FEEDBACK

Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace

Price: $56.22 $39.50 (Save $16.72)
Only 5 left in stock, order soon.
Add to Wishlist

  • Author: Fang Binxing;
  • Language: English
  • Format: 29.2 x 21.6 x 3.2 cm
  • Page: 524
  • Publication Date: 08/2018
  • ISBN: 9787030539069
  • Publisher: Science Press
Details
At the end of 2014, President Xi Jinping as the first state head voiced 'respect to cyber sovereignty'. Following that, more than 30 researchers from different units, including Fang Binxing, took the assignment 'Research on Cyberspace Sovereignty' from the Office of the Central Leading Group for Cyberspace Affairs and the Chinese Academy of Engineering in 2015. The research is focused on the generation, development, conflict, security, and other issues of cyberspace sovereignty. Chen Zuoning, the Vice President of the Chinese Academy of Engineering, attached great importance to the study and gave their advice.
In 1994, China formally got access to the Internet. Two years later China's Internet began to enter a wide popularity stage, and the National State High-Tech Development Plan ('863' Plan) included the Internet technology into the research guides, In 1998, the Ministry of Electronics Industry and the Ministry of Posts and Telecommunications were combined to form the Ministry of Information Industry, which allowed the Internet and telecommunications business to be independent of the government functions and be run by enterprises. The Ministry of Information Industry, unlike the former Ministry of Electronics Industry and Ministry of Posts and Telecommunications, no longer undertook the management activities, but served as the government to regulate the operation of various types of network services. With the functions of the government becoming clear, the Ministry of Information Industry began to make more efforts in the management of security problems and introduced a series of management systems and policies.
In 1996, the Internet activist John Perry Barlow published the famous 'A Declaration of the Independence of Cyberspace', claiming that cyberspace belongs to the 'future world' in which there is no government, no sovereignty, and it is global social space where its own social contract is forming and people deal with what happened in cyberspace in their own ways. As can be seen from the declaration, some people regard cyberspace as a 'virtual world' independent of the physical world and thus resist governmental management from the physical world.
Table of Contents

1 The Definitions of Fundamental Concepts 1
1.1 Basic Definition of Cyber 3
1.2 Various (Electromagnetic) Information Networks 4
1.2.1 Telecommunication Networks 4
1.2.2 Broadcast and Television Networks 7
1.2.3 The Intemet 7
1.2.4 Mobile Internet 8
1.2.5 Social Networks 8
1.2.6 Internet of Things 9
1.2.7 Sensor Networks 9
1.2.8 Industrial Control Networks 9
1.2.9Quantum Communication Networks 10
1.3 The Concept of Space 10
1.4 Introduction of the Concept of Cyberspace 12
1.5 Diversified Description Methods for Cyberspace 16
1.5.1 Simply Defining Cyberspace as Information and
Communication Infrastructure 17
1.5.2 Defining Cyberspace as an Information and Communication Infrastructure and Resident Data 19
1.5.3 Defining Cyberspace as a Collection of Facilities,Data and People 21
1.5.4 Defining Cyberspace as a Collection of Facilities,Data and Operations 23
1.5.5 Defining Cyberspace as a Complete Set of Facilities,Data, People and Operations 24
1.6 Analyses on the Four Elements of Cyberspace 28
1.7 The History of Cyberspace 29
1.7.1 The History of Radio Broadcast 29
1.7.2 History of Direct Broadcasting Satellite 33
1.7.3 History of Cable Television 36
1.7.4 History of the Internet 39
1.7.5 Change of Focuses During Cyberspace Development 47
1.8 The Reality of Cyberspace 48
1.8.1 The Authenticity from the Perspective of Virtual Real Mapping 48
1.8.2 The Authenticity of Cyberspace from Its Representations 48
1.9 The Definition of Cyberspace 49
1.9.1 The Definition from the Public Point of View 49
1.9.2 The Definition from an Academic Point of View 50
1.9.3 The Presentation from the International Perspective 51
1.10 The Definition of Cyberspace Security 51
2 Understanding of the Traditional Sovereignty Concept 53
2.1 The Origin of Sovereignty 54
2.1.1400 Year History of the Western Sovereignty Concept 55
2.1.2 Three Waves of Independence by Sovereign Nations of the World 56
2.1.3 The Intemally Relative Constitutionality of Sovereignty: Postwar Iraq 57
2.1.4 The Externally Relative Constitutionality of Sovereignty: Switzerland and the Tax Haven 58
2.2 The Connotation of Sovereignty 59
2.2.1 The First Natural Attribute of Sovereignty Connotation: Territory Sovereignty 60
2.2.2 The Second Natural Attribute of Sovereignty Connotation: People Sovereignty 60
2.2.3 The Third Natural Attribute of Sovereignty Connotation: Politics Sovereignty 61
2.2.4 Un evolved Sovereignty: Sovereignty Protection of Non self Governing Territories 62
2.3 Extensions of Sovereignty 62
2.3.1 The First Natural Attribute of Sovereignty Denotation: The Right of International Self Defense 63
2.3.2 The Second Natural Attribute of Sovereignty Denotation: The Right of International Independence 64
2.3.3 The Third Natural Attribute of Sovereignty Denotation: The Right of International Equality 65
2.4 Applications of Sovereignty 68
2.4.1 Geographic History Determines Endowments of Traditional National Sovereignty 68
2.4.2 The World View of 'Super Sovereignty' in History 71
2.4.3 'Overall Coordination of Two Great Situations' Reflects Constitutionality of Sovereignty 74
2.4.4 Extensions of State Sovereignty into Cyberspace 75
3 Interpretation of the Concept of“Cyberspace Sovereignty' 77
3.1 Multiple Interpretations About Cyberspace Sovereignty 77
3.1.1 'Cyber Sovereignty': A Shortened Form of 'Cyberspace Sovereignty' 78
3.1.2 The United Nations' Perspective 79
3.1.3 Geneva Declaration of Principles 80
3.1.4 Perspectives in the hiternational Code of Conduct for Information Security 81
3.2 Definition of Cyberspace Sovereignty 82
3.2.1 The Basic Elements of Cyberspace Sovereignty 83
3.2.2 Basic Rights of Cyberspace Sovereignty 84
3.2.3 Basic Principles of Cyberspace Sovereignty 84
3.2.4 Definition of Cyberspace Sovereignty 85
3.3 The Evolution of Sovereignty in a Variety of Cyberspace 86
3.3.1 The Type of Networks Over Which Cyberspace Sovereignty Naturally Exists 87
3.3.2 The Type of Networks Over Which Cyberspace Sovereignty Is Not Challenged 88
3.3.3 The Type of Networks Over Which Cyberspace Sovereignty Has Been Widely Acknowledged by the International Community 90
3.3.4 The Type of Networks Over Which Cyberspace Sovereignty Is a Controversial Issue 91
4 Necessities for Advocating Cyberspace Sovereignty 103
4.1 Conflicts Caused by Absence of Cyberspace Sovereignty 104
4.1.1 Jurisdiction of Domain Name and Other Internet Resources 105
4.1.2 The Ownership of Data Rights 107
4.1.3 Problems Brought by Big Data 108
4.1.4 Problems Brought by DifiFerent Judging Principles of Legality 109
4.1.5 Problems in the Tracing of Stepping Attacks 112
4.1.6 Trans Boundary Issues of Phishing Websites 113
4.2 Evolution of Internet into Benefit Space of Countries 114
4.2.1 Sovereignty Interest at Political Level 114
...
Sample Pages Preview


Sample pages of Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace (ISBN:9787030539069)
Sample pages of Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace (ISBN:9787030539069)
Sample pages of Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace (ISBN:9787030539069)
Sample pages of Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace (ISBN:9787030539069)
Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace
$39.50