{"title":"在网络报复与升级之间:解释各国在遵守相称性原则方面的差异","authors":"Nori Katagiri","doi":"10.1111/polp.12590","DOIUrl":null,"url":null,"abstract":"<div>\n \n \n <section>\n \n <p>I examine how the proportionality principle shapes state responses to a cyberattack. I do so by investigating variation in the effects of the principle of proportionality on the state response. The variation accounts for four types of state response. First, if states respond to a first strike in a proportionate manner, they are in compliance with the principle, and attackers are likely to take it as an indication of willingness to honor the principle. Second, states may react to attackers with an excessive response in violation of the principle, which would force attackers to react as or more harshly. Third, states may accidentally make a proportionate response when they in fact seek to impose excessive harm on attackers. Finally, states may generate an excessive response by error when they in fact seek to comply with the principle.</p>\n </section>\n \n <section>\n \n <h3> Related Articles</h3>\n \n <p>Glen, Carol. 2021. “Norm Entrepreneurship in Global Cybersecurity.” <i>Politics & Policy</i> 49(5): 1121–45. https://doi.org/10.1111/polp.12430.</p>\n \n <p>Glen, Carol M. 2014. “Internet Governance: Territorializing Cyberspace?” <i>Politics & Policy</i> 42(5): 635–57. http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full.</p>\n \n <p>Zeng, Jinghan, Tim Stevens, and Yaru Chen. 2017. “China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of ‘Internet Sovereignty.’” <i>Politics & Policy</i> 45(3): 432–64. https://doi.org/10.1111/polp.12202.</p>\n </section>\n </div>","PeriodicalId":51679,"journal":{"name":"Politics & Policy","volume":"52 4","pages":"712-727"},"PeriodicalIF":1.4000,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Between cyber retaliation and escalation: Explaining the variations in state compliance with the principle of proportionality\",\"authors\":\"Nori Katagiri\",\"doi\":\"10.1111/polp.12590\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n \\n <section>\\n \\n <p>I examine how the proportionality principle shapes state responses to a cyberattack. I do so by investigating variation in the effects of the principle of proportionality on the state response. The variation accounts for four types of state response. First, if states respond to a first strike in a proportionate manner, they are in compliance with the principle, and attackers are likely to take it as an indication of willingness to honor the principle. Second, states may react to attackers with an excessive response in violation of the principle, which would force attackers to react as or more harshly. Third, states may accidentally make a proportionate response when they in fact seek to impose excessive harm on attackers. Finally, states may generate an excessive response by error when they in fact seek to comply with the principle.</p>\\n </section>\\n \\n <section>\\n \\n <h3> Related Articles</h3>\\n \\n <p>Glen, Carol. 2021. “Norm Entrepreneurship in Global Cybersecurity.” <i>Politics & Policy</i> 49(5): 1121–45. https://doi.org/10.1111/polp.12430.</p>\\n \\n <p>Glen, Carol M. 2014. “Internet Governance: Territorializing Cyberspace?” <i>Politics & Policy</i> 42(5): 635–57. http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full.</p>\\n \\n <p>Zeng, Jinghan, Tim Stevens, and Yaru Chen. 2017. “China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of ‘Internet Sovereignty.’” <i>Politics & Policy</i> 45(3): 432–64. https://doi.org/10.1111/polp.12202.</p>\\n </section>\\n </div>\",\"PeriodicalId\":51679,\"journal\":{\"name\":\"Politics & Policy\",\"volume\":\"52 4\",\"pages\":\"712-727\"},\"PeriodicalIF\":1.4000,\"publicationDate\":\"2024-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Politics & Policy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1111/polp.12590\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"POLITICAL SCIENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Politics & Policy","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/polp.12590","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"POLITICAL SCIENCE","Score":null,"Total":0}
引用次数: 0
摘要
我研究了比例原则如何影响国家对网络攻击的反应。为此,我研究了相称性原则对国家应对措施影响的变化。这种变化涉及四种类型的国家反应。首先,如果国家以相称的方式对第一轮攻击做出反应,它们就遵守了该原则,而攻击者很可能将此视为愿意遵守该原则的表现。其次,国家可能会违反该原则对攻击者做出过度反应,这将迫使攻击者做出同样或更严厉的反应。第三,国家可能无意中做出了相称的反应,但实际上却试图对攻击者造成过度伤害。最后,国家在事实上寻求遵守该原则时,可能会错误地做出过度反应。2021."全球网络安全中的规范创业"。Politics & Policy 49(5):1121-45. https://doi.org/10.1111/polp.12430.Glen, Carol M. 2014."Internet Governance:领土化的网络空间?"Politics & Policy 42(5):http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full.Zeng, Jinghan, Tim Stevens, and Yaru Chen.2017."China's Solution to Global Cyber Governance:解读'互联网主权'的国内话语"。Politics & Policy 45(3):432–64. https://doi.org/10.1111/polp.12202.
Between cyber retaliation and escalation: Explaining the variations in state compliance with the principle of proportionality
I examine how the proportionality principle shapes state responses to a cyberattack. I do so by investigating variation in the effects of the principle of proportionality on the state response. The variation accounts for four types of state response. First, if states respond to a first strike in a proportionate manner, they are in compliance with the principle, and attackers are likely to take it as an indication of willingness to honor the principle. Second, states may react to attackers with an excessive response in violation of the principle, which would force attackers to react as or more harshly. Third, states may accidentally make a proportionate response when they in fact seek to impose excessive harm on attackers. Finally, states may generate an excessive response by error when they in fact seek to comply with the principle.
Related Articles
Glen, Carol. 2021. “Norm Entrepreneurship in Global Cybersecurity.” Politics & Policy 49(5): 1121–45. https://doi.org/10.1111/polp.12430.
Glen, Carol M. 2014. “Internet Governance: Territorializing Cyberspace?” Politics & Policy 42(5): 635–57. http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full.
Zeng, Jinghan, Tim Stevens, and Yaru Chen. 2017. “China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of ‘Internet Sovereignty.’” Politics & Policy 45(3): 432–64. https://doi.org/10.1111/polp.12202.