期刊文献+

美国网络空间安全的安全叙述建构——基于《美国国家安全战略》的话语分析(1987-2017) 被引量:5

The Construction of Security Narrative of U.S.Cyberspace Security:A Discourse Analysis of U.S.National Security Strategy(1987-2017)
下载PDF
导出
摘要 [目的/意义]随着互联网及信息通讯技术的飞速发展,人类生活的各个领域与网络空间的联系日益密切,网络空间安全日益成为美国国家安全的重要议题。[方法/过程]借助安全叙述的理论框架,以17份《美国国家安全战略》为研究材料,通过话语分析的方式,探究美国政府是如何构建网络空间安全的安全叙述。[结果/结论]在此基础之上,归纳出美国网络空间安全的安全叙述的三大基本特征及深层动因,并结合这些特征对于未来大国权力博弈的领域作出展望。 [Purpose/Significance]With the rapid development of the Internet and information communication technology,every domain of human life has been closely linked with cyberspace,and cyberspace security is gradually topping the agenda of U.S.national security.[Method/Process]Based on the theoretical framework of security narrative,it employs 17 copies of U.S.National Security Strategy as research materials,takes the approach of discourse analysis,and further explores the construction of security narrative of U.S.cyberspace security.[Result/Conclusion]Under such premise,it generalizes three principal features and underlying dynamics of security narrative of U.S.cyberspace security,and combined with the aforesaid features,makes prospect of future arena in which the power game of great powers takes place.
作者 王守都 Wang Shoudu(Nanjing University, Nanjing 210023)
机构地区 南京大学
出处 《情报杂志》 CSSCI 北大核心 2021年第3期104-111,38,共9页 Journal of Intelligence
关键词 网络空间安全 安全叙述 《美国国家安全战略》 话语分析 技术民族主义 cyberspace security security narrative U.S.national security strategy discourse analysis techno-nationalism
  • 相关文献

参考文献3

二级参考文献117

  • 1刘德斌.冷战后的美国政治与美国外交[J].吉林大学社会科学学报,1996,36(2):1-8. 被引量:3
  • 2张继业,郭晓兵.2006年《美国国家安全战略报告》评析[J].现代国际关系,2006(4):55-59. 被引量:14
  • 3潘志高,倪海宁.美国2006年度《国家安全战略》报告浅析[J].国际论坛,2006,8(4):18-23. 被引量:3
  • 4Robert O. Keohane, "International Institutions : Two Approaches, "International Studies Quarterly, Vol. 32,No. 4, 1988,pp.379-396.
  • 5Michael Dillon, "The Alliance of Security and Subjectivity ," Current Research on Peace and Violence, Vol. 13,No. 3, p. 102.
  • 6David Campbell, "Global Inscription : How Foreign Policy Constitutes the United States, "Alternatives, Vol.15,No. 3, 1990, p. 270.
  • 7R. B. J. Walker, "Realism, Change and International Political Theory," lntentational Studies Quarterly,Vol. 31,No. 1,1987,pp.65-86.
  • 8R. B. J. Walker, "Security, Sovereignty, and the Challenge of World Politics," Alternatives, Vol. 15, No. 1,1990, pp. 3-27.
  • 9Lene Hansen, Security as Practice: Discourse Analysis and the Bosnian War, London: Routledge,2006.
  • 10William E. Connolly, Identity/Difference: Democratic Negotiations of Political Paradox, Ithaca: Cornell U- niversity Press, 1991, pp. 209-210.

共引文献46

引证文献5

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部