网络空间威慑:如何推进第三方责任

被引:10
作者
董青岭
机构
[1] 对外经济贸易大学国际关系学院国家信息中心
关键词
网络威慑; 网络攻击; 网络安全; 第三方; 国际合作;
D O I
暂无
中图分类号
D815 [国际问题]; F49 [信息产业经济];
学科分类号
030207 ; 1201 ;
摘要
网络空间威慑不同于常规威慑与核威慑,二者基于不同的原则而运转。在网络空间中,由于网络攻击者的匿名性、网络归因溯源技术的受限性以及网络空间本身的互联互通性,本来身处局外的"第三方"却常常深深卷入其中。就此,作者在情景假设的基础上提出一个严肃的理论问题:如果网络空间威慑第三方卷入难以避免,那么威慑方应当如何推进第三方责任?依据利益相关者理论,作者首先定义并厘清了"第三方"在网络空间威慑中的"局外合作者"身份和作用,提出网络空间威慑效力的发挥严重依赖于威慑方与第三方的紧密合作;若要诱导并约束第三方持续参与合作威慑进程,则必须要解决利益驱动和违约欺骗两个核心问题,同时更要明晰和推进第三方在网络空间威慑中的地位和责任范畴。简言之,网络空间威慑,第三方深深卷入其中;在发挥威慑效力的过程中,"合作安全"是其基本运行原则;威慑效力严重依赖于威慑方与第三方的紧密合作。
引用
收藏
页码:113 / 124+159 +159-160
页数:14
相关论文
共 14 条
[1]  
The Case for an India-US Partnership in Cyber Security. Srijith K.Nair. http://takshashila.org.in/wp-content/uploads/2010/03/TDD-CyberCollab-SKN-l . 2010
[2]  
"Cyber-Allies:Strengths and Weaknesses of NATO’’s Cyberdefense Posture,". Myriam Dunn Cavelty. IP Global Edition . 2011
[3]  
"Panetta Outlines New Cyber Doctrine for DoD,". Zachary Fryer-Biggs. Air Force Times . 2012
[4]  
Cybersecurity and U.S.-China Relations. Kenneth Lieberthal,Peter W.Singer. http://www.brookings.edu/-/media/research/files/papers/2012/2/23%20cybersecurity%20china%20us%20singer%201ieberthal/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.pdf . 2012
[5]  
Cybersecurity and U.S.-China Relations. Kenneth Lieberthal,Peter W.Singer. http://www.brookings.edu/-/media/research/files/papers/2012/2/23%20cybersecurity%20china%20us%20singer%20lieberthal/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.pdf . 2012
[6]  
"Russia,the United States,and Cyber Diplomacy:Opening the Doors,". Franz-Stefan Gady,Greg Austin. http://kmsl.isn.ethz.eh/serviceengine/Files/ISN/121211/ipublicationdocum . 2010
[7]  
Cyberaecurity and U.S.-China Relations. Kenneth Lieberthal,Peter W.Singer. http://www.brookings.edu/-/media/research/files/papers/2012/2/23%20cybersecurity%20china%20us%20singer%201ieberthal/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.pdf . 2012
[8]  
"Cyber Threats and the Law of War,". David E.Graham. Journal of National Security Law&Policy . 2010
[9]  
"Cyber Deterrence Tougher in Theory than in Practice?". Will Goodman. Strategic Studies Quarterly . 2010
[10]  
"Cyber Deterrence Tougher in Theory than in Practice?". Will Goodman. Strategic Studies Quarterly . 2010