全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2016 

安全与隐私:美国网络安全信息共享的立法博弈分析
Security vs. Privacy:Game Analysis of the U.S. Cyber Security Information Sharing Legislation

DOI: 10.15896/j.xjtuskxb.201601009

Keywords: 网络安全信息共享,安全,隐私,网络威胁指标
cyber security information sharing
,security,privacy,cyber threat indicator

Full-Text   Cite this paper   Add to My Lib

Abstract:

美国网络安全信息共享目的、范围、主体和程序的条款规定引发了安全倡导者与私权拥护者关于安全与隐私的激烈争论,其中既有关政府使用共享信息的目的条款保障人类网络空间生存权得以实现,又有共享的网络威胁信息范围条款界定存在瑕疵,共享的政府参与主体条款违反正当法律程序规定,共享前的个人信息移除程序条款违反比例原则的要求;通过建立政府与私营企业的信任机制,增强共享政策、程序、措施实施的透明度,建立激励机制,制定信息共享协议等,能够有效实现网络安全信息共享立法中安全与隐私的博弈均衡。
It is the purpose, scope, subject and procedures of U.S. cybersecurity information sharing provisions that triggered intense debate about security and privacy between safety advocates and private rights advocates, in which the terms of the purpose that government use the shared information is to protect the human right to live in cyberspace, the terms of the scope that shared cybersecurity threat information is unreasonably defined, the terms of the subject that government′s participation in information sharing violates the due process, the terms of procedures that remove personal information violates the principle of proportionality. Through the establishment of the trust mechanism between the government and the private sectors, enhancement of transparency on sharing policies, procedures the implemented measures, and adoption of integrated information sharing mode, can effectively achieve game balance between security and privacy in cybersecurity information sharing legislation

References

[1]  [5]NOJEIM G T.Cybersecurity and Freedom on the Internet[J].Journal of National Security Law & Policy, 2010(4):119-137.
[2]  [8]霍布豪斯.自由主义[M].朱曾汶,译.北京:商务印书馆,1996:53.
[3]  [2]THE CENTER FOR DEMOCRACY AND TECHNOLOGY.Hearing Before the Senate on Protecting America from Cyber Attacks:the Importance of Information Sharing[EB/OL].[2015-02-10].https://cdt.org/insight/hearing-before-the-senate-on-protecting-america-from-cyber-attacks-the-importance-of-information-sharing/.
[4]  [3]马民虎.网络安全法律问题及对策研究[M].西安:陕西科学技术出版社,2007:35.
[5]  [6]刘星.法律是什么[M].北京:中国政法大学出版社,1998:225.
[6]  [7]KESAN J P, HAYES C M.Mitigative Counterstriking:Self-Defense And Deterrence In Cyberspace[J].Harvard Journal of Law & Technology, 2012,25:415-527.
[7]  [9]姜昕.公法上比例原则研究[D].长春:吉林大学,2005.
[8]  [1]FISCHER E A.Cybersecurity and Information Sharing:Comparison of H.R. 1560 and H.R. 1731 as Passed by the House[EB/OL].[2015-05-30].http://fas.org/sgp/crs/misc/R43996.pdf.
[9]  [4]博登海默.法理学:法律哲学与法律方法[M].邓正来,译.北京:中国政法大学出版社,2004:317.
[10]  [10]王媛.美国宪法上的正当法律程序研究[D].济南:山东大学,2014.
[11]  [11]伯纳德?施瓦茨.美国法律史[M].王军,译.北京:法律出版社,2011:43.
[12]  [12]KELLY B B. Investing in a Centralized Cybersecurity Infrastructure:Why"Hacktivism" Can and Should Influence Cybersecurity Reform[J].Boston University Law Review, 2012,92:1663-1711.
[13]  [13]SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, SECURITY TECHNOLOGIES.Industry Perspectives on the President′s Cybersecurity Information Sharing Proposal[EB/OL].[2015-04-26].http://docs.house.gov/meetings/HM/HM08/20150304/103055/HHRG-114-HM08-Wstate-EggersM-20150304.pdf.
[14]  [14]马民虎,李江鸿.我国信息安全法的法理念探析[J].西安交通大学学报:社会科学版,2007,27(3):74-80.
[15]  [15]罗斯科?庞德.法理学:第一卷[M].邓正来,译.北京:中国政法大学出版社,2004:26.
[16]  [16]CASTRO D.We Need More than a "Good Samaritan" Law for Cybersecurity Information Sharing[J].Cybersecurity Science & Technology, 2012(5):161-173.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133