:::

詳目顯示

回上一頁
題名:中共對網路空間主權之概念與作為
書刊名:中國大陸研究
作者:王清安黃基禎
作者(外文):Wang, Ching-anHwang, Ji-jen
出版日期:2019
卷期:62:1
頁次:頁67-100
主題關鍵詞:網路空間網路空間主權網路安全網路疆域CyberspaceCyber sovereigntyCyber securityCyber territoriality
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(4) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:4
  • 共同引用共同引用:3
  • 點閱點閱:188
近年來網路攻擊事件已經對一個國家的政治、經濟與軍事造成一定的影響。其主要原因是國家行為者,在國家境內無法針對跨國境資料流動實施管轄。各國相繼成立「網路安全法」,賦予政府可以監控資訊流動,以保障網路用戶與企業資料安全,及強化國家境內關鍵基礎設施資安防護。因此,形塑網路空間主權,建構資料在地化(data localization)管理,已成為解決網路空間衝突、分攤維護國際和平的可行性手段。雖然建立資料在地化管理,可以保護個人、企業與國家安全。然而,本研究發現,中共形塑的網路空間主權,自2016年《網絡安全法》頒布後,政府部門依法對境內的網路用戶、網路營運商實施管轄,其網路空間已建構出與世界網路隔離的內部網路。與此同時,中國政府整合軍、民網路產業合作,其所建構出的網路空間疆界,在政治上,已對現行網路空間秩序產生衝擊。經濟上,將增加全球網路營運商進入中國大陸市場的成本,致使貿易保護形成,不利於全球化經濟發展。此外,軍事上,在國安部門獲得外商進入中國大陸市場所繳出的商品原始碼後,將有利於掌握、監控他國網路資訊,為戰時創造出不對稱作戰優勢。總體而言,中共所形塑的網路主權,絕非僅是強化國家境內的網路安全,而實現強國夢、強軍夢的具體表現。
Given the number of cyber-attacks in recent years, it has been confirmed that cyber-attacks can cause a huge impact on a state's political, economic, and military aspects due to the fact that the state actors cannot exercise jurisdiction over cross-border data flows within the territories. A so-called Cyber-Security Law was therefore established by states to empower their governments to monitor the flow of data in order to safeguard the security of users and enterprises in the cyberspace, as well as to strengthen the information security protection of national critical infrastructures in the state. Therefore, the shaping of cyber sovereignty and the construction of data in localized management have become extremely important tools for preventing cyber conflicts and maintaining international peace. Technically, generating data can be managed locally so that personal, business, and national security can be protected. However, this study finds that, in terms of China's cyber sovereignty, since the "Cyber-Security Law" was promulgated in 2016, by law, the CCP has legitimacy to implement jurisdictions in internet users and telecom operators, and also shape cyber sovereignty into an isolated network from the world's networks. At the same time, the Chinese government has integrated its military and civilian networking industry to create a so-called cyber territoriality. Politically, it has had an impact on the current order in cyberspace. Economically, it may increase the cost of global network operators entering the Chinese mainland market, resulting in the formation of trade protection, which is not conducive to global economic development. In addition, when the national security department has obtained the source codes of foreign merchants entering the China's market, the department may use this information to facilitate the controlling and monitoring of information in other countries' networks and to create asymmetric operational advantages in the wartime. In conclusion, the strategic implication of China's cyber sovereignty is not only to strengthen the national cyber security, but also to realize the dream of great power and the dream of a powerful military.
期刊論文
1.梁德昭、朱志平、林凱薰(20121100)。國家主權延伸至網路空間之討論。前瞻科技與管理,2(2),1-14。new window  延伸查詢new window
2.Hwang, Ji-Jen(2017)。China's cyber strategy: A Taiwanese perspective。Korean Journal of Defense Analysis,29(1),95-111。  new window
3.Zhao, Frank、Heatley, Jesse(20160811)。China's Master Plan for IT Dominance。The Diplomat,2016(Aug.)。  new window
4.中國國防科技信息中心(2015)。中國芯防火牆國內率先通過認證。現代軍事,460,109。  延伸查詢new window
5.方濱興(2017)。一個自主開放的互聯網根域名解析體系。信息安全學報,2(4),57-69。  延伸查詢new window
6.王春暉(2016)。互聯網治理四項原則基於國際法理應成全球準則:「領網權」是國家主權在網路空間的繼承與延伸。南京郵電大學學報,36(1),8-15。  延伸查詢new window
7.朱莉欣(2014)。「塔林網路戰國際法手冊」的網路主權觀評價。河北法學,32(10),130-135。  延伸查詢new window
8.何駿、趙立軍、王鵬(2017)。從「塔林手冊」視角看網路主權。裝備學院學報,28(1),6-10。  延伸查詢new window
9.郎平(2016)。中國網路強國戰略與G20框架下的互聯網經濟治理。世界知識,1672,62-63。  延伸查詢new window
10.馬民虎、張敏(2015)。資訊安全與網路社會法律治理:空間、戰略、權利、能力--第五屆中國資訊安全法律大會會議綜述。西安交通大學學報,35(2),92-97。  延伸查詢new window
11.崔文波(2017)。芻議網絡空間主權。江南社會學院學報,19(1),7-13。  延伸查詢new window
12.曹如中、曾瑜、郭華(2014)。基於網路資訊安全的國家競爭情報體系構建研究。情報雜誌,33(8),15-18。  延伸查詢new window
13.傅文成(20160500)。大陸網路主權論述之情勢評析。展望與探索,14(5),35-41。  延伸查詢new window
14.過子庸(20110500)。美國研發「電郵饋入」(FOE)軟體穿越中共網路審查之探討。前瞻科技與管理,1(1),99-113。new window  延伸查詢new window
15.惠志斌(2012)。新安全觀下中國網路資訊安全戰略的理論構建。國際觀察,2012(2),19-24。  延伸查詢new window
16.裴毅東(2014)。從心血安全漏洞談起:對中國網路安全露洞應對機制的建薄議。現代軍事,2014(8),35-37。  延伸查詢new window
17.Astani, Marzie(2016)。Trends and Preventive Strategies for Mitigating Cybersecurity Breaches in Organizations。Issues in Information Systems,17(2),208-214。  new window
18.Barcomb, Kris E.(2013)。From Sea Power to Cyber Power: Learning From the Past to Craft a Strategy for the Future。Joint Force Quarterly,69,80-83。  new window
19.Burgman, Paul R. Jr.(20160518)。Securing Cyberspace: China Leading the Way in Cyber Sovereignty。The Diplomat,2016(May)。  new window
20.Domingo, Francis C.(2016)。Conquering a New Domain:Explaining Great Power Competition in Cyberspace。Comparative Strategy,35(2),154-168。  new window
21.Shirk, Susan(2017)。Trump and China Getting to Yes With Beijing。Foreign Affairs,96(2),20-27。  new window
會議論文
1.Applegate, Scott D.(2016)。The Principle of Maneuver in Cyber Operations。The 4th International Conference on Cyber Conflict。Tallinn:NATO CCD COE。  new window
2.Heinegg, Wolff Heintschel(2012)。Legal Implications of Territorial Sovereignty in Cyberspace。The 4th International Conference on Cyber Conflict。Tallinn:NATO CCD COE。  new window
3.Raud, Mikk(2016)。China and Cyber: Attitude, Strategies, Organisation。The Annual Meeting of CCD COE。Tallinn。  new window
4.Setiawan, A. B.、Syamsudin, A.、Sasongko, A.(2015)。Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity。The 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic。Jakarta。  new window
5.Yang, Haitao、Zhang, Jian(2016)。Network Boundary and Protection。The 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery。Beijing。  new window
研究報告
1.(2017)。中國互聯網路發展狀況統計報告。  延伸查詢new window
圖書
1.中華人民共和國國務院新聞辦公室(2015)。中國的軍事戰略白皮書。中國大陸國務院。  延伸查詢new window
2.互聯網新聞研究中心(2014)。美國是如何監視中國的:美國全球監聽行動紀錄。北京:人民出版社。  延伸查詢new window
3.Clarke, Richard A.、Knake, Robert K.、呂晶華、成高帥(2011)。網路戰:國家安全的新威脅及應對之策。北京:軍事科學出版社。  延伸查詢new window
4.Martel, Frédéric、林幼嵐(2016)。全球網路戰爭:全球化vs在地化。新北市:稻田出版有限公司。  延伸查詢new window
5.洪京一(2015)。世界網路安全發展報告。香港:和平圖書有限公司。  延伸查詢new window
6.惠志斌、覃慶玲(2016)。中國網絡空間安全發展報告(2016)。北京:社會科學文獻出版社。  延伸查詢new window
7.魏亮、魏薇(2016)。網路空間安全。北京:電子工業出版社。  延伸查詢new window
8.Andress, Jason、Winterfeld, Steve(2014)。Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners。London:Elsevier。  new window
9.Austin, Greag(2015)。Cyber Policy in China。Cambridge:Polity。  new window
10.Bayuk, Jennifer L.、Healey, Jason、Rohmeyer, Paul、Sachs, Marcus H.、Weiss, Joseph(2012)。Cyber Security Policy Guidebook。Wiley。  new window
11.Carr, Jeffrey(2012)。Inside Cyber Warfare: Mapping the Cyber Underworld。O'Reilly Media。  new window
12.Chapple, Mike(2014)。Cyberwarfare: Information Operations in a Connected World。Burlington:Jones & Bartlett Learning。  new window
13.Engstrom, Jeffrey(2018)。Systems Confrontation and System Destruction Warfare: How the Chinese People's Liberation Army Seeks to Wage Modern Warfare。Santa Monica, California:RAND Corporation。  new window
14.Maurer, Tim(2015)。National CSIRTs and Their Role in Computer Security Incident Response。Washington, DC:GPPI。  new window
15.Rid, Thomas(2013)。Cyber War will not Take Place。Hurst/Oxford University Press。  new window
16.Theohary, Catherine A.、Rollins, John W.(2015)。Cyberwarfare and Cyberterrorism: In Brief。Washington, DC:Congressional Research Service。  new window
其他
1.新華社(20160317)。中華人民共和國國民經濟和社會發展第十三個五年規劃綱要,http://news.xinhuanet.com/politics/20161h/2016-03/17/c_1118366322.htm, 。  延伸查詢new window
2.(20151203)。中美舉行首次打擊網絡犯罪及相關事項高級別聯合對話,http://military.people.com.cn/BIG5/n/2015/1203/c1011-27885053.html。  延伸查詢new window
3.(2016)。中華人民共和國網路安全法,http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm。  new window
4.(2013)。網傳習近平8.19講話全文:言論方面要敢抓敢管敢於亮劍,http://chinadigitaltimes.net/chinese/2013/11/%E7%BD%91%E4%BC%A0%E4%B9%A0%E8%BF%91%E5%B9%B38%E2%80%A219%E8%AE%B2%E8%AF%9D%E5%85%A8%E6%96%87%EF%BC%9A%E8%A8%80%E8%AE%BA%E6%96%B9%E9%9D%A2%E8%A6%81%E6%95%A2%E6%8A%93%E6%95%A2%E7%AE%A1%E6%95%A2/。  new window
5.中華人民共和國工業和資訊化部(2015)。中國共產黨第十八屆中央委員會第五次全體會議公報,http://www.miit.gov.cn/n1146290/n1146392/c4391094/content.html。  延伸查詢new window
6.中華人民共和國國務院新聞辦公室(2010)。中國互聯網狀況,http://www.scio.gov.cn/zfbps/ndhf/2010/Document/662572/662572.htm。  延伸查詢new window
7.中華人民共和國國務院新聞辦公室(2013)。中國武裝力量的多樣化運用,http://www.scio.gov.cn/zfbps/ndhf/2013/Document/1312844/13128449.htm。  延伸查詢new window
8.朱國賢,霍小光,楊依軍(20151217)。習近平出席第二屆世界互聯網大會開幕式並發表主旨演講強調加強溝通,擴大共識,深化合作,共同構建網路空間命運共同體:劉雲山主持開幕式並致辭。  延伸查詢new window
9.李景璿,陳泰偉(20171119)。網路涉軍舉報平臺正式上線運行。  延伸查詢new window
10.徐海濤(2016)。量子通信「京滬幹線」合肥至上海段開通,http://news.sciencenet.cn/htmlnews/2016/11/361537.shtm?id=361537。  延伸查詢new window
11.高紫檀(20170506)。俄羅斯宣布禁用中國通訊軟件微信,http://www.epochtimes.com/gb/17/5/5/n9110292.htm。  延伸查詢new window
12.張新,楊利程(2017)。我國「網路空間安全軍民融合創新中心」成立,http://www.81.cn/gnxw/2017-12/27/content_7886012.htm。  延伸查詢new window
13.Benner, Katie,Mozur, Paul(20160220)。Apple Sees Value in Its Stand to Protect Security,https://www.nytimes.com/2016/02/21/technology/apple-sees-value-in-privacy-vow.html?_ga=2.260951117.1128833346.1497316750-1159746865.1483843645。  new window
14.Tejada, Carlos(20170419)。Apple Faces Inquiry in China Over App Store Content,https://www.nytimes.com/2017/04/19/business/media/china-apple-app-store.html?_ga=2.261988685.1128833346.1497316750-1159746865.1483843645。  new window
15.Douris, Constance(2017)。Danger! Virus Discovered That Targets America's Electrical Grid,http://nationalinterest.org/blog/the-buzz/danger-virus-discovered-targets-americaselectrical-grid-21242?page=2。  new window
16.Fears, Danika(20180102)。White House urges Iran to stop blocking social media,https://nypost.com/2018/01/02/white-house-urges-iran-to-stop-blocking-social-media/。  new window
17.Ghosh, Dipayan(20170718)。Apple's Dangerous Market Grab in China,https://www.nytimes.com/2017/07/18/opinion/apple-china-regulation.html。  new window
18.Jones, Seth G.(20180202)。The Return of Political Warfare,https://www.csis.org/analysis/returnpolitical-warfare, 。  new window
19.Lee, Jason(20140712)。Apple iPhone a Danger to China National Security: State Media,http://www.bbc.com/news/technology-27712908。  new window
20.Limbgao, Andrea(20161214)。The Global Push for Cyber Sovereignty Is the Beginning of Cyber Fascism,http://thehill.com/blogs/congress-blog/technology/310382-the-global-push-forcyber-sovereignty-is-the-beginning-of。  new window
21.Mozur, Paul,Perlez, Jane(20160421)。Apple Services Shut Down in China in Startling About-Face,https://www.nytimes.com/2016/04/22/technology/apple-no-longer-immune-tochinas-scrutiny-of-us-tech-firms.html?_ga=2.229024220.1128833346.1497316750-1159746865.1483843645。  new window
22.Mozur, Paul,Benner, Katie(20151010)。Apple Is Said to Deactivate Its News App in China,https://www.nytimes.com/2015/10/12/technology/apple-is-said-to-deactivate-itsnews-app-in-china.html。  new window
23.Pubby, Manu(2017)。Indian troops on China border told to format smartphones, delete 42 apps,https://theprint.in/2017/11/28/troops-told-to-format-smartphones-delete-42-appsafter-chinese-spyware-threat。  new window
24.Rawlinson, Kevin(20150129)。US tech firms ask China to postpone intrusive rules,http://www.bbc.com/news/technology-31039227。  new window
25.Schmitt, Michael N.(2013)。Tallinn Manual on the International Law Applicable to Cyber Warfare,https://www.peacepalacelibrary.nl/ebooks/files/356296245.pdf。  new window
26.Sewell, Bruce(2016)。Deciphering the Debate Over Encryption: Industry andLaw Enforcement Perspectives,https://docs.house.gov/meetings/IF/IF02/20160419/104812/HHRG-114-IF02-Wstate-SewellB-20160419.pdf/。  new window
27.Shanghai Cooperation Organization, Code of Conduct for Information Security(2011)。Letter dated 12 September 2011 from the Permanent Representatives of China, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General (A/66/359),https://www.ccdcoe.org/sites/default/files/documents/UN-110912-CodeOfConduct_0.pdf。  new window
28.(2011)。International Strategy for Cyberspace,https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf。  new window
29.United Nations General Assembly(2013)。Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,https://disarmament-library.un.org/UNODA/Library.nsf/a45bed59c24a1b6085257b100050103a/2de562188af985d985257bc00051a476/$FILE/A%2068%2098.pdf。  new window
30.United Nations General Assembly(2015)。Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,http://undocs.org/A/70/172,(A/70/172)。  new window
31.United States Department of Defense(2013)。Joint Publication 3-12 (R) Cyberspace Operations,http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12R.pdf。  new window
圖書論文
1.Tasheva, Iva(2017)。European cybersecurity policy: Trends and prospects。Policy Brief。Brussels:European Policy Centre。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top