当前位置:主页 > 社科论文 > 西方政治论文 >

开放、控制与合作:美国国家信息安全政策分析

发布时间:2018-05-13 07:36

  本文选题:国家信息安全 + 美国国家信息安全政策 ; 参考:《复旦大学》2005年博士论文


【摘要】:自20世纪70年代以降,信息技术随全球化的浪潮席卷全球,通过极大的降低信息发布与交流的成本,对人类社会产生了深刻的影响。这一被称为信息化的进程在冷战后得到了更加迅猛的发展。如同历史上任何一种新兴技术的出现一样,高歌猛进的信息技术同样对国际体系中最主要的行为体:国家行为体产生了重大的挑战。这一挑战的核心问题,就是国家信息安全问题。 从20世纪80年代开始,以托夫勒为代表的未来学家,以信息技术发展将不可避免的导致国家向非国家进行“权力转移”这一基本分析框架,阐述了非国家行为体可能借助信息技术对国家行为体的安全构成挑战。而在20世纪90年代初之后,随着信息技术在军事、经济与社会生活领域的广泛渗透,使得人们认识到现代社会对于信息基础设施的依赖程度正在不断加深,围绕这种依赖是否将会增加国家面对信息攻击的脆弱性,这种脆弱性究竟有多大以及国家应该如何采取何种政策来应对等问题,引发了有关国家信息安全问题的研究热潮。 值得注意的是,在有关的研究成果中,信息安全的技术分析,与基于“信息战”“网络战”“网络中心战”的研究占据了显著的优势地位;在国际关系理论研究领域,主要研究的成果更多关注的是宏观层面的分析,即讨论信息技术对于整个国际政治体系的冲击,或者是讨论信息技术对于国家安全整体的冲击,研究的落脚点是信息时代的国家安全问题。相对而言,基于“中观”层面,集中研究国家信息安全政策的制定及其内容的论著相对还比较苦乏。 本文即试图以此为突破点,综合运用文本分析和案例分析的方法,以美国冷战后国家信息安全政策的演进为主要研究对象,运用认知-建构分析框架,以决策分析的路径,研究国家信息安全政策的制定过程以及影响国家信息安全政策演变的主要因素。 本文包含三个基本假设: 1、决策者的“认知”因素在美国国家信息安全政策制定过程中发挥了重要的作用,关于国家信息安全“认知”的变化构成了推动国家信息安全政策变化的主要动力。 2、美国国家信息安全政策制定过程的实质是决策者决定“开放”与“控制”这两种手段相对比重的过程。911恐怖袭击事件的发生使得“控制”取代“开放”在美国国家信息安全政策中占据了微弱的优势。 3、国际合作始终是美国国家信息安全政策的组成部分,美国推动合作的目的是希望通过国家间的合作,在全球范围实现对于信息的严格控制。 论文由6个部分组成,分别是导论、正文4章和结论。 导论部分主要对回溯国家信息安全问题的由来与发展,梳理现有的研究文献
[Abstract]:Since the 1970s, information technology has swept the world with the tide of globalization. By greatly reducing the cost of information dissemination and communication, it has had a profound impact on human society. This process, known as information technology, developed more rapidly after the cold war. As with any emerging technology in history, advances in information technology pose major challenges to the most important actors in the international system: national actors. The core of this challenge is the issue of national information security. Since the 1980s, futurists, represented by Toffler, will inevitably lead to the basic analytical framework of "power transfer" from the state to the non-state, with the development of information technology. The potential for non-State actors to challenge the security of national actors through information technology is described. After the early 1990s, with the extensive penetration of information technology in military, economic and social life, people realize that the dependence of modern society on information infrastructure is deepening. Whether this dependence will increase the vulnerability of countries to information attacks, how much of this vulnerability and how to adopt policies to deal with such problems has triggered a research boom on national information security. It is worth noting that, among the related research results, the technical analysis of information security and the research based on "information warfare" and "network centric warfare" occupy a significant advantage; in the field of international relations theory, The main research results focus more on macro-level analysis, that is, to discuss the impact of information technology on the international political system as a whole, or to discuss the impact of information technology on national security as a whole. The focus of the research is the national security in the information age. Comparatively speaking, based on the "meso" level, it is relatively difficult to focus on the formulation and content of the national information security policy. This paper attempts to take this as the breakthrough point, synthetically uses the text analysis and the case analysis method, takes the American post-Cold War national information security policy evolution as the main research object, uses the cognitive-constructional analysis frame, takes the decision-making analysis path. This paper studies the process of making national information security policy and the main factors influencing the evolution of national information security policy. This article contains three basic assumptions: 1. The cognitive factors of decision-makers play an important role in the process of making national information security policy in the United States, and the change of "cognition" about national information security constitutes the main driving force to promote the change of national information security policy. 2. The essence of the national information security policy making process of the United States is that the decision makers decide to "open" and "control" the relative weight of the process. 9 / 11 terrorist attacks make "control" replace "open" in the United States. National information security policy occupied a weak advantage. 3. International cooperation is always an integral part of the national information security policy of the United States. The purpose of the United States to promote cooperation is to achieve strict control of information on a global scale through cooperation among countries. The thesis is composed of six parts: introduction, 4 chapters and conclusion. The introduction part mainly reviews the origin and development of the national information security problem, and combs the existing research literature.
【学位授予单位】:复旦大学
【学位级别】:博士
【学位授予年份】:2005
【分类号】:D771.2

【引证文献】

相关期刊论文 前3条

1 杜友文;王建冬;;美国国家信息安全政策综述[J];晋图学刊;2008年06期

2 孙立立;;美国信息安全战略综述[J];信息网络安全;2009年08期

3 张恒山;;透视美国互联网监管的主要内容和措施[J];中国出版;2010年13期



本文编号:1882262

资料下载
论文发表

本文链接:https://www.wllwen.com/shekelunwen/guojizhengzhilunwen/1882262.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户452e3***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com