Muutke küpsiste eelistusi

E-raamat: Cyberspace & Sovereignty

(Harbin Inst Of Technology, China)
  • Formaat: 388 pages
  • Ilmumisaeg: 13-Jan-2022
  • Kirjastus: World Scientific Publishing Co Pte Ltd
  • Keel: eng
  • ISBN-13: 9789811227806
  • Formaat - PDF+DRM
  • Hind: 105,30 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 388 pages
  • Ilmumisaeg: 13-Jan-2022
  • Kirjastus: World Scientific Publishing Co Pte Ltd
  • Keel: eng
  • ISBN-13: 9789811227806

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

How do you describe cyberspace comprehensively? This book examines the relationship between cyberspace and sovereignty as understood by jurists and economists. The author transforms and abstracts cyberspace from the perspective of science and technology into the subject, object, platform, and activity in the field of philosophy. From the three dimensions of "ontology" (cognition of cyberspace and information), "epistemology" (sovereignty evolution), and "methodology" (theoretical refinement), he uses international law, philosophy of science and technology, political philosophy, cyber security, and information entropy to conduct cross-disciplinary research on cyberspace and sovereignty to find a scientific and accurate methodology. Cyberspace sovereignty is the extension of modern state sovereignty. Only by firmly establishing the rule of law of cyberspace sovereignty can we reduce cyber conflicts and cybercrimes, oppose cyber hegemony, and prevent cyber war. The purpose of investigating cyberspace and sovereignty is to plan good laws and good governance. This book argues that cyberspace has sovereignty, sovereignty governs cyberspace, and cyberspace governance depends on comprehensive planning. This is a new theory of political philosophy and sovereignty law.
Words of the Author v
Preface: A Study of Cyberspace Sovereignty and Plan for Fine Law and Good Governance xiii
Part I Ontology
1(136)
Chapter One Ontology of Cyberspace
3(44)
Section One Cyber and Information Space
3(13)
Section Two Essential Elements of Cyberspace
16(9)
Section Three The Essence of Cyber Information
25(15)
Section Four Theory of Cyber Elements
40(7)
Chapter Two Cyber Evolution
47(30)
Section One Invention of the Internet
47(7)
Section Two Connection of Chinese Networks with the Internet
54(5)
Section Three Globalisation of the Internet
59(7)
Section Four Evolution of Cyber Security
66(11)
Chapter Three Cyber Security
77(24)
Section One The View of the UN
77(5)
Section Two The Positions of All States
82(12)
Section Three The Concealed Positions of the United States
94(1)
Section Four The Viewpoints of the Shanghai Cooperation Organisation
95(6)
Chapter Four Cyber Sovereignty
101(36)
Section One The Origin of Cyber Sovereignty
103(6)
Section Two The Connotation of Cyber Sovereignty
109(4)
Section Three The Extension of Cyber Sovereignty
113(8)
Section Four The Role of Cyber Sovereignty
121(16)
Part II Epistemology
137(94)
Chapter Five The Consideration of Cyberspace Order
139(42)
Section One Problems in United States Textbooks
141(9)
Section Two Problems in Chinese Textbooks
150(7)
Section Three The New Cyber Security Discipline
157(4)
Section Four The New Ideas on Cyber Sovereignty
161(20)
Chapter Six The History of Cyberspace Legislation
181(28)
Section One The 100-Year Rule of Law in the Field of Cyber Information in the US
182(11)
Section Two The Modern Western Cyber Strategies
193(4)
Section Three The Dimensions of China's Cyber Risks
197(4)
Section Four The Establishment of the Rule of Law in Cyberspace in China
201(8)
Chapter Seven The Rule of Law in Cyber Sovereignty
209(22)
Section One An Overview of Countries
211(4)
Section Two The US' System
215(3)
Section Three The Russia-EU System
218(3)
Section Four The Chinese System
221(10)
Part III Methodology
231(90)
Chapter Eight Cyberspace and Order Coordination
233(30)
Section One Nodes and Natural Order
234(5)
Section Two Structure and Social Order
239(11)
Section Three Network Functions and Order
250(5)
Section Four Coordination in Network and Order
255(8)
Chapter Nine Network and Overall Planning Entropy
263(34)
Section One The Ideological Origin of Overall Planning
263(9)
Section Two The Application of the Mechanism of Overall Planning
272(5)
Section Three The Proposal of Overall Planning Entropy
277(11)
Section Four The Theory of Cyberspace's Overall Planning Entropy
288(9)
Chapter Ten The Overall Planning of Cyber Justice
297(24)
Section One Historical Materialism
298(4)
Section Two Scientific and Technological Civilisation
302(5)
Section Three Counter-Hegemony
307(5)
Section Four Foresight for Justice
312(9)
Appendix I Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security
321(18)
Summary
321(2)
Foreword by the Secretary-General
323(16)
Bibliography 339
Zhao Hongrui is the Dean of the School of Humanities, Social Sciences and Law at Harbin Institute of Technology, Harbin, China, and has taken on this role since 2014. He is also the author of World Civilization Approach: China's Civilized Rise and Rule of Law in National Security (2015), and On RMB: Aggregate Money Approach (2013), to name a few.