<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          Global EditionASIA 中文雙語(yǔ)Fran?ais
          Opinion
          Home / Opinion / Global Views

          Virtual defense

          By LANG PING | China Daily Global | Updated: 2022-09-07 07:32
          Share
          Share - WeChat
          ZHANG YUJUN/FOR CHINA DAILY

          International security norms for cyberspace are a pressing need as it is becoming increasingly politicized

          In the digital age, two factors-the technical logic and the geopolitical logic featuring competition between major countries-h(huán)ave become the driving force for the international governance of cyberspace. Under the technical logic, the purpose of formulating international rules in cyberspace is to solve security problems caused by technology, while under the geopolitical logic, the purpose is to enable the distribution of interests and the shaping of order among countries. The current process of formulating international rules in cyberspace has become more complex, in the face of both technical problems and geopolitical confrontations.

          The dark side of cyberspace, if left uncontrolled, will bring great threats and risks to national and international security, and it is important for the international community to strengthen cooperation in response to such threats and risks.

          The internet, in its early days, was seen by many as a booster for the global democratic process. However, now we see that the internet, like any other technology, can be used for both good and bad purposes. People are using the internet to commit cyber crimes, circulate hate speech and disinformation and promote militarization. The security risks posed by the internet are rising on a daily basis. In particular, the emergence of geopolitical confrontations in cyberspace has led to an uptick in the risk of militarization and an arms race in cyberspace.

          Cyber attacks, despite the fact that they have not crossed the redlines stipulated in the UN Charter, have brought about potential spillover effects and escalated risks, such as wars, including proxy wars, as has been evidenced in the Russia-Ukraine conflict.

          In addition, disputes centering on internet technology standards are also surging in the international community, such as those over the New IP, the 5G and 6G networks. Some countries have tried to use democracy as a slogan to establish internet alliances, which could further divide the internet.

          In this regard, it is important for the international community to reach a tacit understanding on internet operations to ensure interconnection and protect it from the impact of geopolitical conflicts.

          In the digital sector, some countries attempt to draw ideological boundaries, build digital barriers, promote digital decoupling and establish new political blocs, which will intensify geopolitical confrontation.

          The last two years have seen the emergence of an increasing number of such political blocs, from an alliance of techno-democracies known as the T-12, to the EU-US Trade and Technology Council to the "Indo-Pacific Economic Framework for Prosperity" and the I2U2 Group, comprising Israel, India, the United States and the United Arab Emirates. Considerations based on geopolitical conflicts are overriding the logic of market efficiency, bringing instability to global value chains, industrial chains and supply chains, and running counter to the economy of scale-the inherent driving force for the digital economy.

          Meanwhile, international cooperation has also been advanced. The international community has conducted dialogues and negotiations on issues such as digital trade rules, digital economic cooperation and digital taxes via various intergovernmental platforms such as the United Nations, the World Trade Organization, the Organization for Economic Cooperation and Development, the G20 and the Asia-Pacific Economic Cooperation. The high-level dialogues of Internet Governance Forum+ and World Summit on the Information Society+20 under the framework of the United Nations, and the Global Digital Compact, are committed to bridging the digital divide and achieving the 2030 Goals for Sustainable Development.

          A few years ago, it was often said that the formulation of international rules in cyberspace had gone into uncharted waters, which meant that it was difficult to strike consensuses over the hardcore problems left behind after fixing the easier ones. This has been highlighted in the session of the UN Group of Governmental Experts. The UN GGE process has been going on for 18 years since it was first launched in 2004. Despite the important progress it made in 2015 on 11 voluntary non-binding norms, rules and principles for responsible national behaviors, it has not been able to come up with legally binding norms.

          There are many reasons. First, a lack of security design, the anonymity, and the difficulty in origin tracing in cyberspace make it difficult to apply international laws to cyberspace. Second, it is important for countries, especially major countries, to reach consensuses before international norms can be established. However, due to the imbalance in strengths between major countries in their internet sectors and differences in their interests, there is a lack of common ground on which to agree on international norms. Third, the balancing of interests requires bridging the differences between countries and balancing the relationship between state and non-state actors, while countries are also faced with the issue of coordinating development and security.

          Cyberspace is faced with a very severe security situation. It is in a state of cold peace even if there are no hot wars. There are two ways to respond to the above challenges: First, the international community must strengthen cooperation and jointly tackle common security threats in cyberspace and the digital sectors. Second, it is important for nations to strengthen communication and exchanges, enhance mutual trust in cooperation, and use the United Nations as the main channel to formulate the international rules to be followed through negotiation and consultation.

          In the future, the formulation of international rules in cyberspace can start from the following three aspects: First, more attention should be paid to challenges faced by the international community, such as cyber crimes, systemic risks in cyberspace and corresponding measures to avoid, resolve or remedy such risks. Second, countries could start with informal negotiations and take a step-by-step approach. For instance, they could start by drawing the redlines, determining which behaviors are not allowed, and formulating a negative list that is reinforced by positive behavior commitments, to build up trust bit by bit. Third, there can be some innovations in cyberspace security negotiation methods. The traditional methods of arms control negotiations should be avoided, as it is difficult to impose limits on various countries on building up their military capabilities in cyberspace. Instead, countries should focus on reaching consensuses on the use of cyber capabilities, especially for the most aggressive behaviors that could lead to major emergencies or escalate conflicts.

          The author is a research fellow and head of the national security division of the Institute of World Economics and Politics at the Chinese Academy of Social Sciences. The author contributed this article to China Watch, a think tank powered by China Daily. The views do not necessarily reflect those of China Daily.

          Contact the editor at editor@chinawatch.cn

           

          Most Viewed in 24 Hours
          Top
          BACK TO THE TOP
          English
          Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 色偷偷888欧美精品久久久| 中文字幕日韩有码一区| 国产精品视频一区二区亚瑟| 日韩精品亚洲专在线电影| 国产白嫩护士在线播放| 性xxxx视频播放| 办公室强奷漂亮少妇同事| 中文字幕在线制服丝袜| 成人午夜福利一区二区四区| www插插插无码免费视频网站| 成人精品区| 日本丰满少妇高潮呻吟| 国产微拍一区二区三区四区| 色狠狠色噜噜AV一区| 人妻少妇看A偷人无码电影| 久久毛片少妇高潮| 操国产美女| 乱中年女人伦av三区| 国产成人久久综合一区| 欧美 国产 亚洲 卡通 综合| 日本视频一区二区三区1| 又大又爽又黄无码a片| 四虎永久精品免费视频 | 狠狠色噜噜狠狠狠狠av不卡| 国产成人理论在线视频观看| 免费国产黄线在线观看| 2021中文字幕亚洲精品| 东方av四虎在线观看| 久久精品国产亚洲AV不卡 | 国产免费又黄又爽又色毛| 国产av无码专区亚洲avjulia| 日韩欧美一卡2卡3卡4卡无卡免费2020| 亚洲一区二区在线av| 国产av午夜精品福利| 最新午夜国内自拍视频| 日本边添边摸边做边爱喷水| 亚洲午夜福利在线观看| 九九热精彩视频在线免费| 精品尤物国产尤物在线看| 国日韩精品一区二区三区| 亚洲精品国产一二三无码AV|