Please wait a minute...
 首页  期刊列表 期刊订阅 开放获取 关于我们
English
最新录用  |  在线预览  |  当期目录  |  过刊浏览  |  学科浏览  |  专题文章  |  热点文章  |  下载排行
中国工程科学    2016, Vol. 18 Issue (6) : 1-7     https://doi.org/10.15302/J-SSCAE-2016.06.001
论文
网络空间主权研究
方滨兴1; 邹鹏2; 朱诗兵2
1.中国网络空间安全协会;
2.中国人民解放军装备学院
Research on Cyberspace Sovereignty
Fang Binxing1, Zou Peng2, Zhu Shibing2
1.Cyber Security Association of China, Beijing 100010, China;
2.Academy of Equipment of PLA, Beijing 101416, China
全文: PDF(281 KB)  
导出: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
摘要 网络空间主权(简称网络主权)是国家主权向建立在信息通信技术系统平台之上的网络空间的自然延伸。本文论述了什么是网络空间,什么是网络主权;评判了否定网络主权存在的几个错误的观点;论证了网络主权的客观存在。
关键词 网络空间网络主权(网络空间主权)利益攸关方    
Abstract:Cyberspace sovereignty, also known as cyber sovereignty, is the extension of national sovereignty to the platform of information and communication technology systems. This article defines cyberspace and cyber sovereignty, argues against several erroneous points of view that deny cyber sovereignty, and discusses the existence of cyber sovereignty.
Keywords cyberspace      cyberspace sovereignty      stakeholder     
基金资助:中国工程院重大咨询项目“网络空间安全战略研究”(2015-ZD-10)
发布日期: 2016-12-22
服务
推荐给朋友
免费邮件订阅
RSS订阅
作者相关文章
引用本文:   
Fang Binxing, Zou Peng, Zhu Shibing. Research on Cyberspace Sovereignty[J]. Strategic Study of Chinese Academy of Engineering,2016, 18(6): 1-7.
网址:  
https://journal.hep.com.cn/sscae/EN/10.15302/J-SSCAE-2016.06.001     OR     https://journal.hep.com.cn/sscae/EN/Y2016/V18/I6/1
[1] Yan Jia, Binxing Fang, Xiang Wang, Yongheng Wang, Jingbin An, Aiping Li, Bin Zhou. Software Architecture of Fogcloud Computing for Big Data in Ubiquitous Cyberspace[J]. Strategic Study of Chinese Academy of Engineering, 2019, 21(6): 114-119.
[2] Jia Yan, Li Aiping, Li Yuxiao, Li Shudong, Tian Zhihong, Han Yi, Shi Jinqiao, Lin Bin. Trends in and Management of Bad Cyberspace Information Around the World[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 94-98.
[3] Yu Quan, Yang Lifeng, Gao Guijun, Kou Ziming, Zhai Lidong. Emergency and Response for Cyberspace Security[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 79-82.
[4] Zhu Shibing, Zhang Xuebo, Wang Yu, Liu Yunjie. A Review of the Major Viewpoints on Cyber Sovereignty Around the World[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 89-93.
[5] Si Xueming, Wang Wei, Zeng Junjie, Yang Benchao, Li Guangsong, Yuan Chao, Zhang Fan. A Review of the Basic Theory of Mimic Defense[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 62-68.
[6] Yu Xiangzhan, Zhang Hongli, Yu Haining, Tian Zhihong, Zhai Jianhong, Pan Zhuting. Cyberspace Security Competition and Talent Management[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 49-52.
[7] Zhang Hongli, Yu Haining, Fang Binxing, Qin Yuhai, Yu Xiangzhan, Chu Chengyuan. Certification for Cyberspace Security Professionals in China[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 44-48.
[8] Fang Binxing, Du Aning, Zhang Xi, Wang Zhongru. Research on the International Strategy for National Cyberspace Security[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 13-16.
[9] An Da, Liang Zhihao, Xu Shouren. Study on the Development of China’s Cyberspace Security Industry[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(4): 38-43.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 高等教育出版社.
电话: 010-58556848 (技术); 010-58556485 (订阅) E-mail: subscribe@hep.com.cn