[1]新华社.习近平在第二届世界互联网大会开幕式上的讲话(全文)[EB/OL]. http://www.xinhuanet.com//politics/2015-12/16/c_1117481089.htm.
[2]新华社.携手构建网络空间命运共同体[EB/OL]. https://www.gov.cn/zhengce/2022-11/07/content_5725117.htm.
[3]Martha, F.Cultivating. international cyber norms, America's cyber future: Security and prosperity in the information age. Retrieved June 15,2011,from https://citizenlab.ca/cybernorms2011/cultivating.pdf.
[4][美]罗纳德·吉普森,[美]亚历山大·温特,[美]彼得·卡赞斯坦. 规范、认同和国家安全文化[A].[美]彼得·卡赞斯坦.国家安全的文化:世界政治中的规范与认同[M]. 宋伟,刘铁娃,译.北京:北京大学出版社,2009:56.
[5]曹玮. 国际关系理论教程 [M]. 北京:中国社会科学出版社,2020:218-220.
[6]Nye, J. S.Normative restraints on cyber conflict. Cyber Security Project. Harvard Kennedy School Belfer Center for Science and International Affairs Retrieved.Augest 1,2018, from https://www.belfercenter.org/sites/default/files/files/publication/Nye%20Normative %20Restraints%20Final.pdf.
[7]姜博谦,王渊结. 2022年度联合国打击网络犯罪公约谈判进展[J]. 中国信息安全,2023(1):70-72.
[8][美]约瑟夫·奈.权力大未来 [M].王吉美,译.北京:中信出版社,2012:160-176.
[9]叶成城. 数字时代的大国竞争:国家与市场的逻辑——以中美数字竞争为例 [J],外交评论,2022(2):110-132.
[10]杨乐,崔保国. 科技企业参与联合国框架下网络空间国际规则进程2022年度回顾[J],中国信息安全,2022(12):53-56.
[11]Greenwald, G.& MacAskill, E.NSA Prism program taps in to user data of Apple, Google and others.Retrieved June 7,2013, from https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
[12]Microsoft.Five principles for shaping cybersecurity norms. Retrieved March 13,2013, from https://query.prod.cms. rt.microsoft.com/cms/api/am/binary/REVmc9.
[13][美]布拉德·史密斯,[美]卡罗尔·安·布朗. 工具,还是武器? [M],杨静娴,赵磊,译.北京:中信出版社,2020:21-25.
[14]Microsoft.International Cybersecurity Norms——Reducing Conflict in an Internet-Dependent World.December 15, 2014. Retrieved from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REVroA.
[15]Microsoft.Governments and APTs: The need for norms. Retrieved September 1,2015.from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REXXtU.
[16]Mcrosoft.From articulation to implementation: Enabling progress on cybersecurity norms. Retrieved June 24,2016.from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REVmc8.
[17]Smith,B.The Need for a Digital Geneva Convention. Transcript of Keynote Address at the RSA Conference. February 14,2017.p.10. Retrieved from https://blogs.microsoft.com/wp-content/uploads/2017/03/Transcript-of-Brad-Smiths-Keynote-Address-at-the-RSA-Conference-2017.pdf.
[18]Tech,A. Cybersecurity Tech Accord endorses the MANRS initiative, joining efforts to eliminate the most common threats to the Internet's routing system.Retrieved August 9, 2018. from https://cybertechaccord.org/cybersecurity-tech-accord-endorses-manrs.
[19]Tech, A. Securing the next generation of connected consumer products. Retrieved February 15,2022.from https://cybertechaccord.org/securing-the-next-generation-of-connected-consumer-products.
[20]Weaver, H.(1980).Audience need for orientation and media effects. Communication Research, 7(3):361-373.
[21]钟龙彪. 国家社会化:国际关系的一项研究议程[J],欧洲研究,2009(2):125-137.
[22]Johnston, A. I.(2008). Social states: China in international institutions, New Jersey, Princeton University Press.
[23][美]玛莎·芬尼摩尔,[美] 凯瑟琳·斯金克. 国际规范的动力与政治变革[A].[美] 彼得·卡赞斯坦,[美] 罗伯特·基欧汉,[美] 斯蒂芬·克.世界政治理论的探索与争鸣 [M].[美].秦亚清,等译,上海:上海人民出版社,2018:203-205.
[24]Tech, A. Cybersecurity Tech Accord submission to the UN High Level Panel on Digital Cooperation.Retrieved December 21, 2018.from https://cybertechaccord.org/uploads/prod/2018/12/Tech-Accord-HLP-Response-Dec-2018.pdf.
[25]Tech,A. Cybersecurity Tech Accord letter to OECD scoping paper on digital security of products.Retrieved January 10,2020. from https://cybertechaccord.org/cybersecurity-tech-accord-letter-to-oecd-scoping-pap er-on-security-of-digital-products.
[26]Tech,A. Reducing tensions in cyberspace by promoting cooperation:Cybersecurity Tech Accord publishes a set of recommendations on confidence-building measures in cyberspace.Retrieved April 4,2019. from https://cybertechaccord.org/reducing-tensions-in-cyberspace-by-promoting-coope ration-cybersecurity-tech-accord-publishes-a-set-of-recommendations-on-confide nce-building-measures-in-cyberspace.
[27]Tech,A. Cybersecurity Tech Accord submission to Australian consultation on responsible state behavior in cyberspace. Retrieved March 2,2020. from https://cybertechaccord.org/cybersecurity-tech-accord-submission-to-australian-consultation-on-responsible-state-behavior-in-cyberspace.
[28]Anja,P. J.& Klaus D. W.(Eds.)(2013).Transnational Governance of Violence and Crime.London, Palgrave Macmillan, London.: 129-148.Jeutner, V.(2019). The digital geneva convention: A critical appraisal of Microsoft's proposal. Journal of International Humanitarian Legal Studies. 2019(10):158-170. Available at SSRN: https://ssrn.com/abstract=3402565.
[29]鲁传颖. 网络空间治理与多利益攸关方理论[M].北京:时事出版社,2016:199.
[30]Christian, R.,Duncan, H.,Wyatt, H.& Tim, M.(2020):Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads,Carnegie Endowment for International Peace, February, 2020. Retrieved from https://carnegieendowment.org/2020/02/26/cyberspace-and-geopolitics-assessing-global-cybersecurity-norm-processes-at-crossroads-pub-81110.
[31]黄超. 说服战略与国际规范传播 [J].世界经济与政治, 2010(9):72-87.
[32][美] 玛格丽特·凯克,[美]凯瑟琳·辛金克. 超越国界的活动家:国际政治中的倡议网络 [M].韩召颖,孙英丽,译. 北京:北京大学出版社,2005:100.
[33]Martha, F.(2003). The purpose of intervention: Changing beliefs about the use of force, London: Cornel University Press.
[34]Richard, P.(1998). Reversing the gun sights: transnational civil society targets land mines, International Organization, 52(3): 613-644.
[35]Guo, L.& Chris, V.(2015). The power of message networks: A Big-data analysis of the network agenda setting model and issue ownership. Mass Communication and Society, 18(5):557-576.Vu, T.,Lei,G.& Maxwell,M.(2014). Exploring “the world outside and the pictures in our heads” a network agenda-setting study. Journalism & Mass Communication Quarterly, 91(4):669-686.