論網(wǎng)絡(luò)中的訴諸戰(zhàn)爭權(quán)及交戰(zhàn)規(guī)范
本文選題:網(wǎng)絡(luò)攻擊 + 使用武力 ; 參考:《華東政法大學(xué)》2012年碩士論文
【摘要】:近年有目的地針對國家的網(wǎng)絡(luò)攻擊事件層出不窮,一個新的概念進入人們視野—網(wǎng)絡(luò)戰(zhàn)爭。2011年7月14日,美國國防部在《網(wǎng)絡(luò)空間行動戰(zhàn)略》中,將網(wǎng)絡(luò)空間列為與陸、海、空、天并列的“行動領(lǐng)域”。更有新聞稱,美澳將發(fā)布聯(lián)合聲明,宣布《澳新美安全條約》適用于網(wǎng)絡(luò)空間。不僅如此,世界各國都開始注重自身網(wǎng)絡(luò)戰(zhàn)爭攻防能力,制定一系列政策法令,組建專門的網(wǎng)軍和網(wǎng)絡(luò)指揮中心,筑造網(wǎng)絡(luò)防御工程,以備戰(zhàn)可能發(fā)生的網(wǎng)絡(luò)戰(zhàn)爭。在不遠的將來,網(wǎng)絡(luò)空間也許成為國家的新疆場,網(wǎng)絡(luò)技術(shù)也會作為武器投入軍事使用,網(wǎng)絡(luò)戰(zhàn)爭極可能成為戰(zhàn)爭的重要形式。與網(wǎng)絡(luò)發(fā)展的日新月異相比,網(wǎng)絡(luò)戰(zhàn)爭方面的法律研究還很有限,在一些重要的問題上也缺乏普遍共識,因此,在前人研究的基礎(chǔ)上,本文希望對網(wǎng)絡(luò)戰(zhàn)爭的開戰(zhàn)、交戰(zhàn)規(guī)范方面做一個探索性的研究。 本文主體有五個部分,包括導(dǎo)言和正文四個章節(jié)。導(dǎo)言對網(wǎng)絡(luò)戰(zhàn)爭的出現(xiàn)做了介紹。作為技術(shù)進步帶來的戰(zhàn)爭方式的革新,網(wǎng)絡(luò)戰(zhàn)爭不再是遮遮掩掩的輔助技術(shù)手段,這種戰(zhàn)爭形式已經(jīng)在愛沙尼亞、格魯吉亞事件中表現(xiàn)出了驚人的破壞力,導(dǎo)言最后對文章研究的問題進行了設(shè)問。第一章是對網(wǎng)絡(luò)戰(zhàn)爭的概述。文章從網(wǎng)絡(luò)空間的實體構(gòu)成入手,提出網(wǎng)絡(luò)空間屬于國家主權(quán)的統(tǒng)轄領(lǐng)域的觀點。文章接下來對網(wǎng)絡(luò)戰(zhàn)爭給出了自己的定義,并概括出了網(wǎng)絡(luò)戰(zhàn)爭的獨有特點,,同時將網(wǎng)絡(luò)戰(zhàn)爭與幾個近似概念作了辨析,第一章也對網(wǎng)絡(luò)戰(zhàn)爭采取的手段進行了分類。第二章節(jié)探討的是傳統(tǒng)戰(zhàn)爭合法性問題是否也適用于網(wǎng)絡(luò)戰(zhàn)爭。文章通過對《聯(lián)合國憲章》中禁止使用武力中武力的解讀,將網(wǎng)絡(luò)攻擊與使用武力、侵略行為做特征比對,并通過討論網(wǎng)絡(luò)攻擊是否構(gòu)成武裝攻擊進而推出被攻擊國家能否援引自衛(wèi)權(quán)對網(wǎng)絡(luò)攻擊進行自衛(wèi)。另外,該章研究了網(wǎng)絡(luò)攻擊中國家責(zé)任的歸責(zé)原則。第三章試圖解決的問題是在網(wǎng)絡(luò)戰(zhàn)爭中能否適用某些人道法的基石規(guī)則,例如區(qū)分原則、比例相稱原則、中立規(guī)則等,并探討如何在原則不能完全兼容的情形下進行發(fā)展適用。最后一個部分是基于嚴峻的網(wǎng)絡(luò)安全形勢和國際法律框架尚不健全提出的展望建議,希望能將現(xiàn)有的法律框架張進行更新和發(fā)展,通過簽訂新的專門性條約,既有機構(gòu)承擔(dān)更多的有關(guān)工作,從而建立起完善的網(wǎng)絡(luò)安全保障機制,令網(wǎng)絡(luò)戰(zhàn)爭有法可循,有法可依。
[Abstract]:In recent years, there has been an endless stream of cyberattacks against the country, and a new concept has come into people's view-cyberwarfare. On July 14, 2011, the US Department of Defense listed cyberspace as "land and sea" in the "Cyberspace Action Strategy". An empty, heavenly juxtaposition of "fields of action". More news, the United States and Australia will issue a joint statement declaring the ANZZ United States Security Treaty applicable to cyberspace. Moreover, all countries in the world have begun to pay attention to their cyber war offensive and defensive capabilities, formulate a series of policies and decrees, set up a special cyber army and network command center, and build a network defense project in order to prepare for the possible cyber war. In the near future, cyberspace may become the national Xinjiang farm, and network technology will also be put into military use as a weapon. Cyber warfare is likely to become an important form of war. Compared with the rapid development of the network, the legal research on the network war is still very limited, and there is a lack of general consensus on some important issues. Therefore, on the basis of the previous studies, this paper hopes to go to war on the network war. Do an exploratory study of the rules of engagement. The main body of this paper has five parts, including the introduction and the body of four chapters. The introduction introduces the emergence of cyber warfare. As an innovation in the way of warfare brought about by technological progress, cyberwarfare is no longer a covert auxiliary technology, a form of warfare that has shown astonishing destructive power in the events in Estonia and Georgia. At the end of the introduction, the author puts forward some questions about the research of the article. The first chapter is an overview of cyber warfare. Starting with the entity constitution of cyberspace, this paper puts forward the viewpoint that cyberspace belongs to the dominion of national sovereignty. Then the paper gives its own definition and generalizes the unique characteristics of cyber warfare. At the same time, it distinguishes the network war from several approximate concepts. The first chapter also classifies the means used in the network war. The second chapter discusses whether the legitimacy of traditional warfare is also applicable to cyber warfare. Through the interpretation of the prohibition of the use of force in the Charter of the United Nations, the article compares the characteristics of cyber attacks with the use of force and acts of aggression. By discussing whether the cyber-attack constitutes an armed attack, the author discusses whether the attacked country can invoke the right of self-defence to defend itself against the cyber-attack. In addition, this chapter studies the principle of imputation of state responsibility in cyber attack. The third chapter tries to solve the problem of whether the cornerstone rules of humanitarian law can be applied in cyberwarfare, such as the principle of distinction, the principle of proportionality, the rule of neutrality, and how to develop and apply the principle when the principle is not fully compatible. The last part is based on the critical cybersecurity situation and the unsound international legal framework. It is hoped that the existing legal framework can be updated and developed through the signing of new specialized treaties. The existing institutions undertake more relevant work, thus establishing a perfect network security guarantee mechanism, so that there are laws to follow and laws to follow in cyber warfare.
【學(xué)位授予單位】:華東政法大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2012
【分類號】:D99
【參考文獻】
相關(guān)期刊論文 前10條
1 錢磊;;網(wǎng)絡(luò)犯罪的特點和防治對策[J];安徽電子信息職業(yè)技術(shù)學(xué)院學(xué)報;2010年02期
2 張帥梁;;自衛(wèi)權(quán)的行使與武力反恐的合法性問題——以預(yù)防性自衛(wèi)為視角[J];安陽師范學(xué)院學(xué)報;2008年01期
3 王敏穎;;試論當(dāng)代國際法上的預(yù)防性自衛(wèi)[J];法制與社會;2008年10期
4 高智華;國家主權(quán)與人權(quán)關(guān)系辨析[J];中國人民公安大學(xué)學(xué)報;2004年04期
5 商亮;楊國鑫;石錦來;隋世龍;;網(wǎng)絡(luò)戰(zhàn)部隊—各國軍中新寵[J];國防科技;2009年04期
6 姚財福;;國際法上侵略罪定義的發(fā)展[J];國際關(guān)系學(xué)院學(xué)報;2011年04期
7 顧德欣;戰(zhàn)爭法法律沖突[J];國際論壇;2001年01期
8 朱莉欣;;信息網(wǎng)絡(luò)戰(zhàn)的國際法問題研究[J];河北法學(xué);2009年01期
9 何方明;侯曉娜;;美國反網(wǎng)絡(luò)恐怖活動的情報工作及對我國的啟示[J];江西公安?茖W(xué)校學(xué)報;2009年01期
10 司紅偉;;淺析網(wǎng)絡(luò)攻擊常用方法[J];科技廣場;2006年07期
本文編號:2097128
本文鏈接:http://www.sikaile.net/falvlunwen/guojifa/2097128.html