Research on the Affecting Factors and Promotion Path of International Identity in China's“Cyber Sovereignty”——Based on 31 Cases Through fsQCA
He Wei1, Sun Menghan1, Zhang Jing2
1. School of Economics and Management,Beijing University of Posts and Telecommunications,Beijing 100876,China;
2. School of Marxism,Beijing University of Posts and Telecommunications,Beijing 100876,China
Abstract:The objective of this paper is to study the status of China's international recognition of the concept of“cyber sovereignty”and its influencing factors,so as to provide a reference path for the improvement of China's international recognition of the concept of“cyber sovereignty”.In this paper,we adopt fuzzy set Qualitative Comparative Analysis(fsQCA)methodology from the perspective of international community and the explanatory variables are extracted from the combination of international practice theory.This paper conducts analysis for 31 cases and to explore the necessary condition combinations that affect the outcomes of international identity status of China's concept of cyber sovereignty.The study has found 5 low level identity paths and 1 high level identity path.Low level identity paths can be summarized as follows.①the dual-dominated driving type by common interests and legitimacy;②legitimacy and value pursuit driving type under the geopolitical risks leading;③ideological driving type;④common interests and value pursuit driving type under ideological logic;⑤ideology,geopolitical risk and legitimacy driving type.In response to the current situation of international recognition of China's concept of“cyber sovereignty”, China needs to promote the concept of China's“cyber sovereignty”in a more moderate and objective way,enhance capability of international communication and construct counter-narrative to crack relevant rumors.
何伟, 孙梦寒, 张静. 中国“网络主权”理念国际认同影响因素与提升路径研究——基于31个案例的模糊集定性比较分析[J]. 中国科技论坛, 2023(5): 143-153.
He Wei, Sun Menghan, Zhang Jing. Research on the Affecting Factors and Promotion Path of International Identity in China's“Cyber Sovereignty”——Based on 31 Cases Through fsQCA. , 2023(5): 143-153.
[1]刘杨钺,张旭.政治秩序与网络空间国家主权的缘起[J].外交评论(外交学院学报),2019,36(1):113-134.
[2]戴丽娜.深入理解网络主权的重要意义和作用[J].中国信息安全,2021(11):73-74.
[3]WAZ J,WEISER P.Internet governance:the role of multi-stakeholder organization[J].Journal on telecommunications and high technology Low,2012(10):332-335.
[4]KEOHANE R O,NYE J S.Power and interdependence in the information age[J].Foreign affairs,1998,77(5):81-94.
[5]WU T S.Cyberspace sovereignty?The internet and the international system[J].Harvard journal of law & technology,1997(3):647-666.
[6]FRANZESE,PATRICK W.Sovereignty in cyberspace:can it exist[J].Airforce law review,2009,64:1-42.
[7]周志荣.网络环境中的管辖问题[N].法制日报,2004-04-01(1).
[8]胡丽,齐爱民.论“网络疆界”的形成与国家领网主权制度的建立[J].法学论坛,2016,31(2):59-66.
[9]胡丽,齐爱民,何金海.《国家网络空间主权战略》[J].河北法学,2018,36(6):80-88.
[10]李鸿渊.论网络主权与新的国家安全观[J].行政与法,2008(8):115-117.
[11]方滨兴.论网络空间主权[M].北京:科学出版社,2017.
[12]李金锋,许开轶.网络主权概念研究述评:基于CNKI的量化分析[J].社会科学动态,2018(7):60-66.
[13]李传军,李怀阳.基于网络空间主权的互联网全球治理[J].电子政务,2018(5):9-17.
[14]郝叶力.网络世界的原则性与灵活性——三视角下网络主权的对立统一[J].汕头大学学报(人文社会科学版),2016,32(6):9-14.
[15]阙天舒,李虹.网络空间命运共同体:构建全球网络治理新秩序的中国方案[J].当代世界与社会主义,2019(3):172-179.
[16]肖杰.当前网络空间国际治理困境与可能出路[J].信息安全与通信保密,2019(9):18-21.
[17]MUELLER M.Ruling the root:internet governance and the taming of cyberspace[M].Cambridge:Massachusetts Institute of Technology Press,2002.
[18]刘煜,程恩富.我国网络自主权维护问题与路径分析[J].东南学术,2021(6):21-30.
[19]王正平,徐铁光.西方网络霸权主义与发展中国家的网络权利[J].思想战线,2011,37(2):105-111.
[20]张晓君.网络空间国际治理的困境与出路:基于全球混合场域治理机制之构建[J].法学评论,2015,33(4):50-61.
[21]支振锋.主权是网络空间安全的战略支撑点[J].中国信息安全,2017(1):46-47.
[22]王佳宜.从分歧到共识:网络空间国际规则制定及中国因应[J].中国科技论坛,2021(8):168-177.
[23]余建川.欧盟网络安全建设的新近发展及对我国的启示:基于《欧盟数字十年网络安全战略》的分析[J].情报杂志,2022,41(3):87-94.
[24]金毅,许鸿艳.网络空间命运共同体的价值意蕴及实践路径[J].人民论坛·学术前沿,2021(24):126-128.
[25]李彦.中国参与互联网治理国际制度建构的议程设置策略[J].当代传播,2020(3):71-76.
[26]黄志雄,孙芸芸.网络主权原则的法理宣示与实践运用——再论网络间谍活动的国际法规制[J].云南社会科学,2021(6):69-80,92,186-187.
[27]江天骄.全球网络空间的脆弱稳定状态及其成因[J].世界经济与政治,2022(2):129-154,160.
[28]朱诗兵,张学波,王宇,等.世界范围内网络主权的主要观点综述[J].中国工程科学,2016,18(6):89-93.
[29]王爱玲,达妮莎.坚持“网络主权”的中国声音及国际认同分析[J].大连理工大学学报(社会科学版),2020,41(6):6-13.
[30]北约卓越网络合作防卫中心国际专家小组.塔林网络战国际法手册[M].北京:国防工业出版社,2016.
[31]United Nations.Sixty-eighth session,item 94 of the provisional agenda:group of governmental experts on developments in the field of information and telecommunications in the context of international security(A/68/98)[R/OL].(2013-06-24)[2016-09-10].http://www.mofa.go.jp/files/000016407.pdf.
[32]RADU R,CHENOU J M,WEBER R H.The evolution of global internet governance:principles and policies in the making[M].Berlin,Heidelberg:Springer,2013.
[33]BUDNITSKY S,JIA L R.Branding internet sovereignty:digital media and the Chinese-Russian cyberalliance[J].European journal of culture studies,2018,21(5):594-613.
[34]MCKUNE S,AHMED S.The contestation and shaping of cyber norms through China's internet sovereignty agenda[J].International journal of communication,2018(12):3835-3855.
[35]徐月梅,施灵雨,蔡连侨.一种基于情感特征表示的跨语言文本情感分析模型[J].中文信息学报,2022,36(2):129-141.
[36]SCHMITT M,STEINHEBER S,SCHREIBER K,etal.Joint aspect and polarity classification for aspect-based sentiment analysis with end-to-end neural networks[J].Association for computational linguistics,2018,23(5):1109-1114.
[37]方曙兵.国际实践研究:国际政治理论研究的新议程[J].国外社会科学,2018(2):104-110.
[38]POULIOT V.The logic of practicality:a theory of practice of security communities[J].International organization,2008,62(2):257-288.
[39]方曙兵.国际实践研究:国际政治理论研究的新议程[J].国外社会科学,2018,(2):104-110.
[40]TRIPATHI S M,SINGH A P,DUBE D.Internet governance:a developing nation's call for administrative legal reform[J].International journal of legal information,2009,37(3):368-384.
[41]肖晞,宋国新.共同利益、身份认同与国际合作:一个理论分析框架[J].社会科学研究,2020(4):125-133.
[42]张辉.人类命运共同体:国际法社会基础理论的当代发展[J].中国社会科学,2018(5):43-68,205.
[43]徐月梅,曹晗,王文清,等.跨语言情感分析研究综述[J/OL].数据分析与知识发现,2022(9):1-27[2022-10-12].http://kns.cnki.net/kcms/detail/10.1478.g2.20220719.1413.006.html.
[44]谭春辉,李玥澎,周一夫,等.虚拟学术社区用户间人际信任的影响因素[J].图书馆论坛,2022,42(6):141-149.
[45]查尔斯C·拉金.重新设计社会科学研究[M].北京:机械工业出版社,2019.
[46]杜运周,贾良定.组态视角与定性比较分析(QCA):管理学研究的一条新道路[J].管理世界,2017(6):155-167.