期刊文献+

基于问题导向的国际网络空间治理体系建构 被引量:2

Problem-oriented System Construction of International Cyberspace Governance
下载PDF
导出
摘要 当前互联网的飞速发展给人类的生产、生活带来了极大的便利,与此同时,网络空间治理中的问题也愈发突出,个人、机构、国家等不同层次的网络安全事件不断涌现,对互联网时代人类社会的发展带来严峻的挑战。究其原因,思想观念、治理规则、网络架构、硬件软件是其主要根源。因此,必须重视国际网络空间的治理,从治理主体、治理规则、治理对象、治理目标等四个方面同时发力,构建网络空间人类命运共同体。 The fast development of Internet has brought enormous convenience to people’s work and life.At the same time,the problems in cyberspace governance are becoming more and more prominent.The emergence of cyber security incidents at different levels,such as individuals,institutions,and countries,has brought severe challenges to the development of human society in the Internet era.Ideology,governance rules,network architecture,hardware and software are the root of the problem.Therefore,we must pay attention to the governance of international cyberspace,and attempt to build a cyberspace community of shared future for mankind from four aspects of governance subject,governance rules,governance objects,and governance goals at the same time.
作者 许晓东 芮跃峰 杜志章 XU Xiao-dong;RUI Yue-feng;DU Zhi-zhang(HUST)
出处 《华中科技大学学报(社会科学版)》 CSSCI 北大核心 2020年第4期135-140,共6页 Journal of Huazhong University of Science and Technology(Social Science Edition)
基金 国家社会科学基金重大项目“智慧社会下我国新型社会信用体系构建研究”(19ZDA104) 国家社会科学基金重点项目“市域社会治理智能化模式研究”(20AZD089)。
关键词 网络空间 国际治理 人类命运共同体 cyberspace international governance a community of shared future for mankind
  • 相关文献

参考文献4

二级参考文献77

  • 1[美]路易斯·亨金.《国际法:政治与价值》[M].中国政法大学出版社,2005年2月第1版.第380页.
  • 2Yochai Benkler, "From Consumers to Users: Shifting the Deeper Structures of Regulation towards Sustain- able Commons and User Access," Fed. Comm. LJ, Vol. 52, No. 3, 1999, p. 561.
  • 3Michael Marten, "New Communications Technology-A Survey of Impacts and Issues," Telecommunications Policy, Vol. 20, No. 5, 1996, pp. 375-387.
  • 4Zachary Peterson, Mark Gondree and Robert Beverly, "A Position Paper on Data Sovereignty: The Impor- tance of Geolocating Data in the Cloud," Proceedings of the 8th USENIX conference on networked systems design and implementation, 2011.
  • 5Primavera De Filippi and Smari McCarthy, "Cloud Computing: Centralization and Data Sovereignty," Eu- ropean Journal of Law and Technology, Vol. 3, No. 2, 2012, http://ejh, org/article/view/101/234.
  • 6Marc Mosch, et al. , Automated Federation of Distributed Resources into User-Controlled Cloud Environ- merits, 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing, 2012, pp, 321-326.
  • 7Kris Barcomb, Dennis Krill, Robert Mills and Michael Saville, "Establishing Cyberspace Sovereignty, " International Journal of Cyber Warfare and Terrorism, Vol. 2, No. 3, 2013, pp.26-30.
  • 8Patrice Lyons, "Cyberspace and the Law: Your Rights and Duties in the On-Line World: Edward A. Ca- vazos and Cavino Morin. The MIT Press, Cambridge, Mass. 1994," Information Processing & Management, Vol. 31, No.6, 1995, p. 910.
  • 9Kris Barcomb, Dennis Krill, Robert Mills and Michael Saville, "Establishing Cyberspace Sovereignty," pp. 321-326.
  • 10Brad Brown, Michael Chui and James Manyika, "Are You Ready for the Era of 'Big Data'," McKinsey Quarterly, Vol. 4, 2011, pp. 24-35.

共引文献109

同被引文献54

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部