论网络中的诉诸战争权及交战规范
发布时间:2018-07-04 19:32
本文选题:网络攻击 + 使用武力 ; 参考:《华东政法大学》2012年硕士论文
【摘要】:近年有目的地针对国家的网络攻击事件层出不穷,一个新的概念进入人们视野—网络战争。2011年7月14日,美国国防部在《网络空间行动战略》中,将网络空间列为与陆、海、空、天并列的“行动领域”。更有新闻称,美澳将发布联合声明,宣布《澳新美安全条约》适用于网络空间。不仅如此,世界各国都开始注重自身网络战争攻防能力,制定一系列政策法令,组建专门的网军和网络指挥中心,筑造网络防御工程,以备战可能发生的网络战争。在不远的将来,网络空间也许成为国家的新疆场,网络技术也会作为武器投入军事使用,网络战争极可能成为战争的重要形式。与网络发展的日新月异相比,网络战争方面的法律研究还很有限,在一些重要的问题上也缺乏普遍共识,因此,在前人研究的基础上,本文希望对网络战争的开战、交战规范方面做一个探索性的研究。 本文主体有五个部分,包括导言和正文四个章节。导言对网络战争的出现做了介绍。作为技术进步带来的战争方式的革新,网络战争不再是遮遮掩掩的辅助技术手段,这种战争形式已经在爱沙尼亚、格鲁吉亚事件中表现出了惊人的破坏力,导言最后对文章研究的问题进行了设问。第一章是对网络战争的概述。文章从网络空间的实体构成入手,提出网络空间属于国家主权的统辖领域的观点。文章接下来对网络战争给出了自己的定义,并概括出了网络战争的独有特点,,同时将网络战争与几个近似概念作了辨析,第一章也对网络战争采取的手段进行了分类。第二章节探讨的是传统战争合法性问题是否也适用于网络战争。文章通过对《联合国宪章》中禁止使用武力中武力的解读,将网络攻击与使用武力、侵略行为做特征比对,并通过讨论网络攻击是否构成武装攻击进而推出被攻击国家能否援引自卫权对网络攻击进行自卫。另外,该章研究了网络攻击中国家责任的归责原则。第三章试图解决的问题是在网络战争中能否适用某些人道法的基石规则,例如区分原则、比例相称原则、中立规则等,并探讨如何在原则不能完全兼容的情形下进行发展适用。最后一个部分是基于严峻的网络安全形势和国际法律框架尚不健全提出的展望建议,希望能将现有的法律框架张进行更新和发展,通过签订新的专门性条约,既有机构承担更多的有关工作,从而建立起完善的网络安全保障机制,令网络战争有法可循,有法可依。
[Abstract]:In recent years, there has been an endless stream of cyberattacks against the country, and a new concept has come into people's view-cyberwarfare. On July 14, 2011, the US Department of Defense listed cyberspace as "land and sea" in the "Cyberspace Action Strategy". An empty, heavenly juxtaposition of "fields of action". More news, the United States and Australia will issue a joint statement declaring the ANZZ United States Security Treaty applicable to cyberspace. Moreover, all countries in the world have begun to pay attention to their cyber war offensive and defensive capabilities, formulate a series of policies and decrees, set up a special cyber army and network command center, and build a network defense project in order to prepare for the possible cyber war. In the near future, cyberspace may become the national Xinjiang farm, and network technology will also be put into military use as a weapon. Cyber warfare is likely to become an important form of war. Compared with the rapid development of the network, the legal research on the network war is still very limited, and there is a lack of general consensus on some important issues. Therefore, on the basis of the previous studies, this paper hopes to go to war on the network war. Do an exploratory study of the rules of engagement. The main body of this paper has five parts, including the introduction and the body of four chapters. The introduction introduces the emergence of cyber warfare. As an innovation in the way of warfare brought about by technological progress, cyberwarfare is no longer a covert auxiliary technology, a form of warfare that has shown astonishing destructive power in the events in Estonia and Georgia. At the end of the introduction, the author puts forward some questions about the research of the article. The first chapter is an overview of cyber warfare. Starting with the entity constitution of cyberspace, this paper puts forward the viewpoint that cyberspace belongs to the dominion of national sovereignty. Then the paper gives its own definition and generalizes the unique characteristics of cyber warfare. At the same time, it distinguishes the network war from several approximate concepts. The first chapter also classifies the means used in the network war. The second chapter discusses whether the legitimacy of traditional warfare is also applicable to cyber warfare. Through the interpretation of the prohibition of the use of force in the Charter of the United Nations, the article compares the characteristics of cyber attacks with the use of force and acts of aggression. By discussing whether the cyber-attack constitutes an armed attack, the author discusses whether the attacked country can invoke the right of self-defence to defend itself against the cyber-attack. In addition, this chapter studies the principle of imputation of state responsibility in cyber attack. The third chapter tries to solve the problem of whether the cornerstone rules of humanitarian law can be applied in cyberwarfare, such as the principle of distinction, the principle of proportionality, the rule of neutrality, and how to develop and apply the principle when the principle is not fully compatible. The last part is based on the critical cybersecurity situation and the unsound international legal framework. It is hoped that the existing legal framework can be updated and developed through the signing of new specialized treaties. The existing institutions undertake more relevant work, thus establishing a perfect network security guarantee mechanism, so that there are laws to follow and laws to follow in cyber warfare.
【学位授予单位】:华东政法大学
【学位级别】:硕士
【学位授予年份】:2012
【分类号】:D99
【参考文献】
相关期刊论文 前10条
1 钱磊;;网络犯罪的特点和防治对策[J];安徽电子信息职业技术学院学报;2010年02期
2 张帅梁;;自卫权的行使与武力反恐的合法性问题——以预防性自卫为视角[J];安阳师范学院学报;2008年01期
3 王敏颖;;试论当代国际法上的预防性自卫[J];法制与社会;2008年10期
4 高智华;国家主权与人权关系辨析[J];中国人民公安大学学报;2004年04期
5 商亮;杨国鑫;石锦来;隋世龙;;网络战部队—各国军中新宠[J];国防科技;2009年04期
6 姚财福;;国际法上侵略罪定义的发展[J];国际关系学院学报;2011年04期
7 顾德欣;战争法法律冲突[J];国际论坛;2001年01期
8 朱莉欣;;信息网络战的国际法问题研究[J];河北法学;2009年01期
9 何方明;侯晓娜;;美国反网络恐怖活动的情报工作及对我国的启示[J];江西公安专科学校学报;2009年01期
10 司红伟;;浅析网络攻击常用方法[J];科技广场;2006年07期
本文编号:2097128
本文链接:https://www.wllwen.com/falvlunwen/guojifa/2097128.html