首页--军事论文--战略学、战役学、战术学论文--非常规战争论文

网络战争叙事与网络空间重构:利益主体与风险代价分析

摘要第2页
ABSTRACT第2页
Introduction:Shaping a Future Without Direction第9-11页
Theoretical Framework:Discourse Analysis and Identity Politics第11-14页
CHAPTER 1 CYBERSPACE:IDENTITIES IN CONFLICT AND THE IMPORTANCE OF AVOIDING CYBER-WAR第14-39页
    1.1. Evolution of Cyberspace:From a Domain of Sharing to a Domain of War Fighting第15-21页
        1.1.1. The Two Opposite Identities Fighting to Control Cyberspace第15-16页
        1.1.2. Insiders' Perception:The Ideological Layer of Cyberspace第16-18页
        1.1.3. Outsiders' Perception:The Physical Layer of Cyberspace第18-21页
    1.2. Engineering Cyberspace:How the Ideological Determines The Physical and Vice Versa第21-27页
        1.2.1. Issues of Power and Sovereignty:Cyber Libertarians Versus Orthodox Policymakers第22-25页
        1.2.2. A Holistic Definition to Mitigate the Conflict第25-26页
        1.2.3. The Problem of Adopting a Holistic Definition第26-27页
    1.3. Society Dependence on Cyberspace and the Threat of Cyber-war Narratives第27-39页
        1.3.1. What is Cyber-war and What is it Threatening?第28-30页
        1.3.2. What Does Cyberspace Mean to Society and How is it Changing it?第30-33页
        1.3.3. Cyberspace as Epistemology:How Do We Interpret the World and What Are the Side Effects?第33-37页
        1.3.4. Militarization as an Amplifier of Side Effects and the Final Stage of Dehumanization第37-39页
CHAPTER 2 FROM CYBER-WAR NARRATIVES TO THE SURVEILLANCE STATE第39-72页
    2.1. Means of Knowledge and Means of Destruction:How is Cyber-war Conducted第40-48页
        2.1.1. The Four Steps of Hacking:Reconnaissance, Scanning, Exploitation and Maintaining Access第41-42页
        2.1.2. Understanding the Code:Tools and Techniques of Cyber-warfare第42-44页
        2.1.3. Why are Governments Afraid of Cyber-attacks?第44-46页
        2.1.4. The Attribution Issue:Why Is it Hard to Spot the Enemy?第46-48页
    2.2. Deconstructing the History of a New Threat第48-53页
        2.2.1. The Siberian Pipeline (1982):the First Case or Just a Myth?第49页
        2.2.2. The Bronze of Tallinn (2007):Beginning of the Narratives of Cyberwar第49-51页
        2.2.3. Russia-Georgia Crisis (2008):Operational Warfare in Cyberspace?第51-52页
        2.2.4. Operation Buckshot Yankee (2008):the Turning Point in U.S. Cyber-policy第52-53页
    2.3. U.S. Aggressive Stance in Cyberspace and the Double Standard Issue第53-69页
        2.3.1. Stuxnet & Sons (2010):Cyber-attacks With Physical Consequences第53-58页
        2.3.2. Mandiant Report (2013):Toward Escalation第58-62页
        2.3.3. China and Russia as "Usual Suspects" and the Double Standard Issue第62-65页
        2.3.4. NSA and the Surveillance State (2013):A Step Toward Militarization第65-69页
    2.4. A Path to Further Escalation第69-72页
CHAPTER 3 CYBER-WAR:NARRATIVES, ACTS OF SPEECH AND THE UNDERLYING INTERESTS第72-89页
    3.1. Interest Groups Behind the Narratives of Cyber-war and the Securitization Process第73-86页
        3.1.1. Cyber-war:Myth against Reality第73-78页
        3.1.2. The Role of Internal and External Threats in the Securitization Process第78-82页
        3.1.3. Cyber-war Narratives and the Military-Industrial Complex:A Conflict of Interest第82-86页
    3.2. Conclusions:Avoid Militarization and Promote Cyber-security Education for a Better Cyberspace第86-89页
BIBLIOGRAPHY第89-99页

论文共99页,点击 下载论文
上一篇:实时流数据分析的关键技术及应用
下一篇:大规模发布/订阅系统匹配算法研究