摘要 | 第2页 |
ABSTRACT | 第2页 |
Introduction:Shaping a Future Without Direction | 第9-11页 |
Theoretical Framework:Discourse Analysis and Identity Politics | 第11-14页 |
CHAPTER 1 CYBERSPACE:IDENTITIES IN CONFLICT AND THE IMPORTANCE OF AVOIDING CYBER-WAR | 第14-39页 |
1.1. Evolution of Cyberspace:From a Domain of Sharing to a Domain of War Fighting | 第15-21页 |
1.1.1. The Two Opposite Identities Fighting to Control Cyberspace | 第15-16页 |
1.1.2. Insiders' Perception:The Ideological Layer of Cyberspace | 第16-18页 |
1.1.3. Outsiders' Perception:The Physical Layer of Cyberspace | 第18-21页 |
1.2. Engineering Cyberspace:How the Ideological Determines The Physical and Vice Versa | 第21-27页 |
1.2.1. Issues of Power and Sovereignty:Cyber Libertarians Versus Orthodox Policymakers | 第22-25页 |
1.2.2. A Holistic Definition to Mitigate the Conflict | 第25-26页 |
1.2.3. The Problem of Adopting a Holistic Definition | 第26-27页 |
1.3. Society Dependence on Cyberspace and the Threat of Cyber-war Narratives | 第27-39页 |
1.3.1. What is Cyber-war and What is it Threatening? | 第28-30页 |
1.3.2. What Does Cyberspace Mean to Society and How is it Changing it? | 第30-33页 |
1.3.3. Cyberspace as Epistemology:How Do We Interpret the World and What Are the Side Effects? | 第33-37页 |
1.3.4. Militarization as an Amplifier of Side Effects and the Final Stage of Dehumanization | 第37-39页 |
CHAPTER 2 FROM CYBER-WAR NARRATIVES TO THE SURVEILLANCE STATE | 第39-72页 |
2.1. Means of Knowledge and Means of Destruction:How is Cyber-war Conducted | 第40-48页 |
2.1.1. The Four Steps of Hacking:Reconnaissance, Scanning, Exploitation and Maintaining Access | 第41-42页 |
2.1.2. Understanding the Code:Tools and Techniques of Cyber-warfare | 第42-44页 |
2.1.3. Why are Governments Afraid of Cyber-attacks? | 第44-46页 |
2.1.4. The Attribution Issue:Why Is it Hard to Spot the Enemy? | 第46-48页 |
2.2. Deconstructing the History of a New Threat | 第48-53页 |
2.2.1. The Siberian Pipeline (1982):the First Case or Just a Myth? | 第49页 |
2.2.2. The Bronze of Tallinn (2007):Beginning of the Narratives of Cyberwar | 第49-51页 |
2.2.3. Russia-Georgia Crisis (2008):Operational Warfare in Cyberspace? | 第51-52页 |
2.2.4. Operation Buckshot Yankee (2008):the Turning Point in U.S. Cyber-policy | 第52-53页 |
2.3. U.S. Aggressive Stance in Cyberspace and the Double Standard Issue | 第53-69页 |
2.3.1. Stuxnet & Sons (2010):Cyber-attacks With Physical Consequences | 第53-58页 |
2.3.2. Mandiant Report (2013):Toward Escalation | 第58-62页 |
2.3.3. China and Russia as "Usual Suspects" and the Double Standard Issue | 第62-65页 |
2.3.4. NSA and the Surveillance State (2013):A Step Toward Militarization | 第65-69页 |
2.4. A Path to Further Escalation | 第69-72页 |
CHAPTER 3 CYBER-WAR:NARRATIVES, ACTS OF SPEECH AND THE UNDERLYING INTERESTS | 第72-89页 |
3.1. Interest Groups Behind the Narratives of Cyber-war and the Securitization Process | 第73-86页 |
3.1.1. Cyber-war:Myth against Reality | 第73-78页 |
3.1.2. The Role of Internal and External Threats in the Securitization Process | 第78-82页 |
3.1.3. Cyber-war Narratives and the Military-Industrial Complex:A Conflict of Interest | 第82-86页 |
3.2. Conclusions:Avoid Militarization and Promote Cyber-security Education for a Better Cyberspace | 第86-89页 |
BIBLIOGRAPHY | 第89-99页 |