
A Review of Major Viewpoints on Cyber Sovereignty around the World
Shibing Zhu, Xuebo Zhang, Yu Wang, Yunjie Liu
Strategic Study of CAE ›› 2016, Vol. 18 ›› Issue (6) : 89-93.
A Review of Major Viewpoints on Cyber Sovereignty around the World
As well as bringing great convenience, cyberspace poses new problems and challenges. Cyber sovereignty, in particular, constitutes the basic principle for solving national interest conflicts that arise in the process of cyberspace development. This paper provides a review and an analysis of three typical viewpoints on cyber sovereignty from around the world; namely, advocating for cyber sovereignty, opposing it, or being indifferent to it. We also give an overview of the attitudes of important international organizations and major countries toward cyber sovereignty. Our purpose is to provide an objective description of the cyber sovereignty situation.
cyberspace / national sovereignty / cyber sovereignty / multiple stakeholders / information communication technology-related activities
[1] |
高鸿钧. 清华法制论衡( 第四辑)[M]. 北京: 清华大学出版社, 2004.093中国工程科学 2016 年 第 18 卷 第 6 期 Gao H J. Tsinghua Forum of rule of law (fourth) [M]. Beijing: Tsinghua University Press, 2004.
|
[2] |
Post D G. In search of Jefferson’s moose: Notes on the state of cyberspace [M]. New York: Oxford University Press, 2009.
|
[3] |
希拉里• 克林顿. 互联网自由[EB/OL]. (2010-01-23) [2016-09-12]. http://www.checkinnews.cn/EditText_view.action?textId=67582.
|
[4] |
希拉里• 克林顿. 互联网自由II [EB/OL]. (2011-01-23) [2016-09-12]. http://blog.renren.com/share/307262991/5137535771.
|
[5] |
Lewis J A. Sovereignty and the role of government in cyberspace [J]. Brown Journal of World Affairs, 2010,16(2):55–65.
|
[6] |
Liaropoulos A. Exercising state sovereignty in cyberspace: An internal cyber-order under construction? [C]// Hart D, editor. Proceedings of the 8th international conference on information warfare and security ICIW 2013.
|
[7] |
Lindsay J R, Cheung T M, Reveron D S. China and cybersecurity: Espionage, strategy, and politics in the digital domain [M]. London: Oxford University Press, 2015.
|
[8] |
Wu T S. Cyberspace sovereignty?—The internet and the international system [J]. Harvard Journal of Law & Technology, 1997, 10(3):648–655.
|
[9] |
Tuukkanen T. Sovereignty in the cyber domain [M]/ / Rantapelkonen J, Salminen M, editors. The Fog of Cyber Defence. Helsinki: National Defence University, Department of Leadership and Military Pedagogy, 2013:37–45.
|
[10] |
Jensen E T. Cyber sovereignty: The way ahead [J]. Texas International Law Journal, 2014, 50(2):275–304.
|
[11] |
北约卓越网络合作防卫中心国际专家小组. 塔林网络战国际法手册[M]. 北京: 国防工业出版社, 2016.
|
[12] |
Jensen E T. Sovereignty and neutrality in cyber conflict [J]. Social Science Electronic Publishing, 2011, 35:815–841.
|
[13] |
联合国. 从国际安全角度看信息和电信领域的发展政府专家组的报告( 项目94临时议程)(A/68/98) [R/OL]. (2013-06-24) [2016-09-10]. http://www.mofa.go.jp/files/000016407.pdf.
|
[14] |
联合国 . 从国际安全角度看信息和电信领域的发展政府专家组的报告 ( 项目 93临时议程 ) (A/70/174) [R/OL]. (2015-07-22) [2016-09-10]. http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174&referer=/english/&lang=C.
|
/
〈 |
|
〉 |