期刊文献+

网络安全治理:防范和打击网络恐怖主义的路径选择 被引量:24

Cyber-Security Governance: the Path Choice of Preventing and Combating Cyber-terrorism
下载PDF
导出
摘要 [目的/意义]恐怖主义思想在网络空间广泛渗透和扩散,网络恐怖主义正在成为当前恐怖活动的重要运作方式,防范和打击网络恐怖主义是反恐领域中必须面对的重要课题。[方法/过程]通过对网络恐怖主义势力和网络反恐力量发展状况的对比分析,认为后者无论在道义基础上还是能力优势上都更胜一筹,网络恐怖主义治理是大势所趋且势在必得。[结果/结论]在治理路径选择上,以网络安全治理为视角研究如何应对网络恐怖主义具有显著的现实意义和可操作性。我国可据此制定务实的国家策略,从明确网络反恐战略任务、落实网络反恐相关立法、组建网络安全专门队伍、发动网络反恐社会力量、重视网络反恐技术创新、重点保护关键信息基础设施网络安全、加强网络反恐国际合作等方面部署网络反恐工作,以期达到政府主导网络恐怖主义治理的理想效果。 [ Purpose/Significance ] Nowadays, wide infiltration and diffusion of terrorism ideas in cyberspace has become a real problem and cyber-ten'orism is already an important operation mode of terrorist activities, therefore preventing and combating cyber-terrorism has become an important issue in the field of counter-terrorism. [ Method/Process] Through the comparison and analysis of the cyber-terrorist forces and the counter-cyber-terrorism forces, the author finds out that the latter is much superior to the former in the moral base and the ability superiority, and cyber- terrorism governance is an inevitable trend. [ Result/Conclusion ] On the selection of the governance path, it is significant and operable to study how to deal with cyber-terrorism in terms of network security governance. China should devel- op a pragmatic strategy, deploy the counter-cyber-terrorism activities from aspects of defining the specific cyber-security strategic task, implementing counter-cyber-terrorism legislation, forming a dedicated team of cyber-security, motivating social forces for counter-cyber -terrorism, stressing the protection of counter-cyber-terrbrism technology innovation ,focusing on key information infrastructure cyber-security, and strengthening the international cooperation, etc,to achieve the ideal effect of the government-lod cyber-terrorism governance.
作者 李淑华 :2017-06-23
出处 《情报杂志》 CSSCI 北大核心 2017年第8期12-17,共6页 Journal of Intelligence
基金 2016年中国人民公安大学基本科研业务费项目"反恐国内法与国际法的衔接与协调"(编号:2016JKF0120)的阶段性成果
关键词 网络恐怖主义 网络安全 网络安全治理 网络部队 关键信息基础设施 cyber-terrodsm cyber-security Cyber-security governance cyber-forces critical information infrastructure
  • 相关文献

参考文献6

二级参考文献64

共引文献83

同被引文献310

引证文献24

二级引证文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部