開放、控制與合作:美國國家信息安全政策分析
發(fā)布時(shí)間:2018-05-13 07:36
本文選題:國家信息安全 + 美國國家信息安全政策 ; 參考:《復(fù)旦大學(xué)》2005年博士論文
【摘要】:自20世紀(jì)70年代以降,信息技術(shù)隨全球化的浪潮席卷全球,通過極大的降低信息發(fā)布與交流的成本,對人類社會產(chǎn)生了深刻的影響。這一被稱為信息化的進(jìn)程在冷戰(zhàn)后得到了更加迅猛的發(fā)展。如同歷史上任何一種新興技術(shù)的出現(xiàn)一樣,高歌猛進(jìn)的信息技術(shù)同樣對國際體系中最主要的行為體:國家行為體產(chǎn)生了重大的挑戰(zhàn)。這一挑戰(zhàn)的核心問題,就是國家信息安全問題。 從20世紀(jì)80年代開始,以托夫勒為代表的未來學(xué)家,以信息技術(shù)發(fā)展將不可避免的導(dǎo)致國家向非國家進(jìn)行“權(quán)力轉(zhuǎn)移”這一基本分析框架,闡述了非國家行為體可能借助信息技術(shù)對國家行為體的安全構(gòu)成挑戰(zhàn)。而在20世紀(jì)90年代初之后,隨著信息技術(shù)在軍事、經(jīng)濟(jì)與社會生活領(lǐng)域的廣泛滲透,使得人們認(rèn)識到現(xiàn)代社會對于信息基礎(chǔ)設(shè)施的依賴程度正在不斷加深,圍繞這種依賴是否將會增加國家面對信息攻擊的脆弱性,這種脆弱性究竟有多大以及國家應(yīng)該如何采取何種政策來應(yīng)對等問題,引發(fā)了有關(guān)國家信息安全問題的研究熱潮。 值得注意的是,在有關(guān)的研究成果中,信息安全的技術(shù)分析,與基于“信息戰(zhàn)”“網(wǎng)絡(luò)戰(zhàn)”“網(wǎng)絡(luò)中心戰(zhàn)”的研究占據(jù)了顯著的優(yōu)勢地位;在國際關(guān)系理論研究領(lǐng)域,主要研究的成果更多關(guān)注的是宏觀層面的分析,即討論信息技術(shù)對于整個(gè)國際政治體系的沖擊,或者是討論信息技術(shù)對于國家安全整體的沖擊,研究的落腳點(diǎn)是信息時(shí)代的國家安全問題。相對而言,基于“中觀”層面,集中研究國家信息安全政策的制定及其內(nèi)容的論著相對還比較苦乏。 本文即試圖以此為突破點(diǎn),綜合運(yùn)用文本分析和案例分析的方法,以美國冷戰(zhàn)后國家信息安全政策的演進(jìn)為主要研究對象,運(yùn)用認(rèn)知-建構(gòu)分析框架,以決策分析的路徑,研究國家信息安全政策的制定過程以及影響國家信息安全政策演變的主要因素。 本文包含三個(gè)基本假設(shè): 1、決策者的“認(rèn)知”因素在美國國家信息安全政策制定過程中發(fā)揮了重要的作用,關(guān)于國家信息安全“認(rèn)知”的變化構(gòu)成了推動國家信息安全政策變化的主要動力。 2、美國國家信息安全政策制定過程的實(shí)質(zhì)是決策者決定“開放”與“控制”這兩種手段相對比重的過程。911恐怖襲擊事件的發(fā)生使得“控制”取代“開放”在美國國家信息安全政策中占據(jù)了微弱的優(yōu)勢。 3、國際合作始終是美國國家信息安全政策的組成部分,美國推動合作的目的是希望通過國家間的合作,在全球范圍實(shí)現(xiàn)對于信息的嚴(yán)格控制。 論文由6個(gè)部分組成,分別是導(dǎo)論、正文4章和結(jié)論。 導(dǎo)論部分主要對回溯國家信息安全問題的由來與發(fā)展,梳理現(xiàn)有的研究文獻(xiàn)
[Abstract]:Since the 1970s, information technology has swept the world with the tide of globalization. By greatly reducing the cost of information dissemination and communication, it has had a profound impact on human society. This process, known as information technology, developed more rapidly after the cold war. As with any emerging technology in history, advances in information technology pose major challenges to the most important actors in the international system: national actors. The core of this challenge is the issue of national information security. Since the 1980s, futurists, represented by Toffler, will inevitably lead to the basic analytical framework of "power transfer" from the state to the non-state, with the development of information technology. The potential for non-State actors to challenge the security of national actors through information technology is described. After the early 1990s, with the extensive penetration of information technology in military, economic and social life, people realize that the dependence of modern society on information infrastructure is deepening. Whether this dependence will increase the vulnerability of countries to information attacks, how much of this vulnerability and how to adopt policies to deal with such problems has triggered a research boom on national information security. It is worth noting that, among the related research results, the technical analysis of information security and the research based on "information warfare" and "network centric warfare" occupy a significant advantage; in the field of international relations theory, The main research results focus more on macro-level analysis, that is, to discuss the impact of information technology on the international political system as a whole, or to discuss the impact of information technology on national security as a whole. The focus of the research is the national security in the information age. Comparatively speaking, based on the "meso" level, it is relatively difficult to focus on the formulation and content of the national information security policy. This paper attempts to take this as the breakthrough point, synthetically uses the text analysis and the case analysis method, takes the American post-Cold War national information security policy evolution as the main research object, uses the cognitive-constructional analysis frame, takes the decision-making analysis path. This paper studies the process of making national information security policy and the main factors influencing the evolution of national information security policy. This article contains three basic assumptions: 1. The cognitive factors of decision-makers play an important role in the process of making national information security policy in the United States, and the change of "cognition" about national information security constitutes the main driving force to promote the change of national information security policy. 2. The essence of the national information security policy making process of the United States is that the decision makers decide to "open" and "control" the relative weight of the process. 9 / 11 terrorist attacks make "control" replace "open" in the United States. National information security policy occupied a weak advantage. 3. International cooperation is always an integral part of the national information security policy of the United States. The purpose of the United States to promote cooperation is to achieve strict control of information on a global scale through cooperation among countries. The thesis is composed of six parts: introduction, 4 chapters and conclusion. The introduction part mainly reviews the origin and development of the national information security problem, and combs the existing research literature.
【學(xué)位授予單位】:復(fù)旦大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2005
【分類號】:D771.2
【引證文獻(xiàn)】
相關(guān)期刊論文 前3條
1 杜友文;王建冬;;美國國家信息安全政策綜述[J];晉圖學(xué)刊;2008年06期
2 孫立立;;美國信息安全戰(zhàn)略綜述[J];信息網(wǎng)絡(luò)安全;2009年08期
3 張恒山;;透視美國互聯(lián)網(wǎng)監(jiān)管的主要內(nèi)容和措施[J];中國出版;2010年13期
,本文編號:1882262
本文鏈接:http://www.sikaile.net/shekelunwen/guojizhengzhilunwen/1882262.html