• 沒有找到結果。

研究限制與未來展望

第五章 結論與展望

第二節 研究限制與未來展望

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

127

不過,可以確定的是,除了恐怖份子之外,無人願意見到網路恐怖主義出現 實際案例。如果欠缺真實案例的情況能夠長久維持下去,即使各界的爭論可能將 永無休止,但是從中激發出的持續思辨與論證,對於維護人類安全而言,無疑具 有正面幫助。筆者衷心期盼,眾多對於恐怖主義的相關研究,以及各國為反恐行 動所付出的一切努力與犧牲,能夠確保網路恐怖主義始終僅存在於理論層次。

第二節 研究限制與未來展望

在研究過程之中,筆者曾遭遇某些研究困境,同時受限於研究範圍,亦不得 不忽略某些無法顧及之議題領域,本節將一併說明之。此外,做為全篇論文之結 語,本節也將討論對於未來相關研究之期許及展望,嘗試提供後繼研究者若干論 述基礎。

壹、研究限制

首先,世界各國皆未曾出現實際的網路恐怖主義攻擊案例,因此在缺乏真實 個案的情況下,筆者僅能針對現有的文獻進行整理與分析;在美國政府相關防治 政策方面,由於無從觀察歷年來網路恐怖主義攻擊之次數增減變化,以做為衡量 指標,導致如何準確且有效地評估政策執行之具體成效,亦成為研究過程中的一 大難題。

目前國內針對網路恐怖主義議題之相關研究著作數量尚不豐富,筆者因而必 須盡可能參考眾多英文文獻,以搜集足夠的研究資料。然而,語言的隔閡仍不免 造成若干文意解讀方面的誤解或錯譯,力有未殆之處,尚有待諸多先進與後續研 究者的批評和指正。除此之外,英文文獻的可取得性,頗大程度上也受限於國內 相關資料庫所能搜尋和借閱的範圍,在筆者搜集到的研究資料之中,是否有遺珠 之憾,實不無可能。

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

128

不僅如此,由於網際網路活動具有高度匿名性和匿蹤性之特色,而恐怖組織 與駭客亦多為秘密團體,一般人無從參與或了解,因此在研究過程之中,極不容 易取得恐怖份子及駭客之真實身分、行為模式、活動時間、組織結構、線上聊天 室之位置,以及相互連結關係等第一手資料,絕大部分只能透過相關文獻取得間 接資訊,難免在一定程度上影響本論文對於研究議題之探討和解讀。

另一方面,美國政府防治網路恐怖主義之相關政策,無疑加強了對於網際網 路之監控或管制,固然是為了降低網路恐怖攻擊的發生機率,不過,政策執行過 程所引發之各種關於侵害人權與違反言論自由的議論和疑慮,以及政府應當如何 在反恐政策與人權價值之間取得適當平衡等等,也是目前各界熱烈討論及批評的 一項重要議題。舉例而言,對於美國政府是否應該追查並關閉疑似由恐怖份子或 駭客所架設的特定網站,便出現相左之意見。1然而,本論文礙於研究範圍所限,

為求研究議題之集中,並未嘗試觸及上述之議題領域,亦是本論文有所欠缺之 處,有待後續研究者進行補充。

最後,美國政府所持有之諸多機密資料,以及關鍵基礎設施內部之技術文 件,限於保密機制及專業學識,亦不在筆者能夠接觸與理解的範圍,從而無法更 深入地理解目前相關政策與防衛體系的發展情況,這個問題確實是本論文難以克 服之障礙。

貮、未來展望

本論文已對於網路恐怖主義之界定、威脅程度,以及美國政府至目前為止相 關防治政策的發展概況,進行建構、整理和分析。但是筆者也必須強調,隨著網 路科技的快速發展,各種安全防護軟體和惡意程式的持續開發和制衡、駭客技術 及知識的交流與傳播、關鍵基礎設施的互賴性和相互連結性持續提高,以及新世 代恐怖份子正學習相關知識,或嘗試與駭客合作等等趨勢,皆可能使得本論文所        

1 Carla Mooney, Online Social Networking (Farmington Hills, MI: Lucent Books, 2009), pp. 84-85.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

129

提出的網路恐怖主義之界定,以及威脅程度之評估,都必須隨著情勢變化而進行 修正。

此外,美國政府相關防治政策在未來的發展走向,例如保護各項關鍵基礎設 施之權責,是否將繼續集中於國土安全部,以及與各國之間各層面的互動及協調 措施等等,都值得持續觀察,也是後繼研究者可以關注之焦點。

網際網路既然是全球化現象之重要推手,網路恐怖主義自然也是世界各國與 國際組織必須重視之潛在威脅,尤其是對於網路科技依賴程度甚高的各個先進國 家而言,網路恐怖主義對它們的威脅,也遠大於其他國家。雖然筆者僅針對美國 防治政策進行分析,但是就如同全球化所帶來之其他負面效應一般,網路恐怖主 義同樣需要各國及國際組織通力合作,降低其攻擊發生的可能性,美國政府也早 已意識到這點,大力提倡全球性的對話與協調。關於各國家行為者如何在法律規 範、組織架構及防治政策等各個層面進行有效整合,以及國家應如何以全球視角 看待網路恐怖主義的潛在威脅及發展趨勢等等,皆是相關研究可以深入發展的空 間,筆者也期待未來的研究者能夠多加著墨。

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

130

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

131

參考文獻

中文部分

一、專書

王銘勇,《網路犯罪相關問題之研究》。臺北:司法院,2002。

方天賜、孫國祥,「民族主義與恐怖主義」,收於張亞中主編,《國際關係總論》,

二版,頁193-218。臺北:揚智,2007。

李明峻,「美國國土安全部的設置與功能」,收於邱稔壤主編,《國際反恐與亞太 情勢》。臺北:國立政治大學國際關係研究中心,2004,頁 251-285。

李偉主編,《國際恐怖主義與反恐怖鬥爭年鑑》。北京:時事,2004。

宋興洲,「科技在恐怖主義與反恐行動中所扮演的角色」,收於姜新立、張錦隆主 編,《政治與資訊的交鋒》,頁53-89。臺北:揚智,2010。

林山田,《刑事法論叢(一)》。臺北:臺灣大學法學院圖書部,1997。

林宜隆,《網際網路與犯罪問題之研究》。桃園:中央警察大學出版社,2000。

林義貴,《資訊社會與網路犯罪》。臺北:華立,2005。

邱伯浩,《恐怖主義與反恐》。臺北:新文京,2006。

吳永宗,《電腦運用所衍生法律問題之研究》。臺北:司法院,1998。

馬進保、袁廣林,《高科技犯罪研究》。北京:中國人民公安大學出版社,2008。

許武峰,《電腦犯罪理論與實務問題研究》。臺北:司法院,1998。

黃秋龍,《兩岸總體安全下的非傳統威脅》。臺北:法務部調查局展望與探索雜誌 社,2010。

蔡瑋,「冷戰後的國際恐怖主義:趨勢與挑戰」,收於邱稔壤主編,《國際反恐與 亞太情勢》。臺北:國立政治大學國際關係研究中心,2004,頁 7-29。

蔡翠紅,《美國國家信息安全戰略》。上海:學林,2009。

Bhatnagar, S., Encyclopaedia of Cyber and Computer Hacking, Vol. 1 & 5 (Delhi:

Anmol Publications, 2009).

Brenner, S. W., “Cybercrime: Re-thinking Crime Control Strategies,” in Yvonne Jewkes, ed., Crime Online (Portland: Willan Publishing, 2007), pp. 12-28.

Clarke R. A., & Knake, R. K., Cyber War: The Next Threat to National Security and

What to Do About It (New York: Ecco, 2010).

Colarik, A. M., Cyber Terrorism: Political and Economic Implications (Hershey, PA:

Idea Group, 2006).

Cordesman A. H., & Cordesman, J. G., Cyber-threats, Information Warfare, and

Critical Infrastructure Protection: Defending the U.S. Homeland (Westport,

CT: Praeger, 2002).

Curran, K., Concannon, K., & McKeever, S., “Cyber Terrorism Attacks,” in Lech J.

Janczewski & Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (Hershey, PA: Information Science Reference, 2008), pp. 1-6.

Dass, N., Globalization of Terror: A Threat to Global Economy (New Delhi: MD Publications, 2008).

Denning, D. E., “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” in John Arquilla & David Ronfeldt, eds.,

Networks and Netwars: The Future of Terror, Crime, and Militancy (Santa

Monica, CA: RAND, 2001), pp. 239-288.

Finch, S., “Cyber-terrorism Poses a Serious Threat to Global Security,” in Louise I.

Gerdes, ed., Cyber Crime (Farmington Hills, MI: Greenhaven Press, 2009), pp. 35-39.

Goodman, M. D., “Understanding International ‘Cyberterrorism’: A Law Enforcement

Perspective,” in Cecilia S. Gal, Paul B. Kantor, & Bracha Shapira, eds.,

Security Informatics and Terrorism: Patrolling the Web (Washington, DC: IOS

Press, 2008), pp. 8-16.

Green, J., “The Problem of Cyberterrorism is Exaggerated,” in Louise I. Gerdes, ed.,

Cyber Crime (Farmington Hills, MI: Greenhaven Press, 2009), pp. 40-50.

Higgins, G. E., Cybercrime: An Introduction to an Emerging Phenomenon (New York: McGraw-Hill, 2010).

Jaeger, C., “Cyberterrorism,” in Hossein Bidgoli, ed., The Internet Encyclopedia, Vol.

1 (New York: John Wiley & Sons, 2003), pp. 353-371.

________, “Cyberterrorism and Information Security,” in Hossein Bidgoli, ed.,

Global Perspectives in Information Security: Legal, Social, and International Issues (Hoboken, NJ: John Wiley & Sons, 2009), pp. 127-180.

Mooney, C., Online Social Networking (Farmington Hills, MI: Lucent Books, 2009).

National Research Council, Computers at Risk: Safe Computing in the Information

Age (Washington, DC: National Academies Press, 1991).

Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G.,

Cyberterror:

Prospects and Implications (

Monterey, CA: Center for the Study of Terrorism and Irregular Warfare, Naval Post Graduate School, 1999

).

O’Brien, K. A., “Information Age Terrorism and Warfare,” in David M. Jones, ed.,

Globalisation and the New Terror: The Asia Pacific Dimension (Northampton,

MA: Edward Elgar Publishing, 2004), pp. 127-158.

Owen, R. S., “Infrastructures of Cyber Warfare,” in Lech J. Janczewski & Andrew M.

Colarik, eds., Cyber Warfare and Cyber Terrorism (Hershey, PA: Information Science Reference, 2008), pp. 35-41.

Özeren, S., “Cyberterrorism and International Cooperation: General Overview of the Available Mechanisms to Facilitate an Overwhelming Task,” in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, ed., Responses to

Cyber Terrorism (Washington, DC: IOS Press, 2008), pp. 70-88.

Pasley, J. F., “United States Homeland Security in the Information Age,” in Michael Pittaro, ed., Cybercrime: Current Perspectives from InfoTrac®, 2nd ed., (Belmont, CA: Wadsworth, 2010), pp. 127-135.

Portnoy M., & Goodman, S., eds., Global Initiatives to Secure Cyberspace: An

Emerging Landscape (New York: Springer, 2009).

Rhodes, R., Cyber Meltdown: Bible Prophecy and the Imminent Threat of

Cyberterrorism (Eugene, OR: Harvest House, 2011).

Ross, J. I., Criminal Investigations: Cybercrime (New York: Chelsea House, 2010).

Schell, B. H., & Martin, C., Cybercrime: A Reference Handbook (Santa Barbara, CA:

ABC-CLIO, 2004).

Stiennon, R., Surviving Cyberwar (Lanham, MD: Government Institutes, 2010).

Sundaram, P. M. S., & Jaishankar, K., “Cyber Terrorism: Problems, Perspectives, and Prescription” in Frank Schmalleger & Michael Pittaro, eds., Crimes of the

Internet (Upper Saddle River, NJ: Pearson Education, 2009), pp. 593-611.

Taylor, P. A., & Harris, J. Ll., “Hacktivism,” in Hossein Bidgoli, ed., Global

Perspectives in Information Security: Legal, Social, and International Issues

(Hoboken, NJ: John Wiley & Sons, 2009), pp. 295-317.

Tikk, E., & Oorn, R., “Legal and Policy Evaluation: International Coordination of Prosecution and Prevention of Cyber Terrorism,” in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, ed., Responses to Cyber

Terrorism (Washington, DC: IOS Press, 2008), pp. 89-103.

Weimann, G., Terror on the Internet: The New Arena, the New Challenges (Washington, DC: United States Institute of Peace, 2006).

Wilson, C., Computer Attack and Cyberterrorism (New York: Nova Science, 2009).

二、期刊論文

Brenner, S. W., “‘At Light Speed’: Attribution and Response to Cybercrime/Terrorism/Warfare,” The Journal of Criminal Law and

Criminology, Vol. 97, No. 2 (Winter, 2007), pp. 379-475.

Cohen, A., “Cyberterrorism: Are We Legally Ready?” Journal of International

Business & Law, Vol. IX, No. 1 (Spring 2010), pp. 1-40.

Conway, M., “What Is Cyberterrorism?” Current History, Vol. 101, No. 659 (December 2002), pp. 436-442.

Green, J., “The Myth of Cyberterrorism,” Washington Monthly, Vol. 34, No. 11 (November 2002), pp. 8-13.

Haimes, Y. Y., “Risk of Terrorism to Cyber-Physical and Organizational-Societal Infrastructures,” Public Works Management & Policy, Vol. 6, No. 4 (April 2002), pp. 231-240.

Jarmon, J., “Cyber-terrorism,” Journal on Terrorism and Security Analysis, Vol. 6 (April 2011), pp. 102-117.

Jones, A., “Cyber Terrorism: Fact or Fiction,” Computer Fraud and Security, Vol.

2005, No. 6 (June 2005), pp. 4-7.

Naím, M., “The Five Wars of Globalization,”Foreign Policy, No. 134 (January/February 2003), pp. 28-36.

Parks, C., “Cyber Terrorism: Hype or Reality?” The Journal of Corporate Accounting

& Finance, Vol. 14, No. 5 (July/August 2003), pp. 9-11.

Stohl, M., “Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?” Crime, Law and Social Change, Vol. 46, No. 4-5 (December 2006), pp. 223-238.

Thomas, T. L., “Al Qaeda and the Internet: The Danger of ‘Cyberplanning’,”

Parameters, Vol. 33, No. 1 (Spring 2003), pp. 112-123.

Weimann, G., “Cyberterrorism: The Sum of All Fears?” Studies in Conflict &

Terrorism, Vol. 28, Iss. 5 (2005), pp. 129-149.

 

三、網路資料

“About the National Counterterrorism Center,” <http://www.nctc.gov/about_us/

about_nctc.html>(Retrieved on June 28, 2012).

“About the Office of Infrastructure Protection,” <http://www.dhs.gov/xabout/

structure/gc_1185203138955.shtm>(Retrieved on June 22, 2012).

“Air Force Mission,” < http://www.af.mil/main/welcome.asp > (Retrieved on February 19, 2012).

Arquilla, J., & Ronfeldt, D., “Cyberwar is Coming!” in John Arquilla & David Ronfeldt, eds., In Athena's Camp: Preparing for Conflict in the Information

Age (Santa Monica: RAND, 1997), pp. 23-60, <http://www.rand.org/content/

dam/rand/pubs/monograph_reports/MR880/MR880.ch2.pdf > (Retrieved on February 23, 2012).

“Background Note: Estonia,” < http://www.state.gov/r/pa/ei/bgn/5377.htm > (Retrieved on February 29, 2012).

Caruso, J. T., “Combating Terrorism: Protecting the United States,” before the House Subcommittee on National Security, Veterans Affairs, and International Relations, Washington, DC, March 21, 2002, <http://www.fbi.gov/news/

testimony/combating-terrorism-protecting-the-united-states > (Retrieved on February 9, 2012).

Clark, T., “Clinton Outlines Cyberthreat Plan,” <http://news.cnet.com/

Clinton-outlines-cyberthreat-plan/2100-1023_3-211497.html > (Retrieved on February 1, 2012).

“Convention on Cybercrime,” <http://conventions.coe.int/Treaty/en/Treaties/Html/

185.htm>(Retrieved on June 29, 2012).

“Convention on Cybercrime, CETS No.: 185,” <http://conventions.coe.int/Treaty/

Commun/ChercheSig.asp?NT=185&CL=ENG>(Retrieved on July 9, 2012).

Conway, M., “Cyberterrorism and Terrorist ‘Use’ of the Internet,” First Monday, Vol.

7, No. 11 (4 November 2002), <http://www.uic.edu/htbin/cgiwrap/bin/ojs/

index.php/fm/article/view/1001/922>(Retrieved on February 10, 2012).

“Critical Infrastructure Sector Partnerships,” <http://www.dhs.gov/files/

partnerships/editorial_0206.shtm>(Retrieved on June 22, 2012).

“Cybercrime,” <http://www.interpol.int/content/download/805/6671/version/10/file/

FHT02.pdf>(Retrieved on February 23, 2012).

“Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure,” <http://www.whitehouse.gov/assets/

documents/Cyberspace_Policy_Review_final.pdf > (Retrieved on June 30, 2012).

“Cyber Storm: Securing Cyber Space,” <http://www.dhs.gov/files/training/

gc_1204738275985.shtm>(Retrieved on June 29, 2012).

“Defending America's Cyberspace: National Plan for Information Systems Protection, Version 1.0,” <http://www.fas.org/irp/offdocs/pdd/CIP-plan.pdf>(Retrieved on June 19, 2012).

Denning, D. E., “Cyberterrorism,” testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives, May 23, 2000, <http://www.cs.georgetown.edu/~denning/infosec/

cyberterror.html>(Retrieved on June 19, 2012).

________, “Is Cyber Terror Next?” <http://essays.ssrc.org/sept11/essays/denning.

htm>(Retrieved on June 30, 2012).

“Department of Defense Dictionary of Military and Associated Terms,” p. 368, < http://ra.defense.gov/documents/rtm/jp1_02.pdf > (Retrieved on June 13, 2012).

“Estonian DDoS - A Final Analysis,” <http://www.h-online.com/security/news/item/

Estonian-DDoS-a-final-analysis-732971.html>(Retrieved on March 1, 2012).

“Executive Order 13010, EO 13010: Critical Infrastructure Protection, July 15, 1996,”

<http://www.fas.org/irp/offdocs/eo13010.htm>(Retrieved on June 17, 2012).

“Executive Order 13231 of October 16, 2001: Critical Infrastructure Protection in the

“Executive Order 13231 of October 16, 2001: Critical Infrastructure Protection in the