| 研究生: |
林文棟 Lin, Wen-Tung |
|---|---|
| 論文名稱: |
評估資訊安全韌性:政策導向之價值 Evaluating the Cybersecurity Resilience: Guiding Values for Policy |
| 指導教授: |
蔣麗君
Chiang, Li-Chun |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
社會科學院 - 政治學系 Department of Political Science |
| 論文出版年: | 2025 |
| 畢業學年度: | 113 |
| 語文別: | 英文 |
| 論文頁數: | 194 |
| 中文關鍵詞: | 資訊安全 、資訊安全韌性 、資訊安全政策 、政策分析 、方案評估 、政府機關績效衡量 |
| 外文關鍵詞: | Cybersecurity, Cybersecurity Resilience, Cybersecurity Policy, Policy Analysis, Program Evaluation, Performance Measurement of Governmental Organizations |
| 相關次數: | 點閱:15 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
2016 年,臺灣總統蔡英文提出「資安即國安」的宣示。面對日益嚴峻的網路攻擊,尤其針對政府部門的攻擊日益頻繁,探究臺灣政府如何透過資訊安全政策維護資通安全,已成為當務之急。在這個數位化與高度相互連結的時代,網路攻擊已不可避免。2024年政府機關資通安全威脅偵測管理偵測到約 86.6 萬次針對政府組織的攻擊行為,自2022 年以來,政府機關與負責關鍵基礎設施的特定非政府組織,每年已通報超過 1,000 起資訊安全事件。為應對網路威脅,臺灣自 2001年起陸續推動資訊安全政策與全國性資訊安全方案。最新的「第六期國家資通安全發展方案」旨在建構主動防禦的網路體系,打造一個具備韌性、安全且智慧的國家,足以抵禦並處理各類網路威脅。
本研究旨在評估臺灣政府機關實施資訊安全韌性措施的現況,依據網路韌性的理論架構與臺灣現行資訊安全政策、法規與發展方案的脈絡,建構資訊安全韌性評估架構。透過該架構評估地方政府機關的執行資訊安全韌性措施的成效,進而提供第六期資訊安全方案成效的實證證據。本研究聚焦於兩項主要研究問題,第一項主要研究問題: 臺灣地方政府機關目前資訊安全韌性措施的落實情形為何?並進一步透過四個次級研究問題探討地方政府機關如何準備應對網路攻擊?在網路攻擊事件發生時地方政府機關如何進行應變? 於網路攻擊事件後地方政府機關如何恢復運作?於網路攻擊事件結束後地方政府機關如何進行調適與學習?第二項主要研究問題主要探討哪些因素與網路安全韌性的建構與實施相關。
本研究採用質性研究方法,透過半結構式(半開放式)問卷蒐集地方政府之資料,並以本研究建構之資訊安全韌性評估架構,將政府回應其所實施的資訊安全韌性措施,依據三級等級標準進行評分。研究結果顯示,臺灣地方政府機關已具備一定程度的資訊安全韌性能力,「第六期國家資通安全發展方案」在推動資訊安全與韌性方面,已初步達成其政策目標: 打造一個安全、韌性的國家。
In 2016, Taiwanese President Tsai Ing-wen stated that “cybersecurity is national security”. As Taiwan has encountered severe cyberattacks, especially in the governmental sector, it is necessary to understand how the Taiwanese government implements cybersecurity policy to ensure security in this digitalized and electrified era. Around 866 thousand cyberattacks targeted at governmental organizations were detected in 2024. Governmental organizations and specific non-government agencies responsible for critical infrastructure reported more than 1,000 cyberattack incidents that have intruded on governmental systems since 2022. To solve the cyberattack problems and ensure cybersecurity, the government has implemented cybersecurity policies and different programs since 2001. The latest sixth cybersecurity program aims to build an active defense network and create a resilient, secure, and smart country to withstand and handle cyberattacks. This study conducts a compliance evaluation on the implementation of cybersecurity resilience measures in local governmental organizations and analyzes and evaluates the cybersecurity program and policy.
This research develops a cybersecurity resilience evaluation framework based on the context of Taiwanese cybersecurity policy, program, law, and regulations. This evaluation framework aims to measure the performance of governmental organizations’ implementation of cybersecurity resilience measures. The results of performance measurement offer evidence to determine the achievement of the sixth cybersecurity program. This research addresses two main research questions, followed by four sub-research questions in the first main research question. The main Research Question aims to investigate the implementations of cybersecurity resilience measures in Taiwanese local governmental organizations. The sub-questions investigate how local governmental organizations implement cybersecurity resilience measures to prepare for cyberattack incidents, respond to cyberattack incidents, recover from cyberattack incidents, and adapt and learn after the end of cyberattack incidents. The second main research question focuses on analyzing the factors related to cybersecurity resilience. This research question aims to understand what factors strengthen or weaken cybersecurity resilience measures implemented in local governmental organizations.
This qualitative study conducts a semi-structured questionnaire to collect governmental data. The collected survey data is evaluated and rated from level 1 to level 3, based on the cybersecurity resilience evaluation framework developed in this study. The results of performance measurement show that Taiwanese local governmental organizations have achieved cybersecurity resilience capacity to address cyberattacks, and the cybersecurity program has achieved its objectives to create a secure and resilient country. Policy implications, recommendations, and political economy implications are illustrated in the discussion section.
Administration for Cyber Security. (2022). Cyber Security Policies and Regulations. https://moda.gov.tw/en/ACS/operations/policies-and-regulations/648.
Aghazadeh Ardebili, A., Lezzi, M., & Pourmadadkar, M. (2024). Risk Assessment for Cyber Resilience of Critical Infrastructures: Methods, Governance, and Standards. Applied Sciences, 14(24), 11807. https://doi.org/10.3390/app142411807.
Ahmeti, R., & Vladi, B. (2017). Risk Management in Public Sector: A Literature Review. European Journal of Multidisciplinary Studies, 5, 323–329. https://doi.org/10.26417/ejms.v5i1.p323-329.
Alrubaiq, A., & Alharbi, T. (2021). Developing a Cybersecurity Framework for E-Government Project in the Kingdom of Saudi Arabia. Journal of Cybersecurity and Privacy, 1(2), 302–318. https://doi.org/10.3390/jcp1020012.
Antunes, M., Maximiano, M., Gomes, R., & Pinto, D. (2021). Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal. Journal of Cybersecurity and Privacy, 1(2), 219–238. https://doi.org/10.3390/jcp1020012.
Araujo, M. S. d., Machado, B. A. S., & Passos, F. U. (2024). Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance. Applied Sciences, 14(5), 2116. https://doi.org/10.3390/app14052116.
Arief, A. R. (2022). An Analysis of Cybersecurity Policies and Practices in Public Administration. Journal of Public Representative and Society Provision, 2(2), 88–100. https://doi.org/10.55885/jprsp.v2i2.211.
Awa, H.O., Ukoha, O. and Igwe, S.R. (2017), Revisiting Technology-Organization-Environment (T-O-E) Theory for Enriched Applicability. The Bottom Line, 30(1) pp. 2-22. https://doi.org/10.1108/BL-12-2016-0044.
Blättler, S., & Hunziker, S. (2022). Public Administration Risk Management. In A. Farazmand (Ed.), Global Encyclopedia of Public Administration, Public Policy, and Governance (pp. 10525–10529). Cham: Springer International Publishing.
Bolson, N., Yutkin, M., Rees, W., & Patzek, T. (2022). Resilience Rankings and Trajectories of World's Countries. Ecological Economics, 195, 107383. https://doi.org/10.1016/j.ecolecon.2022.107383.
Bracci, E., Tallaki, M., Gobbo, G., & Papi, L. (2021). Risk Management in the Public Sector: A Structured Literature Review. International Journal of Public Sector Management, 34(2), 205–223. https://doi.org/10.1108/IJPSM-02-2020-0049.
Brezavšček, A., & Baggia, A. (2025). Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review. Systems, 13(1), 52. https://doi.org/10.3390/systems13010052.
Browne, J., Coffey, B., Cook, K., Meiklejohn, S., & Palermo, C. (2019). A Guide to Policy Analysis as a Research Method. Health Promotion International, 34(5), 1032–1044. https://doi.org/10.1093/heapro/day052.
Buchanan, J.M. & Tullock, G. (1962). The Calculus of Consent: Logical Foundations for Constitutional Democracy. The University of Michigan Press.
Bygrave, L. A. (2022). Cyber Resilience versus Cybersecurity as Legal Aspiration. Proceeding of the 2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon), pp. 27-43. https://doi.org/10.23919/CyCon55549.2022.9811084.
Cains, M. G., Flora, L., Taber, D., King, Z., & Henshel, D. S. (2022). Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context Using Expert Elicitation. Risk Analysis, 42(8), 1643–1669. https://doi.org/10.1111/risa.13687.
Clement, J., Esposito, G., & Crutzen, N. (2023). Municipal Pathways in Response to COVID-19: A Strategic Management Perspective on Local Public Administration Resilience. Administration & Society, 55(1), 3-29. https://doi.org/10.1177/00953997221100382.
Chang, K., & Huang, H. (2023). Exploring the Management of Multi-Sectoral Cybersecurity Information-Sharing Networks. Government Information Quarterly, 40(4), 101870. https://doi.org/10.1016/j.giq.2023.101870.
Chang, C. H. (2023). How Does the Tallinn Manual 2.0 Shed Light on the Threat of Cyber Attacks against Taiwan? European Conference on Cyber Warfare and Security, 22, 649–656. https://doi.org/10.34190/eccws.22.1.1294.
Control Yuan. (2023). The Control Yuan Report. https://www.cy.gov.tw/CyBsBoxContent.aspx?n=133&s=28320.
Cronstedt, M. (2002). Prevention, Preparedness, Response, Recovery - An Outdated Concept? The Australian journal of emergency management, 17, 10. https://knowledge.aidr.org.au/resources/ajem-aug-2002-prevention-preparedness-response-recovery-an-outdated-concept/.
Dong, K., Zhen, J., Xie, Z., and Chen, L. (2025). Building Cybersecurity Resilience: Integrating Defense and Recovery Investment Strategies in an Expected Resilience Framework. Journal of Enterprise Information Management, Vol. 38 No. 2, pp. 502-531. https://doi.org/10.1108/JEIM-04-2023-0189.
Duit, A. (2016). Resilience Thinking: Lessons for Public Administration. Public Administration, 94(2), 364–380. https://doi.org/10.1111/padm.12182.
Dunn Cavelty, M., Eriksen, C., & Scharte, B. (2023). Making Cyber Security More Resilient: Adding Social Considerations to Technological Fixes. Journal of Risk Research, 26(7), 801–814. https://doi.org/10.1080/13669877.2023.2208146.
Elkbuli, A., Herrera, M., Awan, M., & Elassad, C. (2021). Striving towards an Effective Emergency Preparedness and Disaster Management Response: Lessons Learned and Future Directions. The American Journal of Emergency Medicine, 50, 804–805. https://doi.org/10.1016/j.ajem.2021.03.036.
Espinosa, V. I., & Pino, A. (2024). E-Government as a Development Strategy: The Case of Estonia. International Journal of Public Administration, 1-14. https://doi.org/10.1080/01900692.2024.2316128.
Fatima, F., Hyatt, J. C., Rehman, S. U., De La Cruz, E., Nadella, G. S., & Meduri, K.(2024). Resilience and Risk Management in Cybersecurity: A Grounded Theory Study of Emotional, Psychological, and Organizational Dynamics. Journal of Economy and Technology, 2, 247–257. https://doi.org/10.1016/j.ject.2024.08.004.
Ferlie, E., Ashburner, L., Fitzgerald, L., & Pettigrew, A. (1996). The New Public Management in Action. Oxford University Press. https://doi.org/10.1093/acprof:oso/9780198289029.001.0001.
Fernandez de Arroyabe, J. C., Arroyabe, M. F., Fernandez, I., & Arranz, C. F. A. (2023). Cybersecurity Resilience in SMEs. A Machine Learning Approach. Journal of Computer Information Systems, 64(6), 711–727. https://doi.org/10.1080/08874417.2023.2248925.
Flowerday, S. V., & Tuyikeze, T. (2016). Information Security Policy Development and Implementation: The What, How and Who. Computers & Security, 61, 169–183. https://doi.org/10.1016/j.cose.2016.06.002.
Galinec, D., & Steingartner, W. (2017). Combining Cybersecurity and Cyber Defense to Achieve Cyber Resilience. 2017 IEEE 14th International Scientific Conference on Informatics, 87-93. https://doi.org/10.1109/INFORMATICS.2017.8327227.
Glerum, A., Atasoy, B., & Bierlaire, M. (2014). Using Semi-Open Questions to Integrate Perceptions in Choice Models. Journal of Choice Modelling, 10, 11-33. https://doi.org/10.1016/j.jocm.2013.12.001.
Gudimetla, S. (2024). Cybersecurity Considerations in Disaster Recovery Planning. International Journal for Research in Applied Science and Engineering Technology, 12, 3143–3149. https://doi.org/10.22214/ijraset.2024.62253.
Gupta, P., Hooda, A., Jeyaraj, A., Seddon, J. J. M., & Dwivedi, Y. K. (2024). Trust, Risk, Privacy and Security in E-Government Use: Insights from a MASEM Analysis. Information Systems Frontiers. https://doi.org/10.1007/s10796-024-10497–8.
Hansen, K., Świderska, A. (2024). Integrating Open- and Closed-Ended Questions on Attitudes Towards Outgroups with Different Methods of Text Analysis. Behav Res, 56, 4802–4822 (2024). https://doi.org/10.3758/s13428-023-02218-x.
Herrman, H., Stewart, D. E., Diaz-Granados, N., Berger, E. L., Jackson, B., & Yuen, T.(2011). What Is Resilience? The Canadian Journal of Psychiatry, 56(5), 258–265. https://doi.org/10.1177/070674371105600.
Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60. http://www.jstor.org/stable/26463926.
Hood, C. (1991). A Public Management for All Seasons? Public Administration, 69(1), 3–19. https://doi.org/10.1111/j.1467-9299.1991.tb00779.x.
Hsieh, H. F., & Shannon, S. E. (2005). Three Approaches to Qualitative Content Analysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687.
Huang, H., & Li, T. S. (2018). A Centralised Cybersecurity Strategy for Taiwan. Journal of Cyber Policy, 3(3), 344–362. https://doi.org/10.1080/23738871.2018.1553987.
Huang, H. (2020). A Collaborative Battle in Cybersecurity? Threats and Opportunities for Taiwan. Asia Policy 15(2), 101–106. https://dx.doi.org/10.1353/asp.2020.0015.
Jakubczak, W., & Yau, H. (2021). Trends in Cybersecurity Regulation of Taiwan (Republic of China) – Phases of Promotion of Major Cyber Security Plans and Programs in the National Cyber Security Program of Taiwan (2021–2024). Zeszyty Naukowe SGSP, 1(80), 199–216. https://doi.org/10.5604/01.3001.0015.6485.
Jensen, M. C., & Meckling, W. H. (1976). Theory of the Firm: Managerial Behavior, Agency Costs and Ownership Structure. Journal of Financial Economics, 3(4), 305–360. https://doi.org/10.1016/0304-405X(76)90026-X.
Lichun Chiang, Kuang-Ting Tai & Ivan P. Lee (2024). Compliance with COVID-19 Preventive Policies and Governmental Transparency: An Experimental Analysis. Public Management Review. https://doi.org/10.1080/14719037.2024.2335231.
Lee, J. Y.-H., Chou, C.-Y., Chang, H.-L., & Hsu, C. (2024). Building Digital Resilience Against Crises: The Case of Taiwan's COVID-19 Pandemic Management. Information Systems Journal, 34(1), 39–79. https://doi.org/10.1111/isj.12471.
Linkov, I., Kott, A. (2019). Fundamental Concepts of Cyber Resilience: Introduction and Overview. In: Kott, A., Linkov, I. (Eds) Cyber Resilience of Systems and Networks. Risk, Systems, and Decisions. Springer, Cham. https://doi.org/10.1007/978-3-319-77492-3_1.
Li, Y., & Liu, Q. (2021). A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126.
Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). A Maturity Framework for Cybersecurity Governance in Organizations. EDPACS, 63(6), 1–22. https://doi.org/10.1080/07366981.2020.1815354.
Manantan, M. B. (2020). The People's Republic of China's Cyber Coercion: Taiwan, Hong Kong, and the South China Sea. Issues & Studies, 56(3), 1–29. https://doi.org/10.1142/S1013251120400135.
Manoharan, A. P., & Ingrams, A. (2018). Conceptualizing E-Government from Local Government Perspectives. State & Local Government Review, 50(1), 56–66. https://www.jstor.org/stable/48596371.
McDavid, J. C., Huse, I., & Hawthorn, L. R. (2019). Program Evaluation and Performance Measurement: An Introduction to Practice - Third Edition. SAGE Publications, Inc. https://doi.org/10.4135/9781071878897.
Ministry of Justice. (2018). Law and Regulations Database. https://law.moj.gov.tw/LawClass/LawAll.aspx?pcode=A0030297.
Moore, M. H. (1995). Creating Public Value: Strategic Management in Government. Harvard University Press.
Moore, M. H. (2013). Recognizing Public Value. Harvard University Press. http://www.jstor.org/stable/j.ctt2jbwqm.
Mott, G., Nurse, J. R. C., & Baker-Beall, C. (2023). Preparing for Future Cyber Crises: Lessons from Governance of the Coronavirus Pandemic. Policy Design and Practice, 6(2), 160–181. https://doi.org/10.1080/25741292.2023.2205764.
Naidoo, I., & Holtzhausen, N. (2020). Contextualising Public Value Theory and Its Measurement in Public Administration. Administratio Publica, 28(2), 191-204. https://doi.org/10.10520/ejc-adminpub-v28-n2-a12.
Neuert, C. E., Meitinger, K., & Behr, D. (2021). Open-Ended Versus Closed Probes: Assessing Different Formats of Web Probing. Sociological Methods & Research, 52(4), 1981-2015. https://doi.org/10.1177/00491241211031271.
Peng, S. (2023). Digital Economy and National Security: Contextualizing Cybersecurity-Related Exceptions. AJIL Unbound, 117, 122–127. https://doi.org/10.1017/aju.2023.18.
Profiroiu, A., & Nastacä, C.-C. (2021). What Strengthens Resilience in Public Administration Institutions? Eastern Journal of European Studies, 12(SI), 100-125. https://doi.org/10.47743/ejes-2021-SI05.
Riskhan, B., Safuan, H. A. J., Hussain, K., Elnour, A. A. H., Abdelmaboud, A., Khan, F., & Kundi, M. (2023). An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment. Sensors, 23(14), 6574. https://doi.org/10.3390/s23146574.
Saeed, S., Suayyid, S. A., Al-Ghamdi, M. S., Al-Muhaisen, H., & Almuhaideb, A. M.(2023). A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors, 23(16), 7273. https://doi.org/10.3390/s23167273.
Sallos, M.-P., Garcia Perez, A. and Bocanet, A. (2024). Organisational Cyber Resilience: a Heuristic for Bridging Foundations and Applications. Journal of Enterprise Information Management, 37(6), pp. 1926-1952. https://doi.org/10.1108/JEIM-06-2023-0317.
Safitra, M. F., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity. Sustainability, 15(18), 13369. https://doi.org/10.3390/su151813369.
Stoker, G. (2011). Was Local Governance Such a Good Idea? A Global Comparative Perspective. Public Administration, 89 (1): 15–31. https://doi.org/10.1111/j.1467-9299.2011.01900.x.
Szleszyński, A., & Dudziak-Gajowiak, D. (2023). Resilience of Public Administration Bodies to Cyberattacks. SJMULF, 209(3), 182-205. https://doi.org/10.5604/01.3001.0053.8961.
Taherdoost, H. (2022). Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview. Electronics, 11(14), 2181. https://doi.org/10.3390/electronics11142181.
Turell, J., SU, F., & Boulanin, V. (2020). Lessons from Past Cyber Incidents and Country Studies. In Cyber-Incident Management: Identifying and Dealing with the Risk of Escalation (pp. 32–42). Stockholm International Peace Research Institute. http://www.jstor.org/stable/resrep26199.11.
Tzavara, V., & Vassiliadis, S. (2024). Tracing the Evolution of Cyber Resilience: A Historical and Conceptual Review. International Journal of Information Security, 23(3), 1695–1719. https://doi.org/10.1007/s10207-023-00811-x.
Yau, H. M. (2018). Explaining Taiwan's Cybersecurity Policy Prior to 2016: Effects of Norms and Identities. Issues & Studies, 54(2), 1850004-1–30. https://doi.org/10.1142/S1013251118500042.
Yau, H. M. (2019). A Critical Strategy for Taiwan’s Cybersecurity: A Perspective from Critical Security Studies. Journal of Cyber Policy, 4(1), 35–55. https://doi.org/10.1080/23738871.2019.1604782.
Weisman, M. J., Kott, A., Ellis, J. E., Murphy, B. J., Parker, T. W., Smith, S., & Vandekerckhove, J. (2025). Quantitative Measurement of Cyber Resilience: Modeling and Experimentation. ACM Trans. Cyber-Phys. Syst., 9(1), Article 1, 1-25. https://doi.org/10.1145/3703159.
Weiss, R. M. (1983). Weber on Bureaucracy: Management Consultant or Political Theorist? The Academy of Management Review, 8(2), 242–248. https://doi.org/10.2307/257751.
Weber, M. (1921). Economy and Society: An Outline of Interpretive Sociology. Berkeley, University of California Press.
Nienhüser, W. (2008). Resource Dependence Theory - How Well Does It Explain Behavior of Organizations? Management Revue, 19(1/2), 9–32. http://www.jstor.org/stable/41783569.
Wildavsky, A. (1988). Searching for Safety. Transaction Publishers. https://www.routledge.com/Searching-for-Safety/Wildavsky/p/book/9780912051185?srsltid=AfmBOooeORnxOG7cBm5CbGfIL3oGr99iGAJl-vOLkbr53MfNPsROrgKc.
Williamson, O. E. (1975). Markets and Hierarchies: Analysis and Antitrust Implications: A Study in the Economics of Internal Organization. Free Press. Willett, M. (2024). Attacking the Issue. Adelphi Series, 64(511–513), 17–30. https://doi.org/10.1080/19445571.2024.2417538.
Zou, B., Choobchian, P., & Rozenberg, J. (2021). Cyber Resilience of Autonomous Mobility Systems: Cyber-Attacks and Resilience-Enhancing Strategies. Journal of Transportation Security, 14(3), 137–155. https://doi.org/10.1007/s12198-021-00230-w.
校內:2030-07-28公開