查詢結果分析
來源資料
第1筆 /總和 1 筆
/ 1 筆
頁籤選單縮合
題 名 | 網路作戰安全與管理主題實證探索之研究--使用GHSOM技術=The Study on Exploring the Topics of Cyber Warfare Security and Management: Using Growing Hierarchical Self-Organizing Map |
---|---|
作 者 | 陳良駒; 范俊平; 謝佳容; | 書刊名 | 資訊管理學報 |
卷 期 | 23:1 2016.01[民105.01] |
頁 次 | 頁99-128 |
分類號 | 592.59 |
關鍵詞 | 網路作戰; 文字探勘; 增長階層式自組織映射圖; Cyber warfare; Text mining; Growing hierarchical self-organizing map; |
語 文 | 中文(Chinese) |
中文摘要 | 網際空間係由相互依存的資訊技術與網路基礎建設所構成的複雜環境,西方國家紛紛推出網際空間戰略,以加強對網際網路的控制與主導,制網路權也是我方近年不斷推動國防現代化與軍事事務革新的重要目標。面對中國「網軍」強大的威脅,本研究目的希望「以敵為師」了解對岸在網際空間作戰的攻防技術與支援規劃。研究中蒐整共計1358篇中國網路作戰相關文獻,據以建構「網路作戰安全與管理」概念詞彙,透過增長階層式自組織映射圖(growing hierarchicalself-organizing map; GHSOM)的分群技術來建構詞彙的主題類別與層級關係,再進行成果歸納及實證分析。研究成果不僅了解中國大陸在網路作戰安全與管理議題上的重要發展及趨勢,也提供各國政府在網路空間戰略策進之參考。 |
英文摘要 | Purpose-In resistance to the enormous threats from the "Cyber Force" over the Internet, this research aims to examine both attacking and defending techniques, as well as the supporting plans from the People's Republic of China (ROC). This study employs the growing hierarchical self-organizing map (GHSOM) to construct the topic categories and hierarchy of vocabularies as a reference for enhancing the cyberspace war-fighting strategy. Design/methodology/approach-The framework of this study can be divided into 3 phases, "Data Collection," "Terminology Process," and "Cluster Analysis." In this research, based on 1,358 PRC's articles focusing on the cyber warfare from 2000 to 2010, a set of terminologies regarding "cyber warfare security and management" was constructed. The topic categories and hierarchy of vocabularies were constructed by using the clustering technique of the GHSOM. The results were then concluded and verified. Findings-The results point out 16 important categories of the cyber warfare, such as "Network Attack Techniques," "Intrusion Detection Security Management," "Network Defense Strategy and Technology," and "Cyber Warfare Strategy and Benefits," etc. The fundamental contributions of this paper can be considered at three different levels: (1)providing a better knowledge representation strategy for the current military observers; (2)discussing progress on the implementation of 5 integrative viewpoints of cyber warfare; and (3)providing 6 cyberspace war-fighting strategies. Practical implications-The results provide an understanding on the subject matter regarding the important development and trend of the cyber warfare security and management, as well as a reference for enhancing the cyberspace war-fighting policies. Originality/value-This paper illustrates a novel application for the military and demonstrates the way to apply the proposed framework to building an objective analysis. The study describes the individual layer of the hierarchy, and identifies means to improving the effectiveness of collective knowledge via practice perspectives. It helps the readers form an understanding on the cyber warfare attacking and defending techniques, as well as the supporting plans. |
本系統中英文摘要資訊取自各篇刊載內容。