Terrorism.” in
Centre of Excellence Defence Against Terrorism, Ankara, Turkey, eds.. Responses
to Cyber Terrorism (Amsterdam: ISO Press). pp. 104-118.
Thion, Romuald. 2008. “Network-Based Passive Information Gathering,” in Ann
Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey:
Information Science Reference). pp. 120-128.
Tikk, Ms Eneken and Ms Reet OORN. 2008. “Legal and Policy Evaluation:
International Coordination of Prosecution and Prevention of Cyber Terrorism,”
in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, eds..
Responses to Cyber Terrorism (Amsterdam: ISO Press). pp. 89-103.
Tzouramanis, Theodoros. 2008. “SOL Code Poisoning: The Most Prevalent
Technique for Attacking Web Powered Databases,” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 161-170.
Warren, M. J.. 2008. “Terrorism and the Internet,” in Ann Shaver and Heidi Hormel,
eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 42-49.
Warkentin, Merrill, Mark B. Schmidt, and Ernst Bekkering. 2008. “Steganography,”
in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 50-56.
Weimann, Gabriel. 2008. “The Reliance of Al-Qaeda on the Internet.” in Centre of
Excellence Defence Against Terrorism, Ankara, Turkey, eds.. Responses to Cyber
Terrorism (Amsterdam: ISO Press). pp. 61-69.
Woda, Krzysztof. 2008. “The Analysis of Money Laundering Techniques.” in Ann
Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 138-145.

(四)期刊論文
Adams, M.. 2006. “Hybridizing Habitus and Reflexivity: Towards an Understanding of Contemporary Identity?.” Sociology. 40(3): 115-143.
Adamson, Flona B.. 2007. “Remapping the Boundaries of ‘State’ and ‘National Identity’: Incorporating Diasporas into IR Theorizing.” European Journal of International Relations. 13(4): 489-526.
Andrew Peterson. 2008. “Addressing Tomorrow’s Terrorists.” Journal of National
Security Law & Policy. 2: 297-354.
Busumtwi-Sam, James. 2002. “Development and Human Security.” International Journal. 57(2): 253-272.
Byman, Daniel L.. 2006/9-11. “Friends Like These: Counterinsurgency and the War on Terrorism,” International Security. 31(2): 79-115.
Davis, Elizabeth Van Wie. 2008/4/14. “Terrorism and the Beijing Olympics: Uyghur Discontent,” China Brief. 8: 1-6.
Donnelly, J.. 2006. “Sovereign Inequalities and Hierarchy in Anarchy: American Power and International Society.” European Journal of International Relations. 12(2): 124-139.
Granville, Johann. 2003. “Tracking Computer Hacking: The Dangers of Cyber Terrorism.” Global Society. 17(1): 89-97.
Ivanon, Viktor. 2010/2/12. “Moscow’s Terror Fighter.” Newsweek. 1(15): 56-59.
Manutscharjan, Aschot. 2009. “Russia’s National Security Strategy Until 2020.” Konrad-Adenauer-Stiftung E.V.. 62: 159-162.
McNeal, S. Gregory. 2007-2008. “Cyber Embargo: Countering the Internet Jihad.” Journal of International Law. 39: 789-827.
Piggin, Richard. 2010/11-12. “The Reality of Cyber Terrorism.” Engineering & Technology. 5(17): 36-38.
Post, Jerrold M., Kevin G. Ruby, and Eric D. Shaw. 2000. “From Car Bombs to Logic Bombs:
The Growing Threat From Information Terrorism.” Terrorism and Political Violence.
12(2): 97-112.
Prichard, Janet J. and E. Laurie Macdonald. 2004. “Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks.” Journal of Information Technology Education. 3: 280-289.
Schmid, Alex P.. 2004. “Frameworks for Conceptualizing Terrorism.” Terrorism and Political Violence. 16(2): 197-221.
Shah, Nishant. 2007. “Subject to Technology: Internet Pornography, Cyber-Terrorism and the Indian State.” Inter-Asia Cultural Studies. 8: 349-365.

(五)研討會論文
Wilshusen, Gregory C. and David A. Powner, 2009. “Continued Efforts Are Needed to
Protect Information Systems from Evolving Threats,” statement for the record to
the subcommittee on Terrorism and Homeland Security Committee on the
Judiciary, (Washington, D. C.: U.S. Government Accountability Office), pp.
1-20.

(六)網際網路
Ashford, Warwick. 2011/3/4. “South Korean Websites Come Under Cyber Attack.”
ComputerWeekly.com. At
http://www.computerweekly.com/Articles/2011/03/04/245708/South-Korean-websi
tes-come-under-cyber-attack.htm (accessed 2011/3/6).
Bachfeld, Daniel. 2003. “War der Wurm drin?,” IT-Sicherheit in der
US-Stromverssorgung. At http://www.heise.de/artikel-archiv/ct/2003/18/034
(accessed 2011/4/12).
Craucamp, Andrew. 2011/2/8. “Online Security Firm Feel the Wrath of Anonymous.” Memeburn. At http://memeburn.com/2011/02/online-security-firm-feels-the-wrath-of-anonymous/(accessed 2011/2/9).
Daniel, Jeremy. 2011/3/17. “Hacker Group Anonymous Declares War on ‘Global Banking Cartel’.” At
http://memeburn.com/2011/03/hacker-group-anonymous-declares-war-on-global-banking-cartel/ (accessed 2011/3/19).
FBI. “Cyber Crime,” The FBI (Federal Bureau of Investigation). At
http://www.fbi.gov/wanted/cyber (accessed 2011/4/1).
FBI. “Ten Most Wanted,” The FBI (Federal Bureau of Investigation). At http://www.fbi.gov/wanted/topten (access 2011/5/5).
Keinon, Herb. 2011/4/11. “Security Cabinet Gives IDF Go-Head for Military Action.” The Jerusalem Post. At http://www.jpost.com/Defense/Article.aspx?id=216032
(accessed 2011/4/14).
Keteyian, Armen. 2010/12/20. “Latest Terror Threat in U.S. Armed to Poison Food.” CBS News. At http://www.cbsnews.com/stories/2010/12/20/eveningnews/main7169266.shtml
(accessed 2010/2/28).
Kitsantonis, Niki. 2010/12/30. “Bomb Blast Damages Athens Court Buildings.” The
New York Times. At
http://www.nytimes.com/2010/12/31/world/europe/31greece.html (accessed
2011/5/4).
Krebs, Brian. 2003/2/14. “A Short History of Computer Virus and Attacks.” The Washington Post. At http://www.washingtonpost.com/ac2/wp-dyn/A50636-2002Jun26
(accessed 2011/2/17).
Lambrecht, Bill. 2010/7/24. “Boeing in Ongoing Cyber Terrorism Fight.” Australian IT.
At
http://www.theaustralian.com.au/australian-it/the-hub/boeing-among-defence-firms-fighting-cyber-terrorism/story-fn4mm2dt-1225883695304 (accessed 2011/5/11).
Leyden, John. 2001/1/22. “Mass Hack Takes Out Govt. Sites.” The Register. At
http://www.theregister.co.uk/2001/01/22/mass_hack_takes_out_govt/
(accessed 2010/11/20).
Linder, Douglas. 2006. “The Oklahoma Bombing Conspirators.” At
http://law2.umkc.edu/faculty/projects/ftrials/mcveigh/conspirators.html
(accessed 2011/1/13).
Mccarthy, Kieren. 2007/3/8. “Factsheet: DNS attack.” ICNN Blog. At
http://blog.icann.org/2007/03/factsheet-dns-attack/ (assessed 2011/2/8).
McCann, Steve. 2011/3/2. “The Terrorist who Burrowed in.” American Thinker. At http://www.americanthinker.com/blog/2011/03/the_terrorist_who_burrowed_in.html (accessed 2011/5/4).
Milan, Mark. 2011/5/1 “Sony apologizes for PlayStation Breach, offers compensation,” CNN. At http://edition.cnn.com/2011/TECH/gaming.gadgets/05/01/playstation.online/index.html?iref=allsearch (accessed 2011/5/15).
Milan, Mark. 2011/5/3. “Sony: PC game network was also hacked.” CNN. At
http://edition.cnn.com/2011/TECH/gaming.gadgets/05/02/sony.hack/index.html?iref=allsearch (accessed 2011/5/4).
Musharbash, Y.. 2004/6/17. “US-Firmen-Website für Qaida-Botschaft gehackt,” Spiegel Online. At
http://www.spiegel.de/politik/ausland/0,1518,304473,00.html (accessed 2011/2/2).
Neill, James. “Qualitative versus Quantitative Research: Key Points in a Classic Debate.” at http://wilderdom.com/research/QualitativeVersusQuantitativeResearch.html
(accessed 2010/10/30).
Palatino, Mong. 2011/4/13. “Malaysia: Cyber Attack Shut Down Independent News Website,” GlobalVoices. At http://globalvoicesonline.org/2011/04/13/malaysia-cyber-attacks-shut-down-independent-news-website/ (accessed 2011/4/15).
Pate, Jason and Gavin Cameron. 2001/8. “Covert Biological Weapons Attacks against Agricultural Targets: Assessing the Impact against U.S. Agriculture.” At http://belfercenter.ksg.harvard.edu/files/covert_biological_weapons_attacks_against_agricultural_targets.pdf (accessed 2011/2/28).
Pellerin, Cheryl. 2010/10/18. “Cyberspace is the New Domain of Warfare security.” U.S. Department of Defense. At http://www.defense.gov/news/newsarticle.aspx?id=61310 (accessed 2011/1/15).
Persson, C.. 2006/12/28. “Rückfall ins Telefonzeitalter" nach Erdbeben.” Heise Online. At http://www.heise.de/newsticker/meldung/Rueckfall-ins-Telefonzeitalter-nach-Erdbeben-129683.html (accessed 2011/2/28).
Pike, John. 2005/4/27. “Attack on U.S. Embassies in Kenya and Tanzania.”
GlobalSecurity.org. At http://www.globalsecurity.org/security/ops/98emb.htm
(assessed 2011/1/13).
Ressa, Maria. 2011/5/4. “Spreading terror: From Bin Laden to Facebook in Southeast Asia.” CNN. At http://edition.cnn.com/2011/OPINION/05/03/bin.laden.southeast.asia/index.html?iref=allsearch (accessed 2011/3/4).
Schneier, Bruce. 2006/9/16. “Terrorism and September 11.” The Beheyeldin Dynasty.
At
http://baheyeldin.com/writings/terrorism/bruce-schneier-on-terrorism-and-septemb
er-11.html/ (accessed 2011/3/14).
Scrub. 2010/3/13. “FBI 2009 Crime Statistics.” ScamFraudAlert Blog. At
http://scamfraudalert.wordpress.com/2010/03/13/fbi-2009-cybercrime-statistics/
(accessed 2011/1/4).
Strickland, Eliza. 2009/7/8. “Cyber Attack Hits Government Websites; North Korea Is Blamed.” Discover. At http://blogs.discovermagazine.com/80beats/2009/07/08/cyber-attack-hits-government-web-sites-north-korea-is-blamed/ (accessed 2011/3/2).
The White House: Office of the Press Secretary. 2010/12/1. “Presidential Proclamation: National Cybersecurity Awareness Month,” The White House: Office of the Press Secretary. At
http://www.whitehouse.gov/the-press-office/2010/10/01/presidential-proclamation-national-cybersecurity-awareness-month (accessed 2011/2/4).
2011/1/8. “Mail Bomb Ignites in DC Postal Facility; Addressed to DHS.” World on Terror News,
At
http://waronterrornews.typepad.com/home/2011/01/mail-bomb-ignites-in-dc-postal
(accessed 2011/5/4).
2011/5/4. “Cyberattack on Nonghyup Bank traced to North.” Korea Joongang Daily. At
http://joongangdaily.joins.com/article/view.asp?aid=2935718 (accessed 2011/5/4).
2011/5/5. “Analysis: Experts Sceptical on New Iran ‘Cyber Attack’ Claim.” Reuters News. At
http://af.reuters.com/article/energyOilNews/idAFLDE74417H20110505?sp=true
(accessed 2011/5/5).
2010/11/24. “Office of the Coordinator for Counterterrorism,” U.S. Department of State. At http://www.state.gov/s/ct/rls/other/des/123085.htm (accessed 2011/2/18).
“Antinomy.” Encyclopedia Britannica eb.com. At http://www.britannica.com/EBchecked/topic/28270/antinomy (accessed 2011/5/22).
“Nimda,” Wikipedia. At http://en.wikipedia.org/wiki/Nimda (accessed 2011/2/6).
“2007 Cyber Attacks on Estonia,” Wikipedia. At http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia (accessed 2011/2/6).
“2011 Canadian Government Hacking,” Wikipedia. At http://en.wikipedia.org/wiki/2011_Canadian_government_hackings (accessed 2011/4/30).














QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top