Abstract:Data sovereignty is a national resource fiercely contested by countries in the new field of cyberspace,which is related to national security and people's interests.Tracing back to the sovereignty theory,it has developed from Westphalia sovereignty to network sovereignty and data sovereignty.Under the background of the current digital economy driven era,it is faced with governance challenges such as broadening the subject dimension,diversified protection models,and multi-level legal forms.Internet data giants have used their dominant position in the data market to weaken the country's power in cyberspace.The United States,EU and other countries and regions'diversified data sovereignty policies and huge data volume differences have increased the difficulty of sovereign governance.The differences in the characteristics of the physical layer,logical layer and content layer of the Internet architecture led to the inability to adopt unified logic or standards for its governance.Facing these multi-dimensional challenges,we should take the hierarchical data sovereignty governance thought as the guidance,plan the governance principle by subject,build the governance model by region,improve the governance framework by level,build the hierarchical regulation of data sovereignty,and effectively safeguard the security of China's data sovereignty in the flood of global data competition.
[1]冉从敬,刘妍.数据主权的理论谱系[J].武汉大学学报(哲学社会科学版),2022,75(6):19-29.
[2]孙南翔,张晓君.论数据主权:基于虚拟空间博弈与合作的考察[J].太平洋学报,2015,23(2):63-71.
[3]冉继军.互联网时代的信息主权(上)[J].新闻知识,2011,28(3):3-5.
[4]刘志强,赵磊.信息时代背景下的网络战与国际政治[J].东南亚纵横,2002,23(8):57-59.
[5]曹磊.网络空间的数据权研究[J].国际观察,2013,34(1):53-58.
[6]陈侠,顔琳,郝晓伟.美炒作“中国黑客”话题与中国对策探讨[J].对外经贸实务,2014,32(10):94-96.
[7]王明进.全球网络空间治理的未来:主权,竞争与共识[J].学术前沿,2016,5(4):15-23.
[8]程啸.个人信息保护法理解与适用[M].北京:中国法制出版社,2021.
[9]GROSS L.The peace of Westphalia,1648-1948[J].The American journal of international law,1984,42(1):20-41.
[10]任东波.历史与理论的张力:反思“威斯特伐利亚”[J].史学集刊,2019(4):22-26.
[11]亨利·基辛格.世界秩序[M].北京:中信出版社,2015.
[12]约翰·霍夫曼.主权[M].长春:吉林人民出版社,2005.
[13]牛博文.信息主权论[D].重庆:西南政法大学,2016.
[14]MUELLER M.Will the internet fragment?Sovereignty,globalization,and cyberspace[M].Cambridge:Cambridge Polity Press,2017.
[15]王舒毅.网络空间国家主权初探[J].保密工作,2012,1(9):48-49.
[16]BARLOW J P.网络独立宣言[EB/OL].[2022-07-01].http://www.ideobook.com/38/declaration-independence-cyberspace/.
[17]张新宝,许可.网络空间主权的治理模式及其制度构建[J].中国社会科学,2016,37(8):139-158.
[18]VATANPARAST R.Data governance and the elasticity of sovereignty[J].Brooklyn journal of international law,2020,46(1):1-38.
[19]TRACHTMAN J P.Cyberspace,sovereignty,jurisdiction,and modernism[J].Indiana journal of global legal studies,1998,5(2):561-581.
[20]KUKUTAI T,TAYLOR J.Indigenous data sovereignty:toward an agenda[M].Canberra:ANU Press,2016.
[21]POLATIN-REUBEN D,WRIGHT J.An internet with brics characteristics:data sovereignty and the balkanisation of the internet[C].4th USENIX Workshop on Free and Open Communications on the Internet,2014.
[22]高富平.大数据知识图谱——数据经济的基础概念和制度[M].北京:北京出版社,2020.
[23]COMMISSION E.Commission staff working document impact assessment[EB/OL].[2021-08-28].https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018SC0118&from=EN.
[24]彭前卫.面向信息网络空间的国家主权探析[J].情报杂志,2002,21(5):98-100.
[25]FATAH F.La souveraineté à l'ère du numérique:enjeux stratégiques pour l'état français et les institutions européennes[J].Revue du marche commun et de l'Union européenne,2020,63(4):26-34.
[26]宫云牧.欧盟的数字主权建构:内涵,动因与前景[J].国际研究参考,2021,1(10):8-16.
[27]KARANICOLAS M.Understanding the internet as a human right[J].Canadian journal of law and technology,2012,10(2):262-285.
[28]DASKAL J.Borders and bits[J].Vanderbilt law review,2018,71(1):179-240.
[29]黄海瑛,何梦婷.基于cloud法案的美国数据主权战略解读[J].信息资源管理学报,2019,9(2):34-45.
[30]吴琦.网络空间中的司法管辖权冲突与解决方案[J].西南政法大学学报,2021,23(1):47-64.
[31]GANAY C D,GILLOT D.Pour une intelligence artificielle maîtrisée,utile et démystifiée[EB/OL].[2021-10-20].https://www.senat.fr/notice-rapport/2016/r16-464-1-notice.html.
[32]新京报.全面解析拜登外交政策,至关重要的“对华三条”[EB/OL].[2021-11-19].https://news.ifeng.com/c/81EPigv4yR4.
[33]BRADFORD A.The brussels effect:how the european union rules the world[M].New York:Oxford University Press,2020.
[34]BENKLER Y.The wealth of networks:how social production transforms markets and freedom[M].New Haven:Yale University Press,2006.
[35]EICHENSEHR K E.The cyber-law of nations[J].The Georgetown law journal,2014,103(2):317-380.
[36]郎平.主权原则在网络空间面临的挑战[J].现代国际关系,2019,1(6):44-50.
[37]刘晗,叶开儒.网络主权的分层法律形态[J].华东政法大学学报,2020,23(4):67-82.
[38]中央纪委国家监察委网站.我国已与81个国家缔结引渡条约、司法协助条约等共169项[EB/OL].[2021-10-13].http://www.bjsupervision.gov.cn/ttxw/202011/t20201111_71643.html.
[39]梁坤.基于数据主权的国家刑事取证管辖模式[J].法学研究,2019,41(2):190-210.
[40]许多奇.个人数据跨境流动规制的国际格局及中国应对[J].法学论坛,2018,33(3):130-137.
[41]刘妍,肖冬梅.澳大利亚数据泄露通知制度及其启示[J].信息资源管理学报,2021,11(3):40-49.
[42]万方,赵琳琳.数据域外管辖趋势及我国的立法应对[J].图书情报知识,2021,38(4):136-145.
[43]CHRISTOPHER K,CATE F H,CHRISTOPHER M,et al.Internet balkanization gathers pace:is privacy the real driver[J].International data privacy law,2015,5(1):1-2.
[44]国家互联网应急中心.2021年上半年我国互联网网络安全监测数据分析报告[EB/OL].[2021-10-25].https://www.cert.org.cn/application/search.jsp.
[45]ANQI W.Cyber sovereignty and its boldest:a Chinese perspective[J].Ohio St Tech LJ,2020,16(2):395-467.
[46]JEYAKODI D.Cyber security in civil aviation[J].The aviation and space journal,2015,14(4):2-9.