Overview
- This book is the first one that comprehensively discusses cyberspace sovereignty in China
- To explain the concept of cyberspace sovereignty as well as its connotation and denotation
- This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (13 chapters)
Keywords
About this book
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing.
At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
Authors and Affiliations
About the author
Bibliographic Information
Book Title: Cyberspace Sovereignty
Book Subtitle: Reflections on building a community of common future in cyberspace
Authors: Binxing Fang
DOI: https://doi.org/10.1007/978-981-13-0320-3
Publisher: Springer Singapore
eBook Packages: Business and Management, Business and Management (R0)
Copyright Information: Science Press and Springer Nature Singapore Pte Ltd. 2018
Hardcover ISBN: 978-981-13-0319-7Published: 11 June 2018
Softcover ISBN: 978-981-13-4386-5Published: 10 January 2019
eBook ISBN: 978-981-13-0320-3Published: 29 May 2018
Edition Number: 1
Number of Pages: XXXIX, 482
Topics: Innovation/Technology Management, International Security Studies, Systems and Data Security