參考書目
壹、中文資料
一、書籍
Baldwin, David A.著,王逸舟譯,2001。《新自由主義、新現實主義和世界政治》。杭州:浙江人民出版社。
Buzan, Barry著,閆健、李劍譯,2009。《人、國家、恐懼》。北京:中央編譯出版社。
Core, Al著,齊若蘭譯,2013。《驅動大未來》。台北:天下文化出版社。
Gompert, David G.著,國防部譯,2015。《西太平洋海權之爭〉。台北:國防部政務辦公室。
James Steinberg and Michael E. O’Hanlon著,2015。蔡曉卉譯,《中美新型戰略關係》。台北:大雁。
Jervis, Robert著,秦亞青譯,2003。《國際政治中的知覺與錯誤知覺》。北京:世界知識出版社。
Keohane, Robert and Nye, Joseph著,洪門華譯,2002。《權力與相互依賴》。北京:北京大學出版社。
Kissinger, Henry著,胡利平等譯,2015。《世界秩序》。北京:中信出版社。
Kissinger, Henry著,胡利平與凌建平等譯,2012。《基辛格:美國的全球戰略》。海口市:海口出版社。
Lampton, David M. 著,林添貴譯,2015。《從鄧小平到習近平》。台北:遠流出版社。
Mearsheimer, John J.著,王義桅、唐小松譯,2003。《大國政治的悲劇》。上海:上海人民出版社。
Medeiros, Evan S.著,國防部譯印,2011。《中共的國際行為》。台北:國防部政務辦公室。
Nye, Joseph S.著,李靜宜譯, 2011。《權力大未來》。台北:天下遠見出版社。
Pillsbury, Michael著,林添貴譯,2015。《百年馬拉松:中國稱霸全球的祕密戰略》。台北:麥田出版社。
Ong, Russell著,國防部譯,2013。《中共與美國的戰略競爭》。台北:國防部政務辦公室。
Roach, Stephen著,洪世民譯,2015。《失衡的經濟》。台北:寶鼎出版社。
Schmidt, Eric and Cohen, Jared著,吳家恆、藍美貞、楊之瑜、鐘玉?譯,2013。《數位新時代》。台北:遠流出版社。
Shirk, Susan L.著,溫洽溢譯,2008。《脆弱的強權》。台北:遠流出版社。
Steinberg, James and O’Hanlon, Michael E.著,蔡曉卉譯,2015。《中美新型戰略關係》。台北:大雁出版社。
Tim Jordan著,江靜之譯,2004。《網際權力》,台北:韋伯出版社年。
Waltz, Kenneth N.著,信強譯,2008。《國際政治理論》。上海:上海人民出版社。
Wendt, Alexander著,秦亞青譯,2004。《國際政治的社會理論》。上海:上海世紀出版社。
王玉民,1994。《社會科學研究方法原理》。台北:紅葉文化事業有限公司。
申琰,2012。《互聯網與國際關係》。北京:人民出版社。
沈偉光,2000。《信息戰》。杭州:浙江大學出版社。
東鳥,2012。《中國輸不起的網路戰爭》。湖南:人民出版社。
林宗達,2005。《全民皆兵-中共信息戰之人民戰爭》。台北:晶典文化出版社。
袁方,2002。《社會研究方法》。台北:五南出版社。
軍事科學院軍事戰略研究部,2013。《戰略學》。北京:軍事科學出版社。
張琼、孫論強,2007。《中國信息安全戰略》。北京:中國人民公安大學。
理查克拉克、羅伯柯納克著,2014。《網路戰爭:下一個國安威脅及因應之道》。台北:國防部政務辦公室。
陳文政、趙繼綸著,2001。《不完美戰場:資訊時代的戰爭觀》。台北:時英出版社。
喬良,王湘穗著,1999。《超限戰:對全球化時代戰爭與戰法的想定》。北京:解放軍文藝出版社。
葉至誠、葉立誠,2000。《研究方法與論文寫作》。台北:商鼎文化。
蔡翠紅,2009。《美國國家信息安全戰略》。上海:學林出版社。
閻學通、孫立峰,2001。《國際關係研究實用方法》。北京:人民出版社。
二、期刊論文
Weitz, Richard著,高一中譯,2010/5。〈網路作戰威脅日增〉(Firewall: The Growing Threat of Cyber Warfare),《國防譯粹》,第37卷第5期,頁34-40。
于柳箐,2014/10。〈美國網路霸權淺析〉,《信息安全與通信保密》,頁126-128。
木子衂,2015/10。〈網絡空間漸成全球政治博弈新角鬥場〉,《信息安全與通信保密》,第10期,頁32-41。
王明國,2015/3。〈全球互聯網治理的模式變遷,制度邏輯與重構路徑〉,《世界經濟與政治》,第3期,47-73。
王明國,2015。〈網路空間治理的製度困境與新興國家的突破路徑〉,《國際展望》,第6期。頁98-116
王桂芳,2017/3。〈大國網絡競爭與中國網絡安全戰略選擇〉,《國際安全研究》,第2期。頁27-46。
朱鋒。2005/9。〈中國崛起與中國威脅:美國意象的由來〉,《美國研究》,第3期,頁33-59。
吳超,2016/7。〈網路恐怖主義對關鍵基礎設施的保護〉,《上海政法學院學報》,第4期,48-57。
呂晶華,2012/3。〈奧巴馬政府網絡空間安全政策述評〉,《國際觀察》,第2期,頁23-29。
呂晶華,2015/9。〈網絡軍備控制:中美分歧與合作〉,《中國信息安全》,第9期,頁43-47。
李登科,2013/7。〈歐巴馬與習近平非正式高峰會之探討〉,《展望與探索》,第7期,頁1-5。李恒陽,2015/2。〈美國網絡軍事戰略探析〉《國際政治研究》,第1期,頁113-134。
安德萬,2016/9。〈美國網絡空間作戰戰略的十年回顧〉,《國際研究參考》,第9期,頁8-12。
汪婧,2015/3。〈美國對中國網絡戰能力的評估與對策〉,《四川師範大學學報》,第42卷第2期,頁43-48。
汪曉風,2015/6。〈美國網絡安全戰略調整與中美新型大國關係的建構〉,《現代國際關係》,第6期,頁17-24。
汪曉風,2016/10。〈中美經濟網絡間諜衝突根源與調適路徑〉《美國研究》,第5期,頁85-110。
沈逸,2015/2。〈全球網絡空間治理原則之爭與中國的戰略選擇〉,《外交評論》,第2期,頁65-79。
金小川,1999年。〈信息社會的重大課題:國家信息安全〉,《國際展望》,第17期,頁28-29。
孫國祥,2015。〈塔林手冊的介紹與初步評析〉,《全球政治評論》,第51期,頁167-173。孫德剛、韋進深,2016。〈中國在國際組織中的的規範塑造評析〉,《國際展望》,第4期,頁93-115。
徐步華,2016。〈全球治理理論與傳統國際關係理論范式的比較分析〉,《馬克思主義與現實》,第4期,頁191-196。
朗平,2013/1。〈網絡空間安全:一項新的全球議程〉,《國際安全研究》,第1期,頁128-141。
朗平,2014/11。〈全球網絡空間規則制定的合作與博弈〉,《國際展望》,第6期,頁138-152。
郝葉力,2015/6。〈大國網絡戰略博弈與中國網絡強國戰略〉,《國際關係研究》,第3期,頁3-15。
崔學民,2016/3。〈美國移交IANA管理權事件啟示〉,《情報雜誌》,第3期,頁24-27。
張克成,2015/2。〈美國網絡戰政策變遷及其啟示〉,《湖北民族學院學報》,第1期,頁144-147。
唐小松、王茜,2011/11。〈美國對華網絡外交的策略及影響〉,《現代國際關係》,第11期,頁30-35。
盛辰超,2016/5。〈聯合國在全球網絡安全治理中的規範功能研究〉,《國際論壇》,2016年第3期,頁7-12。
陳一新,2015/10。〈美「中」雙方在歐習會的得失及與對兩岸的影響〉,《展望與探索》,第10期,頁1-11。陳一新,2016/9。〈520 後臺美中關係的發展與展望〉,《展望與探索》,第9期,頁47-73。陳一新,2016/7。〈美中第八輪戰略暨經濟對話之評析〉,《展望與探索》,第7期,頁8-15。陳志敏等人,2015/1。〈安全發展與國際共進〉,《國際安全研究》,第1期,頁45-77。
陳育正,2015/5。〈美國網路安全防護經驗對我國網路安全情勢之啟示〉,《國防雜誌》,第30卷第3期,頁73-87。陳良駒、傅振華、楊誌瑋,2010。〈詞彙共現分析在中國大陸信息作戰領域發展之實證研究〉,《中國大陸研究》,第53卷第2期,頁111-145。惠志斌,2015/11。〈習奧會輿論博弈下的中美網絡安全形勢分析〉,《信息安全與通信保密》,第11期,頁92-94。
楊哲男,許瑞明,2003/11。〈無線通訊及網際網路:一個想法改變世界–網際網路的誕生與發展〉,《科學發展》,頁6-11。
董青嶺,2016/10。〈網絡空間威攝研究與其關鍵問題〉,《信息安全研究》,第10期,頁900-925。
董愛先,2014/1。〈國際網絡空間治理的主要舉措,特點及發展趨勢〉,《信息安全與通信保密》,第1期,頁36-41。
董慧明,2015/4。〈中國大陸反恐怖主義法草案評析〉,《展望與探索》,第13卷第4期,,頁26-32。趙晨,2016/2。〈美國網絡安全建設的新舉措〉,《國際研究參考》,第2期,頁20-24。
趙隆,2013/11。〈全球治理中的議題設定:能力構建與要素互動〉,《國際關係研究》,第4期,頁52-60。
劉勃然、黃鳳志,2012/6。〈網絡空間國際政治權力博弈問題探討〉,《社會主義研究》,第3期,頁120-126。
劉長敏、李貴州,2016/6。〈奧巴馬任期內美國國家安全戰略報告比較研究〉,《太平洋學報》,第6期,頁54-62。
蔡政修,2016/12。〈從2016年烏鎮會議看全球網路治理發展〉,《展望與探索》,第12期,頁36-49。蔡翠紅,2012/9。〈網絡空間中的中美關係:競爭、衝突與合作〉,《美國研究》,第3期,頁107-121。
魯傳穎,2013/11。〈試析當前網絡空間全球治理困境〉,《現代國際關係》,第11期,頁48-54。
魯傳穎,2016/1。〈網絡空間治理的力量博弈,理念演變與中國戰略〉,《國際展望》,第1期,頁117-134。
叢培影、黃日涵,2016/1。〈網絡空間的治理困境與路徑選擇〉,《國際展望》,第6期,頁98-116。
譚偉恩,2006。〈權力平衡理論之研究:現實主義的觀點〉,《國際關係學報》,第22期,頁129-166。三、官方資料
中共中央網路安全和信息化領導小組辦公室,2016/12/27。〈國家網路空間安全戰略〉,《中共中央網路安全和信息化領導小組辦公室》,http://www.cac.gov.cn/2016-12/27/c_1120195926.htm。
中國外交部,2015/6/23。〈外交部發言人陸康對2015年6月23日例行記者會〉,《中國外交部》,http://www.fmprc.gov.cn/mfa_eng/xwfw_665399/s2510_665401/2511_ 665403/t1275373.shtml。
中國外交部,2015/3/8。〈外交部長王毅就中國外交政策和對外關係回答中外記者提問〉,《中國外交部》,http://www.fmprc.gov.cn/web/ziliao_674904/zt_674979/dnzt _674981/qtzt/ydyl_675049/zyxw_675051/t1243647.shtml。
中國國家網路信息辦公室,2014/2/28。〈沒有網路安全就沒有國家安全〉,《中國國家網路信息辦公室》,http://www.cac.gov.cn/2014-02/28/c_126205811.htm。
中國國家網路信息辦公室,2016/12/22。〈美軍網絡司令部的演變與啟示〉,《中國國家網路信息辦公室》,http://www.cac.gov.cn/2016-12/22/c_1120164344.htm。
中國國務院,2015/5/26。〈中國的軍事戰略〉,《中國國務院》, http://www.scio.gov.cn/zfbps/gfbps/Document/1435341/1435341.htm。
中國國務院,2015/5/8。〈國務院關於印發中國製造2025的通知〉,《中國國務院》, http://www.gov.cn/zhengce/content/2015-05/19/content_9784.htm。
中國國防部,2011/3/31。〈2010年中國的國防白皮書〉,《中國國防部》,http://www.mod.gov.cn/affair/ 2011-03/31/content_4249942.htm。
中國國防部,2013/4/16。〈國防白皮書中國武裝力量的多樣化運用〉,《中國國防部》,http://www.mod.gov.cn/affair/2013-04/16/content _4442839.htm。
全國人民代表大會,2015/7/6。〈網路安全法草案全文〉,《全國人民代表大會》,http://www.npc.gov.cn/npc/xinwen/lfgz/flca/2015-07/06/content_1940614.htm。
李克強,2015/3/5。〈政府工作報告〉,《中國國務院》, http://www.gov.cn/guowuyuan/2015-03/16/content_2835101.htm。
四、網路資料
BBC新聞網,2015/12/27。〈中國全國人大通過反恐怖主義法〉,《BBC新聞網》, http://www.bbc.com/zhongwen/trad/china/2015/12/151227_china_anti_terror_law。
王昉,2016/3/21。〈柯慕賢:中國網絡安全立法可能嚇退德企〉,《FT中文網》,http://big5.ftchinese.com/story/001066718#adchannelID=2000。
人民網,2013/9/12。〈東盟地區論壇網路安全研討會在京舉行〉,《人民網》,http://media. people.com.cn/n/2013/0912/c40606-22893628.html。
中央網路報,2015/8/19。〈網路安全準則還須下一步〉,《中央網路報》,http://www.cdnews.com.tw/cdnews_site/touch/detail.jsp?coluid=110&kindid=0&docid=103342351。
王雅平,2011/4/22。〈金磚五國:南南合作還是南北對峙〉,《清華卡內基全球政策中心》,http://carnegietsinghua.org/2011/04/22/zh-pub-43764。
朱雲鵬 、譚瑾瑜,2015/4/7。〈儘速因應「中國製造2025」〉,《國家政策研究基金會》, http://www.npf.org.tw/3/14901。
行政院陸委會,2015/4。〈中國大陸制訂反恐怖主義法之觀察〉,《行政院陸委會》,http://www.mac.gov.tw/public/Attachment/551216324728.pdf。
柯慕賢,2016/2/26。〈中國製造2025走向成功的關鍵〉,《FT中文網》, http://big5.ftchinese.com/story/001066347?full=y。
美國之音,2015/9/12。〈專家:美反擊中國網路間諜有誇大之嫌〉,《美國之音》,http://www.voachinese.com/a/us-china-cyber-20150911/2961039.html。
查爾斯克洛弗,2016/11/17。〈中國借烏鎮峰會宣傳網路主權立場〉,《FT中文網》,http://m.ftchinese.com/story/001070193。
徐龍第,2013/7/30。〈美國先發制人網絡打擊政策:背景、條件與挑戰〉,《中國國際問題研究院》,http://www.ciis.org.cn/chinese/2013-07/30/c ontent_6165479.htm。
習近平,2016/4/19,〈在網絡安全和信息化工作座談會上的講話〉,《新華網》,http://news.xinhuanet.com/politics/2016-04/25/c_1118731175.htm。
莫雨,2016/2/2。〈全球互聯網治理:新的國際政治角力場?〉,《美國之音》,http://www.voachinese.com/a/internet-governance-new-global-politics-20160201/3172257.html。
陳君碩,喬良,2015/5/2。〈超限戰界定新型態戰爭〉,《中時電子報》,http://www.chinatimes.com/newspapers/20150502000737-260309。
黃麗玲,2015/12/29。〈中國反恐法對媒體公司及個人有何影響〉,《美國之音》,http://www.voachinese.com/a/china-anti-terrorism-20151228/3121948.html。
彭慧鸞,2011。〈網路安全治理的新紀元〉,《政治大學國際關係研究中心》,http://iiro.nccu.edu.tw/attachments/journal/add/5/2011-1-09.pdf。
華夏經緯網,2015/9/21。〈專家談中美網路安全:雙方都上升到國家戰略〉,《華夏經緯網》,http://big5.huaxia.com/thjq/jswz/2015/09/4565183.html。
賀巧薇,2014/7/20。〈美國移交網路監管權邁出第一步 台灣代表全程參與〉,《iTHome》,http://www.ithome.com.tw/news/89495。
新華社,2016/2/26。〈中國互聯網網路安全威脅治理聯盟在京成立〉,《新華社》,http://news.xinhuanet.com/ttgg/2016-02/26/c_1118170775.htm。
儲信艷,2015/1/25。〈政治局會議通過國家安全戰略綱要〉,《人民網》,http://politics.people.com.cn/n/2015/0125/c1001-26445047.html。
歐建平,2016/7/8。〈中國特色信息強軍之路〉,《新華網》, http://news.xinhuanet.com/info/2016-07/28/c_135547027.htm。
賴怡忠,2015/9/27。〈歐習峰會聊勝於無〉,《想想論壇》, http://www.thinkingtaiwan.com/content/4643。
鄭必堅,2016/11/28。〈網路化大潮與中國和平發展的新機遇〉,《人民日報》, http://politics.people.com.cn/n1/2016/1128/c1001-28901429.html。
歸宿,2016/10/17。〈網路問題,中美還有得聊?〉,《中美印象》,2016年10月17日, http://www.uscnpm.com/model_item.html?action=view&table=article&id=11575。
魏之,2016/5/10。〈美國議員質疑中國參與互聯網域名管理〉,《美國之音》,http://www.voacantonese.com/a/members-of-congress-concern-over-icann-with-chinese-government-20160510/3323471.html。
貳、外文資料
一、書籍
Adler, Emanuel and Michael Barnett, 1998. Security Community. Cambridge: Cambridge University Press.
Arquilla, John and David Ronfeldt, 1999. The Emergence of Noopolitik : Toward An American Information Strategy. Santa Monica: RAND.
Baylis, John and Nicholas J. Rengger, 1992. Dilemmas of World Politics: International Issues in A Changing World. Oxford : Clarendon Press.
Baylon, Caroline, 2014. Challenges at the Intersection of Cyber Security and Space Security: Country and International Institution Perspectives. London: Royal Institute of International Affairs.
Chang, Amy, 2014. Warring State China’s Cybersecurity Strategy. Washington, DC.: Center for a New American Security.
Choucri, Nazli, 2012, Cyberpolitics in International Relations. Cambridge: MIT Press.
Clarke, Richard A. and Robert K. Knake, 2010. Cyber War: The Next Threat to National Security and What to Do About It. New York: Harper Collins.
Collins, Alan, 1997. The Security Dilemma and the End of the Cold War. New York: St. Martin’s Press.
Heginbotham, Eric, eds., 2015. The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017.Santa Monica, CA.: RAND.
Gelb, Leslie, 2009. Power Rules: How Common Sense Can Rescue American Foreign Policy. New York: Harper Collins.
Gompert, David C. and Phillip C. Saunders, 2011. The Paradox of Power: Sino-American Strategic Restraint in an Age of Vulnerability. Washington, D.C.: National Defense University.
Harold, Scott W., Martin C. Libicki, and Astrid S. Cevallos, 2016. Getting to Yes with China in Cyberspace. Santa Monica. CA.: RAND.
Haaster, Jelle van, 2016. “Assessing Cyber Power,” in N.Pissanidis, H.Rõigas and M.Veenendaal eds., 2016 8th International Conference on Cyber Conflict: Cyber Power. Tallinn: NATO CCD COE.
Haftendorn, Helga et al., 1999. Imperfect Unions: Security Institutions over Time and Space. Oxford: Oxford University Press.
Hathaway, Oona A., Rebecca Crootof, and Philip Levitz, eds., 2012. The Law of Cyber-Attack. Berkeley: University of California.
Heath, Timothy R., Kristen Gunness, and Cortez A. Cooper, 2016. The PLA and China’s Rejuvenation. Santa Monica, CA.: RAND.
Herz, John H., 1951. Political Realism and Political Idealism: A Study in Theories and Realities. Chicago: University of Chicago Press.
Hobbes, Thomas, 1997. Leviathan: Authoritative Text, Backgrounds, Interpretations. New York: W. W. Norton & Company.
Inkster, Nigel, 2012. “China in Cyberspace,” in Derek S. Reveron, ed., Cyberspace and National Security : Threats, Opportunities, and Power in a Virtual World. Washington, D.C.: Georgetown University.
Inkster, Nigel, 2016. China’s Cyber Power. London: The International Institute for Strategic Studies.
Jepperson, Ronald L., Alexander Wendt, and Peter J. Katzenstein, 1996. “Norms, Identity, and Culture in National Security,” in Peter J. Katzenstein, ed., The Culture of National Security: Norms and Identity in World Politics. New York: Columbia University Press.
Katzenstein, Peter J., 1996. The Culture of National Security: Norms and Identity in World Politics. New York: Columbia University Press.
Keohane, Robert O., 1984. After Hegemony: Cooperation and Discord in the World Political Economy. Princeton, N.J.: Princeton University Press.
Keohane, Robert O., 1986. Neorealism and It’s Critics. New York: Columbia University Press.
Kissinger, Henry, 2014. World Order. New York: Penguin Press.
Kuehl, Daniel T., 2009. “From Cyberspace to Cyberpower: Defining the Problem,” in Cyberpower and National Security. Franklin Kramer, Stuart H. Starr, and Larry K. Wentz, eds,. Washington, D.C.: National Defense University.
Lake, David, and Robert Powell, 1999. Strategic Choice and International Relations. New Jersey: Princeton University Press.
Libicki, Martin, 2009. Cyberdeterrence and Cyberwar. Santa Monica, CA.: RAND .
Lindsay, Jon R., Tai Ming, Cheung, and Derek S. Reveron, 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain.New York: Oxford University Press.
Mearsheimer, John J., 2001. The Tragedy of Great Power Politics. New York: W. W. Norton.
McConnell, Mike, 2011. “Cyber Insecurities: the 21st Century Threatscape,” in America's Cyber Future:Security and Prosperity in the Information Age, Vol. II. Washington, DC: Center for a New American Security.
Morgenthau, Hans J., 1948. Politics among Nations: The Struggle for Power and Peace. New York: A. A. Knopf.
Powers, Shawn M. and Michael Jablonski, 2015. The real cyber war: The political economy of internet freedom. Urbana: University of Illinois Press.
Radu, Roxana, 2013. “Power Technology and Powerful Technologies: Global Governmentality and Security in the Cyberspace,” in Jan Frederik Kremer and Benedikt Muller, eds., Cyberspace and International Relations: Theory, Prospects and Challenges. Berlin : Springer.
Reveron, Derek S., 2012. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Washington, D.C.: Georgetown University Press.
Schmitt, Michael, ed., 2013. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press.
Segal, Adam, 2016. Hacked World Order: How Nations Fight, Trade, Maneuver and Manipulate in The Digital Age. New York: Public Affairs.
Shambaugh, David, 2013. China Goes Global. New York: Oxford University Press.
Smoke, Richard and Andrei Kotunov, 1991. Mutual Security: A New Approach to Soviet-American Relations. New York : St. Martin’s Press.
Smoke, Richard, 1991. “A Theory of Mutual Security,” in Richard Smoke and Andrei Kotunov eds., Mutual Security: A New Approach to Soviet-American Relations. New York : St. Martin’s Press.
Swaine, Michael D., Wenyan Deng, and Aube R. Lescure, 2016. Creating A Stable Asia: An Agenda for a U.S.-China Balance of Power. Washington, DC.: Carnegie Endowment for International Peace.
Thomas, Timothy L., 2009. “Nation-state Cyber Strategies: Examples from China and Russia,” in Cyberpower and National Security. Lincoln: University of Nebraska Press, edited by Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz.
Tikk-Ringas, Eneken, 2015. Evolution of the Cyber Domain: The Implications for National and Global Security. London: The International Institute for Strategic Studies.
Wallander, Celeste A. and Robert O. Keohane, 1999. “Risk, Threat, and Security Institutions,” in Helga Haftendorn, Keohane, and Wallander, eds., Imperfect Unions: Security Institutions over Time and Space. Oxford: Oxford University Press.
Wallander, Celeste A., 1999. Mortal Friends, Best Enemies: German-Russian Cooperation after the Cold War. New York: Cornell University Press.
Waltz, Kenneth N., 1979. Theory of International Politics. MA: Addison-Wesley Publishing Company.
Wheeler, Nicholas J. and Ken Booth, 1992. “The Security Dilemma,” in John, Baylis and Nicholas J. Rengger, eds., Dilemmas of World Politics : International Issues in a Changing World. Oxford : Clarendon Press.
二、期刊論文
Baldwin, David A., 1979/1. “Power Analysis and World Politics: New Trends versus Old Tendencies,” World Politics, Vol. 31, No. 2 , pp. 161-194.
Bets, David J. and Tim Stevens, 2011. “Power and Cyberspace,” Adelphi Series, Vol. 51, No. 424, pp. 35-54.
Blank, Stephen, 2001. “Can Information Warfare be Deterred?” Defense Analysis, Vol. 17, No. 2, pp. 121-138.
Dee, Cheryl Rae, 2007/10. “The Development of the Medical Literature Analysis and Retrieval System,” Journal of the Medical Library Association, Vol. 95, No. 4, pp. 416-425.
Doyle, Michael, 1983/Summer. “Kant, Liberal Legacies, and Foreign Affairs, Part 2,” Philosophy and Public Affairs, Vol. 12, No. 3, pp. 205–235.
Economy, Elizabeth C., 2010/11-12. “The Game Changer: Coping With China's Foreign Policy Revolution,” Foreign Affairs, Vol. 89, No. 6, pp. 142-152.
Newmyer, Jacqueline, 2010/8. “The Revolution in Military Affairs with Chinese Characteristics,” Journal of Strategic Studies, Vol. 33, No. 4, pp. 483-504.
Fravel, M. Taylor, and Christopher P. Twomey, 2015/Winter. “Projecting Strategy: The Myth of Chinese Counter-Intervention,” The Washington Quarterly, Vol. 37, No. 4, pp. 171-187.
Finnemore, Martin, 1993/Autumn. “International Organization as Teachers of Norms: The United Nations Educational, Scientific and Cultural Organization and Science Policy,” International Organization, Vol.47, No.4, pp. 565-598.
Friedberg, Aaron L., 2005/Fall. “The Future of U.S.-China Relations,” International Studies, Vol. 30, No. 2, pp. 7-45.
Gartzke, Erik and Jon R. Lindsay, 2015/6. “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace,” Security Studies, Vol. 24, No 2, pp. 316-348.
Glaser, Bonnie S., 2014. “US-CHINA Relations Managing Differences Remains an Urgent Challenge, ” Southeast Asian Affairs, Vol. 2014, pp. 76-82.
Gompert, David C. and Martin Libicki, 2015/7. “Waging Cyber War the American Way,” Survival, Vol. 54, No. 4, pp. 7-28.
Goodman, Will, 2010. “Cyber Deterrence Tougher in Theory than in Practice?” Strategic Studies Quarterly, Vol. 4, No. 3, pp.102-135.
Hall, Peter A. and Rsemary C.R. Taylor, 1996/12. “Political Science and the Three New Institutionalisms,” Political Studies, Vol. 44, No. 5, pp. 936-957.
Herz, John H., 1950/1. “Idealist Internationalism and the Security Dilemma,” World Politics, Vol. 2, No. 2, pp. 157-180.
Hughes, Rex, 2010/3. “A treaty for cyberspace,” International Affairs, Vol. 86, No. 2, pp. 523-541.
Iasiello, Emilio, 2016/6. “China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities,” Journal of Strategic Security , Vol. 9, No. 2, pp. 45-69.
Inkster, Nigel, 2010/7. “China in Cyberspace,” Survival, Vol. 52, No. 4, pp. 55-66.
Jervis, Robert, 1978/1. “Cooperation under the Security Dilemma,” World Politics, Vol. 30, No. 2, pp. 167-214.
Junio, Timothy, 2013/2. “How Probable Is Cyber War? Bringing IR Theory Back Into the Cyber Conflict Debate,” Strategic Studies, Vol. 36, No. 1, pp. 125-133.
Kania, Elsa B., 2016/7. “A Force for Cyber Anarchy or Cyber Order? —PLA Perspectives on Cyber Rules,” China Brief, Vol. 16, No. 11, pp. 16-22.
Keohane, Robert O., 2012/6. “Twenty Years of Institutional Liberalism,” International Relations, Vol. 26, No. 2, pp. 125-138.
Klimburg, Alexander, 2011/1. “Mobilising Cyber Power,” Survival, Vol. 53, No. 1, pp. 41-60.
Kydd, Andrew, 1997/Fall. “Sheep in Sheep’s Clothing: Why Security Seekers Do Not Fight Each Other,” Security Studies, Vol. 7, No. 1, pp. 114-155.
Liff, Adam P. and G. John Ikenberry, 2014/Fall. “Racing toward Tragedy,” International Security, Vol. 39, No. 2, pp. 52-91.
Lindsay, Jon R., 2014/Winter. “The Impact of China on Cybersecurity,” International Security, Vol. 39, No. 3, pp. 7-47.
Lynn, William J., 2010/9-10. “Defending a New Domain,” Foreign Affairs, Vol. 89, No. 5, pp. 97-108.
Mattis, Peter, 2012/9. “The Analytic Challenge of Understanding Chinese Intelligence Services,” Studies in Intelligence, Vol. 56, No. 3, pp. 47-57.
McReynolds, Joe, 2015/6. “Network Warfare in China’s 2015 Defense White Paper,” China Brief, Vol. 15, No. 12, pp. 10-13.
Nathan, Andrew J., 2016/5-6. “Recent books: Asia and pacific: The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power 1996-2017, Foreign Affairs, Vol. 95, No. 3, pp. 186-187.
Rid, Thomas, 2012/2. “Cyber War Will Not Take Place,” The Journal of Strategic Studies, Vol. 35, No. 1, pp. 5-32.
Rosenau, James N., 1995/Winter. “Governance in the Twenty-first Century,” Global Governance, Vol. 1, No. 1, pp. 13-43.
Saunders, Phillip C. and Joel Wuthnow, 2016/7. “China’s Goldwater-Nichols? Assessing PLA Organizational Reforms,” Joint Force Quarterly, Vol. 82, No. 3, pp. 68-75.
Shambaugh, David, 2011/Winter. “Coping with a Conflicted China,” The Washington Quarterly, Vol. 34, No. 1, pp. 7-27.
Sharma, Munish, 2016/3. “China’s Emergence as a Cyber Power,” Journal of Defense Studies, Vol. 10, No. 1, pp. 43-68.
Stephens, Hampton, 2007/4. “War in the Third Domain,” Air Force Magazine, pp. 58-60.
Swaine, Michael D., 2013/Fall. “Chinese Views on Cybersecurity in Foreign Relations,” China Leadership Monitor, No. 42, pp. 1-27.
Thomas, Nicholas, 2009. “Cyber Security in East Asia: Governing Anarchy,” Asian Security, Vol. 5, No. 1, pp. 3-23.
Wendt, Alexander, 1992/Spring. “Anarchy Is What States Make of It : The Social Construction of Power Politics,” International Organization, Vol. 46, No. 2, pp. 391-425.
Xinming, Ma, 2015/6. “What Kind of Internet Order Do We Need? ” Chinese Journal of International Law, Vol. 14, No. 2, pp. 399-403.
Zhang, Li, 2012/Summer. “A Chinese Perspective on Cyber War,” International Review of the Red Cross, Vol. 94, No. 886, pp. 801-807.
Zhou, Zunyou, 2015/12. “China’s Draft Cybersecurity Law,” China Brief, Vol. 15, No. 24,
pp. 3-6.
三、官方文件
U.S Department of Defense, 2009/3/25. “Annual Report on Military and Security Developments Involving the People’s Republic of China,” www.defense.gov/ pubs/pdfs/China_Military_Power_Report_2009.pdf.
U.S Department of Homeland Security, 2009/5/29. “Cyberspace Policy Review,” https:// www.dhs.gov/sites/default/files/publications/Cyberspace_Policy_Review_final_0.pdf.
U.S Department of Homeland Security, 2010/2/1. “A Strategy Framework for a Secure Homeland,” https://www.dhs.gov/xlibrary/assets/qhsr_report.pdf.
U.S Department of Defense, 2010/5/21. “Army Forces Cyber Command Standup Plan Announced,” http://www.defense.gov/releases/release.aspx?releaseid =13549.
U.S Department of Defense, 2010/5/25. “U.S. Cyber Command Fact Sheet,” http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-038.pdf.
United States-China Economic and Security Review Commission, 2010/11/12. “U.S.-China Economic and Security Review Commission 2010,” http://www.uscc.gov/annual _report/2010/annual_report_full_10.pdf.
The White House, 2011/5/1. “International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World,” https://obamawhitehouse.archives.gov/ sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
U.S. Office of the Director of National Intelligence, 2011/11/3. “Foreign Spies Stealing US Economic Secrets in Cyberspace,” https://www.ncsc.gov/publications/reports/fecie_all/ Foreign_Economic_Collection_2011.pdf.
The White House, 2011/5/1. “International Strategy for Cyberspace,” https://www. whitehouse.gov/sites/default/ files/docs/2012sharingstrategy_1.pdf.
U.S. Joint Chiefs of Staff, 2013/2/5. “Cyberspace Operations,” http://www.dtic.mil/ doctrine/new_pubs /jp3_12R.pdf.
U.S. Department of State, 2013/7/11. “The U.S.-China Closing Statements for U.S.-China Strategic and Economic Dialogue,” http://www.state.gov/s/d/former/burns/remarks /2013/211850.htm.
U.S. Department of State, 2013/7/8. “Background Briefing on the Upcoming Strategic and Economic Dialogue and U.S.-China Relations,” http://www.state.gov/r/pa/prs/ps/2013/ 07/211606.htm.
U.S. Department of the Air Force, 2013/4/24. “Fiscal Year (FY) 2014 Budget Estimates,” http://www.globalsecurity.org/military/library/budget/fy2014/usaf/afd-130403-068-fy14-om-overview.pdf.
U.S. Department of Justice, 2014/5/19. “U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage,” https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber -espionage-against-us-corporations-and-labor.
U.S. Department of Defense, 2015/4/23. “The Department of Defense Cyber Strategy,” htt p://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf.
U.S. Department of Defense, 2015/4/7. “Annual Report to Congress Military and Security Developments Involving the People’s Republic of China 2015,” https://www.defense.gov/Portals/1/Documents/pubs/2015_China_Military_Power_Report.pdf.
U.S. Department of Justice, 2015/12/2. “First U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues Summary of Outcomes,” https://www.justice.gov/opa /pr/first-us-china-high-level-joint-dialogue-cybercrime-and-related-issues-summary-outcomes-0.
U.S. Department of Defense, 2016/5/13. “Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China,” https://www. defense.gov/Portals/1/Documents/pubs/2016%20China%20Military%20Power%20Report.pdf.
U.S. Strategic Command, 2016/9/30. “U.S. Cyber Command (USCYBERCOM),” http://www.stratcom.mil/Media/Factsheets/Factsheet-View/Article/960492/us-cyber-command-uscybercom/.
United States-China Economic and Security Review Commission, 2016/11/16. “USCC 2016 Annual Report,” https://www.uscc.gov/sites/default/files/annual_reports/2016 %20An nual%20Report%20to%20Congress.pdf.
The White House, 2016/11/23. “Statement by the President on Signing the National Defense Authorization Act for Fiscal Year 2017,” https://obamawhitehouse.archives.gov/the- press-office/2016/12/23/statement-president-signing-national-defense-authorization-act-fiscal.
The State Council of The People’s Republic of China, 2016/12/27. “China Announces Cybersecurity Strategy,” http://english.gov.cn/state_council/ministries/2016/12/27/con tent_281475526667672.htm.
Clapper, James R., 2013/3/12. “Statement for the Record Worldwide Threat Assessment of the US Intelligence Community,” Office of the Director of National Intelligence, https://www.dni.gov/files/documents/Intelli gence%20Reports/2013%20ATA%20SFR%20for%20SSCI%2012%20Mar%202013.pdf.
Clapper, James R., 2015/2/26. “Worldwide Threat Assessment of the US Intelligence Community,” Office of the Director of National Intelligence, https://www.dni.gov/ files/documents/Unclassified_2015 _ATA_SFR_-_SASC_FINAL.pdf.
Donilon, Tom, 2013/3/11. “The United States and the Asia-Pacific in 2013,” The White House, https://www.whitehouse.gov/the-press-office/2013/03/11 /remarks-tom-donilon-national-security-advisor-president-united-states-an.
Daniel, Lisa, 2011/2/11. “Panetta: Intelligence Community Needs to Predict Uprisings,” U.S. Department of Defense, http://archive.defense.gov/news/newsarticle.aspx?id=62790.
Gates, Robert, 2009/6/23. “Memorandum for Secretaries of the Military Departments”, U.S. Department of Defense, http://www.defense.gov/home/features/2010/0410_cybersec/ docs/cyber_command_gates_memo[1].pdf.
Lynn, William J., 2011/7/14. “Remarks On the Department of Defense Cyber Strategy,” U.S. Department of Defense, http://archive.defense.gov/speeches/speech.aspx?speechid= 1593.
Obama, Barack, 2009/5/29. “Remarks by the President on Securing Our Nation's Cyber Infrastructure,” The White House, https://obamawhitehouse.archives.gov/the-press-off ice/remarks-president-securing-our-nations-cyber-infrastructure.
Russel, Daniel R., 2015/6/18. “Preview of the Seventh U.S.-China Strategic and Economic Dialogue,” U.S. Department of State, http://fpc.state.gov/243965.htm.
Toner, Mark C., 2015/12/28. “Daily Press Briefing,” U.S. Department of State, http://www.state.gov/r/pa/prs/dpb/2015/12/250880.htm.
四、網路資料
Apps, Peter, 2012/2/3. “Disagreements on Cyber Risk East-West Cold War,” Reuters, http://www.reuters.com/article/us-technology-cyber-idUSTRE8121ED20120203.
Arquilla, John and David Ronfeldt, 2007/9/24. “Cyberwar is Coming,” RAND, http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf.
Austin, Greg, 2016/9/8. “Mapping and Evaluating China’s Cyber Power,” the Lau China Institute at King’s College London, https://www.unsw.adfa.edu.au/australian-centre -for-cyber-security/sites/accs/files/uploads/Greg_Austin _China%27s_Cyber_Power_Policy_Papers-Issue-2.pdf.
Austin, Greg, 2015/6/2. “China’s Military Dream,” The Diplomat, http://thediplomat.com/ 2015/06/chinas-military-dream/.
Bader, Jeffrey A., 2016/2. “How Xi Jinping Sees the World…and Why,” The Brookings Institute, http://www.brookings.edu/~/media/research/files/papers/2016/02/xi-jinping -worldview-bader/xi_jinping_worldview _bader.pdf.
Blackwill, Robert D. and Kurt M. Campbell, 2016/2/25. “Xi Jinping on the Global Stage: Chinese Foreign Policy under a Powerful but Exposed Leader,” Council on Foreign Relations, http://www.cfr.org/china/xi-jinping-global-stage/p37569.
Brooks, Taylor, 2016/2/5. “Why China needs to rein in North Korea's hackers,” Carnegie Endowment for International Peace, http://carnegieendowment.org/2016/02/08/zh- pub-63128.
Brown, Gary and Christopher D. Yung, 2017/1/19. “Evaluating the US-China Cybersecurity Agreement, Part 2: China’s Take on Cyberspace and Cybersecurity,” The Diplomat, http://thediplomat.com/2017/01/evaluating-the-us-china-cybersecurity-agreement-part-2-chinas-take-on-cyberspace-and-cybersecurity/.
Cheng, Ron, 2017/3/9. “Prospects for U.S.-China Cybercrime Cooperation: The Road Thus Far,” The Lawfare Institute, https://www.lawfareblog.com/prospects-us-china-cyber crime-cooperation-road-thus-far.
Campbell, Kurt, et al., 2016/5, “Extending American Power,” Center for a New American Security, https:// s3.amazonaws.com/files.cnas.org/documents/CNASReport-EAP-FIN AL-1.pdf.
Chuanying, Lu, 2016/5/24. “China's Emerging Cyberspace Strategy,” The Diplomat, http://thediplomat.com/2016/05/chinas-emerging-cyberspace -strategy/.
Cheng, Ron, 2017/3/9. “Prospects for U.S.-China Cybercrime Cooperation: The Road Thus Far,” The Lawfare Institute, https://www.lawfareblog.com/prospects-us-china-cybe rcrime-cooperation-road-thus-far.
Corporation, Mandiant, 2013/2/18. “APT1: Exposing One of China’s Cyber Espionage Units,” https://www.fireeye.com/content/dam/fireeye-www/services /pdfs/mandiant-apt 1-report.pdf.
Cordesman, Anthony H., 2016/12/8, “Chinese Strategy and Military Modernization in 2016,” Center for Strategic and International Studies, https://csis-prod.s3.amazonaws. com/s3fs-public/publication/161208_Chinese_Strategy _Military_Modernization_2016.pdf.
Costello, John, 2016/1/20“China Finally Centralizes Its Space, Cyber, Information Forces,” The Diplomat, http://thediplomat.com/2016/01/china-finally-its-centralizes-space-cyb er-information-forces/.
Costello, John, 2016/2/8. “The Strategic Support Force: China’s Information Warfare Service,” Jamestown Foundation, https://jamestown.org/program/the-strategic -support -force-chinas-information-warfare-service/.
Ebrahimian, Bethany A., 2015/7/10. “The Chilling Effect of China’s New Cybersecurity Regime,” Foreign Policy, http://foreignpolicy.com/2015/07/10/china-new-cybersecur ity-law-internet-security/.
Eisenach, Jeffrey , eds., 2016/6/14. “An American Strategy for Cyberspace,” The American Enterprise Institute, pp. 1-3, https://www.aei.org/wp-content/upl oads/2016/06/American-Strategy-for-Cyperspace.pdf.
Gady, Franz-Stefan, 2015/3/24. “Why the PLA Revealed its Secret Plans for Cyber War,” The Diplomat, http://thediplomat.com/tag/the-science-of-military-strategy/.
Giles, Keir, and William Hagestad, 2013/6/4. “Divided by a Common Language: Cyber Definitions in Chinese, Russian and English,” Proceedings of 5th International Conference on Cyber Conflict, Tallinn: NATO CCDCOE Publications, https:// ccdcoe.org/publications/2013proceedings/d3r1s1 _giles.pdf.
Goldsmith, Jack, 2015/9/21. “Don’t Get Too Excited About A US-China Arms Control Agreement for Cyber,” The Lawfare Institute, https://www.lawfareblog.com/don t-get-too-excited-about-us-china-arms-control -agreem ent-cyber.
Grigsby, Alex, 2014/12/11. “ Coming Soon: Another Country to Ratify the Budapest Convention,” Council on Foreign Relations, http://blogs.cfr.org/cyber/2014/12/11/ coming-soon-another-country-to-ratify-to-the-budapest-convention/.
Hvistendahl, Mara, 2016/10/25. “The Decline in Chinese Cyberattacks: The Story Behind the Numbers,” MIT Technology Review, https://www.technologyreview.com/s/602705 /the-decline-in-chinese-cyberattacks-the-story-behind-the-numbers/.
Haass, Richard, 2017/2/7. “Why the World Needs to Police the Growing Anarchy of Cyberspace,” Council on Foreign Relations, http://www.cfr.org/cybersecurity/why- world-needs-police-growing-anarchy-cyberspace/p38803.
Jing de, Jong-Chen, 2014/9/15. “U.S.-China Cybersecurity Relations: Understanding China’s Current Environment,” Georgetown Journal of International Affairs, http://journal.georgetown.edu/u-s-china-cybersecurity-relations-understanding-chinas-current-environment/.
Krekel, Bryan, Adams, Patton and Bakos, George, 2012/3/7. “Chinese Capabilities for Computer Network Operations and Cyber Espionage,” Northrop Grumman Corp, http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=C168B8EB086E6DE571DFBFCECB8F1447?doi=10.1.1.367.6447&rep =rep1&type=pdf.
Knake, Robert K. and Adam Segal, 2017/1/29. “How the Next U.S. President Can Contain China in Cyberspace,” Journal of International Affairs, https://jia.sipa.columbia.edu /how-next-us-president-can-contain-china-cyberspace.
Lampton, David, 2015/5/11. “A Tipping Point in U.S.-China Relations is Upon Us,” The Carter Center, http://www.uscnpm.org/blog/2015/05/11/a-tipping-point-in-u-s-china -relations-is-upon-us-part-i/.
Lawrence, Susan V., 203/11/12. “China’s Political Institutions and Leaders in Charts,” Congressional Research Service, https://fas.org/sgp/crs/row/R43303.pdf.
Leclaire, Elizabeth, 2016/4/8. “Room to Grow – China’s Internet Plus Strategy,” The American Chamber of Commerce, http://insight.amcham-shanghai.org/room-to-grow -chinas-internet-plus-strategy/.
Lee, Stacia, 2016/1/8. “International Reactions to U.S. Cybersecurity Policy: The BRICS Undersea Cable,” The Henry M. Jackson School of International Studies, https:// jsis.washington.edu/news/reactions-u-s-cyber security-policy-bric-undersea-cable/.
Lewis, James A., and Simon Hansen, 2014/11/12. “China’s Cyberpower: International and
Domestic Priorities,” The Australian Strategic Policy Institute, https://www.aspi. org.au/publications/chinas-cyberpower-international-and-domestic-priorities/SR74_China_cyberpower.pdf.
Lewis, James A., 2016/3/25. “Indictment, Countermeasures and Deterrence,” Center for Strategic and International Studies, http://csis.org/publication/indictments-countermea sures-and-deterrence.
Lewis, James A., 2013/3/7. “Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia,” Center for Strategic and International Studies, https://csis-prod.s3.amazo naws.com/s3fs-public/legacy_files/files/ publication/130307_cyber_Lowy.pdf.
Livingston, Scott D., 2016/1/7. “Assessing China’s Plan to Build Internet Power,” ChinaFile, https://www.chinafile.com/reporting-opinion/media/ assessing-chinas-plan-build-internet-power.
Lieberthal, Kenneth and Wangi Jis, 2012/3/30. “Addressing U.S.-China Strategic Distrust,” The Brookings Institute, http://www.brookings.edu/~/media/research/files/papers /2012/3/30-us-china-lieberthal/0330_china_lieberthal .pdf.
Lieberthal, Kenneth and Peter W. Singer, 2012/2/23. “Cybersecurity and U.S.-China Relations,” The Brookings Institute, http://www.brookings.edu/~/media/Research/ Files/Papers/2012/2/23%20cybersecurity%20china%20us%20singer%20lieberthal/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.PDF.
Lord, Kristin M. and Travis Sharp, ed., 2011/6/1. “America’s Cyber Future: Security and Prosperity in the Information Age Volume 1,” Center for New American Security, https://s3.amazonaws.com/files.cnas.org/documents/CNAS_Cyber_Volume-I_0.pdf.
Lu, Chuanying, 2016/5/24. “China’s Emerging Cyberspace Strategy,” The Diplomat, http://thediplomat.com/2016/05/chinas-emerging-cyberspace-strategy/.
Mattis, Peter, 2015/12/29. “China’s Military Intelligence System is Changing”, War on the Rocks, http://warontherocks.com/2015/12/chinas-military-intelligence-system-is-chang ing/.
Micklethwait, John, 2014/9/11. “As the World Turns,” The New York Times, http://www. nytimes.com/2014/09/14/books /review/henry-kissingers-world-order.html.
Mozur, Paul, 2016/11/8. “China’s Internet Controls Will Get Stricter, to Dismay of Foreign Business,” The New York Times, http://cn.nytimes.com/china/20161108/china-cyber-se curity-regulations/dual/.
Moller, Christian, 2015/11/4. “Internet Governance 2015: Brazil and Beyond,” Center for Global Communication Studies, http://www.global.asc.upenn.edu/internet-governance -2015-brazil-and-beyond/.
Niu, Haibin, 2015/2/6. “ A Chinese Perspective on the BRICS in 2015,” Council on Foreign Relations, http://www.cfr.org/councilofcouncils/global_memos/p36088.
Nye, Joseph S., 2010/5/1. “Cyber Power,” Belfer Center for Science and International Affairs, http://belfer center.hks.harvard.edu/files/cyber-power.pdf.
Nye, Joseph S., 2014/5/1. “The Regime Complex for Managing Global Cyber Activities,” Centre for International Governance Innovation and the Royal Institute for International Affairs, https://www.cigionline.org/sites/default/files/gcig_paper_no1.pdf.
O’Brien, Robert, 2016/5/25. “What to Make of the Newly Established CyberSecurity Association of China,” Center for Strategic and International Studies, https://www.csis. org/analysis/what-make-newly-established-cybersecurity-association-china.
O’Brien, Kevin J., 2013/2/5. “ Microsoft and Huawei of China to Unite to Sell Low-Cost Windows Smartphones in Africa,” The New York Times, https://cn.nytimes.com/ business/20130205/c05huawei/print/dual/.
Perlez, Jane, 2013/10/31. “Strident Video by Chinese Military Casts U.S. as Menace,” The New York Times, http://sinosphere.blogs.nytimes.com/2013/10/31/strident-video-by-chinese-military-casts-u-s-as-menace/?_r=0.
Pillsbury, Michael, 2014/9/17. “Misunderstanding China,” Hudson Institute, http://www.hudson.org/research/10623-misunderstanding-china.
Raud, Mikk, 2016/8. “China and Cyber: Attitudes, Strategies, Organisation,” NATO CCDCOE, https://ccdcoe. org/sites/default/files/multimedia/pdf/CS_organisation _CHINA_092016_FINAL.pdf.
Ray, Jonathan, eds., 2016/10/2. “China’s Industrial and Military Robotics Development,” Defense Group Incorporated, https://www.uscc.gov/sites/default/files/Research/DGI_ China%27s%20Industrial%20and%20Military%20Robotics%20Development.pdf.
Rosenzweig, Paul, 2016/4/8. “CYBERCOM Grows Up, Chinese IP Theft, and Apple’s Bug Bounty,” The Lawfare Institute, https://www.lawfareblog.com/cybercom-grows-chine se-ip-theft-and-apples-bug-bounty.
Roy, J. Stapleton, 2016/9/26. “The Future of U.S. Policy Toward Asia,” The Wilson Center, https://www.wilsoncenter.org/article/ambassador-stape-roy-the-future-us-policy-toward-asia.
Romberg, Alan, 2014/6/30. “Future East Asian Security Architecture,” The Stimson Center, https://www.stimson.org/sites/default/files/file-attachments/SecurityArchitecture_1.pdf.
Rui, Zhang, 2015/12/17. “China Headlines: Xi Slams’ double Standards, Advocates Shared Future in Cyberspace,” CCTV, http://english.cntv.cn/2015/12/17/ARTI1450334752 126739.shtml.
Schmidt, Lara, 2015/9/29. “Perspective on 2015 DoD Cyber Strategy,” RAND, http://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT439/RAND_CT439.pdf.
Schiller, Dan, 2014. “Rosa Luxemburg’s Internet? For a Political Economy of State Mobilization and the Movement of Accumulation in Cyberspace,” IJOC, http://ijoc.org /index.php/ijoc/article/viewFile/2045/1076.
Segal, Adam, 2014/6/30. “How China Becomes A Cyber Power,” Council on Foreign Relations, https://www.cfr. org/blog-post/how-china-becomes-cyber-power.
Segal, Adam, 2015/10. “Cybersecurity: Can The US and China Find Common Ground in Cyberspace,” The 100,000 Strong Foundation, https://international.uiowa.edu/sites/ international.uiowa.edu/files/100kstrong-obama-xi-summit-what-happened-what-comes-next-in-us-china-relations.pdf.
Singer, Peter W., 2015/12/18. “How the United States Can Win the Cyberwar of the Future,” Foreign Policy, http://foreignpolicy.com/2015/12/18/how-the-united-states-can-win-the -cyberwar-of-the-future-deterrence-theory-security/.
Singh, Abhishek Pratap, 2016/3/29. “China’s First Anti-Terrorism Law: An Analysis,” Institute for Defense Studies and Analyses, http://www.idsa.in/idsacomments/china-first -anti-terrorism-law_apsingh_290316.
Shinn, Marian, 2015/6/10. “Alarm over Cyber Security Pact with China,” Democratic Alliance, https://www.da.org.za/2015/06/alarm-over-cyber-security-pact-with-china/.
Shambaugh, David, 2017/1. “A View from Washington: U.S.-China Relations in the Age of Trump,” The American Chamber of Commerce in Shanghai, http://insight.amcham- shanghai.org/a-view-from-washington-age-of-trump/.
Stokes, Mark, 2012/10/29. “Countering Chinese Cyber Operations: Opportunities and Challenges for U.S. Interests,” The Project 2049 Institute, http://www.project2049.net/ documents/countering_chinese_cyber_operations_stokes_hsiao.pdf.
Stokes, Mark and Hsiao, Russell, 2013/10/14. “The People’s Liberation Army General Political Department: Political Warfare with Chinese Characteristics,” Project 2049 Institute, https://www.project2049.net/documents/PLA_General_Political_Department _Liaison_Stokes_Hsiao.pdf.
Stokes, Mark A., 2015/7/27. “The PLA General Staff Department Third Department Second Bureau:An Organizational Overview of Unit 61398,” The Project 2049 Institute, http:// www.project2049.net/documents/Stokes _PLA_General_Staff_Department_Unit_61398.pdf.
Sun, Yun, 2013/3/25. “BRICS and China’s Aspiration for the New International Order,” The Brookings Institute, https://www.brookings.edu/blog/up-front/2013/03/25/brics-and -chinas-aspiration-for-the-new-international-order/.
Sun, Yun, 2016/3/23. “A Calculated Relationship,” The Stinson Center, http://www.stimson. org/content/ calculated-relationship.
Swaine, Michael D., 2011/1/19. “China’s Military Muscle,” Carnegie Endowment for International Peace, http://carnegieendowment.org/2011/01/19/china-s-military -muscle/1qk1.
Swaine, Michael D. and Rachel E. Odell, eds., 2013/12/12. “U.S.-China Security Perceptions Survey: Findings and Implications,” Carnegie Endowment for International Peace, http://carnegieendowment.org/files/us_china_security_perceptions_report.pdf.
Ülgen, Sinan, 2016/1/18. “Governing Cyberspace,” Carnegie Endowment for International Peace, http://carnegieendowment.org/files/Sinan_Cyber_Final.pdf.
Wong, Edward, 2015/10/3. “Chinese Colonel’s Hard-Line Views Seep into the Mainstream,” The New York Times, http://www.nytimes.com/2015/10/03/world/asia/chinese-colonels- hard-line-views-seep-into-the-mainstream.html.
Wong, Edward, 2015/11/4. “China Aims for 6.5% Economic Growth Over Next 5 Years, Xi Says,” The New York Times, http://cn.nytimes.com/china/20151104/c04beijing/dual/.
Zheng, Li, 2016/11/23. “Why Is a Cyber Community of Shared Destiny Important,” CHINAUS Focus, http://www.chinausfocus.com/peace-security/why-is-a-cyber- community-of-shared-destiny-important.
Zhao, Frank and Jesse Heatley, 2016/8/11. “China’s Master Plan for IT Dominance,” The Diplomat, http://thediplomat .com/2016/08/chinas-master-plan-for-it-dominance/.
Zhou, Zunyou, 2016/1/23. “China’s Comprehensive Counter-Terrorism Law,” The Diplomat, http://thediplomat.com/2016/01/chinas-comprehensive-counter-terrorism-law/.
Zhu, Huan, 2016/11/30. “China's New ‘Cybersecurity’ Rules Look Like Cyberprotectionism Instead,” The Diplomat, http://thediplomat.com/2016/11/chinas-new-cybersecurity- rules-look-like-cyberprotectionism-instead/.