透過您的圖書館登入
IP:3.144.86.121
  • 期刊

The People's Republic of China's Cyber Coercion: Taiwan, Hong Kong, and the South China Sea

摘要


This paper investigates the increasing use of cyber coercion by the People's Republic of China (PRC) among its core interests: Taiwan, Hong Kong, and the South China Sea. It argues that the PRC's deployment of sophisticated attacks in the form of cyber coercion continues to be part of its geostrategic playbook to exert its influence and prosecute its wider interests as a rising power in the Indo-Pacific region. However, it observes that cyber coercion will be employed by the PRC in concert with all the other tools - diplomatic, economic, and the political - across the spectrum. The paper has two broad goals: first to unpack the trends or patterns in the PRC-sponsored cyber coercion by accentuating contextual and operational dimensions using Taiwan, Hong Kong, and the South China Sea as analytical case studies; second, to highlight the opportunities and limitations of using cyber coercion as an asymmetrical capability in the changing threat landscape. The paper concludes that the PRC's cyber coercion is characterized by blurring the distinction on what constitutes compellence and deterrence. The boundaries are not clear cut, and to a certain degree both are even mutually reinforcing. The in-depth analysis of the case studies reveals the growing prominence of disinformation campaigns in close coordination with cyber operations (malware, phishing, and DDoS attack). This emboldens the PRC with a myriad of coercive strategies in shaping its external environment and realizing its ambition of national rejuvenation across Taiwan, Hong Kong, and the South China Sea.

參考文獻


Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, 38(2), 41–73. doi: 10.1162/ISEC_a_00136
Lewis, J. (2011). Cyberwar thresholds and effects. IEEE Security & Privacy, 9(5), 23–29. doi: 10.1109/MSP.2011.25
Sharp, T. (2017). Theorizing cyber coercion: The 2014 North Korean operation against Sony. Journal of Strategic Studies, 40(7), 898–926. doi: 10.1080/01402390.2017.1307741
Valeriano, B., & Maness, R. C. (2014). The dynamics of cyber conflict between rival antagonists, 2001-11. Journal of Peace Research, 51(3), 347–360. doi:10.1177/0022343313518940
Barbaschow, A. (2019). Telegram says “whooper” DDoS attack launched mostly from China. ZDNet. Retrieved from https://www.zdnet.com/article/telegram-says-whopper-ddos-attack-launched-mostly-from-china/

被引用紀錄


楊一逵 (2023). Resisting China's ICT Influence in Sub-Saharan Africa: A Bandwagoning-for-Profit Perspective. Issues & Studies, 59(1), 1-31. https://doi.org/10.1142/S1013251123500042

延伸閱讀