{"title":"超越传统安全环境的网络空间信任措施:聚焦东北亚网络空间信任措施的特点","authors":"Geun-hye Kim, Kyungho Lee, Jong-in Lim","doi":"10.22883/KJDA.2015.27.1.006","DOIUrl":null,"url":null,"abstract":"This paper aims to analyze confidence-building measures (CBMs) for cyberspace taking place in Northeast Asia. Accordingly, it explores features of cyber security in the Northeast Asian region and concepts of CBMs for cyberspace. Then, it studies networks of CBMs for cyberspace that took place on the government level in the region from 2009 through the first half of 2014 by using the network analysis method, which is useful for studying current social relations. This study analyzes the structure of CBMs networks used in the region for the past six years and the actors. Conclusions of this study are as follows: First, CBMs for cyberspace in Northeast Asia are focused on the United States. Second, the CBMs in the region have similar features to those of traditional security cooperation. Thirdly, they are strongly based on realism. From the perspective of networks, this study is meaningful in that it used a macro approach to analyze CBMs, which was difficult to perform by using conventional methods.","PeriodicalId":43274,"journal":{"name":"Korean Journal of Defense Analysis","volume":"27 1","pages":"87-106"},"PeriodicalIF":0.3000,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"CBMs for Cyberspace beyond the Traditional Security Environment: Focusing on Features for CBMs for Cyberspace in Northeast Asia\",\"authors\":\"Geun-hye Kim, Kyungho Lee, Jong-in Lim\",\"doi\":\"10.22883/KJDA.2015.27.1.006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper aims to analyze confidence-building measures (CBMs) for cyberspace taking place in Northeast Asia. Accordingly, it explores features of cyber security in the Northeast Asian region and concepts of CBMs for cyberspace. Then, it studies networks of CBMs for cyberspace that took place on the government level in the region from 2009 through the first half of 2014 by using the network analysis method, which is useful for studying current social relations. This study analyzes the structure of CBMs networks used in the region for the past six years and the actors. Conclusions of this study are as follows: First, CBMs for cyberspace in Northeast Asia are focused on the United States. Second, the CBMs in the region have similar features to those of traditional security cooperation. Thirdly, they are strongly based on realism. From the perspective of networks, this study is meaningful in that it used a macro approach to analyze CBMs, which was difficult to perform by using conventional methods.\",\"PeriodicalId\":43274,\"journal\":{\"name\":\"Korean Journal of Defense Analysis\",\"volume\":\"27 1\",\"pages\":\"87-106\"},\"PeriodicalIF\":0.3000,\"publicationDate\":\"2015-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Korean Journal of Defense Analysis\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.22883/KJDA.2015.27.1.006\",\"RegionNum\":4,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Korean Journal of Defense Analysis","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.22883/KJDA.2015.27.1.006","RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
CBMs for Cyberspace beyond the Traditional Security Environment: Focusing on Features for CBMs for Cyberspace in Northeast Asia
This paper aims to analyze confidence-building measures (CBMs) for cyberspace taking place in Northeast Asia. Accordingly, it explores features of cyber security in the Northeast Asian region and concepts of CBMs for cyberspace. Then, it studies networks of CBMs for cyberspace that took place on the government level in the region from 2009 through the first half of 2014 by using the network analysis method, which is useful for studying current social relations. This study analyzes the structure of CBMs networks used in the region for the past six years and the actors. Conclusions of this study are as follows: First, CBMs for cyberspace in Northeast Asia are focused on the United States. Second, the CBMs in the region have similar features to those of traditional security cooperation. Thirdly, they are strongly based on realism. From the perspective of networks, this study is meaningful in that it used a macro approach to analyze CBMs, which was difficult to perform by using conventional methods.
期刊介绍:
Since its first publication in 1989, The Korean Journal of Defense Analysis has been covering a broad range of topics related to foreign policy, defense and international affairs in the Asia-Pacific region. As the oldest SSCI registered English journal of political science in Asia, The Korean Journal of Defense Analysis has promoted efforts to provide an arena for sharing initiatives and new perspectives on military and security issues of the Asia-Pacific region. To offer better support to this idea of active intercommunication amongst scholars and defense experts around the globe, The Korean Journal of Defense Analysis made a decision to publish quarterly, starting from 2005.