|本期目录/Table of Contents|

[1]崔保国,杨 乐.科技企业倡导网络空间国际规范的传播策略——以微软网络安全国际规范实践为例[J].未来传播(浙江传媒学院学报),2024,(01):9-20.
 CUI Bao-guo & YANG Le.Tech Enterprise Strategies for Advocating International Cybernorms——Take Microsoft's Cybersecurity Norms as an Example[J].FUTURE COMMUNICATION,2024,(01):9-20.
点击复制

科技企业倡导网络空间国际规范的传播策略——以微软网络安全国际规范实践为例()
分享到:

《未来传播》(浙江传媒学院学报)[ISSN:2096-8418/CN:33-1334/G2]

卷:
期数:
2024年01期
页码:
9-20
栏目:
智能传播
出版日期:
2024-02-20

文章信息/Info

Title:
Tech Enterprise Strategies for Advocating International Cybernorms——Take Microsoft's Cybersecurity Norms as an Example
文章编号:
2096-8418(2024)01-0009-12
作者:
崔保国12杨 乐1
(1.清华大学新闻与传播学院,北京100084; 2.海南大学国际传播与艺术学院,海南海口570228)
Author(s):
CUI Bao-guo & YANG Le
关键词:
网络空间治理 国际规范扩散 科技企业 国际传播
分类号:
G206
DOI:
-
文献标志码:
A
摘要:
当前,网络空间仍处于建章立制的关键时期,具备知识和技术资源的科技企业成为规则制定的重要参与方。面对短期内网络空间“硬法”难达成的现状,国际规范成为约束网络空间各方行为的有效“软法”。近年来,科技企业积极倡导网络空间规范,进入国家主导的网络规范国际议程成为其规范倡导有效性的关键。本研究基于议程设置理论、国家社会化理论和规范周期理论,对科技企业微软的规范倡导实践进行分析。研究发现,采用导向需求型规范、标杆式说服型规范和多议程联动型规范三种倡导策略,能够使科技企业与国家倡导的规范形成互动,在国际社会有效传播。对当前科技企业在国际社会倡导网络空间国际规则成功案例的理论化,将有利于我国企业参与网络空间国际治理的实践探索,提升我国网络空间国际规则制定的综合实力。

参考文献/References:

[1]新华社.习近平在第二届世界互联网大会开幕式上的讲话(全文)[EB/OL]. http://www.xinhuanet.com//politics/2015-12/16/c_1117481089.htm.
[2]新华社.携手构建网络空间命运共同体[EB/OL]. https://www.gov.cn/zhengce/2022-11/07/content_5725117.htm.
[3]Martha, F.Cultivating. international cyber norms, America's cyber future: Security and prosperity in the information age. Retrieved June 15,2011,from https://citizenlab.ca/cybernorms2011/cultivating.pdf.
[4][美]罗纳德·吉普森,[美]亚历山大·温特,[美]彼得·卡赞斯坦. 规范、认同和国家安全文化[A].[美]彼得·卡赞斯坦.国家安全的文化:世界政治中的规范与认同[M]. 宋伟,刘铁娃,译.北京:北京大学出版社,2009:56.
[5]曹玮. 国际关系理论教程 [M]. 北京:中国社会科学出版社,2020:218-220.
[6]Nye, J. S.Normative restraints on cyber conflict. Cyber Security Project. Harvard Kennedy School Belfer Center for Science and International Affairs Retrieved.Augest 1,2018, from https://www.belfercenter.org/sites/default/files/files/publication/Nye%20Normative %20Restraints%20Final.pdf.
[7]姜博谦,王渊结. 2022年度联合国打击网络犯罪公约谈判进展[J]. 中国信息安全,2023(1):70-72.
[8][美]约瑟夫·奈.权力大未来 [M].王吉美,译.北京:中信出版社,2012:160-176.
[9]叶成城. 数字时代的大国竞争:国家与市场的逻辑——以中美数字竞争为例 [J],外交评论,2022(2):110-132.
[10]杨乐,崔保国. 科技企业参与联合国框架下网络空间国际规则进程2022年度回顾[J],中国信息安全,2022(12):53-56.
[11]Greenwald, G.& MacAskill, E.NSA Prism program taps in to user data of Apple, Google and others.Retrieved June 7,2013, from https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
[12]Microsoft.Five principles for shaping cybersecurity norms. Retrieved March 13,2013, from https://query.prod.cms. rt.microsoft.com/cms/api/am/binary/REVmc9.
[13][美]布拉德·史密斯,[美]卡罗尔·安·布朗. 工具,还是武器? [M],杨静娴,赵磊,译.北京:中信出版社,2020:21-25.
[14]Microsoft.International Cybersecurity Norms——Reducing Conflict in an Internet-Dependent World.December 15, 2014. Retrieved from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REVroA.
[15]Microsoft.Governments and APTs: The need for norms. Retrieved September 1,2015.from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REXXtU.
[16]Mcrosoft.From articulation to implementation: Enabling progress on cybersecurity norms. Retrieved June 24,2016.from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/REVmc8.
[17]Smith,B.The Need for a Digital Geneva Convention. Transcript of Keynote Address at the RSA Conference. February 14,2017.p.10. Retrieved from https://blogs.microsoft.com/wp-content/uploads/2017/03/Transcript-of-Brad-Smiths-Keynote-Address-at-the-RSA-Conference-2017.pdf.
[18]Tech,A. Cybersecurity Tech Accord endorses the MANRS initiative, joining efforts to eliminate the most common threats to the Internet's routing system.Retrieved August 9, 2018. from https://cybertechaccord.org/cybersecurity-tech-accord-endorses-manrs.
[19]Tech, A. Securing the next generation of connected consumer products. Retrieved February 15,2022.from https://cybertechaccord.org/securing-the-next-generation-of-connected-consumer-products.
[20]Weaver, H.(1980).Audience need for orientation and media effects. Communication Research, 7(3):361-373.
[21]钟龙彪. 国家社会化:国际关系的一项研究议程[J],欧洲研究,2009(2):125-137.
[22]Johnston, A. I.(2008). Social states: China in international institutions, New Jersey, Princeton University Press.
[23][美]玛莎·芬尼摩尔,[美] 凯瑟琳·斯金克. 国际规范的动力与政治变革[A].[美] 彼得·卡赞斯坦,[美] 罗伯特·基欧汉,[美] 斯蒂芬·克.世界政治理论的探索与争鸣 [M].[美].秦亚清,等译,上海:上海人民出版社,2018:203-205.
[24]Tech, A. Cybersecurity Tech Accord submission to the UN High Level Panel on Digital Cooperation.Retrieved December 21, 2018.from https://cybertechaccord.org/uploads/prod/2018/12/Tech-Accord-HLP-Response-Dec-2018.pdf.
[25]Tech,A. Cybersecurity Tech Accord letter to OECD scoping paper on digital security of products.Retrieved January 10,2020. from https://cybertechaccord.org/cybersecurity-tech-accord-letter-to-oecd-scoping-pap er-on-security-of-digital-products.
[26]Tech,A. Reducing tensions in cyberspace by promoting cooperation:Cybersecurity Tech Accord publishes a set of recommendations on confidence-building measures in cyberspace.Retrieved April 4,2019. from https://cybertechaccord.org/reducing-tensions-in-cyberspace-by-promoting-coope ration-cybersecurity-tech-accord-publishes-a-set-of-recommendations-on-confide nce-building-measures-in-cyberspace.
[27]Tech,A. Cybersecurity Tech Accord submission to Australian consultation on responsible state behavior in cyberspace. Retrieved March 2,2020. from https://cybertechaccord.org/cybersecurity-tech-accord-submission-to-australian-consultation-on-responsible-state-behavior-in-cyberspace.
[28]Anja,P. J.& Klaus D. W.(Eds.)(2013).Transnational Governance of Violence and Crime.London, Palgrave Macmillan, London.: 129-148.Jeutner, V.(2019). The digital geneva convention: A critical appraisal of Microsoft's proposal. Journal of International Humanitarian Legal Studies. 2019(10):158-170. Available at SSRN: https://ssrn.com/abstract=3402565.
[29]鲁传颖. 网络空间治理与多利益攸关方理论[M].北京:时事出版社,2016:199.
[30]Christian, R.,Duncan, H.,Wyatt, H.& Tim, M.(2020):Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads,Carnegie Endowment for International Peace, February, 2020. Retrieved from https://carnegieendowment.org/2020/02/26/cyberspace-and-geopolitics-assessing-global-cybersecurity-norm-processes-at-crossroads-pub-81110.
[31]黄超. 说服战略与国际规范传播 [J].世界经济与政治, 2010(9):72-87.
[32][美] 玛格丽特·凯克,[美]凯瑟琳·辛金克. 超越国界的活动家:国际政治中的倡议网络 [M].韩召颖,孙英丽,译. 北京:北京大学出版社,2005:100.
[33]Martha, F.(2003). The purpose of intervention: Changing beliefs about the use of force, London: Cornel University Press.
[34]Richard, P.(1998). Reversing the gun sights: transnational civil society targets land mines, International Organization, 52(3): 613-644.
[35]Guo, L.& Chris, V.(2015). The power of message networks: A Big-data analysis of the network agenda setting model and issue ownership. Mass Communication and Society, 18(5):557-576.Vu, T.,Lei,G.& Maxwell,M.(2014). Exploring “the world outside and the pictures in our heads” a network agenda-setting study. Journalism & Mass Communication Quarterly, 91(4):669-686.

相似文献/References:

备注/Memo

备注/Memo:
基金项目:国家社会科学基金一般项目“全球数字治理下的国际互联网规则形成机制研究”(21BXW008)。
作者简介:崔保国,男,教授,博士生导师; 杨乐,女,博士研究生。
更新日期/Last Update: 2024-02-15