期刊文献+

印度网络安全治理视域下的美印网络安全竞合 被引量:4

U.S.-India Cyber Competition and Cooperation Under the Vision of India’s Cyber Security Governance
下载PDF
导出
摘要 随着第四次工业革命的到来,互联网成为现实政治的平行世界。在国内层面,印度从政策、法律、多方治理等方面,以政策引领、法律约束、多方参与、多管齐下的方式展开网络安全治理。在国际层面,印度作为新兴国家的代表,在互联网世界的治理之争中提出了“多边主义”,并建议将联合国国际电信联盟作为全球互联网治理的主要机构。印美网络安全关系呈现弱竞争、强合作的态势。除了政治、军事、安全等核心领域外,经济方面的网络安全市场也是印美网络安全合作的重要方面。 With the advent of the fourth industrial revolution,the Internet has become a parallel world of real politics.At the domestic level,India has adopted policy guidance,legal constraints,multi-party participation,and multi-pronged approach to network security governance in terms of policy,law,and multi-party governance.At the international level,India,as a representative of emerging countries,proposed“multilateralism”in the struggle for governance in the Internet world,and proposed the United Nations International Telecommunication Union as the main institution for global Internet governance.The cyber security relationship between India and the United States shows a situation of weak competition and strong cooperation.In addition to the core areas of politics,military,security,etc.,the economic cybersecurity market is also an important aspect of US-India cyber security cooperation.
作者 张舒君 Zhang Shu-jun(International Relations Institute of Nanjing University,Nanjing Jiangsu,210093)
出处 《信息安全与通信保密》 2019年第8期63-74,共12页 Information Security and Communications Privacy
基金 国家社科基金重点项目“中国及新兴大国群体在国际秩序变革中的地位与作用研究”(15AZD027)阶段性成果
关键词 印度 美国 网络安全治理 网络安全关系 India United States Cybersecurity Governance Cyber Security
  • 相关文献

参考文献2

二级参考文献17

  • 1Verisign/ICANN Proposal in Response to NTIA Request,Root Zone Administrator Proposal Related to the IANA Functions Stewardship Transition. http://www.ntia.doc.gov/files/ntia/publications/root_zone_administrator_proposal-relatedtoiana_functionsste-final.pdf . 2015
  • 2David Sanger.'U.S.Decides to Retaliate Against China’’s Hacking'. http://www.nytimes.com/2015/08/02/world/asia/us-decides-to-retaliate-against-chinas-hacking.html . 2015
  • 3The DOD Cyber Strategy. http://www.defense.gov/News/Special-Reports/0415_Cyber-Strategy . 2015
  • 4Michael Hayden.'Ex-NSA chief:Safeguards exist to protect Americans’’privacy'. http://edition.cnn.com/2013/08/01/opinion/hayden-nsa-surveillance/ . 2015
  • 5SAC067 Overview and History of the lANA Functions. https://www.icann.org/en/system/files/files/sac-067-en.pdf . 2015
  • 6Domain Names:Management of Internet Names and Addresses. http://www.ntia.doc.gov/legacy/ntiahome/domainname/nsi.htm . 2015
  • 7Amendment Number Twenty-Four (24). http://www.ntia.doc.gov/files/ntia/publications/amend24.pdf . 2015
  • 8Lawrence E.Strickling.'An Update on the IANA Transition'. http://www.ntia.doc.gov/blog/2015/update-iana-transition . 2015
  • 9Kruger,L.G.Internet Governance and the Domain Name System:Issues for Congress. . 2013
  • 10Patrice A. Lyons.??Cyberspace and the law: Your rights and duties in the on-line world(J)Information Processing and Management . 1995 (6)

共引文献86

同被引文献49

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部