廖丹子.“多元性”非传统安全威胁: 网络安全挑战与治理 [J].国际安全研究,2014,(3):25-36 |
“多元性”非传统安全威胁: 网络安全挑战与治理 |
Challenges and Governance of Multi-Meta Non-traditional Security Threats: Taking Cyber Security Threats as an Example |
投稿时间:2013-12-31 修订日期:2014-03-02 |
DOI: |
中文关键词: 网络安全 “多元性”非传统安全 优态共存 安全治理 |
英文关键词: cyber security, multi-meta non-traditional security, superior coexistence, security governance |
基金项目: |
|
摘要点击次数: 2574 |
全文下载次数: 1496 |
中文摘要: |
随着非传统安全威胁的愈加综合与复杂,非传统安全研究需要进一步精细化。“多元性”非传统安全威胁针对那类与传统安全因素相互交混的威胁而提出,在缘由、意图、主体、手段、地缘等多方面显示了非传统与传统安全相互交织的“多元性”特征。网络安全威胁是“多元性”非传统安全威胁中的重要议题,其呈现了主权难以界定、合法性难以判定、身份难以限定、过程难以追踪、应对难以依靠单一主体的非常规特征,网络安全维护需要新思维。一些国家奉行进攻型网络安全战略,导致了网络空间的威胁升级与安全困境,不利于全球网络安全维护。“优态共存”基于中国“和合”价值观而提出,主张认同建构与互惠共建,更好地适应了网络安全治理的跨界合作、“大安全”观与超越安全困境的能力要求,是较优的网络安全治理方略,可成为“多元性”非传统安全维护的一般路径。 |
英文摘要: |
With the deepening and widening consequences of non-traditional security issues, non-traditional security study needs to go further. Multi-meta Non-traditional Security Threat refered to a particular type of threats, which are characterized by both non-traditional and traditional security. Cyber security is now an important issue in the non-traditional security agenda. It confronts with some un-conventional challenges, for example, it is hard to declare its sovereignty, judge its legitimacy, confine its identity, trace its process, or respond with a single actor. As a result, cyber security governance needs a new way of thinking. Some countries nowadays are pursuing an aggressive cyber security strategy, which brings about escalation of threats and leads to a security dilemma that goes against global cyber security governance. Superior Co-existence was proposed by Chinese Hehe concept, and it claims identity construction and mutual benefits. Compared with the aggressive cyber strategy, it shows a stronger capacity to conduct trans-boundary cooperation, implement the Macro-security Concept and break out of the security dilemma, and therefore better responds to the demands of cyber security governance. Superior Co-existence is a relatively optimal strategy to multi-meta non-traditional security. |
查看全文
查看/发表评论 下载PDF阅读器 |
关闭 |
|
|
|