|
|
|
|
LEADER |
03591nam a2200505 4500 |
001 |
978-981-13-0320-3 |
003 |
DE-He213 |
005 |
20191220130057.0 |
007 |
cr nn 008mamaa |
008 |
180529s2018 si | s |||| 0|eng d |
020 |
|
|
|a 9789811303203
|9 978-981-13-0320-3
|
024 |
7 |
|
|a 10.1007/978-981-13-0320-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a HD28-70
|
072 |
|
7 |
|a KJMV6
|2 bicssc
|
072 |
|
7 |
|a BUS087000
|2 bisacsh
|
072 |
|
7 |
|a KJMV6
|2 thema
|
072 |
|
7 |
|a PDG
|2 thema
|
082 |
0 |
4 |
|a 658.514
|2 23
|
100 |
1 |
|
|a Fang, Binxing.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Cyberspace Sovereignty
|h [electronic resource] :
|b Reflections on building a community of common future in cyberspace /
|c by Binxing Fang.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XXXIX, 482 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Chapter 1 The Definitions of Fundamental Concepts -- Chapter 2 Understanding of the Traditional Sovereignty Concept -- Chapter 3 Interpretation of the Concept of "Cyberspace Sovereignty" -- Chapter 4 Necessities for Advocating Cyberspace Sovereignty -- Chapter 5 The Relationship between Cyberspace Sovereignty and Internet Stakeholders -- Chapter 6 China's Declaration of Cyberspace Sovereignty -- Chapter 7 Objective Existence of Cyberspace Sovereignty in Countries' Affairs -- Chapter 8 Positions of States toward Cyberspace and Cyber-relating Regulations -- Chapter 9 Scientific Basis for Maintaining Cyberspace Sovereignty -- Chapter 10 Extension of Cyberspace Sovereignty -- Chapter 11 Conflicts of Cyberspace Sovereignty Concept -- Chapter 12 Main Initiatives to Safeguard Cyberspace Sovereignty -- Chapter 13 Conclusion.
|
520 |
|
|
|a This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China's clear attitude in the global Internet governance: respecting every nation's right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
|
650 |
|
0 |
|a Management.
|
650 |
|
0 |
|a Industrial management.
|
650 |
|
0 |
|a Security, International.
|
650 |
|
0 |
|a Computer security.
|
650 |
1 |
4 |
|a Innovation/Technology Management.
|0 http://scigraph.springernature.com/things/product-market-codes/518000
|
650 |
2 |
4 |
|a International Security Studies.
|0 http://scigraph.springernature.com/things/product-market-codes/912120
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811303197
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811303210
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811343865
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-13-0320-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-BUM
|
950 |
|
|
|a Business and Management (Springer-41169)
|