Abstract:Cyberspace has undergone a change from de-sovereignty to re-sovereignty,which is driven by multiple subjects to promote its international rulemaking process.Driven by the power-oriented interest demands,the international rules of cyberspace have revealed the ideological gap of ideas among state and non-state behaviors,as well as the resource competition and the interest collision among states.However,with the recognition of the principle of sovereignty in cyberspace,the emergence of soft law norms,and the positive actions by non-state institutions,the international community is gradually reaching the consensus in these fields,and it is possible to coordinate international rules of cyberspace.China is actively participating in the formation of international rules of cyberspace.In the future,it should promote the further optimization,clarification and practice of basic principled consensus,and propose a Chinese plan that not only takes into accout the interests of its own country and the common interests of the international community,as well as speaks for the developing countries on the network.
王佳宜. 从分歧到共识:网络空间国际规则制定及中国因应[J]. 中国科技论坛, 2021(8): 168-177.
Wang Jiayi. From Disagreement to Consensus:International Rule-Making for Cyberspace and China's Response. , 2021(8): 168-177.
[1]BARLOW J P.A declaration of the independence of cyberspace[EB/OL]. (1996-02-08)[2021-04-05].https://www.eff.org/cyberspace-independence. [2]WU T.Cyberspace sovereignty:the internet and the international system[J].Harvard journal of law & technology,1997 (10):647-666. [3]JOHNSON D R,POST D.Law and borders:the rise of law in cyberspace[J].Stanford law review,1996 (48):1367. [4]BAIRD Z.Governing the internet:engaging government,business and nonprofits[J].Foreign affairs,2002 (81):18. [5]尹建国.美国网络信息安全治理机制及其对我国的启示[J].法商研究,2013 (2):140-141. [6]MARGULIES P.Sovereignty and cyber attacks:technology's challenge to the law of state responsibility[J].Melbourne journal of international law,2013 (14):496-519. [7]Newly nasty:defences against cyberwarfare are still rudimentary[N].The economist,2007-03-24. [8]EU.Special Eurobarometer 404:cyber security[R/OL]. (2013-10-01)[2021-05-31].http://ec.europa.eu/commfrontoffice/publicopinion/index.cfm/Survey/getSurveyDetail/search/404/surveyKy/1073. [9]郭丰,林梓瀚,胡正坤.基于全球网络空间稳定进程的 “国际软法”建构与演变[J].信息通信技术与政策,2020 (6):64. [10]MCKAY A.International cybersecurity norms,reducing conflict in an internet-dependent world[R/OL]. (2015-12-01)[2020-11-20].https://www.microsoft.com/en-us/cybersecurity/content-hub/reducing-conflict-in-lnternet-dependent-world. [11]Microsoft.International cybersecurity norms[EB/OL]. (2020-06-28)[2021-05-31].https://www.microsoft.com/en-us/cybersecurity/?activetab=cyber:primaryr4. [12]何志鹏.走向国际法的强国[J].当代法学,2015 (1):149. [13]MATTHEW J S.Solving the dilemma of sate responses to cyberattacks:a justification for the use of active defenses against states who neglect their duty to prevent[J].Military law review,2009 (201):71-72. [14]KLEINWACHTER W.Beyond ICANN vs ITU? How WSIS tries to enter the new territory of internet governance[J].Gazette,2004 (66):233-251. [15]U.S.international strategy for cyberspace[R/OL]. (2009-10-01)[2021-1-10].http://www.whitehouse.gov/sites/default/files/rss viewer/international strategy for cyberspace.pdf. [16]UN General Assembly.Group of governmental experts on developments in the field of information and telecommunications in the context of international security[R].2013,A/68/98. [17]UN General Assembly.Group of governmental experts on developments in the field of information and telecommunications in the context of international security[R].2015,A/70/174. [18]DELERUE F.Cyber operations and international law[M].New York:Cambridge University Press,2020. [19]Embassy of the Republic of Uzbekistan to the Republic of Latvia.The Tashkent declaration of the fifteenth anniversary of the Shanghai cooperation organization[EB/OL]. (2016-06-28)[2021-01-10].http://uzbekistan.lv/en/the-tashkent-declaration-of-the-fifteenth-anniversary-of-theshanghai-cooperation-organization/. [20]SCHMITT M.Tallinn manual 2.0 on the international law applicable to cyber operations[M].Cambridge:Cambridge University Press,2017. [21]王岩.适用于网络空间行动的国际法[J].武大国际法评论,2019 (6):143. [22]TSAGOURIAS N.The slow process of normativizing cyberspace[J].AJIL unbound,2019 (113):75. [23]MACAK K.From cyber norms to cyber rules:re-engaging states as law-makers[J].Leiden journal of international law,2017 (30):887. [24]LESSIG L.The future of ideas:the fate of the commons in a connected world[M].New York:Random House,2002. [25]TSAGOURIAS N,BUCHAN R.Research handbook on international law and cyberspace[M].Cheltenham:Edward Elgar Publishing,2015. [26]江河.从大国政治到国际法治:以国际软法为视角[J].政法论坛,2020 (1):51. [27]黄志雄.网络空间国际规则制定的新趋向——基于《塔林手册2.0版》的考察[J].厦门大学学报 (哲学社会科学版),2018 (1):9.