網(wǎng)絡(luò)戰(zhàn)爭敘事與網(wǎng)絡(luò)空間重構(gòu):利益主體與風(fēng)險代價分析
發(fā)布時間:2021-02-25 23:06
網(wǎng)絡(luò)空間,曾一度被視為共享域,但如今網(wǎng)絡(luò)軍事化趨勢正在把它變成戰(zhàn)爭域。網(wǎng)絡(luò)戰(zhàn)爭敘事為網(wǎng)絡(luò)空間進攻能力的發(fā)展提供了理由,并可能刺激危害公民自由的網(wǎng)絡(luò)監(jiān)控措施的泛濫。本文第一部分將研究網(wǎng)絡(luò)空間敘事的演變、利益主體的身份、網(wǎng)絡(luò)空間治理的相關(guān)矛盾以及網(wǎng)絡(luò)軍事化對社會的影響。第二部分將分析網(wǎng)絡(luò)戰(zhàn)爭敘事相關(guān)的主要案例,并指出評估這些案例的雙重標(biāo)準(zhǔn)、指出網(wǎng)絡(luò)戰(zhàn)爭本身定義的問題以及所引起的軍事化趨勢。第三部分的分析將挖掘網(wǎng)絡(luò)戰(zhàn)爭敘事和言語行為里的偏見以其隱藏的利益勾結(jié)。本論文還將研究中美關(guān)系對網(wǎng)絡(luò)戰(zhàn)爭與網(wǎng)絡(luò)空間的影響,并為避免網(wǎng)絡(luò)沖突進一步升級以促進更好的網(wǎng)絡(luò)空間未來提供建議。
【文章來源】:復(fù)旦大學(xué)上海市 211工程院校 985工程院校 教育部直屬院校
【文章頁數(shù)】:99 頁
【學(xué)位級別】:碩士
【文章目錄】:
摘要
ABSTRACT
Introduction:Shaping a Future Without Direction
Theoretical Framework:Discourse Analysis and Identity Politics
CHAPTER 1 CYBERSPACE:IDENTITIES IN CONFLICT AND THE IMPORTANCE OF AVOIDING CYBER-WAR
1.1. Evolution of Cyberspace:From a Domain of Sharing to a Domain of War Fighting
1.1.1. The Two Opposite Identities Fighting to Control Cyberspace
1.1.2. Insiders' Perception:The Ideological Layer of Cyberspace
1.1.3. Outsiders' Perception:The Physical Layer of Cyberspace
1.2. Engineering Cyberspace:How the Ideological Determines The Physical and Vice Versa
1.2.1. Issues of Power and Sovereignty:Cyber Libertarians Versus Orthodox Policymakers
1.2.2. A Holistic Definition to Mitigate the Conflict
1.2.3. The Problem of Adopting a Holistic Definition
1.3. Society Dependence on Cyberspace and the Threat of Cyber-war Narratives
1.3.1. What is Cyber-war and What is it Threatening?
1.3.2. What Does Cyberspace Mean to Society and How is it Changing it?
1.3.3. Cyberspace as Epistemology:How Do We Interpret the World and What Are the Side Effects?
1.3.4. Militarization as an Amplifier of Side Effects and the Final Stage of Dehumanization
CHAPTER 2 FROM CYBER-WAR NARRATIVES TO THE SURVEILLANCE STATE
2.1. Means of Knowledge and Means of Destruction:How is Cyber-war Conducted
2.1.1. The Four Steps of Hacking:Reconnaissance, Scanning, Exploitation and Maintaining Access
2.1.2. Understanding the Code:Tools and Techniques of Cyber-warfare
2.1.3. Why are Governments Afraid of Cyber-attacks?
2.1.4. The Attribution Issue:Why Is it Hard to Spot the Enemy?
2.2. Deconstructing the History of a New Threat
2.2.1. The Siberian Pipeline (1982):the First Case or Just a Myth?
2.2.2. The Bronze of Tallinn (2007):Beginning of the Narratives of Cyberwar
2.2.3. Russia-Georgia Crisis (2008):Operational Warfare in Cyberspace?
2.2.4. Operation Buckshot Yankee (2008):the Turning Point in U.S. Cyber-policy
2.3. U.S. Aggressive Stance in Cyberspace and the Double Standard Issue
2.3.1. Stuxnet & Sons (2010):Cyber-attacks With Physical Consequences
2.3.2. Mandiant Report (2013):Toward Escalation
2.3.3. China and Russia as "Usual Suspects" and the Double Standard Issue
2.3.4. NSA and the Surveillance State (2013):A Step Toward Militarization
2.4. A Path to Further Escalation
CHAPTER 3 CYBER-WAR:NARRATIVES, ACTS OF SPEECH AND THE UNDERLYING INTERESTS
3.1. Interest Groups Behind the Narratives of Cyber-war and the Securitization Process
3.1.1. Cyber-war:Myth against Reality
3.1.2. The Role of Internal and External Threats in the Securitization Process
3.1.3. Cyber-war Narratives and the Military-Industrial Complex:A Conflict of Interest
3.2. Conclusions:Avoid Militarization and Promote Cyber-security Education for a Better Cyberspace
BIBLIOGRAPHY
【參考文獻】:
期刊論文
[1]論中美網(wǎng)絡(luò)空間的戰(zhàn)略互信[J]. 蔡翠紅. 美國問題研究. 2013(01)
[2]國家-市場-社會互動中網(wǎng)絡(luò)空間的全球治理[J]. 蔡翠紅. 世界經(jīng)濟與政治. 2013 (09)
[3]大眾傳媒與中國外交政策的制定[J]. 蔣昌建,沈逸. 國際觀察. 2007(01)
本文編號:3051713
【文章來源】:復(fù)旦大學(xué)上海市 211工程院校 985工程院校 教育部直屬院校
【文章頁數(shù)】:99 頁
【學(xué)位級別】:碩士
【文章目錄】:
摘要
ABSTRACT
Introduction:Shaping a Future Without Direction
Theoretical Framework:Discourse Analysis and Identity Politics
CHAPTER 1 CYBERSPACE:IDENTITIES IN CONFLICT AND THE IMPORTANCE OF AVOIDING CYBER-WAR
1.1. Evolution of Cyberspace:From a Domain of Sharing to a Domain of War Fighting
1.1.1. The Two Opposite Identities Fighting to Control Cyberspace
1.1.2. Insiders' Perception:The Ideological Layer of Cyberspace
1.1.3. Outsiders' Perception:The Physical Layer of Cyberspace
1.2. Engineering Cyberspace:How the Ideological Determines The Physical and Vice Versa
1.2.1. Issues of Power and Sovereignty:Cyber Libertarians Versus Orthodox Policymakers
1.2.2. A Holistic Definition to Mitigate the Conflict
1.2.3. The Problem of Adopting a Holistic Definition
1.3. Society Dependence on Cyberspace and the Threat of Cyber-war Narratives
1.3.1. What is Cyber-war and What is it Threatening?
1.3.2. What Does Cyberspace Mean to Society and How is it Changing it?
1.3.3. Cyberspace as Epistemology:How Do We Interpret the World and What Are the Side Effects?
1.3.4. Militarization as an Amplifier of Side Effects and the Final Stage of Dehumanization
CHAPTER 2 FROM CYBER-WAR NARRATIVES TO THE SURVEILLANCE STATE
2.1. Means of Knowledge and Means of Destruction:How is Cyber-war Conducted
2.1.1. The Four Steps of Hacking:Reconnaissance, Scanning, Exploitation and Maintaining Access
2.1.2. Understanding the Code:Tools and Techniques of Cyber-warfare
2.1.3. Why are Governments Afraid of Cyber-attacks?
2.1.4. The Attribution Issue:Why Is it Hard to Spot the Enemy?
2.2. Deconstructing the History of a New Threat
2.2.1. The Siberian Pipeline (1982):the First Case or Just a Myth?
2.2.2. The Bronze of Tallinn (2007):Beginning of the Narratives of Cyberwar
2.2.3. Russia-Georgia Crisis (2008):Operational Warfare in Cyberspace?
2.2.4. Operation Buckshot Yankee (2008):the Turning Point in U.S. Cyber-policy
2.3. U.S. Aggressive Stance in Cyberspace and the Double Standard Issue
2.3.1. Stuxnet & Sons (2010):Cyber-attacks With Physical Consequences
2.3.2. Mandiant Report (2013):Toward Escalation
2.3.3. China and Russia as "Usual Suspects" and the Double Standard Issue
2.3.4. NSA and the Surveillance State (2013):A Step Toward Militarization
2.4. A Path to Further Escalation
CHAPTER 3 CYBER-WAR:NARRATIVES, ACTS OF SPEECH AND THE UNDERLYING INTERESTS
3.1. Interest Groups Behind the Narratives of Cyber-war and the Securitization Process
3.1.1. Cyber-war:Myth against Reality
3.1.2. The Role of Internal and External Threats in the Securitization Process
3.1.3. Cyber-war Narratives and the Military-Industrial Complex:A Conflict of Interest
3.2. Conclusions:Avoid Militarization and Promote Cyber-security Education for a Better Cyberspace
BIBLIOGRAPHY
【參考文獻】:
期刊論文
[1]論中美網(wǎng)絡(luò)空間的戰(zhàn)略互信[J]. 蔡翠紅. 美國問題研究. 2013(01)
[2]國家-市場-社會互動中網(wǎng)絡(luò)空間的全球治理[J]. 蔡翠紅. 世界經(jīng)濟與政治. 2013 (09)
[3]大眾傳媒與中國外交政策的制定[J]. 蔣昌建,沈逸. 國際觀察. 2007(01)
本文編號:3051713
本文鏈接:http://sikaile.net/shekelunwen/renwuzj/3051713.html
最近更新
教材專著