购买
下载掌阅APP,畅读海量书库
立即打开
畅读海量书库
扫码下载掌阅APP

参考文献

Barlow,J.P.1996.Adeclaration of the independence of cyberspace[EB/OL].https://www.eff.org/cyberspace-independence(accessed 20 September 2021).

CCDCOE(NATO Cooperative Cyber Defense Centre of Excellence).2019.Trends in international law for cyberspace[EB/OL].https://ccdcoe.org/uploads/2019/05/Trends-Intlaw_a4_final.pdf(accessed 20 September 2021).

Cheng,L.,Pei,J.,&Danesi,M.2019.A sociosemiotic interpretation of cybersecurity in U.S.legislative discourse[J].Social Semiotics 29(3):286-302.

DeNardis,L.& Raymond,M.2013.Thinking clearly about multistakeholder Internet governance[C].Presented at Eight Annual GigaNet Symposium.

Gibson,W.2000.Neuromancer[M].New York:Ace Books.

International Committee of the Red Cross(ICRC).2015.International Humanitarian Law and the Challenges of Contemporary Armed Conflicts[R].Geneva:International Committee of the Red Cross.

International Telecommunication Union(ITU).2011.ITU National Cybersecurity Strategy Guide[R].Genvena:International Telecommunication Union.

Kosseff,J.2018.Defining cybersecurity law[J]. lowa Law Review 103(985):985-1031.

Kummer,M.2013.Multistakeholder cooperation:Reflections on the emergence of a new phraseology in international cooperation[EB/OL].https://www.internetsociety.org/blog/2013/05/multistakeholder-cooperation-reflections-on-the-emergence-of-a-new-phraseology-in-international-cooperation/(accessed 30 September 2021).

Kurbalija,J.2012.An Introduction to Internet Governance[M].Malta:Diplo Foundation.

Lessig,L.2006.Code Version 2[M].New York:Basic Books.

Melzer,N.2011.Cyberwarfare and International Law[R].Geneva:UNIDIR Resources.https://unidir.org/files/publications/pdfs/cyberwarfare-and-international-law-382.pdf(accessed 10 September 2021).

Mitchell,W.1995.City of Bits:Space,Place,and the Infobahn[M].Cambridge:MIT Press.

Reidenberg,J.1998.Lex informatica:The formulation of information policy rules through technology[J].Texas Law Review 76(3):553-593.

Schatz,D.,Bashroush,R.,& Wall,J.2017.Towards a more representative definition of cyber security[J].Journal of Digital Forensics,Security and Law 12:53-74.

Strate,L.1999.The varieties of cyberspace:Problems in definition and delimitation[J].Western Journal of Communication 63(3):382-412.

Weber,R.H.2015.Realizing a New Global Cyberspace Framework:Normative Foundations and Guiding Principles[M].New York:Springer.

Weir,G.R.S.& Mason,S.2017.The Sources of Digital Evidence[M]//Mason,S.& Seng,D.Electronic Evidence(Fourth edition).London:Institute of Advanced Legal Studies,1-17.

West,S.2014.Globalizing Internet governance:Negotiating cyberspace agreements in the post-Snowden era[C].Presented at the 42nd Research Conference on Communication,Information and Internet Policy.

蔡翠红.2013.国家—市场—社会互动中网络空间的全球治理[J].世界经济与政治,9∶91-100.

国际电信联盟.2017.国际电信联盟全球网络安全指数报告概要[J].信息安全与通信保密,7∶72-83.

鲁传颖.2016a.网络空间治理与多利益攸关方理论[M].北京:时事出版社.

鲁传颖.2016b.网络空间治理的力量博弈、理念演变与中国战略[J].国际展望,1∶117-134.

王春晖.2017.《网络安全法》六大法律制度解析[J].南京邮电大学学报(自然科学版),37(1):1-13. aYFiqF8q7M7w0qGeMukREN499G9EOJwsIh1XvZ2n4rMymCEwTGev9z/LFVVgRe2R

点击中间区域
呼出菜单
上一章
目录
下一章
×