內容簡介
內容簡介 首部結合西方和中國學者的觀點,探討中國網路安全的話題巨作中國在21世紀成為嶄露頭角的重要大國,最主要的原因來自於善加利用網路空間。網路安全問題來自於網路空間所帶來的經濟價值、外交用途和軍事意義。而對中國來說,網路安全的發展已經拓展到經濟和貿易、政治與外交、軍事與安全等各種領域。網路安全如何發展為中美關係中的重要議題?網路安全問題在中國與國際關係哪些領域引發衝突?網路安全問題又對中美關係產生了什麼樣的影響?本書將一一闡述中國如何在戰略高度認知和定位網路安全問題中,以增強國際競爭力的角度發展網路空間實力,並推動中國與西方國家在網路安全問題上的共同利益與合作共識。Jon R. Lindsay目前任職為加拿大蒙克國際研究中心的助理教授,近期已完成一本有關於科技與軍事的相關書籍。Derek Reveron為美國海軍戰事學院教授,專門攻讀戰略發展及美國國防政策。張太銘(Tai Ming Cheung)任職於加州大學聖地牙哥分校全球衝突與合作研究所所長,擅長研究中國的國防政策、國防科技和創新項目研究。China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber -- attacks -- predominantly from the United States.China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors -- Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West -- address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
作者介紹
作者介紹 Jon R. Lindsay's research examines the impact of technology on international security and strategy and has been published in leading academic journals such as International Security, Security Studies, Journal of Strategic Studies, and Technology and Culture. He holds a PhD in political science from the Massachusetts Institute of Technology and an MS in computer science and BS in symbolic systems from Stanford University. He is an officer in the U.S. naval reserve with seventeen years of experience including assignments in Asia, Europe, Latin America, and the Middle East. Tai Ming Cheung, director of the University of California Institute on Global Conflict and Cooperation, is a long-time analyst of Chinese and East Asian defense and national security affairs with particular expertise on the political economy of science, technology, and innovation and their impact on national security matters. Dr. Cheung was based in Asia from the mid-1980s to 2002 covering political, economic and strategic developments in greater China. He was also a journalist and political and business risk consultant in northeast Asia. Dr. Cheung received his PhD from the War Studies Department at King's College, London University.Derek S. Reveron is a professor of national security affairs and the EMC Informationist Chair at the U.S. Naval War College. He specializes in strategy development, non-state security challenges, and U.S. defense policy. He has published nine books including U.S. Foreign Policy and Defense Strategy: The Evolution of an Incidental Superpower (2015), Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World (2012) and Human Security in a Borderless World (2011). He received a a PhD in public policy analysis from the University of Illinois at Chicago.