>
>
>
Cyberspace sovereignty—— Reflections on building a community of common future in cyberspace(按需印刷)
科学出版社弘德自营店
店铺评分

商品评价 0.00
发货速度 0.00
售后服务 0.00
  • 热销商品
  • 热门关注
  • 商品介绍
  • 商品评价

内容简介

  《2016司法鉴定能力验证鉴定文书评析》评析的鉴定文书取材于2016年度26项司法鉴定领域能力验证部分鉴定机构的反馈结果,覆盖法医类、物证类和声像资料(含电子物证)专业。评析中选用了同一个能力验证项目中不同层次水平的鉴定文书及相关反馈结果,依据各专业的要求从鉴定方法、鉴定过程、分析论述、标准适用、结果评判、结论表述、文书规范,以及检测中内部质量控制和记录要求等方面进行点评和分析,对于司法鉴定机构提高鉴定能力和加强质量管理具有很高的指导和示范作用。
  《2016司法鉴定能力验证鉴定文书评析》可供司法鉴定机构技术和管理人员、司法行政管理人员和认证认可评审员学习或参考。

目录

Contents
1 The Definitions of Fundamental Concepts 1
1.1 Basic Definition of Cyber 3
1.2 Various (Electromagnetic) Information Networks 4
1.2.1 Telecommunication Networks 4
1.2.2 Broadcast and Television Networks 7
1.2.3 The Intemet 7
1.2.4 Mobile Internet 8
1.2.5 Social Networks 8
1.2.6 Internet of Things 9
1.2.7 Sensor Networks 9
1.2.8 Industrial Control Networks 9
1.2.9Quantum Communication Networks 10
1.3 The Concept of Space 10
1.4 Introduction of the Concept of Cyberspace 12
1.5 Diversified Description Methods for Cyberspace 16
1.5.1 Simply Defining Cyberspace as Information and
Communication Infrastructure 17
1.5.2 Defining Cyberspace as an Information and Communication Infrastructure and Resident Data 19
1.5.3 Defining Cyberspace as a Collection of Facilities,Data and People 21
1.5.4 Defining Cyberspace as a Collection of Facilities,Data and Operations 23
1.5.5 Defining Cyberspace as a Complete Set of Facilities,Data, People and Operations 24
1.6 Analyses on the Four Elements of Cyberspace 28
1.7 The History of Cyberspace 29
1.7.1 The History of Radio Broadcast 29
1.7.2 History of Direct Broadcasting Satellite 33
1.7.3 History of Cable Television 36
1.7.4 History of the Internet 39
1.7.5 Change of Focuses During Cyberspace Development 47
1.8 The Reality of Cyberspace 48
1.8.1 The Authenticity from the Perspective of Virtual Real Mapping 48
1.8.2 The Authenticity of Cyberspace from Its Representations 48
1.9 The Definition of Cyberspace 49
1.9.1 The Definition from the Public Point of View 49
1.9.2 The Definition from an Academic Point of View 50
1.9.3 The Presentation from the International Perspective 51
1.10 The Definition of Cyberspace Security 51
2 Understanding of the Traditional Sovereignty Concept 53
2.1 The Origin of Sovereignty 54
2.1.1400 Year History of the Western Sovereignty Concept 55
2.1.2 Three Waves of Independence by Sovereign Nations of the World 56
2.1.3 The Intemally Relative Constitutionality of Sovereignty: Postwar Iraq 57
2.1.4 The Externally Relative Constitutionality of Sovereignty: Switzerland and the Tax Haven 58
2.2 The Connotation of Sovereignty 59
2.2.1 The First Natural Attribute of Sovereignty Connotation: Territory Sovereignty 60
2.2.2 The Second Natural Attribute of Sovereignty Connotation: People Sovereignty 60
2.2.3 The Third Natural Attribute of Sovereignty Connotation: Politics Sovereignty 61
2.2.4 Un evolved Sovereignty: Sovereignty Protection of Non self Governing Territories 62
2.3 Extensions of Sovereignty 62
2.3.1 The First Natural Attribute of Sovereignty Denotation: The Right of International Self Defense 63
2.3.2 The Second Natural Attribute of Sovereignty Denotation: The Right of International Independence 64
2.3.3 The Third Natural Attribute of Sovereignty Denotation: The Right of International Equality 65
2.4 Applications of Sovereignty 68
2.4.1 Geographic History Determines Endowments of Traditional National Sovereignty 68
2.4.2 The World View of "Super Sovereignty" in History 71
2.4.3 "Overall Coordination of Two Great Situations" Reflects Constitutionality of Sovereignty 74
2.4.4 Extensions of State Sovereignty into Cyberspace 75
3 Interpretation of the Concept of“Cyberspace Sovereignty" 77
3.1 Multiple Interpretations About Cyberspace Sovereignty 77
3.1.1 "Cyber Sovereignty": A Shortened Form of "Cyberspace Sovereignty" 78
3.1.2 The United Nations' Perspective 79
3.1.3 Geneva Declaration of Principles 80
3.1.4 Perspectives in the hiternational Code of Conduct for Information Security 81
3.2 Definition of Cyberspace Sovereignty 82
3.2.1 The Basic Elements of Cyberspace Sovereignty 83
3.2.2 Basic Rights of Cyberspace Sovereignty 84
3.2.3 Basic Principles of Cyberspace Sovereignty 84
3.2.4 Definition of Cyberspace Sovereignty 85
3.3 The Evolution of Sovereignty in a Variety of Cyberspace 86
3.3.1 The Type of Networks Over Which Cyberspace Sovereignty Naturally Exists 87
3.3.2 The Type of Networks Over Which Cyberspace Sovereignty Is Not Challenged 88
3.3.3 The Type of Networks Over Which Cyberspace Sovereignty Has Been Widely Acknowledged by the International Community 90
3.3.4 The Type of Networks Over Which Cyberspace Sovereignty Is a Controversial Issue 91
4 Necessities for Advocating Cyberspace Sovereignty 103
4.1 Conflicts Caused by Absence of Cyberspace Sovereignty 104
4.1.1 Jurisdiction of Domain Name and Other Internet Resources 105
4.1.2 The Ownership of Data Rights 107
4.1.3 Problems Brought by Big Data 108
4.1.4 Problems Brought by DifiFerent Judging Principles of Legality 109
4.1.5 Problems in the Tracing of Stepping Attacks 112
4.1.6 Trans Boundary Issues of Phishing Websites 113
4.2 Evolution of Internet into Benefit Space of Countries 114
4.2.1 Sovereignty Interest at Political Level 114
4.


好评度
0%
  • 全部评价
  • 晒图
  • 追评
  • 好评
  • 中评
  • 差评