期刊文献+

安全与隐私:美国网络安全信息共享的立法博弈分析 被引量:9

Security vs. Privacy: Game Analysis of the U. S. Cyber Security Information Sharing Legislation
下载PDF
导出
摘要 美国网络安全信息共享目的、范围、主体和程序的条款规定引发了安全倡导者与私权拥护者关于安全与隐私的激烈争论,其中既有关政府使用共享信息的目的条款保障人类网络空间生存权得以实现,又有共享的网络威胁信息范围条款界定存在瑕疵,共享的政府参与主体条款违反正当法律程序规定,共享前的个人信息移除程序条款违反比例原则的要求;通过建立政府与私营企业的信任机制,增强共享政策、程序、措施实施的透明度,建立激励机制,制定信息共享协议等,能够有效实现网络安全信息共享立法中安全与隐私的博弈均衡。 It is the purpose,scope,subject and procedures of U. S. cybersecurity information sharing provisions that triggered intense debate about security and privacy between safety advocates and private rights advocates,in which the terms of the purpose that government use the shared information is to protect the human right to live in cyberspace,the terms of the scope that shared cybersecurity threat information is unreasonably defined,the terms of the subject that government's participation in information sharing violates the due process,the terms of procedures that remove personal information violates the principle of proportionality. Through the establishment of the trust mechanism between the government and the private sectors,enhancement of transparency on sharing policies,procedures the implemented measures,and adoption of integrated information sharing mode,can effectively achieve game balance between security and privacy in cybersecurity information sharing legislation.
作者 方婷 李欲晓
出处 《西安交通大学学报(社会科学版)》 CSSCI 北大核心 2016年第1期69-76,共8页 Journal of Xi'an Jiaotong University:Social Sciences
基金 国家社会科学基金重大项目(15ZDA047) 国家社会科学基金项目(15BFX050) 信息网络安全公安部重点实验室开放课题项目(C13603) 信息网络安全公安部重点实验室开放课题项目(C13604)
关键词 网络安全信息共享 安全 隐私 网络威胁指标 cyber security information sharing security privacy cyber threat indicator
  • 相关文献

参考文献13

  • 1FISCHER E A. Cybersecurity and Information Sharing:Com- parison of H. R. 1560 and H. R. 1731 as Passed by the House[ EB/OL ]. [ 2015 - 05 - 30 ]. http://fas, org/sgp/ ers/misc/R43996, pdf.
  • 2THE CENTER FOR DEMOCRACY AND TI-CHNOLOGY. Hearing Before the Senate on Protecting America from Cyber Attacks :the In-ortance of Information Sharing[ EB/OL]. [2015 - 02 - 10 ]. https ://cdt. org/insight/bearing - before - the - sen- ate - on - protecting - america - from - cyber - attacks - the - importance - of - information - sharing/.
  • 3博登海默.法理学:法律哲学与法律方法[M].北京:中国政法大学出版社,2004.
  • 4NOJEIM G T. Cybersecurity and Freedom on the Internet [J]. Journal of National Security Law & Policy, 2010(4) : 119 - 137.
  • 5刘星.法律是什么[M].北京:中国政法大学出版社,1998..
  • 6KESAN J P, HAYES C M. Mitigative Counterstriking:Self- Defense And Deterrence In Cyberspace [ J ]. Harvard Journal of Law & Technology, 2012,25:415 -527.
  • 7霍布豪斯.自由主义[M].北京:商务印务馆,1996..
  • 8姜听.公法上比例原则研究[D].长春:吉林大学,2005.
  • 9伯纳德·施瓦茨.美国法律史[M].北京:法律出版社,2011.
  • 10KELLY B B. Investing in a Centralized Cybersecurity Infra- structure:Why" Hacktivism" Can and Should Influence Cy- bersecurity Reform [ J ]. Boston University Law Review, 2012,92 - 1663 - 1711.

二级参考文献14

共引文献137

同被引文献61

  • 1袁春阳,杜跃进,周威,李欣.美国政府《国家网络应急响应计划》及其借鉴意义[J].保密科学技术,2012(5):35-41. 被引量:7
  • 2成婧.结构功能主义视角下的国家治理体系建设[J].湖南科技大学学报(社会科学版),2014,17(6):64-68. 被引量:18
  • 3太史雁峰,万定生,陈军冰.利用蜜罐技术改进P^2DR模型及在公安网络上的应用研究[J].福建公安高等专科学校学报(社会公共安全研究),2006,20(2):32-37. 被引量:1
  • 4徐世甫.网络管理法治化的问题域[J].上海大学学报(社会科学版),2006,13(4):132-135. 被引量:3
  • 5Gregory T Nojeim. Cybersecurity and Freedom on the Intemet [ J ]. Journal of National Security Law & Policy ,2010 (4) :119- 137.
  • 6Executive Order - Promoting Private Sector Cybersecurity In- formationSharing [ EB/OL ]. [ 2015 - 3 - 22 ]. https://www. whitehouse, gov/the- press -office/2015/02/13/executive- order -promoting -private- sector- cybersecurity -information - shari.
  • 7Sue Eckert. Protecting Critical Infrastructure: The Role of the Private Sector [ J/OL ]. [ 2014 - 01 - 20 ]. www. ridgway, pitt. edu/Portals/1/pdfs/Publications/Eckert, pdf.
  • 8Congressional Research Service. Cybersecurity Selected Legal Is- sues [ R/OL ]. [ 2013 - 07 - 20 ]. http ://www2. gwu. edu/- usarchiv/NSAEBB/../docs/Cyber-067. pdf.
  • 9Department of Justice, Federal Trade Commission. Antitrust Pol- icy Statement on Sharing of Cybersecurity Information [ EB/ OL]. [2014-08-25]. https://www, ft. gov/system/files/ documents/public statements/297681 / 140410 ftcdoj cybcrthreats - tmt. pdf.
  • 10Paul Rosenzwoig. Cybersecurity Information Sharing One Step Toward U. S. Security, Prosperity, and Freedom in Cyberspace [ R/OL]. 12014-04-02 ]. http ://www. heritage, org/research/ reports/2014/04/cybersecurity-information- sharing- one- step- toward -us -security -prosperity -and -freedom -in -cyberspace.

引证文献9

二级引证文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部