期刊文献+

“多元性”非传统安全威胁:网络安全挑战与治理 被引量:18

Challenges and Governance of Multi-Meta Non-traditional Security Threats: Taking Cyber Security Threats as an Example
下载PDF
导出
摘要 随着非传统安全威胁的愈加综合与复杂,非传统安全研究需要进一步精细化。"多元性"非传统安全威胁针对那类与传统安全因素相互交混的威胁而提出,在缘由、意图、主体、手段、地缘等多方面显示了非传统与传统安全相互交织的"多元性"特征。网络安全威胁是"多元性"非传统安全威胁中的重要议题,其呈现了主权难以界定、合法性难以判定、身份难以限定、过程难以追踪、应对难以依靠单一主体的非常规特征,网络安全维护需要新思维。一些国家奉行进攻型网络安全战略,导致了网络空间的威胁升级与安全困境,不利于全球网络安全维护。"优态共存"基于中国"和合"价值观而提出,主张认同建构与互惠共建,更好地适应了网络安全治理的跨界合作、"大安全"观与超越安全困境的能力要求,是较优的网络安全治理方略,可成为"多元性"非传统安全维护的一般路径。 With the deepening and widening consequences of non-traditional security issues, non-traditional security study needs to go further. Multi-meta Non-traditional Security Threat refered to a particular type of threats, which are characterized by both non-traditional and traditional security. Cyber security is now an important issue in the non-traditional security agenda. It confronts with some un-conventional challenges, for example, it is hard to declare its sovereignty, judge its legitimacy, confine its identity, trace its process, or respond with a single actor. As a result, cyber security governance needs a new way of thinking. Some countries nowadays are pursuing an aggressive cyber security strategy, which brings about escalation of threats and leads to a security dilemma that goes against global cyber security governance. Superior Co-existence was proposed by Chinese Hehe concept, and it claims identity construction and mutual benefits. Compared with the aggressive cyber strategy, it shows a stronger capacity to conduct trans-boundary cooperation, implement the Macro-security Concept and break out of the security dilemma, and therefore better responds to the demands of cyber security governance. Superior Co-existence is a relatively optimal strategy to multi-meta non-traditional security.
作者 廖丹子
出处 《国际安全研究》 2014年第3期25-39,156-157,共15页 Journal of International Security Studies
基金 国家社科基金重大招标项目<中国非传统安全威胁识别 评估与应对研究>(项目编号:12&ZD099)的阶段性成果
关键词 网络安全 “多元性”非传统安全 优态共存 安全治理 cyber security,multi-meta non-traditional security,superior coexistence,security governance
  • 相关文献

参考文献21

二级参考文献331

共引文献356

同被引文献172

引证文献18

二级引证文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部