透過您的圖書館登入
IP:3.145.95.244
  • 學位論文

美中網路安全競爭與網路空間主權爭議之研究

Sino-US. Competition over Cybersecurity and Disputes on Sovereignty in Cyberspace

指導教授 : 梁德昭

摘要


網路安全迄今一直為國際之間競爭的焦點,大國之間在政經領域的竊密、軍事領域的抗衡,甚至是國內立法的管制,無時無刻在進行網路安全的競逐。本研究從攻勢現實主義的視角,透過美國和中國的網路安全競逐的個案,分析大國間網路安全競逐所浮現的主權問題。研究發現,網路空間因不具地緣因素的限制,更為貼近攻勢現實主義的理論基礎,即國家極力爭取權力以成為全球霸權。大國之間在對網路空間治理及主權存在認知上的差異,以及網路空間中欠缺相關法律規範及難以確定網路實際行為者的情況下,網路安全領域發生摩擦之情境短期內仍將持續。而國際體系中,亦同時存在網際網路上的國家主權爭議,各國致力推行網路化後所帶來的國家安全及利益上的威脅,使網路空間成為各國政府極力維護的目標。雖然在網路空間中似乎並無國家主權立基的條件,但無論是基於攻擊上的防護,或是限制資訊的傳遞,都必需藉由彰顯國家主權的存在來執行。針對網路空間中所浮現的網路主權問題,本研究參考海洋法船旗國國籍管轄的精神,提出一網路數位憑證認證架構,並透過系統實作,在網際網路空間中提供使用者設備的國籍憑證的識別方法,從而落實邏輯邊疆的概念,是未來解決國際間網路衝突的可行解決方案。

並列摘要


Cyber security has long been the focus of international competition, may it be in political and economic theft, military confrontation or domestic legal regulations. This paper aimed to look at cyber security competition between the United States and China and to analyse the sovereignty issues emerged from these various cases from an offensive realism perspective. The study found that due to the lack of geographical features in cyberspace, it could best epitomise the theoretical basis of offensive realism, that State strive to seek power in order to become a global hegemony. Wide cognitive differences among major powers regarding the governance of cyberspace and the existence of sovereignty, the lack of related legal norms and the inability to identify actual network actors led to constant frictions in the cyber security filed in the short-run. Threats towards national security and interests posed by internetisation had made cyberspace the target every government aimed to protect and secure, and thus resulted in conflicts over national sovereignty on the Internet in the international system. Despite doubts over the conditions for the establishment of sovereignty in the cyberspace, protections from cyber-attacks and limits imposed on information transfers could only be executed base on the existence of national sovereignty. To deal with emerging issues of Internet sovereignty in the cyberspace, and base on the spirit of flag state jurisdiction under UNCLOS, this paper proposed to institute a digital network certification system, which provide Internet user to authenticate his/her nationality through systematic practices, and in which the concept of logical frontier could be implemented, as a viable solution to settle future international conflicts in the cyberspace.

參考文獻


英文部份
Adam Segal, “Department of Justice Indicts Chinese Hackers: What Next?” Council on Foreign Relations, May 19, 2014, Retrieved from http://blogs.cfr.org/asia/2014/05/19/department-of-justice-indicts-chinese-hackers-what-next/.
Adam Segal, “Revealed: Why China and America are Set to Clash in Cyberspace,” National Interest, August 3, 2015, Retrieved from http://www.nationalinterest.org/blog/the-buzz/revealed-why-china-america-are-set-clash-cyberspace-13479.
Arend Lijphart,“Comparative Politics and the Comparative Method,” American Political Science Review, September 1971, Vol. 65, No. 3, pp. 691-693.
Bame, M, July 22, 2011, “Strategy for Operating in Cyberspace (DSOC). About.com Guide”, Retrieved from http://defense.about.com/b/2011/07/22/dod-strategy-for-operating-in-cyberspace-dsoc.htm (accessed March 19, 2012).

延伸閱讀