Muutke küpsiste eelistusi

E-raamat: Research on the Rule of Law of China's Cybersecurity: China's Rule of Law in Cybersecurity Over the Past 40 Years

  • Formaat: PDF+DRM
  • Ilmumisaeg: 22-Jan-2022
  • Kirjastus: Springer Verlag, Singapore
  • Keel: eng
  • ISBN-13: 9789811683565
  • Formaat - PDF+DRM
  • Hind: 147,58 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 22-Jan-2022
  • Kirjastus: Springer Verlag, Singapore
  • Keel: eng
  • ISBN-13: 9789811683565

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book provides a comprehensive and systematic review of China's rule of law on cybersecurity over the past 40 years, from which readers can have a comprehensive view of the development of China's cybersecurity legislation, supervision, and justice in the long course of 40 years. In particular, this book combines the development node of China's reform and opening up with the construction of the rule of law for cybersecurity, greatly expanding the vision of tracing the origin and pursuing the source, and also making the study of the rule of law for China's cybersecurity closer to the development facts of the technological approach.


1 40 Years of China's Legal Construction in Cybersecurity
1(90)
1.1 Cyberspace Governance in the View of Equipment Security
2(13)
1.1.1 Legislative Background
2(4)
1.1.2 Legislative Process
6(7)
1.1.3 Legislative Assessment
13(2)
1.2 Cyberspace Governance in the View of Social Security (2000-2012)
15(20)
1.2.1 Legislative Background
15(5)
1.2.2 Legislative Process
20(13)
1.2.3 Legislative Assessment
33(2)
1.3 Cyberspace Governance in the View of National Security (2013-2020)
35(55)
1.3.1 Legislative Background
35(8)
1.3.2 Legislative Process
43(42)
1.3.3 Legislative Evaluation
85(5)
References
90(1)
2 40 Years of China's Regulatory Development in Cybersecurity
91(26)
2.1 The Early Stage of Internet Administration Construction: The Police-Led Supervision Model (1994--1999)
92(3)
2.2 The Emergence of the Multisectoral Participation Model (2000--2007)
95(5)
2.3 The Initial Overall Coordination Model (2008--2013)
100(2)
2.4 The Strengthened Overall Coordination Model in the New Period (2014--2021)
102(13)
References
115(2)
3 40 Years of China's Judicial Reforms in Cybersecurity
117(22)
3.1 Criminalization and Punishment of Cybercrimes
118(10)
3.2 Reinforcement of Civil Relief
128(5)
3.3 Standardization of Actual Administrative Behavior
133(3)
3.4 Innovation of Trial Mechanism
136(2)
References
138(1)
4 40 Years of China's International Governance in Cyberspace
139(34)
4.1 Evolution and Development of China's International Governance in Cyberspace
139(11)
4.1.1 Holding High the Banner of Cybersecurity Sovereignty
139(3)
4.1.2 Making Endeavors to Maintain Peace in Cyberspace
142(1)
4.1.3 Shaping the Asia-Pacific Cybersecurity Concept
143(2)
4.1.4 Raising the Security Consensus of BRICS
145(3)
4.1.5 Consolidating the Consensus on Cybersecurity Between Asia and Europe
148(2)
4.2 Game and Cooperation Between China and the United States in Cyberspace
150(12)
4.2.1 Development Process of the Game
151(4)
4.2.2 Typical Game Incidents
155(4)
4.2.3 Cooperation Situation
159(3)
4.3 Disagreements and Cooperation Between China and the EU in Cyberspace
162(9)
4.3.1 Development Process of the Game
162(4)
4.3.2 Cooperation Situation
166(3)
4.3.3 Cooperation Mechanisms
169(2)
References
171(2)
5 Future Prospects of China's Legal Construction in Cybersecurity
173(12)
5.1 Serve "Digital Well-Being" as the Fundamental Gist
174(2)
5.2 Correctly Handle the Relationship Between Technological Development and Legal Initiative
176(1)
5.3 Promote the Development of Legislation, Law Enforcement and Judicature in a Scientific and Coordinated Manner
177(4)
5.4 Design Security System Around the Core Element of Data
181(2)
5.5 Conclusion
183(2)
Annex: Research on Global Data Trading Practices, Industry Norms and Legal Issues 185
Huang Daoli, a researcher at the Third Research Institute of the Ministry of Public Security, is currently the director of the CyberSecurity Law Research Center of the Third Research Institute of the Ministry of Public Security. She has been  engaged in network security policy and law practice and interdisciplinary research for more than 10 years with fruitful research achievements in the fields of personal information protection, data security, network security vulnerability management, and  critical information infrastructure protection, has presided over more than 10 national, provincial, and ministerial-level projects of the Ministry of Science and Technology of the People's Republic of China, Shanghai Municipal Science and Technology Commission, and the Ministry of Public Security, and participated in the drafting of the Regulations on the Safety and Protection of Critical Information Infrastructure and other administrative regulations. As the chief editor, she has edited more than 10 books , such as China's rule of law in cybersecurity  over the past 40 years and One Book on Cybersecurity Law. She has published more than 30 professional academic papers and is an expert of Shanghai CyberSecurity and Informatization Expert Advisory Group, a legal adviser of Zhejiang Province Cyber Governance, an expert committee member of Jiangsu Cyberspace Administration Office, a secretary-general of Expert Committee of China Information Security Law Conference, and the director of Cyber and Information Law Society of China Law Society.