Skip to main content

Scientific Basis for Maintaining Cyberspace Sovereignty

  • Chapter
  • First Online:
Cyberspace Sovereignty
  • 1144 Accesses

Abstract

Cyberspace sovereignty includes four elements: information communication technology facilities that support the existence of cyberspace; data to be generated, stored, processed, transmitted and displayed in an information communication technology system; cyber roles that transmit and process the data; and control rules determining principles of processing and transmitting the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Lecture of professor LV Shuwang from the Chinese Academy of Sciences in Peking University. http://xsc.nuc.edu.cn/info/1011/2066.htm [2016-10-3].

  2. 2.

    Model ccTLD Sponsorship Agreement-Triangular Situation. http://archive.icann.org/en/cctlds/model-tscsa- 02sep01.htm [2016-9-17].

  3. 3.

    Decimal network—developed and accomplished by XIE Jianping from Shanghai Institute of Chemical Industry. http://www.ccsa.org.cn/article_new/show_article.php?categories_id=73ca46f0-1b19-4d30-f550-44b1be116665&article_id=cyzx_173dae1a-c47b-e2c8-a140-466363d25c7c [2016-10-3].

  4. 4.

    LV Shuwang: China does not have its own Internet, and it is a top priority to build public network home. http://news.jschina.com.cn/system/2014/12/27/023111503.shtml [2016-10-3].

  5. 5.

    What is block chain? What can block chain technology do? http://www.qukuailianweb.com/164.html [2016-10-3].

  6. 6.

    Discussion of autonomous root domain name resolution system based on national alliance from viewpoint of national network sovereignty. http://news.xinhuanet.com/politics/2014-11/27/c_127255092.htm [2016-10-3].

  7. 7.

    Huang C, Maltz DA, Li J, et al (2011) Public DNS system and global traffic management//Proceedings INFOCOM, IEEE, 2615–2623. http://baike.baidu.com/view/5971613.htm [2016-9-25].

  8. 8.

    DNS “paralyzing” continued: self-repair without affecting drowsing of websites. http://www.360doc.com/content/14/0123/16/8534868_347361717.shtml [2016-9-17].

  9. 9.

    Domain name hosting and resolution services in education networks: To facilitate the rapid sharing of resources within the CERNET network. http://www.edu.cn/zxz_6542/20140424/t20140424_1104097_1.shtml [2016-9-17].

  10. 10.

    Discussion of autonomous root domain name resolution system based on national alliance from viewpoint of national network sovereignty. http://news.xinhuanet.com/politics/2014-11/27/c_127255092.htm [2016-10-3].

  11. 11.

    Open Root Server Network (ORSN). http://www.orsn.net [2016-9-21].

  12. 12.

    Yeti DNS Project. http://www.yeti-dns.org [2016-9-21].

  13. 13.

    Open DNS. http://www.doc88.com/p-6819957124082.html [2016-9-17].

  14. 14.

    Introduction of L root image into China will further enhance experience of the Internet users. http://www.ch.21vianet.com/?p=2303 [2016-9-17].

  15. 15.

    Discussion of autonomous root domain name resolution system based on national alliance from viewpoint of national network sovereignty. http://news.xinhuanet.com/politics/2014-11/27/c_127255092.htm [2016-10-3].

  16. 16.

    UNCITRAL Model Law on Electronic Commerce. http://www.uncitral.org/uncitral/en/uncitral_texts/electronic_commerce/1996Model.html [2016-9-17].

  17. 17.

    Microsoft cut off MSN service for five countries including Cuba. http://www.infzm.com/content/29199?depk3e [2016-10-2].

  18. 18.

    US strategic commander claimed that: Internet attacks on the United States will face military strikes. http://mil.eastday.com/m/20090516/u1a4375577.html [2016-10-3].

  19. 19.

    US Internet large-scale paralysis, Twitter, New York Times and other sites were attacked. http://news.qq.com/a/20161022/016976.htm [2016-12-31].

  20. 20.

    Historically, Google was attacked by DDoS because DDoS attacks between “PW” make the attacked “PW” redirect its domain name to Google’s IP address.

  21. 21.

    International Covenant on Civil and Political Rights, Chinese and English versions. http://www.hrol.org/Documents/ChinaDocs/Obligations/2012-11/272.html [2016-9-17].

  22. 22.

    Einstein Program for the United States Network Security 17. http://3y.uu456.com/bp_0g0oh8hxyn00kc51ztr7_1.html [2016-9-17].

  23. 23.

    US-CERT. https://www.us-cert.gov/ [2016-10-3].

  24. 24.

    Joint Task Force-Global Network Operations. https://en.wikipedia.org/wiki/Joint_Task_Force-Global_Network_Operations [2016-10-3].

  25. 25.

    Computer Fraud and Abuse Act. http://www.infseclaw.net/news/html/?937.html [2016-9-25].

  26. 26.

    The Controlling the Assault of Non-Solicited Pornography and Marketing or “CAN-SPAM” Act. http://www.magazine.org/sites/default/files/CONSUMER-CAN-SPAM.doc [2016-9-21].

  27. 27.

    Zhang YR (2002) Inspiration to China from controlling of online information harmful for minors in the US. Juvenile Delinquency Prob 5:54–55. http://www.docin.com/p-1508725455.html [2016-10-4].

  28. 28.

    Pornographic content control model in foreign internet. http://tech.sina.com.cn/roll/2008-02-28/0205588296.shtml [2016-9-21].

  29. 29.

    Television broadcasting activities: “Television without Frontiers” (TVWF) Directive. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=URISERV:l24101 [2016-9-17].

  30. 30.

    Audiovisual Media Services (AMS) Directive. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=URISERV:am0005 [2016-9-17].

  31. 31.

    Russia: Establish a “information filtering” firewall. http://news.ifeng.com/gundong/detail_2012_12/28/20607648_0.shtml [2016-9-21].

  32. 32.

    Russia requires a WiFi real name system. http://news.ifeng.com/a/20140809/41511186_0.shtml [2016-9-21].

  33. 33.

    German anti-child pornography law “law of blocking webpage login” officially entered into force. http://news.xinhuanet.com/world/2010-02/24/content_13038321.htm [2016-9-21].

  34. 34.

    France implements standardized management on the Internet. http://news.nen.com.cn/system/2012/12/26/010178108.shtml [2016-9-23].

  35. 35.

    Research on Governmental Governance of Public Opinion in Emergencies. http://3y.uu456.com/bp_14k0n8gg7y3xy6r95j74_17.html [2016-9-25].

  36. 36.

    Japan promotes the use of mobile phone filtering software to purify the network environment. http://tech.sina.com.cn/t/2010-01-05/14483739295.shtml [2016-9-17].

  37. 37.

    Xu JY (2013) Study on Korea’s legal system of supervising online information harmful for minors. Southwest University, Chong Qmg. http://www.docin.com/p-1518833237.html [2016-10-4].

  38. 38.

    Australia publishes network and mobile content rating regulation. http://tech.sina.com.cn/roll/2008-07-17/0748736404.shtml [2016-10-3].

  39. 39.

    Protect America Act of 2007. https://www.justice.gov/archive/ll/docs/text-of-paa.pdf [2016-9-17].

  40. 40.

    Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008. https://www.congress.gov/110/plaws/publ261/PLAW-110publ261.pdf [2016-9-17].

  41. 41.

    Le nouveau code penal. http://www.360doc.com/content/13/1226/17/15261343_340313398.shtml [2016-9-20].

  42. 42.

    France published the Anti-terrorism Law, which comprehensively guarded against terrorist activities. http://news.gmw.cn/2014-09/27/content_13392218.htm [2016-9-20].

  43. 43.

    Everything You Need to Know About Russia’s Internet Crackdown. https://advox.globalvoices.org/2014/07/06/everything-you-need-to-know-about-russias-internet-crackdown/ [2016-8-30].

  44. 44.

    Today’s hits: The Japanese House of Representatives forcibly passed the “Specific Secrets Protection Act”. http://news.163.com/13/1204/08/9F85M0JR00014JB5.html?f=jsearch [2016-10-3].

  45. 45.

    HU Xing. Singapore published a series of norms and regulations to furthest protect network rights of the Internet users.

  46. 46.

    Legal Daily: The law will not allow to discredit the country's freedom of speech. http://opinion.people.com.cn/n/2014/0514/c1003-25015157.html [2016-10-3].

  47. 47.

    Korea will severely punish behavior of spreading the Kim Shou-day beheaded video on the Internet. http://news.163.com/2004w06/12592/2004w06_1087993998073.html [2016-9-17].

  48. 48.

    Two islands and reef groups at North latitude 37°14′12′′, east longitude 131°51′51′′ were called “Dokdo” by South Korea called “Dokdo”, and “Takeshima” by Japan, which currently are under the actual control of Korea, but Japan claims to have sovereignty over them.

  49. 49.

    Self-immolation of Korean people to defend sovereignty. http://news.sina.com.cn/w/2005-03-19/03515400978s.shtml [2016-9-17].

  50. 50.

    How foreign countries manage the internet. http://theory.people.com.cn/n/2013/0110/c143844-20160586-2.html [2016-9-17].

  51. 51.

    Management of social networks in the United States. http://news.xinhuanet.com/world/2012-01/19/c_111452562.htm [2016-9-17].

  52. 52.

    China Internet Space Research Institute. “Foreign regulation on Internet bad information—methods and technology” Chapter III Administrative constraints on the internet in the countries, 3.2 Endangerment of national security and national dignity, 3.2.1 the United States. Beijing: Law Press, 2016.

  53. 53.

    EU new security plan against terrorist crime on network, National Internet Information Office of the People's Republic of China. 2015-05-03/ 2015-05-14. http://www.cac.gov.cn/2015-05/03/c_1115159504.htm [2016-8-30].

  54. 54.

    Britain protects cybersecurity by administrative means. http://www.hebdx.com/tabid/74/InfoID/9658/frtid/76/Default.aspx [2016-9-25].

  55. 55.

    The UK strictly manages network communication tools, allows security departments to access data. http://news.xinhuanet.com/world/2012-06/13/c_123277623.htm [2016-10-3].

  56. 56.

    France has shielded 60 websites involved in terrorism over the past year. http://news.xinhuanet.com/world/2016-04/16/c_128901973.htm [2016-10-3].

  57. 57.

    Summary: Australia comprehensively manages and filter network bad information. http://news.xinhuanet.com/world/2012-06/10/c_112175263.htm [2016-10-3].

  58. 58.

    Germany: Precautions against the protection of minors from trespass. http://news.youth.cn/zt/hlw/ggcs/201007/t20100729_1302408_2.htm [2016-10-3].

  59. 59.

    A major network service provider in Netherlands “blocks” child pornography websites. http://tech.163.com/07/0326/09/3AGH42UH00091KT0.html [2017-10-4].

  60. 60.

    Internet Watch Foundation. http://wang283869.honpu.com/ [2016-10-3].

  61. 61.

    Russia set up “network police” K Department. http://media.people.com.cn/GB/17049808.html [2016-10-4].

  62. 62.

    Russian control network rumors by means of many measures. http://news.xinhuanet.com/world/2012-05/04/c_111890033.htm [2016-10-4].

  63. 63.

    European Union set up a center against cybercrime. http://news.163.com/12/0329/04/7TO2UEH000014AED.html [2016-10-4].

  64. 64.

    Li J (2004) Review of Singapore 's network content control system—discussion about perfection of relevant system in China. Nat Sci Ed J Public Secur Univ 4(30):45–49. http://www.pkulaw.cn/fulltext_form.aspx?Gid=1509961106&EncodingName=%E9%97%81%E8%8D%A4%E5%96%96%E9%8F%81%EE%87%A2%EF%BF%BD%E5%BC%B2%E5%A9%B5%E5%AC%AB%E5%84%8C [2016-9-25].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Binxing Fang .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Science Press and Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Fang, B. (2018). Scientific Basis for Maintaining Cyberspace Sovereignty. In: Cyberspace Sovereignty . Springer, Singapore. https://doi.org/10.1007/978-981-13-0320-3_9

Download citation

Publish with us

Policies and ethics