|
1 40 Years of China's Legal Construction in Cybersecurity |
|
|
1 | (90) |
|
1.1 Cyberspace Governance in the View of Equipment Security |
|
|
2 | (13) |
|
1.1.1 Legislative Background |
|
|
2 | (4) |
|
1.1.2 Legislative Process |
|
|
6 | (7) |
|
1.1.3 Legislative Assessment |
|
|
13 | (2) |
|
1.2 Cyberspace Governance in the View of Social Security (2000-2012) |
|
|
15 | (20) |
|
1.2.1 Legislative Background |
|
|
15 | (5) |
|
1.2.2 Legislative Process |
|
|
20 | (13) |
|
1.2.3 Legislative Assessment |
|
|
33 | (2) |
|
1.3 Cyberspace Governance in the View of National Security (2013-2020) |
|
|
35 | (55) |
|
1.3.1 Legislative Background |
|
|
35 | (8) |
|
1.3.2 Legislative Process |
|
|
43 | (42) |
|
1.3.3 Legislative Evaluation |
|
|
85 | (5) |
|
|
90 | (1) |
|
2 40 Years of China's Regulatory Development in Cybersecurity |
|
|
91 | (26) |
|
2.1 The Early Stage of Internet Administration Construction: The Police-Led Supervision Model (1994--1999) |
|
|
92 | (3) |
|
2.2 The Emergence of the Multisectoral Participation Model (2000--2007) |
|
|
95 | (5) |
|
2.3 The Initial Overall Coordination Model (2008--2013) |
|
|
100 | (2) |
|
2.4 The Strengthened Overall Coordination Model in the New Period (2014--2021) |
|
|
102 | (13) |
|
|
115 | (2) |
|
3 40 Years of China's Judicial Reforms in Cybersecurity |
|
|
117 | (22) |
|
3.1 Criminalization and Punishment of Cybercrimes |
|
|
118 | (10) |
|
3.2 Reinforcement of Civil Relief |
|
|
128 | (5) |
|
3.3 Standardization of Actual Administrative Behavior |
|
|
133 | (3) |
|
3.4 Innovation of Trial Mechanism |
|
|
136 | (2) |
|
|
138 | (1) |
|
4 40 Years of China's International Governance in Cyberspace |
|
|
139 | (34) |
|
4.1 Evolution and Development of China's International Governance in Cyberspace |
|
|
139 | (11) |
|
4.1.1 Holding High the Banner of Cybersecurity Sovereignty |
|
|
139 | (3) |
|
4.1.2 Making Endeavors to Maintain Peace in Cyberspace |
|
|
142 | (1) |
|
4.1.3 Shaping the Asia-Pacific Cybersecurity Concept |
|
|
143 | (2) |
|
4.1.4 Raising the Security Consensus of BRICS |
|
|
145 | (3) |
|
4.1.5 Consolidating the Consensus on Cybersecurity Between Asia and Europe |
|
|
148 | (2) |
|
4.2 Game and Cooperation Between China and the United States in Cyberspace |
|
|
150 | (12) |
|
4.2.1 Development Process of the Game |
|
|
151 | (4) |
|
4.2.2 Typical Game Incidents |
|
|
155 | (4) |
|
4.2.3 Cooperation Situation |
|
|
159 | (3) |
|
4.3 Disagreements and Cooperation Between China and the EU in Cyberspace |
|
|
162 | (9) |
|
4.3.1 Development Process of the Game |
|
|
162 | (4) |
|
4.3.2 Cooperation Situation |
|
|
166 | (3) |
|
4.3.3 Cooperation Mechanisms |
|
|
169 | (2) |
|
|
171 | (2) |
|
5 Future Prospects of China's Legal Construction in Cybersecurity |
|
|
173 | (12) |
|
5.1 Serve "Digital Well-Being" as the Fundamental Gist |
|
|
174 | (2) |
|
5.2 Correctly Handle the Relationship Between Technological Development and Legal Initiative |
|
|
176 | (1) |
|
5.3 Promote the Development of Legislation, Law Enforcement and Judicature in a Scientific and Coordinated Manner |
|
|
177 | (4) |
|
5.4 Design Security System Around the Core Element of Data |
|
|
181 | (2) |
|
|
183 | (2) |
Annex: Research on Global Data Trading Practices, Industry Norms and Legal Issues |
|
185 | |