检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:魏静远 WEI Jingyuan
机构地区:[1]中国人民大学法学院
出 处:《武大国际法评论》2023年第6期60-75,共16页Wuhan University International Law Review
基 金:2022年中国博士后科学基金第72批面上资助二等项目“国际法院对善意原则适用的类型化分析”(2022M720388)的阶段性成果之一。
摘 要:当前网络空间安全形势愈加复杂严峻,国家间网络冲突对抗日益频繁,如网络攻击行为违反国际法律义务且可归因于一国时将涉及行为国国家责任的追究以及受害国采取反措施维护国家安全与利益等问题。在认定网络攻击行为的不法性时应具体区分网络情报窃取、网络攻击破坏等复杂的网络攻击场景。对该不法行为是否可归因于一国的判断不仅需要技术手段进行追踪溯源定位攻击主体,在法律层面对网络攻击行为与特定一国的联系进行类型化分析以及归因标准的适用分析也至关重要。在受害国追究行为国国家责任时是否应公开披露证据问题上,国际法并未作强制义务要求,而由于网络技术的高度机密性,国家公开与否的决策往往带有一定的政治外交色彩。当前,对频发的网络攻击行为进行正确定性及归因以确定国家责任问题仍面临着诸多不确定性,中国应把握契机丰富相关理论及实践,积极参与网络空间全球治理,贡献中国方案和智慧。Currently, cyberspace security is becoming an increasingly complex and serious issue. The cyber conflicts and confrontations between countries are becoming more and more frequent. If a cyber-attack constitutes a breach of international legal obligations and can be attributed to a state, it will involve issues such as the pursuit of the state responsibility and the right of the injured state to take countermeasures to safeguard its national security and interests. In determining the wrongfulness of a cyber-attack, a specific distinction should be made between complex attack scenarios, such as computer network exploitation and computer network attack. The determination of whether the wrongful act can be attributable to a state requires not only technical means to trace the source of the attack, but also legal analysis on different types of their relation and applicable attribution criteria. Whether evidence of those determination should be publicly disclosed by the injured state in the pursuit of state responsibility is not explicitly required by international law. Due to the highly confidential nature of cyber technology, the trade-off between disclosure or not is often tinged with a certain amount of political diplomacy. Currently, there are still many uncertainties regarding the correct legally characterization and attribution of frequent cyberattacks for the purpose of establishing state responsibility. China should seize this opportunity to enrich its relevant theory and practice, for actively participating in the global governance of cyberspace and providing Chinese input and insight.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.33