当前位置:主页 > 社科论文 > 军事论文 >

网络战争叙事与网络空间重构:利益主体与风险代价分析

发布时间:2021-02-25 23:06
  网络空间,曾一度被视为共享域,但如今网络军事化趋势正在把它变成战争域。网络战争叙事为网络空间进攻能力的发展提供了理由,并可能刺激危害公民自由的网络监控措施的泛滥。本文第一部分将研究网络空间叙事的演变、利益主体的身份、网络空间治理的相关矛盾以及网络军事化对社会的影响。第二部分将分析网络战争叙事相关的主要案例,并指出评估这些案例的双重标准、指出网络战争本身定义的问题以及所引起的军事化趋势。第三部分的分析将挖掘网络战争叙事和言语行为里的偏见以其隐藏的利益勾结。本论文还将研究中美关系对网络战争与网络空间的影响,并为避免网络冲突进一步升级以促进更好的网络空间未来提供建议。 

【文章来源】:复旦大学上海市 211工程院校 985工程院校 教育部直属院校

【文章页数】:99 页

【学位级别】:硕士

【文章目录】:
摘要
ABSTRACT
Introduction:Shaping a Future Without Direction
Theoretical Framework:Discourse Analysis and Identity Politics
CHAPTER 1 CYBERSPACE:IDENTITIES IN CONFLICT AND THE IMPORTANCE OF AVOIDING CYBER-WAR
    1.1. Evolution of Cyberspace:From a Domain of Sharing to a Domain of War Fighting
        1.1.1. The Two Opposite Identities Fighting to Control Cyberspace
        1.1.2. Insiders' Perception:The Ideological Layer of Cyberspace
        1.1.3. Outsiders' Perception:The Physical Layer of Cyberspace
    1.2. Engineering Cyberspace:How the Ideological Determines The Physical and Vice Versa
        1.2.1. Issues of Power and Sovereignty:Cyber Libertarians Versus Orthodox Policymakers
        1.2.2. A Holistic Definition to Mitigate the Conflict
        1.2.3. The Problem of Adopting a Holistic Definition
    1.3. Society Dependence on Cyberspace and the Threat of Cyber-war Narratives
        1.3.1. What is Cyber-war and What is it Threatening?
        1.3.2. What Does Cyberspace Mean to Society and How is it Changing it?
        1.3.3. Cyberspace as Epistemology:How Do We Interpret the World and What Are the Side Effects?
        1.3.4. Militarization as an Amplifier of Side Effects and the Final Stage of Dehumanization
CHAPTER 2 FROM CYBER-WAR NARRATIVES TO THE SURVEILLANCE STATE
    2.1. Means of Knowledge and Means of Destruction:How is Cyber-war Conducted
        2.1.1. The Four Steps of Hacking:Reconnaissance, Scanning, Exploitation and Maintaining Access
        2.1.2. Understanding the Code:Tools and Techniques of Cyber-warfare
        2.1.3. Why are Governments Afraid of Cyber-attacks?
        2.1.4. The Attribution Issue:Why Is it Hard to Spot the Enemy?
    2.2. Deconstructing the History of a New Threat
        2.2.1. The Siberian Pipeline (1982):the First Case or Just a Myth?
        2.2.2. The Bronze of Tallinn (2007):Beginning of the Narratives of Cyberwar
        2.2.3. Russia-Georgia Crisis (2008):Operational Warfare in Cyberspace?
        2.2.4. Operation Buckshot Yankee (2008):the Turning Point in U.S. Cyber-policy
    2.3. U.S. Aggressive Stance in Cyberspace and the Double Standard Issue
        2.3.1. Stuxnet & Sons (2010):Cyber-attacks With Physical Consequences
        2.3.2. Mandiant Report (2013):Toward Escalation
        2.3.3. China and Russia as "Usual Suspects" and the Double Standard Issue
        2.3.4. NSA and the Surveillance State (2013):A Step Toward Militarization
    2.4. A Path to Further Escalation
CHAPTER 3 CYBER-WAR:NARRATIVES, ACTS OF SPEECH AND THE UNDERLYING INTERESTS
    3.1. Interest Groups Behind the Narratives of Cyber-war and the Securitization Process
        3.1.1. Cyber-war:Myth against Reality
        3.1.2. The Role of Internal and External Threats in the Securitization Process
        3.1.3. Cyber-war Narratives and the Military-Industrial Complex:A Conflict of Interest
    3.2. Conclusions:Avoid Militarization and Promote Cyber-security Education for a Better Cyberspace
BIBLIOGRAPHY


【参考文献】:
期刊论文
[1]论中美网络空间的战略互信[J]. 蔡翠红.  美国问题研究. 2013(01)
[2]国家-市场-社会互动中网络空间的全球治理[J]. 蔡翠红.  世界经济与政治. 2013 (09)
[3]大众传媒与中国外交政策的制定[J]. 蒋昌建,沈逸.  国际观察. 2007(01)



本文编号:3051713

资料下载
论文发表

本文链接:https://www.wllwen.com/shekelunwen/renwuzj/3051713.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户f2349***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com