-
1Dissertation/ Thesis
المؤلفون: 陳欣媛
المساهمون: 法律學系碩士在職專班
مصطلحات موضوعية: 內線交易, 資訊平等理論, 信賴關係理論, 私取理論, 消息傳遞理論, 不實陳述理論, 偶然聽聞, 駭客, Insider Trading, Information Equality Theory, Trust Relationship Theory, Theory of Private Acquisition, Messaging Theory, Theory of Misrepresentation, Overhearing Inside Information, Hack
وصف الملف: 99 bytes; text/html
Relation: https://irlib.pccu.edu.tw//handle/987654321/53414; https://irlib.pccu.edu.tw/bitstream/987654321/53414/2/index.html
-
2Conference
المساهمون: 資訊管理學系
Relation: 2008知識社群與系統發展研討會論文全集; http://ir.lib.pccu.edu.tw//handle/987654321/27197
-
3Dissertation/ Thesis
المؤلفون: 王仁甫, Wang, Jen-Fu
المساهمون: 吳豐祥, Wu, Feng-Shang
مصطلحات موضوعية: 法外創新, 白帽駭客, 個人特質, 社群中介, 社群支援, Outlaw innovation, White hat hacker, Personal characteristics, Community mediation, Community support
وصف الملف: 8731784 bytes; application/pdf
Relation: 一、 英文期刊\n[1] Ahmad, Atif et al. (2019). Strategically-motivated advanced persistent threat: definition, process, tactics and a disinformation model of counterattack. Computers & Security, 86, 402–418.\n[2] Amabile, T. M. (1988). A model of creativity and innovation in organizations. Research in Organizational Behavior, 10, 123-167.\n[3] Antunes, Joao, Neves, Nuno, Correia, Miguel, Verissimo, Paulo & Neves, Rui (2010) Vulnerability discovery with attack injection. IEEE Transactions on Software Engineering, 36(3), 357-370.\n[4] Baba, Y., & Walsh, J. P. (2010). Embeddedness, social epistemology and breakthrough innovation: The case of the development of statins. Research Policy, 39(4), 511-522.\n[5] Barron, A. (2012). Kant, copyright and communicative freedom. Law and Philosophy, 31(1), 1-48.\n[6] Bashir, M., Wee, C., Memon, N., & Guo, B. (2017). Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool. Computers & Security, 65, 153-165.\n[7] Battistella, C., De Toni, A. F., De Zan, G., & Pessot, E. (2017). Cultivating business model agility through focused capabilities: A multiple case study. Journal of Business Research, 73, 65-82.\n[8] Benjamin, V., Zhang, B., Nunamaker, J. F., & Chen, H. C. (2016). Examining hacker participation length in cybercriminal internet-relay-chat communities. Journal of Management Information Systems, 33(2), 482-510.\n[9] Benson, T. (2016). Open source paradigm: A synopsis of the cathedral and the bazaar for health and social care. Journal of Innovation in Health Informatics, 23(2), 488-492.\n[10] Bodford, J. E., & Kwan, V. S. Y. (2018). A game theoretical approach to hacktivism: Is attack likelihood a product of risks and payoffs? Cyberpsychology Behavior and Social Networking, 21(2), 73-77.\n[11] Boe, O., & Torgersen, G. E. (2018). Norwegian “digital border defense” and competence for the unforeseen: A grounded theory approach. Frontiers in Psychology, 9, 555–555.\n[12] Boon, W., & Edler, J. (2018). Demand, challenges, and innovation. Making sense of new trends in innovation policy. Science and Public Policy, 45(4), 435-447.\n[13] Bradford, E. (2016). All hail the “innovation champion”: Using social identity theory to understand being an “innovation champion.” Strategic Direction, 32(5), 13-15.\n[14] Breznitz, S. M., & Feldman, M. P. (2012). The engaged university. Journal of Technology Transfer, 37(2), 139-157.\n[15] Brown, S. L., & Eisenhardt, K. M. (1995). Product development - past research, present findings, and future-directions. Academy of Management Review, 20(2), 343-378.\n[16] Buisson, F. (2014). How do investors communicate with innovators such as "geeks"? A case study of HackFwd. International Journal of Arts Management, 16(3), 20-32.\n[17] Burstyn, H. L. (1990). Computer whiz guilty. Aba Journal, 76, 20-20.\n[18] Buss, A. H., & Finn, S. E. (1987). Classification of personality-traits. Journal of Personality and Social Psychology, 52(2), 432-444.\n[19] Carney, M., Gedajlovic, E., & Yang, X. H. (2009). Varieties of Asian capitalism: Toward an institutional theory of asian enterprise. Asia Pacific Journal of Management, 26(3), 361-380.\n[20] Castells, M. (2002).The cultures of the Internet. Queen`s Quarterly, Fall, 109(3), 333-345.\n[21] Cavusoglu, H., Mishra, B., & Raghunathan, S. (2005). The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16(1), 28-46.\n[22] Cederstrom, C., & Fleming, P. (2016). On bandit organizations and their (IL) legitimacy: Concept development and illustration. Organization Studies, 37(11), 1575-1594.\n[23] Chesbrough, H. (2004). Managing open innovation. Research-Technology Management, 47(1), 23-26.\n[24] Chiang, Y. H., & Hung, K. P. (2010). Exploring open search strategies and perceived innovation performance from the perspective of inter-organizational knowledge flows. R&D Management, 40(3), 292-299.\n[25] Choi, J. P., Fershtman, C., & Gandal, N. (2010). Network security: Vulnerabilities and disclosure policy. Journal of Industrial Economics, 58(4), 868-894.\n[26] Citron. D. K. (2009). Law’s Expressive Value in Combating Cyber Gender Harassment. Michigan Law Review, 108(3), 373–415.\n[27] Cloatre, E. (2018). Law and ANT (and its Kin): Possibilities, challenges, and ways forward. Journal of Law and Society, 45(4), 646-663.\n[28] Cook. (2018). Cross-border data access and active cyber defense: Assessing legislative options for a new international cybersecurity rulebook. Stanford Law & Policy Review, 29(2), 205–236.\n[29] Dahlander, & Gann, D. M. (2010). How open is innovation? Research Policy, 39(6), 699–709.\n[30] de Graaf, M. M. A., Ben Allouch, S., & van Dijk, J. A. G. M. (2018). A phased framework for long-term user acceptance of interactive technology in domestic environments. New Media & Society, 20(7), 2582-2603.\n[31] Delmas, M. A., & Toffel, M. W. (2008). Organizational responses to environmental demands: Opening the black box. Strategic Management Journal, 29(10), 1027-1055.\n[32] DiMaggio, P., Hargittai, E., Neuman, W. R., & Robinson, J. P. (2001). Social implications of the internet. Annual Review of Sociology, 27, 307-336.\n[33] Dosi, G.(1989). The nature of the innovation process. In Dosi GG, Freeman C, Nelson R, Silverberg G, Soete L (Eds.), Technical Change and Economic Theory (pp. 221–238). London: Printer.\n[34] Dosso, Martin, B. R., & Moncada-Paternò-Castello, P. (2018). Towards evidence-based industrial research and innovation policy. Science & Public Policy, 45(2), 143–150.\n[35] Dunn, A. G., Day, R. O., Mandl, K. D., & Coiera, E. (2012). Learning from hackers: Open-source clinical trials. Science Translational Medicine, 4(132), 132-132.\n[36] Eberhart, R. N., Eesley, C. E., & Eisenhardt, K. M. (2017). Failure is an option: Institutional change, entrepreneurial risk, and new firm growth. Organization Science, 28(1), 93-112.\n[37] Eichensehr, K. E. (2017). Public-private cybersecurity. Texas Law Review, 95(3), 467-538.\n[38] Eisenhardt, K. M. (1989). Building theories from case-study research. Academy of Management Review, 14(4), 532-550.\n[39] Emery, A. C. (2017). Zero-day responsibility: The benefits of a safe harbor for cybersecurity research. Jurimetrics Journal of Law, Science and Technology, 57(4), 483-503.\n[40] Enkel, E., Gassmann, O., & Chesbrough, H. (2009). Open R&D and open innovation: Exploring the phenomenon. R&D Management, 39(4), 311-316.\n[41] Esteves, J., Ramalho, E., & de Haro, G. (2017). To improve cybersecurity, think like a hacker. Mit Sloan Management Review, 58(3), 71-77.\n[42] Fitzgerald, B. (2006). The transformation of open source software. Mis Quarterly, 30(3), 587-598.\n[43] Flores, O., Rayle, L. (2017). How cities use regulation for innovation: The case of Uber, Lyft and Sidecar in San Francisco. Transportation Research Procedia, 25, 3756-3768.\n[44] Flowers, S. (2008). Harnessing the hackers: The emergence and exploitation of outlaw innovation. Research Policy, 37(2), 177-193.\n[45] Funk, R. J. & Hirschman, D. (2017). Beyond nonmarket strategy: Market actions as corporate political activity. Academy of Management Review, 42(1), 32-52.\n[46] Gad, M. (2014). Crime ware marketplaces and their facilitating technologies. Technology Innovation Management Review, 4(11), 28-33.\n[47] Gao, X. & Zhong, W. J. (2016). Economic incentives in security information sharing: The effects of market structures. Information Technology & Management, 17(4), 361-377.\n[48] Garriga, H., von Krogh, G., & Spaeth, S. (2013). How constraints and knowledge impact open innovation. Strategic Management Journal, 34(9), 1134-1144.\n[49] Gaspareniene, L. & Remeikiene, R. (2015). Digital shadow economy: A critical review of the literature. Mediterranean Journal of Social Sciences, 6(6), 402-409.\n[50] Gassmann. O. (2006). Opening up the innovation process: Towards an agenda. R&D Management, 36(3), 223-228.\n[51] Geroski, P. A. (2000). Models of technology diffusion. Research Policy, 29(4), 603-625.\n[52] Giboney, J. S., Proudfoot, J. G., Goel, S., & Valacich, J. S. (2016). The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise. Computers & Security, 60, 37-51.\n[53] Goel, R. K., Sauoris J. W., & Zhang, X. (2015). Innovation and underground entrepreneurship. The Journal of Technology Transfer, 40(5), 800–820.\n[54] Goodman, M. (2011). What business can learn from organized crime: Global criminals are now sophisticated managers of technology and talent. A guide to their best practices. Harvard Business Review, 89(11), 27-.\n[55] Greenwood, R., Raynard, M., Kodeih, F., Micelotta, E. R., & Lounsbury, M. (2011). Institutional complexity and organizational responses. Academy of Management Annals, 5, 317-371.\n[56] Guo, D., Guo, Y., & Jiang, K. (2016). Government-subsidized R&D and firm innovation: Evidence from China. Research Policy, 45(6), 1129-1144.\n[57] Guo, J., Su, Q., & Zhang, Q. (2017). Individual Creativity during the ideation phase of product innovation: An interactional perspective. Creativity and Innovation Management, 26(1), 31-48.\n[58] Hargadon, A. B., & Douglas, Y. (2001). When innovations meet institutions: Edison and the design of the electric light. Administrative Science Quarterly, 46(3), 476-501.\n[59] Harison, E., & Koski, H. (2010). Applying open innovation in business strategies: Evidence from finnish software firms. Research Policy, 39(3), 351-359.\n[60] Hastbacka, M. (2004). Open innovation: What’s mine is mine…What if yours could be mine, too? Technology Management Journal, 12, 1-3.\n[61] Hausken, K. (2017). Security investment, hacking, and information sharing between firms and between hackers. Games, 8(2), 23.\n[62] Head, B. W.(2010).Reconsidering evidence-based policy: Key issues and challenges. Policy and Society, 29(2), 77–94.\n[63] Hemmi, A., & Graham, I. (2014). Hacker science versus closed science: Building environmental monitoring infrastructure. Information Communication & Society, 17(7), 830-842.\n[64] Henderson, R. M., & Clark, K. B. (1990). Architectural innovation - the reconfiguration of existing product technologies and the failure of established firms. Administrative Science Quarterly, 35(1), 9-30.\n[65] Hiatt, S. R., Sine, W. D., & Tolbert, P. S. (2009). From Pabst to Pepsi: The deinstitutionalization of social practices and the creation of entrepreneurial opportunities. Administrative Science Quarterly, 54(4), 635–667.\n[66] Hinings, B., Gegenhuber, T., & Greenwood, R. (2018). Digital innovation and transformation: An institutional perspective. Information and Organization, 28(1), 52-61.\n[67] Holt, T. J. (2013). Examining the forces shaping cybercrime markets online. Social Science Computer Review, 31(2), 165-177.\n[68] Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. Journal of Strategic Information Systems, 22(2), 175-186.\n[69] Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys, 51(4), 1-36.\n[70] Huizingh. (2011). Open innovation: State of the art and future perspectives. Technovation, 31(1), 2–9.\n[71] Hutter, K., Fuller, J., Hautz, J., Bilgram, V., & Matzler, K. (2015). Machiavellianism or morality: Which behavior pays off in online innovation contests? Journal of Management Information Systems, 32(3), 197-228.\n[72] Jacobides, Knudsen, T., & Augier, M. (2006). Benefiting from innovation: Value creation, value appropriation and the role of industry architectures. Research Policy, 35(8), 1200–1221.\n[73] Jardine, E. (2018). Tor, what is it good for? Political repression and the use of online anonymity-granting technologies. New Media & Society, 20(2), 435-452.\n[74] Jeong, S. (2014). Strategic collaboration of R&D entities for technology convergence: Exploring organizational differences within the triple helix. Journal of Management & Organization, 20(2), 227-249.\n[75] Kannan, K., Rahman, M. S., & Tawarmalani, M. (2016). Economic and Policy Implications of Restricted Patch Distribution. Management Science, 62(11), 3161-3182.\n[76] Katila, & Ahuja, G. (2002). Something old, something new: A longitudinal study of search behavior and new product introduction. Academy of Management Journal, 45(6), 1183–1194.\n[77] Klerkx, L., & Aarts, N. (2013). The interaction of multiple champions in orchestrating innovation networks: Conflicts and complementarities. Technovation, 33(6-7), 193-210.\n[78] Koops, B. J., & Kosta, E. (2018). Looking for some light through the lens of "cryptowar" history: Policy options for law enforcement authorities against "going dark". Computer Law & Security Review, 34(4), 890-900.\n[79] Kraemer-Mbula, E., Tang, P., & Rush, H. (2013). The cybercrime ecosystem: Online innovation in the shadows? Technological Forecasting and Social Change, 80(3), 541-555.\n[80] Kraft, P. S., & Bausch, A. (2018). Managerial social networks and innovation: A meta-analysis of bonding and bridging effects across institutional environments. Journal of Product Innovation Management, 35(6), 865-889.\n[81] Kung, L., Cegielski, C. G., & Kung, H. J. (2015). An integrated environmental perspective on software as a service adoption in manufacturing and retail firms. Journal of Information Technology, 30(4), 352-363.\n[82] Lanzolla, G., & Suarez, F. F. (2012). Closing the technology adoption-use divide: The role of contiguous user bandwagon. Journal of Management, 38(3), 836-859.\n[83] Laursen, & Salter, A. (2006). Open for innovation:the role of openness in explaining innovation performance among U.K. manufacturing firms. Strategic Management Journal, 27(2), 131–150.\n[84] Lee, E. (2005). The ethics of innovation: p2p software developers and designing substantial noninfringing uses under the sony doctrine. Journal of Business Ethics, 62(2), 147-162.\n[85] Lee, H., Smith, K. G., & Grimm, C. M. (2003). The effect of new product radicality and scope on the extent and speed of innovation diffusion. Journal of Management, 29(5), 753-768.\n[86] Lee, J. & Seo, D. (2016). Crowdsourcing not all sourced by the crowd: An observation on the behavior of Wikipedia participants. Technovation, 55-56, 14-21.\n[87] Leukfeldt, R., Kleemans, E., & Stol, W. (2017). The use of online crime markets by cybercriminal networks: A view from within. American Behavioral Scientist, 61(11), 1387-1402.\n[88] Lewis, & Usher, N. (2013). Open source and journalism: Toward new frameworks for imagining news innovation. Media, Culture & Society, 35(5), 602–619.\n[89] Li, Z., & Liao, Q. (2018). Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets. Government Information Quarterly, 35(1), 151-160.\n[90] Liu, M. L., Hull, C. E., & Hung, Y. T. C. (2017). Starting open source collaborative innovation: The antecedents of network formation in community source. Information Systems Journal, 27(5), 643-670.\n[91] Macleod, C. (2007). Exposed! Top hacker secrets. Management Services, 51(2), 46-47.\n[92] MAgnigbAto. E. (2018). Modelling the Triple Helix of university-industry-government relationships with game theory: Core, shapley value and nucleolus as indicators of synergy within an innovation system. Journal of Informetrics, 12(4), 1118–1132.\n[93] Maheux, B. (2014). Assessing the intentions and timing of malware. technology innovation. Management Review, 4(11), 34-40.\n[94] Mangano, R. (2018). Blockchain securities, insolvency law and the sandbox approach. European Business Organization Law Review, 19(4), 715-735.\n[95] Mansfield-Devine, S. (2009). Darknets. Computer Fraud & Security, 2009(12), 4-6.\n[96] Massa, F. G. (2017). Guardians of the internet: Building and sustaining the anonymous online community. Organization Studies, 38(7), 959-988.\n[97] Meyer, R. D., Dalal, R. S., & Hermida, R. (2010). A review and synthesis of situational strength in the organizational sciences. Journal of Management, 36(1), 121-140.\n[98] Mollick, E. (2005). Tapping into the underground. Mit Sloan Management Review, 46(4), 21-27.\n[99] Mookerjee, V., Mookerjee, R., Bensoussan, A., & Yue, W. T. (2011). When hackers talk: Managing information security under variable attack rates and knowledge dissemination. Information Systems Research, 22(3), 606-623.\n[100] Moralles, H. F., & Rebelatto, D. A. D. (2016). The effects and time lags of R&D spillovers in Brazil. Technology in Society, 47, 148-155.\n[101] Mulhall, T. (1997). Where have all the hackers gone? Computers & Security, 16(4), 285-290.\n[102] Nelms, T. C., Maurer, B., Swartz, L., & Mainwaring, S. (2018). Social payments: Innovation, trust, bitcoin, and the sharing economy. Theory Culture & Society, 35(3), 13-33.\n[103] Nissenbaum, H. (2004). Hackers and the contested ontology of cyberspace. New Media & Society, 6(2), 195–217.\n[104] OCASIO. (1997). Towards an attention-based view of the firm. Strategic Management Journal, 18(S1), 187–206.\n[105] Paleari, S., Donina, D., & Meoli, M. (2015). The role of the university in twenty-first century European society. Journal of Technology Transfer, 40(3), 369-379.\n[106] Piva, Rentocchini, F., & Rossi-Lamastra, C. (2012). Is open source software about innovation? Collaborations with the open source community and innovation performance of software entrepreneurial ventures. Journal of Small Business Management, 50(2), 340–364.\n[107] Powell, A. (2016). Hacking in the public interest:Authority, legitimacy, means, and ends. New Media & Society, 18(4), 600-616.\n[108] Prabhu, V., Sutton, C., & Sauser, W. (2008). Creativity and certain personality traits: Understanding the mediating effect of intrinsic motivation. Creativity Research Journal, 20(1), 53-66.\n[109] Prahalad, C.K. & Ramaswamy, V. (2004). Co-creation experiences: The next practice in value creation. Journal of Interactive Marketing, 18(3), 5–14.\n[110] Ransbotham, S., Mitra, S., & Ramsey, J. (2012). Are markets for vulnerabilities effective? Mis Quarterly, 36(1), 43-64.\n[111] Roche, E. M. (2016). Information and communication technology still a force for good? Journal of Global Information Technology Management, 19(2), 75-79.\n[112] Rogers, M. K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97-102.\n[113] Rottleuthner, H. (1989). A purified sociology of law: Niklas Luhmann on the autonomy of the legal system. Law & Society Review, 23(5), 779–797.\n[114] Ruggeri, D., & Rizza, C. (2017). Accounting information system innovation in interfirm relationships. Journal of Management Control, 28(2), 203-225.\n[115] Sales, N. A. (2018). Privatizing cybersecurity. Ucla Law Review, 65(3), 620-688.\n[116] Samtani, Chinn, R., Chen, H., & Nunamaker, J. F. (2017). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 34(4), 1023–1053.\n[117] Sarpong, D., Dong, S., & Appiah, G. (2016). `Vinyl never say die`: The re-incarnation, adoption and diffusion of retro-technologies. Technological Forecasting and Social Change, 103, 109-118.\n[118] Sedore, M. (2014). When technocultures collide: Innovation from below and the struggle for autonomy. Canadian Journal of Communication, 39(4), 672-674.\n[119] Seebruck, R. (2015). A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digital Investigation, 14, 36-45.\n[120] Seidel, V. P., Langner, B., & Sims, J. (2017). Dominant communities and dominant designs: Community-based innovation in the context of the technology life cycle. Strategic Organization, 15(2), 220-241.\n[121] Seigfried-Spellar, K. C., O`Quinn, C. L., & Treadway, K. N. (2015). Assessing the relationship between autistic traits and cyberdeviancy in a sample of college students. Behaviour & Information Technology, 34(5), 533-542.\n[122] Sergeeva, N. (2016). What makes an "innovation champion"? European Journal of Innovation Management, 19(1), 72-89.\n[123] Serracino-Inglott, P. (2013). Is it ok to be an anonymous? Ethics & Global Politics, 6(4), 217-244.\n[124] Sherer, P. D., & Lee, K. (2002). Institutional change in large law firms: A resource dependency and institutional perspective. Academy of Management Journal, 45(1), 102-119.\n[125] Siebers, L. Q. (2017). Hybridization practices as organizational responses to institutional demands: The development of Western retail TNCs in China. Journal of Economic Geography, 17(1), 1-29.\n[126] Skute, I., Zalewska-Kurek, K., Hatak, I., & de Weerd-Nederhof, P. (2019). Mapping the field: A bibliometric analysis of the literature on university-industry collaborations. Journal of Technology Transfer, 44(3), 916-947.\n[127] Soderberg, J. (2010). Misuser inventions and the invention of the misuser: Hackers, crackers and filesharers. Science as Culture, 19(2), 151-179.\n[128] Stock, von Hippel, E., & Gillert, N. L. (2016). Impacts of personality traits on consumer innovation success. Research Policy, 45(4), 757–769.\n[129] Stockton, P.N., Golabek-Goldman, M. (2013). Curbing the market for cyber weapons. Yale Law & Policy Review, 32, 101-128.\n[130] Suchman, M. C. (1995). Managing legitimacy-strategic and institutional approaches. Academy of Management Review, 20(3), 571-610.\n[131] Tavassoli, S., & Karlsson, C. (2015). Persistence of various types of innovation analyzed and explained. Research Policy, 44(10), 1887-1901.\n[132] Teece, D. J. (2007). Explicating dynamic capabilities: The nature and microfoundations of (sustainable) enterprise performance. Strategic Management Journal, 28(13), 1319-1350.\n[133] Teece, D. J., Pisano, G., & Shuen, A. (1997). Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509-533.\n[134] Tran, H., Campos-Nanez, E., Fomin, P., & Wasek, J. (2016). Cyber resilience recovery model to combat zero-day malware attacks. Computers & Security, 61, 19-31.\n[135] Triana, M. (2018). Is selling malware a federal crime? New York University Law Review, 93(5), 1311-1350.\n[136] Tu, K. V., & Meredith, M. W. (2015). Rethinking virtual currency regulation in the bitcoin age. Washington Law Review, 90(1), 271-347.\n[137] van der Panne, van Beers, C., & Kleinknecht, A. (2003). Success and failure of innovation: A literature review. International Journal of Innovation Management, 7(3), 309–338.\n[138] van Erp, J. (2017). New governance of corporate cybersecurity: A case study of the petrochemical industry in the port of rotterdam. Crime Law and Social Change, 68(1-2), 75-93.\n[139] van Oorschot, J. A. W. H., Hofman, E., & Halman, J. I. M. (2018). A bibliometric review of the innovation adoption. Technological Forecasting and Social Change, 134, 1-21.\n[140] Vanhaverbeke, Van de Vrande, V., & Chesbrough, H. (2008). Understanding the advantages of open innovation practices in corporate venturing in terms of real options. Creativity and Innovation Management, 17(4), 251–258.\n[141] Vanslette, S. H., & Boyd, J. (2011). Lawbreaking jokers: Tricksters using outlaw discourse. Communication Quarterly, 59(5), 591-602.\n[142] von Briel, F., & Recker, J. (2017). Lessons from a failed implementation of an online open innovation community in an innovative organization. MIS Quarterly Executive, 16(1), 35-46.\n[143] Wang, J. (2018). Innovation and government intervention: A comparison of Singapore and Hong Kong. Research Policy, 47(2), 399-412.\n[144] Wang, T. Y., Thornhill, S., & De Castro, J. O. (2017). Entrepreneurial orientation, legitimation, and new venture performance. Strategic Entrepreneurship Journal, 11(4), 373-392.\n[145] West, & Gallagher, S. (2006). Challenges of open innovation: The paradox of firm investment in open-source software. R&D Management, 36(3), 319–331.\n[146] West, R. E., & Hannafin, M. J. (2011). Learning to design collaboratively: Participation of student designers in a community of innovation. Instructional Science, 39(6), 821-841.\n[147] Wolfe, R. A. (1994). Organizational innovation - review, critique and suggested research directions. Journal of Management Studies, 31(3), 405-431.\n[148] Wu, C. H., Parker, S. K., & de Jong, J. P. J. (2014). Need for cognition as an antecedent of individual innovation behavior. Journal of Management, 40(6), 1511-1534.\n[149] Yunlu, D. G., Clapp-Smith, R., & Shaffer, M. (2017). Understanding the role of cultural intelligence in individual creativity. Creativity Research Journal, 29(3), 236-243.\n[150] Zahra, S., Hayton, J., Marcel, J. & O’Neill, H. (2001), Fostering entrepreneurship during international expansion: managing key challenges. European Management Journal, 19(4), 359-369.\n[151] Zhang, X., Tsang, A., Yue, W. T., & Chau, M. (2015). The classification of hackers by knowledge exchange behaviors. Information Systems Frontiers, 17(6), 1239-1251.\n[152] Zibarras, L. D., Port, R. L., & Woods, S. A. (2008). Innovation and the `dark side` of personality: dysfunctional traits and their relation to self-reported innovative characteristics. Journal of Creative Behavior, 42(3), 201-215. \n二、英文書籍與書章\n[1] Borrás, S., & Edler, J. (eds.) (2014). The Governance of Socio-technical Systems: Explaining Change. Cheltenham, UK: Edward Elgar Press.\n[2] Callon, M. (2002). From science as an economic activity to socioeconomics of scientific research: The dynamics of emergent and consolidated techno-economic networks. In: P. Mirowski & E-M. Sent (Eds), Science Bought and Sold: Essays in the Economics of Science (pp. 277-317). Chicago, IL: University of Chicao Press.\n[3] Chesbrough, H. (2006). Open innovation: A new paradigm for understanding industrial innovation. In Chesbrough, H., Vanhaverbeke, W., West J (eds.) Open Innovation: Researching a New Paradigm (pp 3–11). Oxford, MA: Oxford University Press.\n[4] Chen P., Desmet L., Huygens C. (2014). A Study on Advanced Persistent Threats. Communications and Multimedia Security (pp.63-72). Berlin, Heidelberg: Springer Berlin Heidelberg Press.\n[5] Christensen, C. M. (1997). The Innovator’s Dilemma : When New Technologies Cause Great Firms to Fail. Boston, MA: Harvard Business School Press.\n[6] Drucker, P. F. (1993). Post-capitalist Society. New York, NY: HarperBusiness Press.\n[7] Rogers, E.M. (2003). Diffusion of Innovations (5th ed.). New York, NY: Free Press.\n[8] Oliver Wendell Holmes, Jr. (2016). The Common Law: With Linked Table of Contents. Lanham, MD: Dancing Unicorn Press.\n[9] Jordan, T. (2008). Hacking: Digital Media and Technological Determinism. Cambridge, MA: Polity Press.\n[10] Latour, B. (1987). Science in Action: How to Follow Scientists and Engineers Through Society. Cambridge, MA: Harvard University Press.\n[11] Luhmann, N., Ziegert, K. A., & Kastner, F. (2004). Law As A Social System. In F. Kastner, R. Nobles & D. Schiff. Oxford, MA: Oxford University Press.\n[12] North, D. C., (1990). Institutions, Institutional Change and Economic Performance. New York, NY: Cambridge University Press.\n[13] Schumpeter, J. A., & Opie, R. (1934). The Theory of Economic Development: An Inquiry into Profits, Capital, Credit, Interest, and the Business cycle. Cambridge, Mass: Harvard University Press.\n[14] Yin, R.K., (2013). Case Study Research: Design and Methods. Sage Press.\n[15] Zadig, Sean M., (2016). Understanding the Impact of Hacker Innovation upon IS Security Countermeasures (Doctoral dissertation, College of Computing and Engineering). Retrieved from https://nsuworks.nova.edu/gscis_etd/976/ (最後查詢日2021年12月30日)\n[16] Zimbardo, Gerrig, R. J., & Ruch, F. L. (1999). Psychology and Life / Philip G. Zimbardo, Richard J. Gerrig. (15th ed.). New York, NY: Longman.\n \n三、中文期刊\n[1] 王士帆 (民108)。當科技偵查駭入語音助理-刑事訴訟準備好了嗎?臺北大學法學論叢第,112,191-242。\n[2] 周信輝、蔡志豪(民102)。網絡組織間關係治理的搭架:行動者網絡理論的動態觀點。臺大管理論叢,23(S1),135-163。\n[3] 林添貴(譯) (2017)。Z世代效應:改變未來企業經營的六股力量(原作者:Koulopoulos, T. & Keldsen, D.)。台北市:時報出版。(原著出版年:2014)\n[4] 施育傑(民109)。科技時代的偵查干預處分-兼論我國法方向。月旦法學雜誌,36,154-174。\n[5] 袁建中、彭弼聲、吳勝銘(民101)。創新與網路結構關係:以次世代微影技術發展與技術前景評估為例。創新管理,9(4),1-35。\n[6] 陳蕙芬 (民104)。柔韌設計:化機構阻力為創新助力。中山管理評論 23(1),13-55。\n[7] 彭玉樹、梁奕忠、于卓民、梁晉嘉(民99)。台灣管理學門質性研究之回顧與展望。中山管理評論,18(1),11-40。; G0102364501; https://nccur.lib.nccu.edu.tw//handle/140.119/138992; https://nccur.lib.nccu.edu.tw/bitstream/140.119/138992/1/450101.pdf
-
4Academic Journal
المؤلفون: 林勤經, Lin, Abe Chin-ching
المساهمون: 曹承礎, 臺灣大學:資訊管理學研究所
وصف الملف: 1124069 bytes; application/pdf
Relation: 參考文獻: 中文部分: [1] 國家資通安全會報技術服務中心(2001) 2001年資通安全報告書,2001年12月,國家資通安全會報。 [2] 樊國楨、方仁威、林明華(2000) ”A Study of Defensive Security Mechanism for Information System,” 網際網路技術學刊(Journal of Internet Technology,JIT),Volume 1,No.1,July 2000, pp.29-38. [(DBLP, Computer Science Journals),ISSN:1607-9264] [3] 賽門鐵克網路安全威脅研究報告,2004 年 3 月, 第 5 期 , http://www.symantec.com.tw/region/tw/enterprise/article/sistr_2.html [4] 趨勢科技網站,認識駭客, http://www.trend.com.tw/gatelock/edu/hacker.asp [5] 趨勢科技網站,病毒教室, http://www.trend.com.tw/endusers/security/primer.htm [6] 賽門鐵克網站,http://www.symantec.com/region/tw/avcenter/vinfo/venc/data /tw-w32.netsky.x@mm.html [7] 賽門鐵克網站,http://www.symantec.com/region/tw/avcenter/vinfo/venc/data /tw-w32.beagle.u@mm.html [8]RPC遠端執行程式碼,CAN-2003-0813,http://www.cve.mitre.org/cgi-bin /cvename.cgi?name=CAN-2003-0813 http://www.securityfocus.com/bid/10039 [9]木馬防禦全攻略,天網安全SKYNET,http://www.skynet.com.tw/8/21.htm [10]「殺手」病毒發威 420個郵局當機,聯合新聞網5月3日新聞, [11] 經濟部技術處 (2004) 2004電子商務應用年鑑(E-Commerce Yearbook 2004),財團法人資訊工業策進會資訊市場情報中心(MIC)出版,民國九十三年五月初版,經濟部技術處發行,ISBN:957-581-30409。 [12]行政院資訊通信發展推動小組(民90年),「建立我國通資訊基礎建設安全機制」,行政院編印,頁1-2。 [13] 張盛益、許美玲等譯(民84年),「電腦安全的威脅與對策」,資訊工業策進會,簡介頁。 [14]林建宏等(民91年),「軍備發展與軍事教育結合之研究」,頁1-4,國防大學國防管理學院。 [15]Ann Majchrzak著,謝棟樑譯(民89年),「政策研究方法論」,弘智文化出版社,頁88-89。 [16]陳膺強(民88年),「應用抽樣調查」,台灣商務印書館,頁43-45。 [17]林惠玲、陳正倉等著(民86),「統計學方法與應用」(上冊),雙葉書廊,頁12。 [18] Bernard H. Boar著,江永祥譯(民84年),「資訊科技的策略計畫」,松崗電腦圖書公司,頁3-65。 [19] 伍啟元(民80年),「公共政策(上)」,台灣商務印書館,頁1-5。 [20] 國防通信電子及資訊季刑第四期,P23~49。 [21] 國防通信電子及資訊季刑第五期,P1~15。 [22] 資訊管理研究,第四卷,第二期 2002年七月,P43~P64。 [23] 國防通信電子及資訊季刑第五期,P102~123。 英文部分: [24] Andrew Ren-Wei Fung, Kwo-Jean Farn, and Abe C. Lin (2003) ”A Study on the Certification of the Information Security Management Systems,” Computer Standards & Interfaces. September 2003, Vol. 25, Issue 5, pp. 447-461. [(SCI,EI), ISSN:0920-5489] [25] F.B. Schneider (1999) Trust in Cyberspace, National Academic Press, New York, U.S.A. [26] The White House (2000) National Plan for Information Systems Protection Version 1.0. [27] The Executive Yuan of Republic of China (R.O.C) (2001) February 5, 2001 (90) MOE Document No.007431. [28] ISO (2001) Information Technology- Guidelines for the Management of IT Security, Parts 1-5, ISO/IEC TR 13335 (All Parts), ISO(International Organization for Standardization). [29] Bruce Schneier (2003) Beyond Fear:Thinking Sensibly About Security in an Uncertain World, Published in the United States by Copernicus Books, an imprint of Springer-Verlag New York, Inc., U.S.A. [30] ISO /IEC(International Electro-technical Commission) (2000) Information Technology- Code of Practice for Information Security Management, ISO/IEC 17799, 2000(E), ISO. [31]eMule Remote Buffer Overflow Vulnerability, Security Focus, 2004/04/03, [32] RegedLt debugger, VirusZone, http://www.viruszone.net/bbs/view.php?id=info_virus_emergency&no=106&keyword=regedlt&sn=off&ss=on&sc=on [33]SoftEther.com(SoftEtherオフィシャルページ),http://internet.watch.impress.co.jp/static/column/sether/2004/02/02/ http://www.udn.com/2004/5/3/NEWS/INFOTECH/INF3/1991590.shtml [34] BSi , Information security management –Part 2: Specification for information security management systems, BS7799-2:1999 , BSi. [35] Christopher M. King, Curtis E. Dalton, & T. Ertem Osmanoglu, 2001, Security Architecture: Design, Deployment & Operations, McGraw-Hill Company. [36] ISO (1997) Banking, Securities and Other Financial Services─Information Security Guidelines, ISO TR 13569:1997(E), ISO。 [37] Communications of the CCISA Vol. 9 No. 3 June 2003; zh-TW; http://ntur.lib.ntu.edu.tw/handle/246246/54272; http://ntur.lib.ntu.edu.tw/bitstream/246246/54272/1/ntu-94-P91747008-1.pdf
-
5
المؤلفون: 詹豐造, FengZao Zhan
المساهمون: 李根芳, KenFang Lee
مصطلحات موضوعية: 駭客任務, 字幕翻譯, 商業電影, 佛學, 新時代, 阿賴耶識, The Matrix, Buddhism, subtitle translation, New Age, commercial film, art, lang
-
6Dissertation/ Thesis
المؤلفون: 邱建嶧
المساهمون: 盧業中
مصطلحات موضوعية: 網路戰, 中央網路安全和信息化委員會, 戰略支援部隊, 軍民融合, 駭客組織, 網路間諜, Cyber Warfare, Central Network Security and Informatization Committee, Strategic Support Force, Military-Civilian Integration, Hacker organization, Cyber Espionage, scipo, hist
Relation: http://nccur.lib.nccu.edu.tw/bitstream/140.119/122805/1/004201.pdf; http://nccur.lib.nccu.edu.tw//handle/140.119/122805
-
7
المساهمون: 資訊工程系, 陳金鈴
مصطلحات موضوعية: 智慧型手機, 無線網路, 駭客, 外掛程式, 天下嘉農, 應用程式, smartphone, wireless network, hacker, bot, KANO, APP
وصف الملف: 6395770 bytes; application/pdf
Relation: http://ir.lib.cyut.edu.tw:8080/handle/310901800/34790; http://ir.lib.cyut.edu.tw:8080/bitstream/310901800/34790/1/31.pdf
-
8
المؤلفون: 林穎佑
مصطلحات موضوعية: 資訊安全, 網軍, 駭客, 國家安全, 資安戰略, Cyber security, Cyber force, Hackers, National security, Cyber security strategy
Relation: 戰略與評估 8(1), p.107-127; 全文連結 https://tpl.ncl.edu.tw/NclService/JournalContentDetail?SysId=A20015706; https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/123035
-
9Dissertation/ Thesis
المؤلفون: 張晉瑄
المساهمون: 資訊工程學系
-
10Dissertation/ Thesis
المؤلفون: 林應穩, Lin, Eng-Wen
المساهمون: 工學院: 工業工程學研究所, 指導教授: 洪一薰, 林應穩, Lin, Eng-Wen
مصطلحات موضوعية: UTM防火牆, 破壞式創新理論, 駭客攻擊, UTM Firewall, disruptive innovation, hacker attacks, envir, eco
Time: 16
Relation: http://ntur.lib.ntu.edu.tw/bitstream/246246/271556/1/ntu-105-P03546009-1.pdf; http://ntur.lib.ntu.edu.tw/handle/246246/271556
-
11
المساهمون: 資訊與通訊系, 彭俊澄, 崔建峰
مصطلحات موضوعية: 駭客, 滲透, sql 注入, 網頁木馬, Hacker, penetration, SQL injection, webshell
وصف الملف: 2512029 bytes; application/pdf
Relation: http://ir.lib.cyut.edu.tw:8080/handle/310901800/31769; http://ir.lib.cyut.edu.tw:8080/bitstream/310901800/31769/1/201507X.pdf
-
12Dissertation/ Thesis
المؤلفون: 林晉源, Lin, Chin-Yuan
المساهمون: 法律學院: 法律學研究所, 指導教授: 黃榮堅, 林晉源, Lin, Chin-Yuan
مصطلحات موضوعية: 駭客, 網路空間, 電腦犯罪, 入侵電腦, 法益, 抽象危險犯, hacker, cyberspace, computer crime, computer intrusion, legal interest, offense of abstract danger, droit
Time: 48
Relation: http://ntur.lib.ntu.edu.tw/bitstream/246246/273276/1/ntu-104-R00a21052-1.pdf; http://ntur.lib.ntu.edu.tw/handle/246246/273276
-
13
المساهمون: 資訊工程系
مصطلحات موضوعية: 線上遊戲, 駭客, 外掛程式, 特洛伊木馬, online game, hacker, bot, Trojan horse
وصف الملف: 1274594 bytes; application/pdf
Relation: 資訊科技國際期刊 9(2), p.58-66; International Journal of Advanced Information Technologies 9(2), p.58-66; http://ir.lib.cyut.edu.tw:8080/handle/310901800/26377; http://ir.lib.cyut.edu.tw:8080/bitstream/310901800/26377/1/IJAIT 9(2)_07.pdf
-
14
المساهمون: 資訊工程系, 陳金鈴
وصف الملف: 3000044 bytes; application/pdf
Relation: http://ir.lib.cyut.edu.tw:8080/handle/310901800/23203; http://ir.lib.cyut.edu.tw:8080/bitstream/310901800/23203/1/015.pdf
-
15Dissertation/ Thesis
المؤلفون: 范慈慧, Tzu-Hui Fan
المساهمون: 孫培真, 何淑君, Pei-Chen Sun, Shu-Chun Ho
مصطلحات موضوعية: 駭客動機, 懲罰必然性, 懲罰嚴重性, 道德強度, 資訊法律, 資訊倫理, 同儕影響, Hacker Motivation, Punishment Certainty, Punishment Severity, Moral Intensity, Information Law, Information Ethics, Peer Influence, info, socio
-
16Dissertation/ Thesis
المساهمون: 孫式文, Sun, Se Wen
مصطلحات موضوعية: 駭客, 創客空間, 社群, 科技, 開放原始碼, 學習方法, 教育, 多元文化, 跨文化溝通, 紮根理論, 社會程序, 台灣, hacker, hackerspace, community, technology, open source, learning, education, multicultural, intercultural communication, grounded theory, social processes, Taiwan
وصف الملف: 11417992 bytes; application/pdf
Relation: Aldiabat, K., & Le Navenec, C.-L. (2011). Clarification of the Blurred Boundaries between Grounded Theory and Ethnography: Differences and Similarities. Turkish Online Journal of Qualitative Inquiry, 2. \nAltman, M. (2011). Oral histories. Noisebridge.net. Retrieved December 21, 2013, from https://http://www.noisebridge.net/wiki/Oral_histories\nAltman, M. (2012). Hacking at the crossroad: US military funding of hackerspaces. Journal of Peer Production, 1(2). \nAlvesson, M., & Sköldberg, K. (2009). Reflexive methodology: New vistas for qualitative research: Sage.\nAnderson, B. (1991). Imagined communities: Reflections on the origin and spread of nationalism: Verso.\nAppadurai, A. (1996). Modernity at large: Cultural dimensions of globalization: U of Minnesota Press.\nArduino. (2013). Arduino.cc. Retrieved March 2, 2013, from http://arduino.cc/\nBecker, H. S., & Geer, B. (1957). Participant observation and interviewing: A comparison. Human Organization, 16(3), 28-32. \nBenkler, Y. (2002). Coase`s Penguin, or, Linux and "The Nature of the Firm". Yale Law Journal, 369-446. \nBenkler, Y., & Nissenbaum, H. (2006). Commons-based peer production and virtue. Journal of Political Philosophy, 14(4), 394-419. \nBennet, D. (2010). Proceedings from the "Innovation, Education and the Maker Movement" Workshop: New York Hall of Science.\nBhaskar, R. (1975/2008). A realist theory of science: Routledge.\nBirks, M., & Mills, J. (2011). Grounded theory: A practical guide: Sage Publications.\nBlackshaw, T. (2009). Key concepts in community studies: SAGE Publications.\nBlumer, H. (1954). What is wrong with social theory? American Sociological Review, 3-10. \nBlumer, H. (1980). Mead and Blumer: The convergent methodological perspectives of social behaviorism and symbolic interactionism. American Sociological Review, 409-419. \nBlumer, H. (1986). Symbolic interactionism: Perspective and method: University of California Press.\nBourdieu, P. (1977). Outline of a theory of practice. Cambridge, England: Cambridge University Press.\nBourdieu, P. (1998). Practical reason: On the theory of action: Stanford University Press.\nBowen, G. A. (2006). Grounded theory and sensitizing concepts. International journal of qualitative methods, 5(3). \nBowyer, A. (2011, December 5, 2012). RepRap and Open Source. Reprap.org. Retrieved Spetember 8, 2013, from http://reprap.org/wiki/Neutering_a_RepRap\nBrown III, W., Yen, P.-Y., Rojas, M., & Schnall, R. (2013). Assessment of the Health IT Usability Evaluation Model (Health-ITUEM) for evaluating mobile health (mHealth) technology. Journal of Biomedical Informatics, 46(6), 1080-1087. doi: http://dx.doi.org/10.1016/j.jbi.2013.08.001\nBrugh, W. (2012). DARPA funding for hackers, hackerspaces, and education: A good thing? Hackers on Planet Earth Number 9: Hackers on Planet Earth.\nBuechley, L., & Hill, B. M. . (2010). LilyPad in the wild: how hardware`s long tail is supporting new engineering and design communities. Paper presented at the 8th ACM Conference on Designing Interactive Systems, Aarhus, Denmark. \nCallon, M. (1999). Some elements of a sociology of translation. In M. Biagioli (Ed.), The science studies reader (pp. 67): Psychology Press.\nCallon, M., Law, J., & Rip, A. (1986). Mapping the dynamics of science and technology: Springer.\nCarlton, A., & Cooper, C. (2011). The DIY trunk show craftifesto: The power is in your hands! DIYtrunkshow.com. Retrieved May 23, 2013, from http://diytrunkshow.com/about/\nCavalcanti, G. (2013). Is it a hackerspace, makerspace, TechShop, or FabLab? Make Magazine. Retrieved September 10, 2013, from http://makezine.com/2013/05/22/the-difference-between-hackerspaces-makerspaces-techshops-and-fablabs/\nCERN. (2013). CERN OHL Version 1.2. CERN. Retrieved November 4, 2013, from http://www.ohwr.org/documents/294\nCharmaz, K. (2006). Constructing grounded theory: A practical guide through qualitative analysis: Pine Forge Press.\nChen, K. K. (2009). Enabling creative chaos: The organization behind the Burning Man event: University of Chicago Press.\nColeman, G. (2012). Coding freedom: The ethics and aesthetics of hacking: Princeton University Press.\nCorbin, J., & Strauss, A. (2008). Basics of qualitative research: Techniques and procedures for developing grounded theory: Sage.\nCoyne, I. T. (1997). Sampling in qualitative research: Purposeful and theoretical sampling; merging or clear boundaries? Journal of Advanced Nursing, 26(3), 623-630. \nCreswell, J. W. (1998). Qualitative inquiry and research design: Choosing among five traditions: Sage Publications.\nCreswell, J. W., & Miller, D. L. (2000). Determining validity in qualitative inquiry. Theory into Practice, 39(3), 124-130. \nCsikszentmihalyi, M. (1996). Creativity: Flow and the Psychology of Discovery and Invention: HarperCollins Publishers.\nCzarniawska, B. (2004). On time, space, and action nets. Organization, 11(6), 773-791. \nCzarniawska, B. (2009). Emerging institutions: pyramids or anthills? Organization Studies, 30(4), 423-441. \nDeLanda, M. (2001). The politics of software. Dissent, 48(4), 96-99. \nDeLanda, M. (2006). A new philosophy of society: Assemblage theory and social complexity: Continuum.\nDeleuze, G., & Guattari, P. F. (1987). A thousand plateaus: Capitalism and schizophrenia: University of Minnesota Press.\nDesign Patterns. (n.d.). Hackerspaces.org. Retrieved May 30, 2013, from http://hackerspaces.org/wiki/Design_Patterns\nDey, I. (1993). Qualitative data analysis: A user friendly guide for social scientists: Routledge.\nDissanayake, E. (1995). The Pleasure and meaning of making. American Craft, 55(2), 6. \nDo-ocracy. (2013). Noisebridge.net. Retrieved July 21, 2014, from https://http://www.noisebridge.net/wiki/Do-ocracy\nDoctorow, C. (2006). Printcrime. Nature, 439(7073), 242-242. \nDojo Startups. (n.d.). Hacker Dojo., 2013, from http://www.hackerdojo.com/InvestinStartups\nDougherty, D. (2012). DARPA Mentor award to bring making to education. Retrieved from http://makezine.com/2012/01/19/darpa-mentor-award-to-bring-making-to-education/\nDunbar-Hester, C. (2012). Soldering toward media democracy: Technical practice as symbolic value in radio activism. Journal of Communication Inquiry, 36(2), 149-169. \nFab Lab FAQ. (2013). MIT Center for Bits and Atoms. Retrieved August 15, 2013, from http://fab.cba.mit.edu/about/faq/\nFarr, N. (2009). Respect the past, examine the present, build the future. Hackerspaces.org. Retrieved April 24, 2013, from http://blog.hackerspaces.org/2009/08/25/Respect-the-Past-Examine-the-Present-Build-the-Future/\nFlorida, R. (2003). Cities and the creative class. City & Community, 2(1), 3-19. \nFoundation, A. S. (2012). How the ASF works: project management and collaboration. Apache Software Foundation. Retrieved July 20, 2014, from http://apache.org/foundation/how-it-works.html - decision-making\nGans, H. J. (1999). Participant observation in the era of “ethnography”. Journal of contemporary ethnography, 28(5), 540-548. \nGasson, S. (2004). Rigor in grounded theory research The handbook of information systems research (pp. 79-102).\nGauntlett, D. (2011). Making is connecting: The social meaning of creativity, from DIY and knitting to YouTube and Web 2.0 (1st ed.). Cambridge, UK: Polity Press.\nGiddens, A. (1979). Central problems in social theory: Action, structure and contradictions in social analysis: University of California Press.\nGoe, W. R., & Noonan, S. (2007). The sociology of community. In C. D. Bryant & D. L. Peck (Eds.), 21st Century Sociology (pp. 10). Thousand Oaks, CA: SAGE Publications, Inc.\nGreer, B. (2011). What is craftivism, anyway? Retrieved May 23, 2013, from http://craftivism.com/what.html\nGrenzfurthner, J., & Schneider, F. A. (2009). Hacking the spaces. monochrom.at. Retrieved from http://www.monochrom.at/hacking-the-spaces/\nGroth, A. (2013). Zappos is going holacratic: no job titles, no managers, no hierarchy. Quartz. Retrieved from http://qz.com/161210/zappos-is-going-holacratic-no-job-titles-no-managers-no-hierarchy/\nGuba, E. G., & Lincoln, Y. S. (1994). Competing paradigms in qualitative research. Handbook of qualitative research, 2, 163-194. \nThe "hacker ethic". (2007). Interesting hacks to fascinate people: The MIT gallery of hacks. Retrieved May 20, 2013, from http://hacks.mit.edu/Hacks/misc/ethics.html\nHackerethik. (n.d.). Chaos Computer Club. Retrieved September 25, 2013, from http://ccc.de/en/hackerethik\n Hackerspaces: the beginning. (2011). B. Pettis, A. Schneeweisz & J. Ohlig (Eds.), Retrieved from http://blog.hackerspaces.org/2011/08/31/hackerspaces-the-beginning-the-book/ \nHackerspaces.org. (2013). Hackerspaces.org Retrieved February 27, 2013, from http://hackerspaces.org/wiki/\nHacks on the Great Dome (Bldg. 10). (n.d.). Interesting Hacks To Fascinate People: The MIT Gallery of Hacks. Retrieved November 4, 2013, from http://hacks.mit.edu/Hacks/by_location/great_dome.html\nHall, W. A., & Callery, P. (2001). Enhancing the rigor of grounded theory: Incorporating reflexivity and relationality. Qualitative Health Research, 11(2), 257-272. \nHarry, B., Sturges, K. M., & Klingner, J. K. (2005). Mapping the process: An exemplar of process and challenge in grounded theory analysis. Educational Researcher, 34(2), 3-13. \nHeath, H., & Cowley, S. (2004). Developing a grounded theory approach: A comparison of Glaser and Strauss. International journal of nursing studies, 41(2), 141-150. \nHemmi, A., & Graham, I. (2013). Hacker science versus closed science: Building environmental monitoring infrastructure. Information, Communication & Society(ahead-of-print), 1-13. \nHernes, T. (2007). Understanding organization as process: Theory for a tangled world: Routledge.\nHertz, G. (2011). Arduino microcontrollers and the Queen`s Hamlet: Utilitarian and hedonized DIY practices in contemporary electronic culture. Paper presented at the Integration through Computation: Proceedings of the 31st Annual Conference of the Association for Computer Aided Design in Architecture (ACADIA), Calgary/Banff, Canada.\nHodder, I. (2003). The interpretation of documents and material culture. Collecting and interpreting qualitative materials, 2, 155-175. \nHoeken, Z. (2009). MakerBot industries full speed ahead! Retrieved from http://www.nycresistor.com/2009/03/16/makerbot-industries-full-speed-ahead/\nHofstede, G. H. (2001). Culture`s Consequences: Comparing Values, Behaviors, Institutions and Organizations Across Nations: SAGE Publications.\nHomo faber. (2012). In M. Morris (Ed.), Concise dictionary of social and cultural anthropology (pp. 121): John Wiley & Sons.\nHomo faber. (2013). In Merriam-Webster.com. Retrieved March 11, 2013, from http://www.merriam-webster.com/dictionary/homo faber\nKalish, J. (2011, December 10, 2011). Libraries make room for `high-tech` hackerspaces. NPR. Retrieved September 25, 2013, from http://www.npr.org/2011/12/10/143401182/libraries-make-room-for-high-tech-hackerspaces\nKellogg, S. (2012). The Rise of DIY Scientists: Is It Time for Regulation? Washington Lawyer, 26.\nKera, D. (2011a). Entrepreneurs, squatters and low-tech artisans: DIYbio and hackerspace models. Paper presented at the The 17th International Symposium on Electronic Art, Istanbul, Turkey. http://isea2011.sabanciuniv.edu/paper/entrepreneurs-squatters-and-low-tech-artisans-diybio-and-hackerspace-models-citizen-science-be\nKera, D. (2011b). Grassroots R&D, prototype cultures and DIY innovation: Global flows of data, kits and protocols. In A. Ferscha (Ed.), Pervasive adaptation: the next generation pervasive computing research agenda: Inst. for Pervasive Computing, Johannes Kepler Univ.\nKera, D. (2012). Hackerspaces and DIYbio in Asia: Connecting science and community with open data, kits and protocols. Journal of Peer Production, 1(2). \nKoerber, A., & McMichael, L. (2008). Qualitative sampling methods: A primer for technical communicators. Journal of Business and Technical Communication, 22(4), 454-473. \nKoestler, A. (1967). The ghost in the machine: Macmillan.\nKolb, S. (2012). Grounded theory and the constant comparative method: Valid research strategies for educators. Journal of Emerging Trends in Educational Research and Policy Studies, 3(1), 83-86. \nKostakis, V., Niaros, V., & Giotitsas, C. (2014). Production and governance in hackerspaces: A manifestation of commons-based peer production in the physical realm? International Journal of Cultural Studies, 1367877913519310. \nKozminsky, L., Nathan, N., & Kozminsky, E. (2008). Using concept mapping to construct new knowledge while analyzing research data: The case of the grounded theory method. Paper presented at the Concept mapping: Connecting educators: Proceedings of the Third International Conference on Concept Mapping.\nKripe, Z. (2011, Autumn/Winter). The Making of Southeast Asian Silicon Valleys. The Newsletter (International Institute of Asian Studies), 2.\nKuznetsov, S., & Paulos, E. (2010). Rise of the expert amateur: DIY projects, communities, and cultures. Paper presented at the 6th Nordic Conference on Human-Computer Interaction, Reykjavik, Iceland. http://www.yourhost.is/en/nordichi-2010/conference-programme-wednesday.html\nLatour, B. (1987). Science in action: How to follow scientists and engineers through society: Harvard University Press.\nLatour, B. (1996). On actor-network theory: A few clarifications. Soziale Welt, 369-381. \nLatour, B. (2005). Reassembling the social: An introduction to actor-network-theory: Oxford University Press.\nLave, J., & Wenger, E. (1991). Situated learning: Legitimate peripheral participation: Cambridge University Press.\nLee, F. (2012). Critical realism, grounded theory, and theory construction in heterodox economics. Munich Personal RePEc Archive(MPRA Paper No. 40341). \nLessig, L. (2002). Introduction. Free software, free society: selected essays of Richard M. Stallman (pp. 9-11). Boston, MA: Free Software Foundation.\nLevy, S. (2010). Hackers: Heroes of the computer revolution. Sebastopol, CA: O`Reilly Media.\nLewins, A., & Silver, C. (2006). Choosing a CAQDAS package: A working paper. Surrey, UK: Surrey University Computer Assisted Qualitative Data Analysis Networking Project. \nLichstein, H. (1963, November 20). Telephone hackers active, The Tech. \nLifehacker. (2013). Lifehacker.com. Retrieved May 30, 2013\nLindlof, T. R., & Taylor, B. C. (2011). Qualitative communication research methods (3rd ed.): SAGE Publications.\nLindtner, S. (2013). Making subjectivities: How China`s DIY makers remake industrial production, innovation & the self. Paper presented at the Eleventh Chinese Internet Research Conference (CIRC11), Oxford Internet Institute, University of Oxford.\nLindtner, S., & Li, D. (2012). Created in China: The makings of China`s hackerspace community. Interactions, 19(6), 18-22. \nMaillioux, T. (2011). What happens when you turn a middle school library into a hackerspace? Retrieved from http://blog.ponoko.com/2011/11/10/what-happens-when-you-turn-a-middle-school-library-into-a-hackerspace/\nThe MakerBot/Thingiverse move to the Dark Side (Updated). (2012). Retrieved from http://blog.hackerspaces.org/2012/09/23/the-makerbotthingiverse-move-to-the-dark-side/\nMarion Suiseeya, K. R., & Caplow, S. (2013). In pursuit of procedural justice: Lessons from an analysis of 56 forest carbon project designs. Global Environmental Change, 23(5), 968-979. \nMarshall, C., & Rossman, G. B. (1999). Designing qualitative research (3rd ed.): Sage Publications.\nMaxigas. (2012). Hacklabs and hackerspaces: Tracing two genealogies. Journal of Peer Production, 1(2). \nMaxwell, J. A. (2009). Designing a qualitative study. In L. Bickman & D. J. Rog (Eds.), The Sage handbook of applied social research methods: SAGE Publications.\nMaxwell, J. A. (2012). A realist approach for qualitative research: SAGE Publications.\nMcLennan, J. F. (2011, Fall). Local economies for a global future. Trim Tab, 1, 24-35.\nMiles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook: SAGE Publications.\nMills, J., Bonner, A., & Francis, K. (2008). The development of constructivist grounded theory. International journal of qualitative methods, 5(1), 25-35. \nMoilanen, J. (2012). Emerging hackerspaces: Peer-production generation. In I. Hammouda, et al. (Ed.), Open Source Systems: Long-Term Sustainability (pp. 94-111): Springer.\nMulvenna, M. (Producer). (2013, December 31). Pop-up Living Labs: Experiments in Co-creating Service Design with Diverse Stakeholders in Hackerspace Communities. Retrieved from http://www.slideshare.net/mauricemulvenna/popup-living-labs-experiments-in-cocreating-service-design-with-diverse-stakeholders-in-hackerspace-communities\nNg, W.-Y. (2006). Rational sharing and its limits. First Monday, 11(6). \nNoisebridge vision. (2014). Noisebridge.net. Retrieved June 20, 2014, from https://http://www.noisebridge.net/wiki/Noisebridge_Vision\nNYCResistor. (2013). NYCResistor.com. Retrieved January 30, 2013, from http://www.nycresistor.com/\nO`Hara, K., Alani, H., & Shadbolt, N. (2003). Identifying communities of practice: Analysing ontologies as networks to support community recognition. Advanced Knowledge Technologies: Selected Papers, 12. Retrieved from http://www.aktors.org\nO`Leary, A. (2012, October 5). Worries over defense department money for ‘hackerspaces’, The New York Times. Retrieved from http://www.nytimes.com/2012/10/06/us/worries-over-defense-dept-money-for-hackerspaces.html\nO`Reilly, T. (2006). The legacy of the Whole Earth Catalog. Retrieved from http://radar.oreilly.com/2006/10/the-legacy-of-the-whole-earth.html\nO`Toole, P., & Were, P. (2008). Observing places: using space and material culture in qualitative research. Qualitative research, 8(5), 616-634. \nOhlig, J., & Weiler, L. (2007). Building a hacker space. Paper presented at the 24th Chaos Communication Congress, Berlin, Germany. http://events.ccc.de/congress/2007/Welcome%21/index.html\nOldenburg, R. (1998). The great good place: Cafés, coffee shops, bookstores, bars, hair Salons, and other hangouts at the heart of a community: Marlowe.\nOliver, C. (2012). Critical realist grounded theory: A new approach for social work research. British Journal of Social Work, 42(2), 371-387. \nOpen Source License Data. (2013). Black Duck Software. Retrieved February 18, 2013, from http://osrc.blackducksoftware.com/data/licenses/index.php\nOSHW. (2012). Open source hardware definition. OSHW. Retrieved January 29, 2013, from http://freedomdefined.org/OSHW\nPatton, M. Q. (1999). Enhancing the quality and credibility of qualitative analysis. Health services research, 34(5 Pt 2), 1189. \nPettigrew, S. F. (2000). Ethnography and grounded theory: A happy marriage? Advances in Consumer Research, 27, 256-260. \nPettis, B. (2007). Hackers on a Plane - Defcon. Retrieved from http://www.brepettis.com/blog/2007/8/8/hackers-on-a-plane-defcon.html\nPettis, B. (2012). Fixing Misinformation with Information. Retrieved from http://www.makerbot.com/blog/2012/09/20/fixing-misinformation-with-information/\nPowell, A. (2012). Democratizing production through open source knowledge: From open software to open hardware. Media, Culture & Society, 34(6), 691-708. doi:10.1177/0163443712449497\nPS: One is now a do-ocracy. (2009). Pumping Station: One. Retrieved July 20, 2014, from http://pumpingstationone.org/2009/10/psone-is-now-a-do-ocracy/\nPuddephatt, A. J., & Charmaz, K. C. (2006). An interview with Kathy Charmaz: On constructing grounded theory. Qualitative sociology review, 2(3). \nRatto, M. (2011). Critical Making: conceptual and material studies in technology and social life. The Information Society, 27(4), 252-260. \nRich, N. (2010). The American Wikileaks hacker. Rolling Stone. Retrieved from http://www.rollingstone.com/culture/news/meet-the-american-hacker-behind-wikileaks-20101201\nRobson, G. (2004). The origins of phreaking. Blacklisted! 411, 6.\nRuf, C., & Back, A. (2013). Adoption of online videos in organizations: A multi-case comparison. Paper presented at the 26th Bled eConference: eInnovations:\nChallenges and Impacts for Individuals, Organizations and Society, Bled, Slovenia. \nSchwandt, T. A. (2000). Three epistemological stances for qualitative inquiry. Handbook of qualitative research (Vol. 2, pp. 189-213).\nSöderberg, J. (2011). Free space optics in the Czech wireless community: Shedding some light on the role of normativity for user-initiated innovations. Science, Technology & Human Values, 36(4), 423-450. \nSöderberg, J., & Daoud, A. (2012). Atoms want to be free too! Expanding the critique of intellectual property to physical goods. tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society, 10(1), 66-76. \nStallman, R. M. (2002a). Free software, free society: Selected essays of Richard M. Stallman. Boston, MA: Free Software Foundation.\nStallman, R. M. (2002b). On hacking. Retrieved from http://stallman.org/articles/on-hacking.html\nStar, S. L., & Griesemer, J. R. (1989). Institutional ecology, translations, and boundary objects: Amateurs and professionals in Berkeley`s Museum of Vertebrate Zoology, 1907-39. Social Studies of Science, 19(3), 387-420. \nStorey, A. (2012). SAFECAST. Focus Forward Films: Focus Forward Films.\nStrauss, A., & Corbin, J. (1990). Basics of qualitative research (Vol. 15): Sage publications Newbury Park, CA.\nStrauss, A., & Corbin, J. (1994). Grounded theory methodology. Handbook of qualitative research, 273-285. \nStrauss, A., & Corbin, J. (1998). Basics of qualitative research: Techniques and procedures for developing grounded theory. SAGE Publications, Thousand Oaks, USA. \nSun, C. (2014, February 9). Entrepreneur is a mover and maker: Justin Wang Shenglin, South China Morning Post. Retrieved from http://www.scmp.com/news/china/article/1424291/entrepreneur-mover-and-maker-justin-wang-shenglin\nTaylor, C. (2004). Modern social imaginaries: Duke University Press.\nTuomi, I. (2001). Internet, innovation, and open source: Actors in the network. First Monday, 6(1). \nTweney, D. (2009). DIY freaks flock to hackerspaces worldwide. Wired Magazine. Retrieved from http://www.wired.com/gadgetlab/2009/03/hackerspaces/\nUrquhart, C. (2001). An encounter with grounded theory: Tackling the practical and philosophical issues Qualitative research in IS: Issues and trends (pp. 104-140): Idea Group Publishing.\nVerhoeven, I., Metze, T., & van de Wijdeven, T. (2014). Do-ocracy’s democratic anchorage. Paper presented at the 42nd ECPR Joint Sessions, Universidad de Salamanca, Spain. \nWalker, D., & Myrick, F. (2006). Grounded theory: An exploration of process and procedure. Qualitative Health Research, 16(4), 547-559. \nWallerstein, I. (2004). World-systems analysis: An introduction: Duke University Press.\nWang, T., & Kaye, J. (2011). Inventive leisure practices: Understanding hacking communities as sites of sharing and innovation. Paper presented at the CHI 2011, Vancouver, BC, Canada. http://chi2011.org/program/byAuthor.html\nWeitzman, E. A. (2000). Software and qualitative research. Handbook of qualitative research, 2, 803-820. \nWellman, B., Boase, J., & Chen, W. (2002). The networked nature of community: Online and offline. It & Society, 1(1), 151-165. \nWenger, E. (1998). Communities of practice: Learning, meaning, and identity: Cambridge University Press.\nWenger, E. (2000). Communities of practice and social learning systems. Organization, 7(2), 225-246. \nWenger, E. (2010). Communities of practice and social learning systems: The career of a concept. Social learning systems and communities of practice (pp. 179-198): Springer.\nWilliams, A., Gibb, A., & Weekly, D. (2012, March/April). Research with a hacker ethos: What DIY means for tangible interaction research. Interactions, 19, 14-19.\nWittgenstein, L. (1965). The blue and brown books: HarperCollins.\nYagoda, B. (2014, March 7). A Short History of "Hack". The New Yorker.; G0984610212; https://nccur.lib.nccu.edu.tw//handle/140.119/70302; https://nccur.lib.nccu.edu.tw/bitstream/140.119/70302/1/021201.pdf
-
17Dissertation/ Thesis
المؤلفون: 洪立仁, Hung, Li-jen
المساهمون: 建築與景觀學系環境藝術碩士班, 陳正哲, 歐崇敬, Cheng-che Chen, Chung-ching Ou
Relation: http://nhuir.nhu.edu.tw/handle/987654321/17522; http://nhuir.nhu.edu.tw/bitstream/987654321/17522/-1/index.html; http://nhuir.nhu.edu.tw/bitstream/987654321/17522/-1/101NHU05356020-001.pdf
-
18Dissertation/ Thesis
المؤلفون: 蔡勝東, Tsai, Sheng-Tung
المساهمون: 建築與景觀學系環境藝術碩士班, 陳正哲, 歐崇敬, Cheng-Che Chen, Chung-Ching Ou
مصطلحات موضوعية: 監控, 真人實境, 駭客任務, 楚門的世界, 環境變異, Immortal, The Matrix, The Truman Show, Control, Environment
Relation: http://nhuir.nhu.edu.tw/handle/987654321/17029; http://nhuir.nhu.edu.tw/bitstream/987654321/17029/-1/index.html; http://nhuir.nhu.edu.tw/bitstream/987654321/17029/-1/102NHU00356003-001.pdf
-
19Dissertation/ Thesis
المؤلفون: 王清安, Wang, Ching An
المساهمون: 李登科
مصطلحات موضوعية: 中共網軍, 網路戰, 不對稱作戰, 國家安全, 駭客, 病毒, PLA cyber forces, cyber warfare, asymmetric warfare, national security, hackers, viruses
وصف الملف: 3908325 bytes; application/pdf
Relation: 一、中文部份\n(一)官方出版品 \n立法院,《我國如何因應網軍與駭客攻擊並強化資訊安全措施》,《立法院公報》,第102卷第29期。\n行政院研究發展考核委員會,《中共發展「信息戰」及對我國建立資訊安全制度影響之研究》,台北:五南文化出版,2002年。\n行政院研究發展考核委員會,《整合資通安全機制以強化國土安全之研究》,台北:五南文化出版,2005年。\n行政院科技顧問組,《2010年資安政策白皮書》,(台北:五南文化出版),2010年。\n國防部,中華民國102年《四年期國防總檢討》(Quadrennial Defense Review),台北:五南文化出版,2013年。\n國防部,中華民國93年《國防報告書》,台北:五南文化出版,2004年。\n國防部,中華民國102年《國防報告書》,台北:五南文化出版,2013年。\n (二)專書\n丁志宏,《陸軍數字化部隊建設研究》,北京:國防大學出版社,2003年。\n王正德,《決勝賽柏空間-網路軍事技術及其運用》,北京:軍事科學出版社,2003年。\n王保存,《外國軍隊信息化建設的理論與實踐》北京:解放軍出版社,2008年。\n田文輝主編,《韜略談兵-現代戰爭及安全情勢新思維》,台北:青年日報社,2007年。\n江澤民,《江澤民文選一第3卷》,北京:人民出版社,2006年。\n李健、嚴美譯,Larry K.wentz、Charles L.Barry、Stuart H. Star,《網路戰美軍稱霸世界的第五戰場》(Military Perspectives on Cyberpower),香港:新點出版公司,2010年。\n李曉、陳乘風、郭鑄文,《鍵與屏的博殺-網路戰掃描》,湖北:科學技術出版社,2003年。\n沈偉光主編,《中國信息戰:知名學者聚焦信息戰權威專家解讀信息化》,北京:新華出版社,2005年。\n沈偉光主編,《信息邊彊-無影無形的第五邊彊》,北京:新華出版社,2003年。\n沈偉光主編,《電子軍務-敲開未來戰爭之門》北京:新華出版社,2003年。\n沈偉光、解璋、馬亞西,《信息化軍隊-未來戰爭的主角》,北京:新華出版社,2003年。\n吳漢平主編,Edward Walts,《信息戰原理與實戰》(Information Warfare: Principles and Operations),北京:電子工業出版社,2004年。\n周宏仁主編、徐愈副主編,《中國信息化形勢分析與預測》,北京:社會科會文獻出版社,2010年。\n林宗達,《中共軍事革新之信息戰與太空戰》,台北:全球防衛雜誌社,2002年。\n東鳥,《中國輸不起的網路戰爭》,北京:中南出版傳媒集團,2010年。\n東鳥,《網路戰爭:互聯網改變世界簡史》,北京:九洲出版社,2009年。\n馬亞西、成冀、王漢水,《網路戰-地球村時代的戰爭》,北京:國防出版社,1999年。\n國防部史政編譯局譯,《2010美國四年期國防總檢討報告》(Quadrennial Defense Report,QDR),台北:國防部史政編譯局,2010年。\n國防部史政編譯局譯,毛文杰(James C.Mulvenon)、譚睦瑞(Murray Scot Tanner)、蔡斯(Michael S. Chase)、傅里林格(David Frelinger)、龔培德(David C.Gompert)、李比奇(Martin C.Libicki)、包克文(Kevin L. Pollpeter),《中共對美國軍事變革之反應》(Chinese Responses to U.S.Military Transformation and Implications for the Department of Defense),台北:國防部史政編譯局,2010年。\n國防部史政編譯局譯,《中共崛起構成的挑戰-亞洲觀點》(Asian Perspec -tives on the Challenges of China),台北:國防部史政編譯局,2001年。\n國防部史政編譯局譯,史利芙爾(Frank J.Cilluffo),《網路威脅與資訊安全》(Cyber Threats and Information Security),台北:國防部史政編譯局,2002年。\n國防部史政編譯局譯,布里特(Thomas W.Britt)、安德魯(Carl Andrew Castro)、艾德樂(Army B.Adler)《軍事成效》(Military Performance),台北:國防部史政編譯局,2009年。\n國防部史政編譯局譯,甘浩森(Roy Kamphausen),施道安(Andrew Scobell)著,《解讀共軍兵力規模》(Right-Sizing the people’Sliberation Army),台北:國防部史政編譯局,2010年。\n國防部史政編譯局譯,多伊爾(Michase W. Doyle),《第一擊-國際衝突的先制與預防》(Striking First-Preemption and Prevention in International comflict),台北:國防部史政編譯局,2011年。\n國防部史政編譯局譯,艾利諾.史龍(Elinor Sloan),《軍事轉型與當代戰爭》(Military Transformation And Modern Warfare),台北:國防部史政編譯局,2010年。\n國防部史政編譯局譯,佛蘭納根(Stephen J Flanagan)、馬提(Michael E. Marti),《人民解放軍與變動的中國》(The peple’s Liberation Army and China in transition),台北:國防部史政編譯局,2005年。\n國防部史政編譯局譯,克里夫(Roger Cliff),《中共商用科技的軍事潛力》(The Military Potential of China’s Commercial Technology),台北:國防部史政編譯局,2001年。\n國防部史政編譯局譯,辛巴拉(Stephen J.Cimbala),《美國國家安全》(U.S.National Security),台北:國防部史政編譯局,2005年。\n國防部史政編譯局譯,阿里斯德(Leigh Armistead),國防部史政編譯局譯,《資訊作戰》(Information Operation Matters),台北:國防部史政編譯室,2012年。\n國防部史政編譯局譯,阿里斯德(Leigh Armistead),國防部史政編譯局譯,《資訊作戰-以柔克剛的戰爭》(Information Operations Warfare and the Hard Reality of Soft Power),台北:國防部史政編譯室,2008年。\n國防部史政編譯局譯,阿瑞(Guy Ben-Ari)、趙(Pierre A.Chao),《因應複雜的世界-發展明日國防與網狀化系統》(Organizing for a Complex World –Developing Tomorrow’s Defense and Net-Centric systems),台北:國防部史政編譯局,2010年。\n國防部史政編譯局譯,哈特(Gary Hart),《第四種國力-美國廿一世紀的大戰略》(The Fourth Power-A Grand Strategy for the United States in the twenty-first Century),台北:國防部史政編譯局,2008年。\n國防部史政編譯局譯,奎斯特(George H.Quester),《國際體系的攻擊與防禦》(Offense and Defense in the International System),台北:國防部史政編譯局,2004年。\n國防部史政編譯局譯,科普蘭(Thomas E.Copeland),《資訊革命與國家安全》(Information Revolution and Natonal Security),台北:國防部史政編譯局,2001年。\n國防部史政編譯局譯,約翰.阿爾吉拉(John Arquila)、大衛.朗斐德(David Ronfeldt),《網路及網路戰》(Networks and Netars:The Future of Terror,Crime,And Militancy),台北:國防部史政編譯局,2003年。\n國防部史政編譯局譯,麥艾文(Evan S Medeiros),《中共的國際行為》(China’s International Behavior),台北:國防部史政編譯局,2011年。\n國防部史政編譯局譯,費根保 (Evan A. Feigenbaum),《中共科技先驅:從核子時代到資訊時代的國家安全與戰略競爭》(China’s Techno-warriors National Security and Strategic Competition from the Nuclear to the Information age),台北:國防部史政編譯局,2006年。\n國防部史政編譯局譯,費學禮 (Richard D. Fisher Jr.),《中共軍事發展-區域與全球勢力佈局》(China’s Military Modernization- Building for Regional and Global Reach),台北:國防部史政編譯局,2011年。\n國防部史政編譯局譯,賈斯伯 (Scott Jasper),《國防能力轉型-國防安全新策略》(Transforming Defense Capabilities),台北:國防部史政編譯局,2012年。\n國防部史政編譯局譯,盧福偉(Bernard Loo),《軍事轉型與戰略》(Military Transformation and Strategy),台北:國防部史政編譯局,2011年。\n國防部史政編譯局譯,韓力(Eric L.Haney)、湯姆生(Brian M.Thomsen)《論21世紀戰爭超越震撼與威懾》(Beyond Shock and Awe: Warfare in the 21st Century),台北:國防部史政編譯局,2010年。\n崔國平主編,《國防信息安全戰略》,北京:金城出版社,2000年。\n張春江、倪健民主編,《國家信息安全報告》,北京:人民出版社,2000年。\n張軍主編,《IT戰爭》,北京:科學出版社,2000年。\n張蜀平、禚法寶、王祖文,《直面信息化戰爭》,北京:國防工業出版社,2007年。\n張黎,《構建信息化軍隊的組織體制》,北京:解放軍出版社,2004年。\n曹正榮、吳潤波、孫建軍,《信息化聯合作戰》,北京:解放軍出版社,2006年。\n曹峻、楊慧、楊麗娟,《全球化與中國國家安全》北京:社會科學文獻出版社,2008年。\n曹雄源,《美國國防暨軍事戰略》,桃園:國防大學,2008年。\n曹雄源,《戰略透視:冷戰後美國層級戰略體系》,台北:五南圖書出版社,2013年。\n曹雄源,《戰略解碼:美國國家安全戰略的佈局》,台北:五南出版社,2013年。\n曹雄源、廖舜石譯,《布希政府時期國家安全戰略》(The National Security Strategy of The United States of America,2002、2006),桃園:國防大學,2008年。\n曹雄源、廖舜石譯,《全球戰略觀察》,桃園:國防大學戰略研究所,2008年。\n曹雄源、廖舜石譯,《柯林頓政府時期:全球時代的國家安全戰略》(A National Security Strategy for A Global Age,2000),桃園:國防大學,2008年\n曹雄源、廖舜石譯,《柯林頓政府時期:接觸與擴大的國家安全戰略》(A National Security Strategy of Engagement and Enlargement 1995、1996),桃園:國防大學,2008年。\n曹雄源、廖舜石譯,《柯林頓政府時期:新世紀的國家安全戰略》(A National Security Strategy for New Century 1997、1998、1999),桃園:國防大學,2008年。\n喬良、王湘穗,《超限戰》,台北:左岸文化出版社,2004年。\n楊世松,《軍事信息能力論論》,北京:軍事科學出版社,2007年。\n載清民,《直面信息戰》,北京:國防大學出版社,2002年。\n劉天竺,《中共正在輸掉的戰爭》,北京:明鏡出版社,2010年。\n劉台平,《島計畫-2008年中共發動對台割喉戰》,北京:時英出版社,2004年。\n劉俊英主編,《中共研究》(China Studies)彙編,台北:國防部部長辦公室,2006年。\n劉威麟,《網路紅事件》,台北:大塊文化出版社,2009年。\n劉偉,《信息化戰爭作戰指揮研究》,北京:國防大學出版社,2009年。\n劉慶元,《解析中共國家安全戰略》,台北:揚智文化出版社,2003年。\n潘小剛、周亞明、肖琳子,《中國信息安全報告-預警與風險化解》,北京:紅旗出版社,2009年。\n蔡翼主編,《崛起東亞-聚焦新世紀解放軍》,台北:勒巴克顧問出版社,2009年。\n戴旭,《2030肢解中國?美國的全球戰略和中國的危機》,香港:新點出版公司,2010年。\n(三)期刋論文\n王文勇譯,亞歷山大(David Alexander),〈網路防衛戰略方案〉(A SDI for Cyberspace),《國防譯粹》,第40卷,第9期,2013年9月,頁53-57。\n左少雄,〈中共信息戰與我國通資安全應變機制之研究〉,《陸軍學術月刋》,第40卷,第461期,2004年1月,頁32-42。\n余忠勇譯,杜迪克(Charles E. Dudik),波爾格(Jesse Bourque),〈電子戰與網路作戰:未來聯合兵種〉(Electronic Warfare and Cyber Operations),《國防譯粹》,第40卷,第11期,2013年11月,頁23-27。\n余忠勇譯,奧本海默(Andy Oppenheimer),〈網路戰-對抗無聲的大規模毀滅性武器〉(Fighting the Quiet WMD-Cyber-Warfare),《國防譯粹》,第39卷,第8期,2012年8月,頁26-32。\n李永悌,蘭貝斯(Benjamin S.Lambeth),〈空權、太空權與網路權〉(Airpower、Spacepower,and cyberpower),《國防譯粹》,第38卷,第4期,2011年4月,頁12-31。\n李育慈譯,克勒(Mara Koehler),〈得不償失:九一一事件對中共戰略環境的衝擊〉(The Effects of 9/11 on China’s Strategic Environment:lllusive Gains and Tangible Setbacks),《國防譯粹》,第40卷,第10期,2013年10月,頁4-15。\n李育慈譯,哈姆斯(T.X.Hammes),〈近海管制:因應中(共〉可能衝突的遠慮深計〉(Offshore Control:A Proposed Strategy for an Unlikely Conflict),《國防譯粹》,第39卷,第10期,2012年10月,頁7-23。\n李泇鍀譯,高井(Teri Takai),〈更靈活的國防資訊能力〉(Creating a More Agile Defense Department info-Tech Enterprise),《國防譯粹》,第39卷,第8期,2012年8月,頁36-38。\n辛毅,〈電子信息裝備軍民融合式發展的思考〉,《國防》,第3期,2013年,頁10-13。\n周敦彥譯,布姆加納(John Bumgarner),〈確保網路安全:重新思考新防禦時代之軍事準則〉(Securing the Cyber Sphere: Rethinking Military Doctrine for A New Defense Era),《國防譯粹》,第39卷,第8期,2012年8月,頁33-35。\n周敦彥譯,湯馬斯(Thomas Henderschedt),〈共軍資訊化作戰之借鏡〉(Learn from the PLA),《國防譯粹》,第39卷,第10期,2012年10月,頁29-35。\n林宗達,〈中共信息戰之「網軍」作戰初探〉,《展望與探索》,第5卷,第9期,2007年9月,頁60-84。\n林宗達,〈中共信息戰發展之評估〉,《中共研究》,第36卷,第7期,2002年7月,頁43-59。\n林明武,〈國軍應用「通資電」科技於不對稱戰力之研究〉,《國防雜誌》,第27卷,第4期,2012年7月,頁87-101。\n林穎佑,〈大陸網軍與APT攻擊〉,《展望與探索》,第11卷,第3期,2013年3月,頁95-110。\n昌業庭,〈以十八大精神為指導 在新的起點上推進國防動員建設科學發展〉,《國防》,第2期,2013年,頁12-15。\n高一中,成斌(Dean Cheng),〈中共對嚇阻的觀點〉(Chinses Views on Deterrence),《國防譯粹》,第38卷,第4期,2011年4月,頁50-55。\n高一中譯,巴坎(Kris E.Barcomb),〈從海權到網權:以史為鑑勾革未來的戰略〉(From Sea Power to Cyber Power: Learning from the Past to Craft a Strategy for the Future),《國防譯粹》,第41卷,第2期,2014年2月,頁29-37。\n高一中譯,帕克(G.Stavridis and Elton C.Parker),〈航向網路之海〉(Sailing the Cyber Sea),《國防譯粹》,第39卷,第8期,2012年8月,頁4-14。\n高一中譯,馬格努森(Stew Magnuson),〈阻絕中共駭客狂襲〉(Stopping the Chinese Hacking Onslaught),《國防譯粹》,第40卷,第2期,2013年2月,頁73-78。\n高一中譯,奧爾森(Soren Olson),〈檯面下較勁:網路戰與戰略經濟攻擊〉(Shadow Boxing: Cyber Warfare and Strategic Economic Attack),《國防譯粹》,第39卷,第12期,2012年12月,頁42-49。\n高光耀、鄭從卓,〈我國光網城市建設的主要問題及對策研究〉,《未來與發展》,第4期,2013年,頁2-6。\n洪志安、王官德,〈轉型中之中共陸軍〉,《陸軍學術雙月刋》,第532期,2013年12月,頁44-61。\n范宏武,〈從中共信息戰發展概況論第三波戰爭概念建構及發展之重要性〉,《大直高中學報》,第4期,2007年6月,頁123-158。\n唐仁俊,〈中共信息戰之發展與限制〉,《空軍學術雙月刋》,第619期,2010年10月,頁26-40。\n孫國祥,〈具有中國特色社會主義的複雜訊息〉,《中共研究》,第四十七卷,第八期,2013年7月,頁4-18。\n袁平譯,南麗(Nan Li),〈中共擴張海權之企圖〉(Scanning the Horizon for “New Historical Missions”),《國防譯粹》,第37卷,第12期,2010年12月,頁85-92。\n張淑中,「中國大陸軍事及科技發展的全球戰略意涵分析」,《中共研究》,第47卷第10期,2013年10月,頁101-116。\n戚魯江,〈美國國會網路安全立法探析〉,《中國人大》,第340期,2013年8月,頁51-52。\n梁正綱譯,哈米迪(Ahmad Zahid Hamidi),〈新戰爭型態:網路結合無人飛行載具與新興威脅〉(New Forms of Warfare: Cyber, UAVs and Emerging Threats),《國防譯粹》,第40卷第11期,2013年11月,頁42-45。\n陳嘉容譯,埃爾南德斯(Rhett A.Hernandez),〈美陸軍在網際空間的全方位策略〉(Preparing the Army to Prevent,Shape and Win in Cyberspace),《國防譯粹》,第41卷,第1期,2014年1月,頁4-8。\n陳漢強、蘇文德,〈中共信息戰之網路攻擊型態研究〉,《新新季刋》,第四十卷,第二期,2012年4月,頁235-240。\n章昌文譯,巴雷特(Danelle Barrett)、卡斯蒂略(Jesse Castillo),〈訓練官兵網路戰力〉(Creating Cyber Warriors),《國防譯粹》,第40卷,第4期,2013年4月,頁47-51。\n章昌文譯,法加迪(David Faggard),〈風起雲湧的社會運動:不對稱衝突的隠憂〉(Social Swarming: Asymmetric Effects on Public Discourse in Future Conflict),《國防譯粹》,第40卷,第10期,2013年10月,頁43-55。\n章昌文譯,紐美勒(Kevin P.Newmeyer),〈誰該主導美國的網路安全作為〉(Who Should Lead U.S Cybersecurity Efforts?),《國防譯粹》,第39卷,第8期,2012年8月,頁15-25。\n章昌文譯,菲利普斯(Kyle Genaro Phillips),〈武裝衝突法足以適用網路戰爭〉(Unpacking Cyberwar:The Sufficiency of the Law of Armed Conflict in the Cyber domain),《國防譯粹》,第41卷,第1期,2014年1月,頁21-28。\n章昌文譯,歐文(Sandra I.Erwin),〈國家安全未來五大威脅〉(The Five Treats To National Security in the Coming Decade),《國防譯粹》,第40卷,第2期,2013年2月,頁42-54。\n曾祥穎,〈美陸軍網狀化作戰之檢討與展望〉,《陸軍學術雙月刊》,第526期,2012年12月,頁4-20。\n童光復譯,賈斯伯(Scott Jasper),〈美國與中共的網路戰爭〉(Are US and Chinese Cyber Intrusions So Different),《國防譯粹》,第40卷,第12期,2013年12月,頁76-81。\n黃文啟,克拉克(Balne R.Clark),〈以資訊戰做為武裝衝突嚇阻手段〉(Information Operations as a Deterrent to Armed Conflict ),《國防譯粹》,第37卷,第12期,2010年12月,頁4-13。\n黃俊麟,〈中共信息戰與網路戰結合未來網軍發展之研究〉,《聯合後勤季刋》,第10期,2007年8月,頁17-28。\n黃基禎,〈中國大陸網路戰思維〉,《中共研究》,第47卷,第10期,2013年10月,頁147-151。\n黃淑芬譯,成斌(Dean Cheng),〈共軍特種作戰〉(The Chinese People’s Liberation Army and Special Operations),《國防譯粹》,第39卷,第12期,2012年12月,頁87-92。\n楊黎中譯,格蘭特(Rebecca Grant),〈鑑往知來的網路安全與發展〉(Old Lessons,”New”Domain:The Air Force Can Learn A Lot from What It Has Already Seen in Cyberspace),《國防譯粹》,第41卷,第1期,2014年1月,頁48-55。\n謝台喜,〈中共太空發展對我之威脅與因應作為〉,《陸軍學術雙月刊》,第526期,2012年12月,頁21-34。\n謝游麟,〈國軍發展「不對稱」軍事思想之途徑與實踐〉,《國防雜誌》,第27卷第4期,2012年7月,頁51-64。\n龐小寧,〈政府危機管理中的網路謠言控制研究〉,《未來與發展》,第4期,2013年,頁12-15。\n(四)碩博士論文\n李承瑀,《中共高技術條件下信息戰之研究》,政治作戰學校政治研究所碩士論文,2000年6月。\n陳憶綾,《解放軍資訊戰對台軍事安全影響之研究》,政治作戰學校政治研究所碩士論文,2006年6月。\n黃鈴,《「信息化戰爭條件」下之共軍對台戰略》,政治作戰學校政治研究所碩士論文,2005年6月。\n(五)週刊、雜誌\n山本進一、平可夫,〈中國陸軍數據鏈 使用更多加固式電腦〉,《漢和防務評論》,第101期,2013年3月,頁49。\n于揚,〈中國裝力量的多樣化運用白皮書vs中國軍力報告〉,《亞太防務》,第63期,2013年1月,頁30-35。\n史可夫,〈中國在西藏建設監聽站〉,《漢和防衛》,第93期,2012年7月,頁36-37。\n史可夫,〈中國建設監聽站〉,《漢和防務評論》,第93期,2012年7月,頁45-48。 \n史可夫,〈中國軍事力量的世界延伸範圍〉,《漢和防務評論》,第96期,2012年10月,頁47-48。\n史可夫,〈中國軍隊正式成立駭客部隊〉,《漢和防務評論》,第87期,2012年1月,頁23-25。 \n毛峰,〈日本創建網軍聯美反制中國〉,《亞洲週刋》,第27卷第21期,2013年,6月,頁36-37。\n毛峰,〈日美軍事同盟遏制中國崛起〉,《亞洲週刋》,第27卷第41期,2013年,10月,頁32-33。\n李少弘,〈從美國軍力發展看2013-2023中共軍事能力〉,《尖端科技》,第352期,2013年,12月,頁34-41。\n李建,〈美國實施網路威攝戰略試圖遏制中國大陸網戰力量〉,《尖端科技》,第344期, 2013年4月,頁26-27。\n李貴發,〈2023年東亞軍事情勢分析之二〉,《尖端科技》,第351期,2013年,11月,頁14-20。\n沙沙,〈美軍亟思壓制「解放軍之眼」〉,《亞太防務》,第56期,2012年,12月,頁34-35。\n沙沙,〈網路版朝鮮戰爭爆發-兩韓網路戰對抗升級〉,《亞太防務》,第61期,2013年3月,頁22-27。\n余揚,〈中國戰術導彈威懾美日〉,《遠望》,第292期,2013年1月,頁47-51。\n呂烔昌,〈美印組成網路聯合部隊對抗中國大陸網軍〉,《尖端科技》,第311期,2010年7月,頁90-92。\n林郁方,〈2013年國防預算剖析〉,《亞太防務》,第56期,2012年,12月,頁4-5。\n昊銘,〈”.CN”攻擊疑犯已從國外帶回〉,《瞭望東方周刋》,第2期,2014年1月9日,頁37。\n昊銘,〈黑客關注中國600個網站〉,《視野》,16期,2013年8月,頁17-18。\n昊銘,〈境外對華網路攻擊報告〉,《瞭望東方周刋》,第30期,2013年8月8日,頁17。\n約翰(Juhn chang),〈中國信息安全發展現況〉,《漢和防衛》,2013年9月,頁44-45。\n倪耿,〈台式不對稱作戰與戰力組合〉,《亞太防務》,第63期,2013年1月,頁36-41。\n倪耿,〈追求台海軍事穏定台式不對稱與戰力組合〉,《亞太防務》,第2期,2012年1月,頁37-40。\n徐佳,〈網軍來襲,新一代國防戰開打〉,《數位時代》,第228期,2013年,5月,頁91-92。\n徐海濤、鮑曉菁,〈我國首台基於龍芯3B的萬億次高性能電腦研制成功〉,《遠望》,第293期,2013年2月,頁3。\n柴惠珍譯,Shame Harris著,〈中共網軍〉,《陸軍軍事譯粹選輯》,第十八輯,2008年5月,頁726-725\n張雯、姚曉天,〈美國電子監控細節曝光〉,《亞洲週刋》,第27卷第25期,2013年,6月,頁32。\n梁華傑,〈資訊時代戰場如何優劣轉換及以小摶大〉,《尖端科技》,第352期,2013年,12月,頁93-97。\n梁華傑,〈奪取制網路權 搶先制定網路戰規則〉,《尖端科技》,第351期,2013年,11月,頁51-55。\n畢誠斌,〈史諾登洩密案有如網路戰911〉,《尖端科技》,347期,2013年4月,頁4-5。\n莆勛、區肇威,〈美國在亞太區域的不對稱作戰〉,《軍事連線》,第52期,2012年,12月,頁61-68。\n新華網,〈習近平:科技是國家強盛之基〉,《遠望》,第299期,2013年8月,頁4。\n楊欣霖,〈跟著新政策賺錢去〉,《數位時代》,第22期,2013年,2月,頁48-49。\n載政龍,〈中共網軍發展與網路攻防:兼論我國資通安全之政策規劃〉,《戰略評估》,第四卷第四期,2012年冬季,頁97-120。\n廖文中,〈中國網軍:國安、公安與解放軍〉,《全球防衛雜誌》,271期,2007年11月,頁1-5。\n趙郁竹,〈一把火,燒出台灣網路建設隠憂〉,《數位時代》,第228期,2013年,5月,頁114-115。\n趙郁竹,〈全球瘋4G,台灣怎麼走〉,《數位時代》,第222期,2012年,11月,頁166-168。\n齊先予,〈大陸網癱「秦始皇」賊喊捉賊〉,《新紀元》,第363期,2014年1月30日,頁46-48。\n編輯部,〈中國軍隊在西藏的部署與軍事訓練〉,《漢和防衛》,第103期,2013年5月,頁56-62。\n編輯部,〈中國對印度、阿富汗的作戰準備南疆軍區兵力部署〉,《漢和防衛》,第103期,2013年5月,頁51-55。\n鄭文浩、楊雷,〈網路戰比核彈威脅更大〉,《瞭望東方周刋》,第47期,2013年12月12日,頁39-43。\n鄭宇欽,〈北約未來的軍事重心:網路、核生化與能源安全〉,《尖端科技》,第340期,2012年12月,頁35-39。\n蘇武,〈強龍利爪 不可低估的中國軍事力量〉(China’s Military Forces),《亞太防務》,第56期,2012年,12月,頁36-41。\n(六)報紙\n〈Twiiter也遇駭 25萬用戶資料遭竊〉,《中國時報》,2013年2月3日,版11\n中央社紐約,〈避免誤解 傳美曾對中共說明網攻計畫〉,《青年日報》,2014年4月8日,版5。\n王光慈,〈國防部第4支網路中隊成軍〉,《聯合報》,2013年4月30日,版11。\n王光磊,〈美軍與塔利班新戰場-社群網站〉,《青年日報》,2012年9月5日,版6。\n王光磊,〈美智庫預算兵推 航艦、陸軍優歌〉,《青年日報》,2013年2月18日,版5。\n王光磊,〈美網路戰預算倍增〉,《青年日報》,2011年11月9日,版5。\n王光磊,〈駭客攻擊雷達網路 抗駭新時代國防要務〉,《青年日報》,2013年2月29日,版5。\n王超群,〈中美網路軍演 資安全作又較勁〉,《旺報》,2012年4月19日,版8。\n王銘義,〈美隨時可以把陸打回石器時代〉,《中國時報》,2014年1月23日,版13。\n尹曉春,〈磋商網安議題 中美取得共識〉,《台灣醒報》,2013年4月25日,版3。\n〈共軍網頻繁 美網戰單位擬升級〉,《青年日報》,2012年9月30日,版5。\n〈全球網路監控 敘中最嚴重〉,《青年日報》,2013年3月13日,版5。\n白德華,〈習近平領軍 網路安全成國家戰略〉,《中國時報》,2014年2月28日,版22。\n朱建陵,〈紐時:美國安局駭進華為竊密〉,《中國時報》,2014年3月25日,版13。\n李治安,〈駭客無任務〉,《自由時報》,2014年2月21日,版21。\n李宗祐,〈台灣340萬次/天網路攻擊〉,《中國時報》,2013年8月30日,版8。\n李奕明、劉時均、鄧桂芬,〈詐團吸收同袍 LINE拍圖傳軍情〉,《聯合報》,2014年5月9,版12。\n李登科,〈網路攻擊威脅日增 慎防無聲戰爭〉,《青年日報》,2012年4月14日,版2。\n吳明杰,〈癱敵網路 軍方擬研發脈衝武器〉,《中國時報》,2012年9月3日,版4。\n林克倫、賴錦宏、李春,〈大陸維穏預算 連3年高出軍費〉,《聯合報》,2013年3月6日,版13。\n林秉學,〈專家警告 智慧網路武器將興起〉,《青年日報》,2012年6月9日,版5。\n林政忠,〈駭客攻擊對象 台灣居世界之冠〉,《聯合報》,2013年3月25日,版8。\n林詩萍,〈學者:服貿開放網路電信.國安資訊都淪陷〉,《自由時報》,2013年8月16,版6。\n林翠儀,〈攔截中國情資?日拒美監亞太海底光纜〉,《自由時報》,2013年10月28日,版10。\n邱燕玲,〈網路戰爭時代 陳撥促部會警覺〉,《自由時報》,2012年12月21日,版6。\n俞智敏,〈伊朗網路劫機?陰謀論 滿天飛〉,《自由時報》,2014年3月18日,版8。\n俞智敏,〈監控九萬留澳生 中國廣布情報網〉,《自由時報》,2014年4月22日,版13。\n洪健元,〈軍費投注不對稱戰爭、電磁武器、網路戰〉,《青年日報》,2014年3月21日,版5。\n姜翔、羅添斌,〈治安國安隠憂 784中國人非法滯台〉,《自由時報》,2014年3月3,版1。\n胡蔥寧,〈無疆界記者:美英網路監控 不輸中俄〉,《自由時報》,2014年3月13日,版10。\n崔敬熙,〈防網攻 美網軍2016年擴編至6千人〉,《青年日報》,2014年3月30日,版5。\n張佑生,〈美聯社遭駭 美股2分鐘跌144點〉,《聯合報》,2013年4月25日,版17。\n張沛元,〈上海交大遭爆與解放軍駭客部隊合作〉,《自中時報》,2013年3月25日,版12。\n張玲玲,〈中共管控網際網路 對內維穏對外情蒐〉,《青年日報》,2014年3月9日,版7。\n〈習近平對天河二號超級電腦系統研制成功作出重要批示〉,《解放軍報》(北京),2013年6月19日,版1。\n曹郁芬、林翠儀譯,〈美國防部:中國軍事力及意圖不透明〉,《自由時報》,2014年3月6日,版3。\n曹郁芬,〈美官員:解放軍抗美 信心大增〉,《自由時報》,2014年2月1日,版6。\n陳文嬋,〈手機間碟軟體 傳通簡訊就監控〉,《自由時報》,2012年12月20日,版5。\n陳伃軒、林翠儀,〈威脅四鄰 中國擴武 軍費4兆〉,《中國時報》,2014年3月6日,版13。\n陳伃軒,〈烏克蘭實彈鎮壓 死傷逾600人〉,《自由時報》,2014年2月21日,版18。\n陳思豪,〈共軍轉型要裁80萬人〉,《聯合報》,2011年4月23日,版15。\n陳柏廷,〈封殺美產品 陸際出網安審查〉,《中國時報》,2014年5月23日,版22。\n陳家倫,〈陸首支資訊化旅〉,《旺報》,2014年3月18日,版6。\n陳曼濃,〈軍事革命浪潮 生化戰將登場〉,《旺報》,2014年1月14日,版8。\n陳清泉,〈網路冷戰下的資訊安全戰略〉,《蘋果日報》,2013年3月25日,版15。\n陳維真,〈中國數位人民戰爭 全民抗美〉,《自由時報》,2013年8月1日,版AA2。\n陳慰慈、蔡亞樺、吳柏軒、甘芝美、陳慧萍、陳彥廷,〈新戶政程序轉包中國資安系統門戶大開〉,《自由時報》,2014年2月20日,版7。\n許博淳,〈國軍落實資安維護 確保國防安全〉,《青年日報》,2012年12月23日,版4。\n黃一翔,〈政院研擬組織型網駭攻擊因應方案〉,《青年日報》,2012年12月23日,版4。\n黃一翔,〈面對網路戰爭陳揆指示速擬對策〉,《青年日報》,2012年12月20日,版1。\n黃文正,〈你的手機可能正被美追緃〉,《中國時報》,2013年12月6日,版22。\n黃文正,〈美國安局研發量子電腦 破解加密〉,《中國時報》,2014年元月4日,版19。\n黃德潔,〈中共持續關注 美日亞太軍力發展〉,《青年日報》,2014年1月2日,版5。\n馮克芸,〈美兵推模擬 台遭中共封銷〉,《聯合報》,2011年12月9日,版19。\n馮克芸,〈美軍網路武器 總統才能發動〉,《聯合報》,2013年2月6日,版14。\n彭顯均,〈馬坦承:對中開放 駭台更多〉,《自由時報》,2013年4月2日,版4。\n曾復生,〈習近平的戰略時間表〉,《中國時報》,2014年1月25日,版16。\n楊智強,〈資安等級低 立委促成國土安全部〉,《台灣醒報》,2013年4月30日,版2。\n楊湘鈞、蘇璄璇、陳乃綾,〈張善政:攻擊屬「非常嚴重」〉,《聯合報》,2014年元月10日,版6。\n楊舒媚,〈新戶政系統 轉包中國網路公司〉,《中國時報》,2014年3月11日,版11。\n湯雅雯,〈台灣首枚太空GPS 2018年升空〉,《中國時報》,2014年2月26,版6。\n管淑平,〈美起訴解放軍 中國暫停網路合作〉,《自由時報》,2014年5月21日,版10。\n管淑平,〈無線電波植間碟美滲透10萬電腦〉,《自由時報》,2014年元月16日,版9。\n管淑平,〈華為替南韓建4G 美憂情資外洩〉,《自由時報》,2013年12月5日,版15。\n劉屏、朱建陵,〈美政府告解放軍5軍官〉,《中國時報》,2014年5月20日,版1。\n劉榮,〈嚴密管控機制反制網軍入侵〉,《青年日報》,2007年10月22日,版3。\n編譯組,〈俄軍入侵 克里米亞遭網攻〉,《青年日報》,2014年3月6日,版6。\n編譯組,〈美韓機密通訊〉,《青年日報》,2014年2月23日,版5。\n蔡筱雯,〈谷歌董座批中國老練駭客〉,《蘋果日報》,2013年2月3日,版23。\n鄭光華,〈強化網路防衛體系有效反制中共網軍攻勢〉,《青年日報》,2007年12月21日,版3。\n鄭德麟,〈我應積極建立總體防衛體系〉,《青年日報》,2008月11月22日,版3。\n鄧智原,〈強化資訊安全保障國土防衛〉,《青年日報》,2008年9月17日,版3。\n〈鞏固第5戰場 美日將聯手防駭〉,《青年日報》,2014年1月28日,版5。\n盧永山,〈去年駭客網攻三成中國幹的〉,《自由時報》,2013年4月25日,版5。\n盧素梅,〈陸聯戰指揮改革估2020年完成〉,《旺報》,2014年1月7日,版6。\n蕭示恩,〈符合戰略需求提升國家競爭力長役期發揮戰力-裨益國家發展需求〉,《青年日報》,2012年1月9日,版1。\n賴昭穎,〈2015年前美將組40支網路部隊〉,《聯合報》,2013年3月25日,版8。\n賴昭穎,〈中共政治作戰 台灣是首要目標〉,《聯合報》,2013年10月23日,版13。\n賴錦宏,〈央視畫面 驚見對台作戰地圖〉,《聯合報》,2013年10月14日,版13。\n鍾翠珠,〈國防部也受駭 網路安全陷危機〉,《民眾日報》,2014年3月3,版2。\n簡竹君,〈美爆史上最大監控每天蒐50億筆手機資訊〉,《蘋果日報》,2013年12月6日,版28。\n藍孝威,〈習領軍信息化小組 因應資訊戰〉,《中國時報》,2014年1月23日,版13。\n魏國金,〈反擊中國駭客 美將先發制人〉,《自由時報》,2013年2月6日,版10。\n魏國金,〈美海軍網路司令 將掌國安局〉,《自由時報》,2014年2月1日,版10。\n魏國金,〈美國安局日蒐50億筆手機位置資料〉,《自由時報》,2013年12月6日,版29。 \n羅印沖、陳秀蘭、黃淑嫆,〈軍費近4兆 陸強化海空二炮〉,《旺報》,2014年3月6日,版C1。\n蘇芳禾,〈電信業開放 業者:像木馬屠城〉,《自由時報》,2013年10月3日,版5。\n羅添斌,〈中對台導彈民進黨評估2025年增至1850枚〉,《自由時報》,2014年3月3,版4。\n羅添斌,〈反制中國網軍我建構網路戰攻防驗測環境〉,《自由時報》,2012年9月2日,版6。\n羅添彬,〈反制中國 軍方發展無人攻擊機〉,《自由時報》,2012年9月3日,版1。\n羅添斌,〈防紅色駭客美禁官方買中國網通產品〉,《自由時報》,2013年4月28日,版2。\n羅添彬,〈國防科技研發預算低 奢談發展不對稱戰力〉,《自由時報》,2012年9月3日,版2。\n羅添斌,〈強化網攻 國安局招募大學生駭客〉,《自由時報》,2013年11月12日,版6。\n羅添彬、曾韋禎,〈軍方總機外包喊卡〉,《自由時報》,2013年1月10日,版4。\n(七)網路資料 \n〈中共中央軍委主席江澤民、中央軍委副主席胡錦濤參加十屆全國人大二次會議解放軍代表團全體會議發表講話內容〉,《解放軍報》,http:big5.xinhuanet.com/gate/big5/news.xinhuanet.com/newscenter/2004-03/11/content_1360725.htm(2014年2月11日)。\n〈中國政府疑似於十八大期間封鎖境內Google服務〉,《行政院國家資通安全會報技術服務中心》,\nhttp://www.icst.org.tw/NewsRSSDetail.aspx?seq=14276(2013年11月10日)。\n中華人民共和國國務院新聞辦公室,〈2006年中國的國防〉白皮書,\n《中華人民共和國國防部》,\nhttp://www.mod.gov.cn/affair/2011-01/06/content_4249948_6.htm(2014月1月10日)。\n中華人民共和國國務院新聞辦公室,〈2008年中國的國防〉白皮書,\n《中華人民共和國國防部》,\nhttp://www.mod.gov.cn/affair/2011-01/06/content_4249949.htm(2014年1月10日)。\n中華人民共和國國務院新聞辦公室,〈2010年中國的國防〉白皮書,\n《中華人民共和國國防部》, \nhttp://www.mod.gov.cn/reports/201101/bpsz/2011-03/31/content_4235224.htm>(2014年1月10日)。\n中華人民共和國國務院新聞辦公室,〈中國武裝力量的多樣化運用〉,\n《中華人民共和國國防部》,\nhttp://www.mod.gov.cn/affair/2013-04/16/content_4442839_4.htm(2014年1月10日)。\n中華人民共和國國務院新聞辦公室,〈中國統計年鑑2013〉,《中華人民共和國國家統計局》,http://www.stats.gov.cn/tjsj/ndsj/2013/indexch.htm> (2014年3月21日)。\n王珮華,〈中國騰訊APP微信今登台 台灣即時通中國可掌控〉,《自由時報電子報》http://www.libertytimes.com.tw/2012/new/oct/18/today-fo1.htm(2014年3月21日)。\n〈以色列成立駭客學校:推崇真刀真槍〉,《中國安全網》(securitycn), http://www.securitycn.net/html/news/colligation/8691.html(2014年3月10日)。\n〈行政院年度資安稽核結果首度公開〉,《行政院國家資通安全會報技術服務中心》http://www.icst.org.tw/NewsRSSDetail.aspx?seq=14672&lang=zh(2014年3月21日)。\n技術服務中心整理,〈Cisco、Linksys與Netgear的無線路由器存有後門〉,《行政院國家資通安全會報技術服務中心》,\nhttp://www.icst.org.tw/NewsRSSDetail.aspx?seq=14698(2014年3月21日)。\n余采霏,〈資安人才難覓 台灣應急起直追〉,《網管人》,http://www.netadmin.com.tw/article_content.aspx?sn=1005200015(2014年3月20日)。\n吳明杰、邱燕玲,〈我神秘網軍 首度秀戰力〉,《自由時報》http://www.libertytimes.com.tw/2013/new/may/31/today-fo1.htm (2014年3月21日)。\n林頂杜(Dindo Lin),〈卡巴斯基CEO爆料:俄國太空站與核電廠曾遭病毒入侵〉,《科技新報》,\nhttp://technews.tw/2013/11/14/kaspersky-ceo-stuxnet- iss -nuclear- plant/(2014年2月14日)。\n胡光曲,〈全軍預備役電磁頻譜管理中心打造高技術尖兵〉,《華夏經緯網》http://hk.huaxia.com/thjq/jsxw/dl/2013/10/3573880.html(2014年3月20日)。\n〈科技計畫中央財政撥款綜合情況〉,《中國主要科技指標數據庫》, http://www.sts.org.cn/kjnew/maintitle/MainMod.asp?Mainq=2&Subq=1(2014年3月21日)。\n〈借口網絡安全 印度或封殺中國微信〉,《中國評論新聞網》http://hk.crntt.com/doc/1025/8/6/4/102586449.html? coluid=0&kindid=0&docid=102586449&mdate= 0618105253(2014年2月11日)。\n〈國防部因應「終統」中共可能採取之威懾武嚇研判及我因應作為專案報告〉,《部會報告》,http://npl.ly.gov.tw/npl/report/950315/19.pdf。(2014年1月10日) 。\n〈國家資通訊安全發展方案〉,《行政院國家資通安全會報》, \nhttp://www.nicst.ey.gov.tw/News_Content3.aspx?n=F7DE3E86444BC9A8&sms=FB4DC0329B2277CF&s=1ACE1B808B9444DF。(2014年2月10日)。\n陳祐欣,〈現代版木馬屠城 中共以網向全球開戰〉,《看雜誌》http://www.watchinese.com/%E7%9C%8B%E4%B8%AD%E5%9C%8B/2008/280(2014年1月10日)\n陳曉莉,〈美國國安局以惡意程式滲透全球5萬個網路〉,《iThome》,。(2014年3月10日)。\n曹乙帆,〈小心!目標式網路誤導攻擊增溫〉,《網路資訊》, http://news.networkmagazine.com.tw/classification/security/2013/11/21/60342/>(2014年2月20日)。\n曾復生,〈美中俄日太空爭霸〉,《旺報》,http://tw.news.yahoo.com/%E7%BE%8E%E4%B8%AD%E4%BF%84%E6%97%A5%E5%A4%AA%E7%A9%BA%E7%88%AD%E9%9C%B8-213000573.html(2014年2月10日)。\n曾復生,〈美中網路戰略七大高地〉,《財團法人國家政策研究基金會》,http://www.npf.org.tw/post/3/13321(2014年2月10日)。\n曾復生著,〈國際網路安全競合情勢剖析〉,《國家政策研究基金會》,< http://www.npf.org.tw/post/2/12290(2014年2月10日)。\n蔡和穎,〈共軍演訓動態 國防部全程掌握〉,《中央社新聞網》, http://tw.news.yahoo.com/%E5%85%B1%E8%BB%8D%E6%BC%94%E8%A8%93%E5%8B%95%E6%85%8B-%E5%9C%8B%E9%98%B2%E9%83%A8%E5%85%A8%E7%A8%8B%E6%8E%8C%E6%8F%A1-143211709.html(2014年2月10日)。\n鄭文浩、王玉山,〈院士:我國網絡基本算不設防 成網絡攻擊最大受害國之一》,《人民網》http://military.people.com.cn/BIG5/n/2014/0107/c1011-24045169.html (2014年3月23日)。\n戴定國,〈新新人類戰爭 網軍納入正規部隊〉,《人間福報》,http://www.merit-time.com.tw//NewsPage.asp?unid=306788(2014年3月10日)。\n二、英文部份\n(一)期刋\nMurray, Williamson & Leary,Thomas,“Military Transformation and Legacy forces,”Joint Force Quarterly,No.30.Spr. 2002,pp.20〜27.\nRid,Thomas,“Cyberwar and Peace,”FOREIGN AFFAIRS,No.56.Nov/Dec. 2013,pp.77-85. \n(二)網路資料\nCenciotti David,“DISA PARTICIPATES IN ANNUAL EXERCISE FOCUSED ON CYBER OPERATIONS AND DEFENSE”,DISA,< http://www.disa.mil/News/Stories/2013/Cyber-Flag-Exercise>(2014年4月20日).\nCenciotti David,“Third Prototype of China’s Stealth Jet Makes Maiden Flight and Shows Improvements”,The Avaitionist, (2014年4月20日).\nCheryl Pellerin,“DOD at Work on New Cyber Strategy, Senior Military Advisor Says”,defense, 。(2014年3月21日).\nDon Eijndhoven,“The Chilling State of Cyber Affairs”, infosecisland, (2014年3月21日).\nDepartment of Defense Chief Information Officer, “DoD 8570.01- M:Infor- mation Assurance Workforce Improvement Program,” Washington. DC, 〈http://www.dtic.mil/whs/directives/corres/pdf/857001m.pdf〉(2014年3月20日).\nDepartment of Defense, “Quadrennlal Defenes Review 2014”, Washington. DC,〈http://www.defense.gov/pubs/2014_Quadrennial_Defense_ Review.pdf〉(2014年4月16 ).\nJarno Limnéll, “Resilience - The way to Survive a Cyber Attack”, infosecisland,\n(2014年3月21日).\n“New Chinese stealth jet built with stolen F-35 component designs“,RT,\n< http://rt.com/news/chinese-jet-cyber-espionage-stolen- 718/>(2014年4月21日)\nPAUL KALLENDER-UMEZU,“Experts:Japan`s New Cyber Unit Understaffed, Lacks Skills”,defense, < http://www.defensenews.com/article/20130709/DEFREG03/307090007/Experts-Japan-s-New-Cyber-Unit-Understaffed-Lacks-Skills>(2014年4月2日).\nPierluigi Paganini,“The cyber capabilities of Iran can hit US”, Security Affairs, (2014年2月20日).\n“ `Spying Birds`: Hackers deface Angry Birds website following NSA revelations”,RT, < http://rt.com/news/angry-birds-nsa-hackers-374/>2014年3月16日)。\n“US report:China`s cyberwar skills a risk to military”,bbc, http://www.bbc.co.uk/news/world-asia-china-17308921&prev=/search%3Fq%3Dchina%2Bcyber%2Bability%26biw%3D1229%26bih%3D562(2014年3月20日).\nZachary Fryer-Biggs,“Hesitancy Over Cyber Strike on Syrian Air Defense”,defensenews, (2013年12月8日).; G0099922023; https://nccur.lib.nccu.edu.tw//handle/140.119/67194; https://nccur.lib.nccu.edu.tw/bitstream/140.119/67194/1/202301.pdf
-
20
المساهمون: 淡江大學資訊管理學系, 淡江大學管理科學研究所
مصطلحات موضوعية: 電子商務E-Commerce, 消費駭客consumer hackers, 標錯價mislabeled prices, PageRank
Relation: 2011資訊管理及應用研討會論文全集,43-50頁; http://120.106.11.159/ir/handle/310997200/5610; http://120.106.11.159/ir/bitstream/310997200/5610/-1/a4.pdf