小程序|公众号|微博|手机版

(33)Nicolò Bussolati,“The Rise of Non-State Actors in Cyberwarfare”,in Jens David Ohlin,Kevin Govern and Claire Finkelstein,eds.,Cyberwar Law and Ethics for Virtual Conflicts,Oxford University Press,2015,pp.102-126.
(34)Luke Glanville,“The Myth of ‘Traditional’ Sovereignty”,International Studies Quarterly,Vol.57,No.1,2013,pp.79-90.
(35)Richard Andres,“Cyber-Gang Warfare”,Foreign Policy,February 12,2013,http://foreignpolicy.com/2013/02/12/cyber-gang-warfare/.
(36)肖冬梅、文禹衡:《在全球数据洪流中捍卫国家数据主权安全》,《红旗文稿》,2017年第9期。
(37)《深陷脸书数据丑闻,“剑桥分析”公司倒闭》,新华网,2018年5月3日,http://www.xinhuanet.com/fortune/2018-05/03/c_1122776912.htm。
(38)Gemalto,2017:The Year of Internal Threats and Accidental Data Breaches,https://www.breachlevelindex.com/assets/Breach-Level-Index-Report-2017-Gemalto.pdf.
(39)杜雁芸:《大数据时代国家数据主权问题研究》,《国际观察》,2016年第3期,第1-14页。
(40)沈逸:《ICANN治理架构变革进程中的方向之争:国际化还是私有化?》,《汕头大学学报》(人文社会科学版),2016年第6期。
(41) Bilbao-Osorio,Soumitra Dutta and Bruno Lanvin,The Global Information Technology Report 2014:Rewards and Risks of Big Data,World Economic Forum,2014.
(42)支振锋:《全球网络新秩序有赖于平等共治》,《人民日报》,2014年7月21日。
(43)萨义德:《文化与帝国主义》,李琨译,生活·读书·新知三联书店,2003年,第10页。
(44)Bill Wasik,“Welcome to the Age of Digital Imperialism”,The New York Times,June 4,2015,https://www.nytimes.com/2015/06/07/magazine/welcome-to-the-age-of-digital-imperialism.html.
(45)Mark Graham and Bernie Hogan,“Uneven Openness:Barriers to MENA Representation on Wikipedia”,Oxford Internet Institute Report,April 29,2014.
(46)Mark Graham and Matthew Zook,“Augmented Realities and Uneven Geographies:Exploring the Geolinguistic Contours of the Web”,Environment and Planning A:Economy and Space,Vol.45,No.1,2013,pp.77-99.
(47)Bill Wasik,“Welcome to the Age of Digital Imperialism”.
(48)Christopher Rudolph,“Sovereignty and Territorial Borders in a Global Age”,pp.1-20.
(49)Daniel Drezner,“The Global Governance of the Internet:Bringing the State Back in”,Political Science Quarterly,Vol.119,No.3,2004,p.478.
(50)Stephen Krasner,“Abiding Sovereignty”,pp.229-251.
(51)曼瑟尔·奥尔森:《集体行动的逻辑》,陈郁、郭宇峰、李崇新译,格致出版社,2014年。
(52)Paul Meyer,“Cyber-Security Through Arms Control:An Approach to International Co-Operation”,The RUSI Journal,Vol.156,No.2,2011,pp.22-27; Markus Maybaum and Jens ,“Arms Control in Cyberspace:Architecture for a Trust-Based Implementation Framework Based on Conventional Arms Control Methods”,in N.Pissanidis,H. and M.Veenendaal,eds.,2016 8th International Conference on Cyber Conflict:Cyber Power,Tallinn,Estonia,May 31-June 3,2016,CCD COE Publications,pp.159-173.
(53)Markus Maybaum and Jens ,“Arms Control in Cyberspace:Architecture for a Trust-Based Implementation Framework Based on Conventional Arms Control Methods”,pp.159-173.
(54)Joseph S.Nye,Jr.,“From Bombs to Bytes:Can Our Nuclear History Inform Our Cyber Future?” Bulletin of the Atomic Scientists,Vol.69,No.5,2013,pp.8-14.
(55)许可:《从网络主权看个人信息权利》,《中国信息安全》,2017年第5期。
(56)Madeline Carr,“Power Plays in Global Internet Governance”,Millennium:Journal of International Studies,Vol.43,No.2,2015,p.642.
(57)王明进:《全球网络空间治理的未来:主权、竞争与共识》,《人民论坛·学术前沿》,2016年第4期。
(58)沈逸:《全球网络空间治理与金砖国家合作》,《国际观察》,2014年第4期。
(59)“G7 Declaration on Responsible States Behavior in Cyberspace”,G7 2017,Italy,April 11,2017,http://www.g7italy.it/sites/default/files/documents/Declaration_on_cyberspace_0.pdf.
(60)Milton Mueller,Andreas Schmidt and Brenden Kuerbis,“Internet Security and Networked Governance in International Relations”,p.99.
(61)Mark Raymond and Laura DeNardis,“Multistakeholderism:Anatomy of an Inchoate Global Institution”,International Theory,Vol.7,No.3,2015,pp.572-616.
(62)Ben Buchanan,“Cryptography and Sovereignty”,Survival,Vol.58,No.5,2016,pp.95-122.
(63)肯尼思·华尔兹:《国际政治理论》,信强译,苏长和校,上海人民出版社,2008年,第128页。
(64)黄志雄主编:《网络主权论——法理、政策与实践》,第185页。
(65)Beverley Earle and Gerald Madek,“International Cyberspace:From Borderless to Balkanized?” Georgia Journal of International and Comparative Law,Vol.31,No.2,2003,pp.225-263.
(66)例如,2015年7月,第四届联合国信息安全专家组发布报告,明确指出“尊重各国在网络空间的主权”,反映出主权原则适用于网络空间已得到国际社会接受。
(67)迈克尔·施密特主编:《网络行动国际法塔林手册2.0版》,黄志雄等译,社会科学文献出版社,2017年,第57-72页。
(68)同上书,第118页。
(69)David Sanger and Martin Fackler,“N.S.A.Breached North Korean Networks Before Sony Attack,Officials Say”,The New York Times,January 18,2015.另可参见Travis Sharp,“Theorizing Cyber Coercion:The 2014 North Korean Operation Against Sony”,Journal of Strategic Studies,Vol.40,No.7,2017,pp.898-926。
(70)迈克尔·施密特主编:《网络行动国际法塔林手册2.0版》,第63页。
(71)朱莉欣、武兰:《网络空间安全视野下的〈塔林手册2.0〉评价》,《信息安全与通信保密》,2017年第7期。
(72)“National Cyber Strategy of the United States of America”,(点击此处阅读下一页)
本文责编:陈冬冬 发信站:爱思想(http://www.aisixiang.com),栏目:天益学术 > 国际关系 > 国际关系理论 本文链接:http://www.aisixiang.com/data/119587.html 文章来源:《外交评论:外交学院学报》2019年第1期