在网络报复与升级之间:解释各国在遵守相称性原则方面的差异

IF 1.4 Q2 POLITICAL SCIENCE
Nori Katagiri
{"title":"在网络报复与升级之间:解释各国在遵守相称性原则方面的差异","authors":"Nori Katagiri","doi":"10.1111/polp.12590","DOIUrl":null,"url":null,"abstract":"<div>\n \n \n <section>\n \n <p>I examine how the proportionality principle shapes state responses to a cyberattack. I do so by investigating variation in the effects of the principle of proportionality on the state response. The variation accounts for four types of state response. First, if states respond to a first strike in a proportionate manner, they are in compliance with the principle, and attackers are likely to take it as an indication of willingness to honor the principle. Second, states may react to attackers with an excessive response in violation of the principle, which would force attackers to react as or more harshly. Third, states may accidentally make a proportionate response when they in fact seek to impose excessive harm on attackers. Finally, states may generate an excessive response by error when they in fact seek to comply with the principle.</p>\n </section>\n \n <section>\n \n <h3> Related Articles</h3>\n \n <p>Glen, Carol. 2021. “Norm Entrepreneurship in Global Cybersecurity.” <i>Politics &amp; Policy</i> 49(5): 1121–45. https://doi.org/10.1111/polp.12430.</p>\n \n <p>Glen, Carol M. 2014. “Internet Governance: Territorializing Cyberspace?” <i>Politics &amp; Policy</i> 42(5): 635–57. http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full.</p>\n \n <p>Zeng, Jinghan, Tim Stevens, and Yaru Chen. 2017. “China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of ‘Internet Sovereignty.’” <i>Politics &amp; Policy</i> 45(3): 432–64. https://doi.org/10.1111/polp.12202.</p>\n </section>\n </div>","PeriodicalId":51679,"journal":{"name":"Politics & Policy","volume":"52 4","pages":"712-727"},"PeriodicalIF":1.4000,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Between cyber retaliation and escalation: Explaining the variations in state compliance with the principle of proportionality\",\"authors\":\"Nori Katagiri\",\"doi\":\"10.1111/polp.12590\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n \\n <section>\\n \\n <p>I examine how the proportionality principle shapes state responses to a cyberattack. I do so by investigating variation in the effects of the principle of proportionality on the state response. The variation accounts for four types of state response. First, if states respond to a first strike in a proportionate manner, they are in compliance with the principle, and attackers are likely to take it as an indication of willingness to honor the principle. Second, states may react to attackers with an excessive response in violation of the principle, which would force attackers to react as or more harshly. Third, states may accidentally make a proportionate response when they in fact seek to impose excessive harm on attackers. Finally, states may generate an excessive response by error when they in fact seek to comply with the principle.</p>\\n </section>\\n \\n <section>\\n \\n <h3> Related Articles</h3>\\n \\n <p>Glen, Carol. 2021. “Norm Entrepreneurship in Global Cybersecurity.” <i>Politics &amp; Policy</i> 49(5): 1121–45. https://doi.org/10.1111/polp.12430.</p>\\n \\n <p>Glen, Carol M. 2014. “Internet Governance: Territorializing Cyberspace?” <i>Politics &amp; Policy</i> 42(5): 635–57. http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full.</p>\\n \\n <p>Zeng, Jinghan, Tim Stevens, and Yaru Chen. 2017. “China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of ‘Internet Sovereignty.’” <i>Politics &amp; Policy</i> 45(3): 432–64. https://doi.org/10.1111/polp.12202.</p>\\n </section>\\n </div>\",\"PeriodicalId\":51679,\"journal\":{\"name\":\"Politics & Policy\",\"volume\":\"52 4\",\"pages\":\"712-727\"},\"PeriodicalIF\":1.4000,\"publicationDate\":\"2024-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Politics & Policy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1111/polp.12590\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"POLITICAL SCIENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Politics & Policy","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/polp.12590","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"POLITICAL SCIENCE","Score":null,"Total":0}
引用次数: 0

摘要

我研究了比例原则如何影响国家对网络攻击的反应。为此,我研究了相称性原则对国家应对措施影响的变化。这种变化涉及四种类型的国家反应。首先,如果国家以相称的方式对第一轮攻击做出反应,它们就遵守了该原则,而攻击者很可能将此视为愿意遵守该原则的表现。其次,国家可能会违反该原则对攻击者做出过度反应,这将迫使攻击者做出同样或更严厉的反应。第三,国家可能无意中做出了相称的反应,但实际上却试图对攻击者造成过度伤害。最后,国家在事实上寻求遵守该原则时,可能会错误地做出过度反应。2021."全球网络安全中的规范创业"。Politics & Policy 49(5):1121-45. https://doi.org/10.1111/polp.12430.Glen, Carol M. 2014."Internet Governance:领土化的网络空间?"Politics & Policy 42(5):http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full.Zeng, Jinghan, Tim Stevens, and Yaru Chen.2017."China's Solution to Global Cyber Governance:解读'互联网主权'的国内话语"。Politics & Policy 45(3):432–64. https://doi.org/10.1111/polp.12202.
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Between cyber retaliation and escalation: Explaining the variations in state compliance with the principle of proportionality

I examine how the proportionality principle shapes state responses to a cyberattack. I do so by investigating variation in the effects of the principle of proportionality on the state response. The variation accounts for four types of state response. First, if states respond to a first strike in a proportionate manner, they are in compliance with the principle, and attackers are likely to take it as an indication of willingness to honor the principle. Second, states may react to attackers with an excessive response in violation of the principle, which would force attackers to react as or more harshly. Third, states may accidentally make a proportionate response when they in fact seek to impose excessive harm on attackers. Finally, states may generate an excessive response by error when they in fact seek to comply with the principle.

Related Articles

Glen, Carol. 2021. “Norm Entrepreneurship in Global Cybersecurity.” Politics & Policy 49(5): 1121–45. https://doi.org/10.1111/polp.12430.

Glen, Carol M. 2014. “Internet Governance: Territorializing Cyberspace?” Politics & Policy 42(5): 635–57. http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full.

Zeng, Jinghan, Tim Stevens, and Yaru Chen. 2017. “China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of ‘Internet Sovereignty.’” Politics & Policy 45(3): 432–64. https://doi.org/10.1111/polp.12202.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Politics & Policy
Politics & Policy POLITICAL SCIENCE-
CiteScore
2.50
自引率
23.10%
发文量
61
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信