| 844 | 9 | 484 |
| 下载次数 | 被引频次 | 阅读次数 |
网络治理是一项复杂系统的社会工程,符号学因其系统性可为网络治理构建和完善提供学理支撑。网络治理和网络空间作为社会符号具有时空性和社会性,其意义会随着历史的变迁和解释主体的不同而变化,主要受历史条件、网络治理实践和国家利益等语境因素的制约。网络空间命运共同体和网络主权是中国网络治理符号系统的重要组成部分,要不断推动其从价值独特性符号向价值共识性符号的转变,即既保持中国特色,又获得国际社会的普遍共识。此外,结合马克思主义哲学理论,中国网络治理具有时代性、人民性、科学性、实践性和全球性,是马克思主义在网络空间治理领域的中国实践,是历史符号在新时代的全新阐释。
Abstract:Cyber governance is a complicated and systematic social network,and semiotics,for its systematic nature,can provide theoretical support for constructing and perfecting cyber governance. Cyber governance and cyberspace as social signs are characterized by temporality,spatiality and sociality. In other words,they may mean different things in different historical periods and to different discourse communities,depending upon contextual factors including historical conditions,cyber governance practices and national interests. A community with a shared future in cyberspace and cyber sovereignty,as vital components of the Chinese cyber governance sign system,should be promoted to shift from signs with unique values to signs with consensus values,upholding the Chinese characteristics and reaching a broad consensus among the international community. Additionally,in light of the Marxist philosophy,cyber governance in China is contemporary,people-oriented,well-conceived,practical and global. It is the application of Marxism in China's cyberspace governance practices as well as the fresh construction of the historical sign in the new era.
[1]习近平.没有网络安全就没有国家安全[EB/OL].(2018-12-27)[2022-01-01].http://www.cac.gov.cn/2018-12/27/c_1123907720.htm.
[2]INTERNATIONAL TELECOMMUNICATION UNION.Global Cybersecurity Index 2020 [R].Geneva:International Telecommunication Union,2021.
[3]世界互联网大会组委会.《携手构建网络空间命运共同体》概念文件[EB/OL].(2019-10-16)[2022-01-01].http://www.cac.gov.cn/2019-10/16/c_1572757003996520.htm.
[4]CHANDLER D.Semiotics:The Basics [M].London and New York:Routledge,2017.
[5]程乐,裴佳敏.网络安全法律的符号学阐释[J].浙江大学学报(人文社会科学版),2018(6):125-139.
[6]CHENG L,WANG X.Cyber Asset in Judicial Discourses:A Socio-semiotic Interpretation [J].Social Semiotics,2019,29(4):507-523.
[7]CHENG L,HU X,MATULEWSKA A,et al.Exploring Cyberbullying:A Socio-semiotic Perspective [J].International Journal of Legal Discourse,2020,5(2):359-378.
[8]SAUSSURE F.Course in General Linguistics [M].Translated by HARRIS R.London:Bloomsbury,2013.
[9]HODGE R,KRESS G.Social Semiotics [M].Cambridge:Polity Press,1988.
[10]LEEUWEN T.Introducing Social Semiotics [M].London and New York:Routledge,2005.
[11]DANESI M.The Quest for Meaning:A Guide to Semiotic Theory and Practice [M].Toronto:University of Toronto Press,2007.
[12]HALLIDAY M A K.Language as Social Semiotic [M].London:Edward Arnold,1978:108.
[13]CHENG L,PEI J,DANESI M.A Sociosemiotic Interpretation of Cybersecurity in U.S.Legislative Discourse [J].Social Semiotics,2019,29(3):286-302.
[14]PEI J,CHENG L.Discursive Profile of International Telecommunication Regulations as Institutional Dialogue:A Sociosemiotic Perspective [J].Social Semiotics,2022,32(1):17-34.
[15]黄华新,徐慈华.符号学视野中的网络互动[J].自然辩证法研究,2003(1):50-54.
[16]MINEI E,MATUSITZ J.Cyberspace as a New Arena for Terroristic Propaganda:An Updated Examination [J].Poiesis Prax,2012,9(1-2):163-176.
[17]CHENG L,SUN Y,LI J.Aggressiveness of Emojis before the Court:A Sociosemiotic Interpretation [J].Social Semiotics,2020,30(3):365-378.
[18]DANESI M.The Semiotics of Emoji:The Rise of Visual Language in the Age of the Internet [M].London:Bloomsbury,2016.
[19]WAGNER A,MARUSEK S,YU W.Sarcasm,the Smiling Poop,and E-discourse Aggressiveness:Getting Far too Emotional with Emojis [J].Social Semiotics,2020,30(3):305-311.
[20]WAGNER A.E-victimization and E-predation Theory as the Dominant Aggressive Communication:The Case of Cyber Bullying [J].Social Semiotics,2019,29(3):303-318.
[21]GIBSON W.Neuromancer [M].New York:Ace Books,2000:51.
[22]MELZER N.Cyberwarfare and International Law [R].Geneva:UNIDIR Resources,2011.
[23]INTERNATIONAL COMMITTEE OF THE RED CROSS.International Humanitarian Law and the Challenges of Contemporary Armed Conflicts [R].Geneva:International Committee of the Red Cross,2015.
[24]WEIR G R S,MASON S.The Sources of Digital Evidence [M]//MASON S.Electronic Evidence.London:Butterworth,2012:16-21.
[25]STRATE L.The Varieties of Cyberspace:Problems in Definition and Delimitation [J].Western Journal of Communication,1999,63(3):382-412.
[26]SINGER P W,FRIEDMAN A.Cybersecurity and Cyberwar:What Everyone Needs to Know [M].Oxford:Oxford University Press,2014.
[27]PHELAN J M.CyberWalden:The Inner Face of Interface [M]//STRATE L,JACOBSON R,GIBSON S B.Communication and Cyberspace:Social Interaction in an Electronic Environment.Cresskill:Hampton Press,1996:39-48.
[28]HOFMANN J.Internet Governance:A Regulative Idea in Flux [M]//BANDAMUTHA R K J.Internet Governance:An Introduction.Icfai:University Press,2005:74-108.
[29]BARLOW J P.A Declaration of the Independence of Cyberspace [EB/OL].(1996-02-08)[2021-08-08].https://www.eff.org/cyberspace-independence.
[30]HAGGART B,SCHOLTE J A,Tusikov N.Introduction:Return of the State?[M]//HAGGART B,SCHOLTE J A,TUSIKOV N.Power and Authority in Internet Governance:A Return of the State.Abingdon:Routledge Global Cooperation Series,2021:1-12.
[31]GLECKMAN H.Multistakeholder Governance and Democracy:A Global Challenge [M].London:Routledge,2018:1.
[32]CARR M.Power Plays in Global Internet Governance [J].Millennium:Journal of International Studies,2015,43(2):640-659.
[33]DENARDIS L,RAYMOND M.Thinking Clearly about Multistakeholder Internet Governance [EB/OL].(2016-07-17)[2022-01-01].https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2354377.
[34]张心志,刘迪慧.IANA移交的实质及影响[J].信息安全与通信保密,2018(10):74-80.
[35]鲁传颖.网络空间治理与多利益攸关方理论[M].北京:时事出版社,2016:84.
[36]WEST S.Globalizing Internet Governance:Negotiating Cyberspace Agreements in the Post-Snowden Era [EB/OL].(2014-04-01)[2022-01-01].https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2418762.
[37]张卫良,何秋娟.应对西方“网络自由”必须维护我国意识形态安全[J].红旗文稿,2016(9):9-11.
[38]CASSIRER E.An Essay on Man:An Introduction to a Philosophy of Human Culture [M].New Haven:Yale University Press,1944.
[39]马克思,恩格斯.马克思恩格斯文集:第2卷[M].北京:人民出版社,2009:32.
[40]马克思,恩格斯.马克思恩格斯文集:第9卷[M].北京:人民出版社,2009.
[41]LAGOPOULOS A P.Semiotics and History:A Marxist Approach [J].Semiotica,1986,59(3-4):215-244.
[42]VOLOSHINOV V N.Marxism and the Philosophy of Language [M].New York:Seminar Press,1973:21.
[43]李俭.法律术语的社会符号学阐释——以“通常居住”为例[J].浙江工商大学学报,2017(4):59-65.
[44]程乐,王春晖.多维解读我国网络综合治理体系构建[EB/OL].(2020-05-26)[2022-01-01].https://theory.gmw.cn/2020-05/26/content_33859824.htm.
[45]BARRINHA A,RENARD T.Cyber-diplomacy:The Making of an International Society in the Digital Age [J].Global Affairs,2017,3(4-5):353-364.
[46]吕红周,单红.斯捷潘诺夫的符号学思想阐释[M]//田海龙,于鑫.符号学多元研究.天津:南开大学出版社,2017:101-113.
[47]习近平.网络安全为人民,网络安全靠人民[EB/OL].(2016-04-19)[2022-01-01].http://www.cac.gov.cn/2016-04/19/c_1118673697.htm.
[48]孙强.习近平的新型网络安全观[EB/OL].(2016-09-12)[2022-01-01].http://pinglun.youth.cn/ll/201609/t20160912_8647587.htm.
[49]马克思,恩格斯.马克思恩格斯选集:第4卷[M].北京:人民出版社,2012:574.
[50]程乐,裴佳敏.网络空间治理的中国方案[EB/OL].(2019-04-29)[2022-01-01].https://www.guancha.cn/chengle/2019_06_02_504054.shtml.
[51]RABER D,BUDD J M.Information as Sign:Semiotics and Information Science [J].Journal of Documentation,2003,59(5):507-522.
[52]MORTELMANS D.Sign Values in Processes of Distinction:The Concept of Luxury [J].Semiotica,2005,157(1-4):497-520.
[53]MADIEGA,T.Digital Sovereignty for Europe [R].European Parliamentary Research Service,2020.
[54]INTERNATIONAL TELECOMMUNICATION UNION.Recommendation ITU-T X.1205:Overview of Cybersecurity [R].Geneva:International Telecommunication Union,2009.
[55]HURRELL A.On Global Order:Power,Values,and the Constitution of International Society [M].Oxford:Oxford University Press,2007:2.
(1)Oxford English Dictionary Online,at http://www.oed.com/view/Entry/240849 (Last visited on August 15,2021).
(2)Collins English Dictionary Online,at https://www.collinsdictionary.com/dictionary/english/cyberspace (Last visited on August 15,2021).
(3)Dictionary by Merriam-Webster Online,at https://www.merriam-webster.com/dictionary/cyberspace (Last visited on August 15,2021).
(4)Wiktionary Online,at https://en.wiktionary.org/wiki/cyberspace (Last visited on August 15,2021).
(5)US Department of Defense,Dictionary of Military and Associated Terms,at https://www.bits.de/NRANEU/others/jp-doctrine/jp1_02(05).pdf (Last visted on August 20,2021).
(6)US Department of Defense,Dictionary of Military and Associated Terms,at https://www.bits.de/NRANEU/others/jp-doctrine/jp1_02(10-08).pdf (Last visted on August 20,2021).
基本信息:
DOI:10.14134/j.cnki.cn33-1337/c.2022.02.001
中图分类号:D631;TP393.08
引用信息:
[1]程乐,裴佳敏,Marcel Danesi.中国网络治理的社会符号学阐释[J].浙江工商大学学报,2022,No.173(02):6-16.DOI:10.14134/j.cnki.cn33-1337/c.2022.02.001.
基金信息:
国家社会科学基金重大专项“建立健全我国网络综合治理体系研究”(20ZDA062); 浙江省哲学社会科学规划课题“基于语料库的中美网络安全法律话语研究”(22NDQN249YB)