期刊文献+

“网上丝绸之路”安全态势分析、评估与应对 被引量:2

Analysis, Evaluation and Response for the Network Security Situation of "Online Silk Road"
下载PDF
导出
摘要 《“十三五”国家信息化规划》首次提出“网上丝绸之路”建设优先行动,加强与沿线各国的网络互联和信息互通,促进形成基于“互联网+”的多领域、多层次信息经济带。当前,越来越多的中国企业践行“走出去”发展战略,随着企业跨国业务对互联网和信息系统依赖程度逐渐增强,网络安全风险日益凸显。加强“网上丝绸之路”沿线各国网络安全态势分析、评估与应对研究,有助于企业防范和化解网络安全风险,推动和保障“网上丝绸之路”建设。 The"13th Five-Year National Informationization Plan"first proposed the priority action of"Online Silk Road"construction,strengthened network interconnection and information exchange with countries along the route,and promoted the formation of multi-domain and multi-level information economy belt based on"Internet+".At present,more and more Chinese companies are practicing the“going out”development strategy.As the business become more dependent on the network and IT,network security risks are increasingly prominent.Strengthening the analysis,evaluation and response research on the network security situation of countries along the“Online Silk Road”will help enterprises to prevent and resolve network security risks and promote and guarantee the construction of“Online Silk Road”.
作者 杨绍亮 陈月华 陈发强 YANG Shao-liang;CHEN Yue-hua;CHEN Fa-qiang
出处 《产业经济评论》 2020年第1期73-89,共17页 Review of Industrial Economics
关键词 安全态势 安全风险评估 “网上丝绸之路”安全 “一带一路”安全 security situation security risk evaluation online silk road security one belt and one road security
  • 相关文献

参考文献5

二级参考文献76

  • 1Yochai Benkler, "From Consumers to Users: Shifting the Deeper Structures of Regulation towards Sustain- able Commons and User Access," Fed. Comm. LJ, Vol. 52, No. 3, 1999, p. 561.
  • 2Michael Marten, "New Communications Technology-A Survey of Impacts and Issues," Telecommunications Policy, Vol. 20, No. 5, 1996, pp. 375-387.
  • 3Zachary Peterson, Mark Gondree and Robert Beverly, "A Position Paper on Data Sovereignty: The Impor- tance of Geolocating Data in the Cloud," Proceedings of the 8th USENIX conference on networked systems design and implementation, 2011.
  • 4Primavera De Filippi and Smari McCarthy, "Cloud Computing: Centralization and Data Sovereignty," Eu- ropean Journal of Law and Technology, Vol. 3, No. 2, 2012, http://ejh, org/article/view/101/234.
  • 5Marc Mosch, et al. , Automated Federation of Distributed Resources into User-Controlled Cloud Environ- merits, 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing, 2012, pp, 321-326.
  • 6Kris Barcomb, Dennis Krill, Robert Mills and Michael Saville, "Establishing Cyberspace Sovereignty, " International Journal of Cyber Warfare and Terrorism, Vol. 2, No. 3, 2013, pp.26-30.
  • 7Patrice Lyons, "Cyberspace and the Law: Your Rights and Duties in the On-Line World: Edward A. Ca- vazos and Cavino Morin. The MIT Press, Cambridge, Mass. 1994," Information Processing & Management, Vol. 31, No.6, 1995, p. 910.
  • 8Kris Barcomb, Dennis Krill, Robert Mills and Michael Saville, "Establishing Cyberspace Sovereignty," pp. 321-326.
  • 9Brad Brown, Michael Chui and James Manyika, "Are You Ready for the Era of 'Big Data'," McKinsey Quarterly, Vol. 4, 2011, pp. 24-35.
  • 10Johan Eriksson and Giampiero Giacomello, "Who Controls the Internet? Beyond the Obstinacy or Obsoles- cence of the State," International Studies Review, Vol. 11, No. 1, 2009, pp. 205-230.

共引文献66

同被引文献7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部