信息资源管理学报 ›› 2019, Vol. 9 ›› Issue (2): 12-24.doi: 10.13365/j.jirm.2019.02.012

• 专题-超越地理疆界的网络与数据主权 • 上一篇    下一篇

网络主权安全的国际战略模式研究

冉从敬 王冰洁   

  1. 1.武汉大学信息管理学院,武汉,430072; 2.武汉大学信息资源研究中心,武汉,430072
  • 收稿日期:2019-02-25 出版日期:2019-04-26 发布日期:2019-04-26
  • 作者简介:冉从敬,教授,博士生导师,武汉大学信息资源研究中心副主任,研究方向为知识产权、信息咨询、专利分析与服务,Email:rancongjing@163.com;王冰洁,硕士生,研究方向为网络主权、大数据治理,Email:wbj_whu@163.com。
  • 基金资助:

    本文系教育部人文社科重点研究基地重大项目“大数据资源的制度规制和国家治理研究”(17JJD870001)和国家社会科学基金重大项目“健全国家大数据主权的安全体系研究(国家十九大专项)”(18VSJ034)的成果之一。

Research on International Strategic Model of Network Sovereign Security

Ran Congjing Wang Bingjie   

  1. 1.School of Information Management, Wuhan University, Wuhan 430072;2.Center for Studies of Information Resources of Wuhan University, Wuhan 430072
  • Received:2019-02-25 Online:2019-04-26 Published:2019-04-26

摘要:

本文在调研近10年世界上部分主要国家及国际组织的网络安全战略的基础上,从国家主权视角分析网络空间的国际整体法制现状,归纳不同典型代表的国家网络主权安全战略模式。在整体国际框架下,国际电信联盟ITU、信息社会世界峰会WSIS、联合国信息安全政府专家组及网络犯罪问题专家组,以及各区域间所缔约的组织联盟如欧盟EU、北约NATO、经合组织OECD等,均体现了不同主权国家间对于网络空间的合作治理。在各国家主权视角下,按照网络空间的发展权、主导权及控制权等由强到弱,本文从战略规划、组织机制等方面归纳总结了以美国为代表的美国式网络军事化战略、以英法德为代表的欧洲式防御威慑型战略,以及以日韩为代表的日韩式合作阵营型战略。

关键词: 网络主权, 网络安全战略, 网络军事化, 网络空间防御, 网络空间治理

Abstract:

Based on the research on the cybersecurity strategies of some major countries and international organizations in the world in the past ten years, this paper analyzes the status quo of the international legal system of cyberspace from the perspective of national sovereignty, and summarizes the national sovereign strategic model of different typical representatives. Under the overall international framework, the International Telecommunication Union, the World Summit on the Information Society, the United Nations Panel of Experts on Information Security, and the Panel of Experts on Cybercrime, as well as alliances of organizations contracted between regions, such as the EU, NATO, OECD Etc., all reflect the status quo of cooperation and governance of cyberspace between different sovereign countries. From the perspective of national sovereignty, according to the power of development, dominance and control of cyberspace, the author summarizes from the aspects of strategic planning and organizational mechanism, and summarizes the US-style network militarization strategy represented by the United States, the European-style defense deterrent strategy represented by Britain, France and Germany, and the Japanese-Korean cooperative camp strategy represented by Japan and South Korea.

Key words:

 
Network sovereignty;Network security strategy;Network militarization;Cyberspace defense;Cyberspace

中图分类号: