期刊文献+

奥巴马网络安全政策及对中国的基本含义 被引量:2

Obama administration's Cyber Security Policy and Its Basic Implication to China
下载PDF
导出
摘要 随着网络安全重要性的日渐增加,奥巴马政府加强了对网络安全的管理,并力图完善美国网络安全的机制建设和战略规划。同时,中美之间围绕网络安全的争执和冲突凸显。奥巴马政府的对华网络政策呈现如下特点:一方面,通过网络媒介大力开展"微博外交",强化意识形态输出和渗透;另一方面,将美国关键基础设施因经济机密和敏感军事信息失窃所造成的损失,归咎于中国军方支持的黑客攻击,宣扬"中国网络安全威胁论",抹黑中国的国际形象。面对美国在网络安全上的施压和挑战,中国需要从战略高度给予重视,既要积极探讨中美之间从具体事务合作到逐渐增加相关领域战略互信的可行性,又要寻求加强与俄罗斯和其他发展中国家的协调合作,充分利用多边平台推动塑造网络安全国际规制;另外,也可尝试考虑动员国内私有领域和民众的参与,积极营造维护网络空间安全的大环境。 As the importance of cyber security increases,the Obama administration strengthened the control of cyber security,tried to improve structural construction and strategic planning of the U.S.cyber security.In the meantime,the dispute and conflict between China and the U.S.over cyber security became prominent.Obama administration's cyber security policy towards China has the following features:on the one hand,the U.S.vigorously carries out 'micro-blog diplomacy' through network,strengthening ideology export and infiltration;while on the other hand,the U.S.ascribes the damage of its critical infrastructure caused by the theft of economic secrets and sensitive military information to the hacker attacks supported by the Chinese military,spreading 'the threat of Chinese cyber attack' and smearing China's international image.Faced with the pressure and challenge of cyber security from the U.S.,China should pay more attention to the issue from a strategic height,actively exploring the feasibility of gradually increasing mutual strategic trust from the cooperation on specific affairs.At the same time,China should seek coordination and cooperation with Russia and other developing countries,make full use of multiple platforms to push forward the shaping of international cyber security regulations.In addition,China should try to consider mobilizing the participation of domestic private sectors and masses to create a broad environment of maintaining cyber-space security.
出处 《和平与发展》 CSSCI 2015年第1期58-71,115-116,共14页 Peace and Development
  • 相关文献

参考文献32

  • 1Kenneth Lieberthal and Peter W. Singer, "Cybersecurity and U.S. -China Relations," Brookings, February 2012, http://www.brookings.edu/~/media/Research/Files/ Papers / 2012 / 2 / 23 % 20cybersecurity % 20china % 2011s % 20singer % 2011eberthal / 0223_cybersecu rity china us lieberthal_singer_pdf._english.PDF, p. vi.
  • 2USCC,"2014 Annual Report: Report to Congress of the U.S-China Economic and Security Review Commission,"Nov.2014, p.263, available at: http://origin.www.usec.gov/ sites / default /files / annu al_reports / Complete % 20Report. PD F.
  • 3White House: "Statement by the President on the Cybersecurity Framework", available at: http://www, whitehouse, gov/the - press - office/2014/02/12/statement -president - cybersecurity- framework.
  • 4White House,"cyberspace policy review:Assuring a Trusted and Resilient Information and Communications Infrastructure", available at: http://www.whitehouse.gov/assets/documents/ Cyberspace_Policy_Review final.pdf.
  • 5White House,""National Security Strategy",available at: http: //www.whiteh~use.g~v/sites/defau~t~~~es/rss-viewer/nati~na~-security strategy.pdf.
  • 6White House, "National Strategy for Trusted Identities in Cyberspace", available at: http ://www. whitehouse, gov/sites/default/files/rss_viewer/NSTICstrategy_041511, pdf.
  • 7Department Of Homeland Security: "Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise", available at : http://www. dhs. gov / xlibrary / assets / nppd / blueprint- for- a- secure- cyber- future, pdf.
  • 8White House, "National Strategy for Information Sharing and Safeguarding", available at: http://www.whitehouse.gov/sites/default/files/docs/2012sharingstrategy_l .pdf.
  • 9White House, " Executive Order 13587--Stnletural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information", available at: http://www, whitehouse, gov / the - press - office / 2011 / 10/07/executi ve- order - 13587- structural - reforms- improve- security- classified- net.
  • 10White House, "Presidential Policy Directive--Critical Infrastructure Security and Resilience" ,available at: http://www.whitehouse.gov/the-press-o~ce/2013/O2/12/presidential- policy-directive-critical-infrastructure-security-and-resil.

二级参考文献184

  • 1田佑中.论因特网时代的社会控制[J].社会科学辑刊,2001(5):37-43. 被引量:10
  • 2卢新德.论美国信息安全战略的扩张性[J].当代亚太,2005(7):24-29. 被引量:4
  • 3[美]罗杰·菲德勒著.《媒介形态变化》,明安香译,华夏出版社2000年版,第30页.
  • 4巴瑞·布赞等著,朱宁译.《新安全论》,杭州:浙江人民出版社,2003年,第38页.
  • 5联合国教科文组织:《世界文化报告》,1999年,第201页.
  • 6巴瑞·布赞等.《新安全论》,第16页.
  • 7Fmnz-Stefan Gady and Greg Austin.Russia,the United States,and Cyber Diplomacy:Opening the Doors[OL],The EastWest Institude.www.ewi.info.
  • 8Barry Collin.The Future of Cyberterrorism[J]. Crime & Justice International Journal,March 1997.
  • 9Dorothy Denning.Activism,Hacktivism,and Cyberterrorism:The Intemet as a Tool for Influencing Foreign Policy[OL].http://www.nautilus. org,2000-02-04.
  • 10Lynne Manganaro.Combatting Cyber Extremism in the Global Environment.losphere[J]. summer,2008.

同被引文献58

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部