期刊文献+

论数据主权——基于虚拟空间博弈与合作的考察 被引量:57

On Data Security——An Examination of Game and Cooperation in Cyberspace
下载PDF
导出
摘要 随着互联网、云计算、物联网等通讯和网络技术的发展,数据跨境流动和储存更加日常化和便捷化。在大数据时代,国家数据安全面临更为严峻的挑战。数据主权将成为各国对数据及相关技术、设施、服务商进行管辖的理论基础。实践中,国家间的自发博弈形成了多重管辖权冲突和国家安全困境的无秩序状态。欲破解无秩序困境,国际社会应回归数据主权的合作参与性,以对数据的属地管辖和属人管辖为原则,对虚拟空间共有物实施共管,并对虚拟空间犯罪采取集体行动,以确保全人类共同的安全和发展。 With the development of communication and network technologies, such as Internet, cloud com- puting, and the Internet of Things, cross - boundary flow and storage of data become, more convenient. In the era of big data, national data security is facing more severe challenges. Data sovereignty will become the theoretical foundation of national administration of data and data - related technologies, facilities and service providers. In practice, unfortunately, the spontaneous game between nations results in a multi -ju- risdictional conflict and chaotic national security dilemma. With the purpose of solving the dilemma, the in- ternational community should focus on data sovereignty with the concepts of participation and cooperation. Specifically, data jurisdiction should be based on territorial jurisdiction and personal jurisdiction. All coun- tries around the world take collective actions to confront criminal actions in cyberspace in order to realize common security and development.
机构地区 西南政法大学
出处 《太平洋学报》 CSSCI 北大核心 2015年第2期63-71,共9页 Pacific Journal
基金 西南政法大学2014年度科研创新博士重点项目"网络空间的全球治理与国际法问题研究"(XZYJS2014006)
关键词 虚拟空间 数据主权 国家安全 cyberspace data sovereignty national security
  • 相关文献

参考文献40

  • 1Dunniela Kaufman, "Does Security Trump Tradeg.", Law & Business Review of the America, Vol. 13,2007, p. 624.
  • 2Dan Philpott, Edward N. Zalta, eds. , The Stanford Encyclo- paedia of Philosophy, 2003, http:// plato, stanford, edu/archives/ sum2003/entries/sovereignty.
  • 3Carol M. Celestine, " ' Cloudy' Skies, Bright Futures.'? In Defense of a Private Regulatory Scheme for Policing Cloud Computing", University oflllinois Journal of Law, Technology and Policy, Vol. 13, 20t3, pp. 144 - 145.
  • 4Omer Tene, Jules Polonetsky, "Privacy in the Age of Big Data: A Time for Big Decisions", Stanford Law Review Online, Vol. 64, 2012, p.63.
  • 5Kristina Irion, "Government Cloud Computing and National Data Sovereignty", Policy & lnternet, Vol. 4, 2012, pp. 42 -43.
  • 6曹磊.网络空间的数据权研究[J].国际观察,2013(1):53-58. 被引量:75
  • 7Adeno Addis, "The Thin State in Thick Globalism: Sover- eignty in the Information Age" , Vanderbilt Journal of Transnational Law, Vol. 37, 2004, pp. 24 - 45.
  • 8P. De Filippi, S. McCarthy, "Cloud Computing : Centrali- zation and Data Sovereignty", European Journal of Law and Technolo- gy, VoL3, No. 2, 2012, p. 15.
  • 9Christopher Rees, "Tomorrow's Privacy : Personal Information as Property", International Data Privacy Law, Vol. 3, No. 4, 2013, pp. 220 - 221.
  • 10Bryar A. Garner, ed., Black's Law Dictionary, 1999, p. 1402.

二级参考文献60

共引文献159

引证文献57

二级引证文献443

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部