期刊文献+

打击网络恐怖主义欧盟立法探析

Analysis of European Union Legislation against Cyber Terrorism
原文传递
导出
摘要 传统恐怖主义活动与网络科技相结合,产生了网络恐怖主义。网络恐怖主义问题是当今全球非传统安全领域面临的新问题,其表现形式多种多样,并且借助于网络的全球性危及整个国际社会。欧洲联盟在打击网络恐怖主义立法方面起步较早,内容上相对完善,丰富了欧盟法的内容,也推进了网络反恐国际法的建设。中国作为维护国际社会和平与稳定的重要力量,从自身状况出发开展了一系列打击网络恐怖主义的国际实践。中国与欧盟在网络反恐领域内存在着众多共同利益,未来也将在网络恐怖主义问题上达成更多的共识。 The combination of traditional terrorism activities and cyber technology produced Cyberterrorism. In the field of global non-traditional security, cyberterrorism is a new problem, it manifests in various forms and threatens the entire international community. The European Union started earlier in against Cyberterrorism legislation, its content is relatively complete, not only enrich the EU law, but also Promoting the construction of International cyber anti-terrorism law. As an important country in international society, China had launched a series of international practices to combat cyberterrorism, these measures are inevitable for maintaining world peace and stability. China and European Unions have lots of common interests in the field of cyber anti-terrorism, will reach more consensus on this issue in the future.
作者 杨凯
出处 《欧洲法律评论》 2019年第1期143-156,共14页 Chinese Journal of European Law
基金 国家社会科学基金重点项目“海外安全利益法律保护的中国模式研究”(项目号:13AFX028)的阶段性研究成果
关键词 网络恐怖主义 网络反恐 欧盟法 中欧合作 Cyberterrorism Cyber Anti-terrorism European Union Law China-EU Cooperation
  • 相关文献

参考文献2

二级参考文献28

  • 1See Ulrich Sieber," The Threat of Cybercrime", in Council of Europe ( ed. ), Organized Crime in Europe, Strasbourg 2005, pp. 212 - 218.
  • 2刘玉燕.《中国政府恐怖主义危机管理问题研究》,北京师范大学出版社2011年版,第1页.
  • 3See Mark M. Pollitt, " Cyberterrorism: Fact or Fancy?" Proceedings of the 20th National Information Systems Security Conference, October 1997, pp. 285 - 259.
  • 4See Ulrich Sieber, Cyber-terrorism-The Use of the lnternet for Terrorist Purposes ,2008 ,Council of Europe.
  • 5See Ulrich Sieber, International Cooperation against Terrorist Use of Intemet, in Revue Intemationale de Droit Penal, 3 e/4e trimesters (2006), S. 399.
  • 6See United Nations Counter-Terrorism Implementation Task Force Working Group,Report on Countering the Use of the Internet for Terrorist Purposes,2009 ,p.5.
  • 7See United Nations Counter-Terrorism Implementation Task Force Working Group, Report on Countering the Use of the lnternet for Terrorist Purposes, p. 2.
  • 8See Max Taylor and John Horgan, "A Conceptual Framework for Addressing Psychological Process in the Development of the Terrorist", Terrorism and Political Violence, 18 ( 2006 ).
  • 9U. Sieber and P. Brunst, eds. , Cyberterrorism and Other Use of the Internet for Terrorist Purposes, Council of Europe, 2007,pp. 12 -21.
  • 10C. Foltz,"Cyberterrorism, Computer Crime,and Reality" ,Information Management & Computer Security, 15.3. 2004, Vol. 12, pp. 154 - 166.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部