ZHAO Ruiqi. Constructing International Norms for the Governance of Cyber Terrorism—An Analytical Framework of Neo-liberal Institutionalism[J]. Journal of Jishou University(Social Sciences), DOI: 10.13438/j.cnki.jdxb.2020.04.010.
[1] 盘冠员,章德彪.网络反恐大策略——如何应对网络恐怖主义[M].北京:时事出版社,2016.
[2] JOSEPH S,NYE J.Cyber Power[EB/OL].[2019-11-22].https://www.belfercenter.org/sites/default/files/legacy/files/cyber-power.pdf.
[3] 安东尼奥·古特雷斯.团结全世界,打击恐怖主义.[EB/OL].[2019-11-22].https://www.un.org/sg/zh/content/sg/articles/2018-06-26/uniting-world-against-terrorism.
[4] Albahar M.Cyber Attacks and Terrorism:A Twenty-First Century Conundrum[J].Science and Engineering Ethics,2019 (25):993.
[5] COLLIN B C.The Future of Cyberterrorism:Where the Physical and Virtual Worlds Converge[J].Crime & Justice International,1997,13(2):16.
[6] 赵晨.网络空间已成国际反恐新阵地[N].光明日报,2017-06-14(14).
[7] WEIMANN G.Cyberterrorism:The sum of all fears? [J].Studies in Conflict & Terrorism,2005,28(2):129-130.
[8] COHEN B.Between Imagined Reality and Real Terrorism[J].Military and Strategic Affairs,2015,7(3):3-17.
[9] 刘海龙.当代媒介研究导论[J].国际新闻界,2005(2):53-59.
[10] AXELROD R.The Evolution of Cooperation[M].New York:Perseus Books Group,2006:3.
[11] 余瀛波.打击网络恐怖主义亟待加强国际合作[N].法制日报,2016-11-19.
[12] KRASNER S D.International Regime[M].New York:Cornell University Press,1983:2.
[13] KEOHANE R O.After Hegemony:Cooperation and Discord in the World Political Economy[M].New Jersey:Princeton University Press,2005.
[14] STEPHEN K.International Regimes[M].NY:Cornell University Press,1983:2.
[15] 叶江,殷翔.现实主义与新自由制度主义权力观之比较分析——兼谈不同权力观对当代国际格局的不同理解[J].国际政治研究,2008(1):131-142.
[16] BALDWIN D.Neorealism and Neoliberalism:The Contemporary Debate[M].New York :Colum bia University Press,1993:4-8.
[17] 卡尔·波兰尼.巨变:当代政治与经济的起源[M].黄树民,译.北京:社会科学文献出版社,2017:52-56.
[18] 约翰·米尔斯海默.大国政治的悲剧[M].王义桅,唐小松,译.上海:上海人民出版社,2003:5.
[19] 罗伯特·基欧汉.新现实主义及其批判[M].郭树勇,译.北京:北京大学出版社,2002:277.
[20] 倪世雄.西方国际关系理论的新发展——学派、论战、理论[J].复旦学报(哲学社会科学版),1999(1):18-23.
[21] 谢许潭.国际反恐新战场:应对“伊斯兰国”媒体宣传的挑战[J].外交评论(外交学院学报),2016(1):82-103.
[22] BUNZEL C.From Paper State to Caliphate:The Ideology of the Islamic State [EB/OL].[2019-11-26].http://www.brookings.edu/research/papers/2015/03/ideology-of-islamicstate.
[23] The Christchurch Call:helping important voices be heard[EB/OL].[2019-11-26].https://internetnz.nz/Christchurch-Call.
[24] 于浩.被遗忘权:制度构造与中国本土化研究[J].华东师范大学学报(哲学社会科学版),2018(5):152.
[25] 联合国欢迎互联网巨头开展网络反恐倡议[EB/OL].[2019-11-28].https://news.un.org/zh/story/2017/06/278092.
[26] 王新喜.科技巨头们的反恐困境[EB/OL].[2019-11-28].https://www.tmtpost.com/2396771.html.
[27] 高金萍,尹婉莹.“棱镜门”事件中的社会正义与国家利益博弈[J].国际新闻界,2014(4):97-108.
[28] Charlie Osborne:Police are now targeting former WebStresser DDoS-for-hire users.[EB/OL].[2019-12-02]https://www.zdnet.com/article/police-are-now-targeting-former-webstresser-ddos-for-hire-users/.
[29] 李巍.从规则到秩序——国际制度竞争的逻辑[J].世界经济与政治,2019(4):45.
[30] 刘泽毅,杜彬.以色列反恐情报战略探讨[J].武警学院学报,2009(5):94-96.
[31] 周青松.全球恐怖主义数据库及对中国反恐数据库建设的启示[J].情报杂志,2016(9):10.
[32] 郎平.网络恐怖主义的界定、解读与应对[J].信息安全研究,2016(10):886.
[33] BUREAU OF PUBLIC AFFAIRS:Ten Things You Should Know About the Global Counterterrorism Forum[EB/OL].[2019-11-28].https://2009-2017.state.gov/r/pa/pl/235149.htm.
[34] MICHAEL B,FINNEMORE M.Rules for the World – International Organizations[M].New York:Cornell University Press,2004:5.
[35] 蒂姆·毛瑞尔.联合国网络规范的出现:联合国网络安全活动分析[EB/OL].[2019-11-28].https://carnegietsinghua.org/2016/09/26/zh-pub-64686.
[36] ARMSTRONG D.Revolution and World Order:The Revolutionary State in International Society[M].Oxford:Oxford University Press,1994:7-8.
[37] SHILLING C.Physical Capital and Situated Action:A New Direction for Corporeal Sociology[J].British Journal of Sociology of Education,2004,25(4):473-487.
[38] 约翰·伊肯伯里.大战胜利之后:制度、战略约束与战后秩序重建[M].门洪华,译.北京:北京大学出版社,2008:215-236.
[39] IKENBERRY G J.The End of Liberal International Order? [J].International Affairs,2018,94(1):7-23.
[40] METZ S.Rethinking Insurgency[EB/OL].[2019-11-28].https://ssi.armywarcollege.edu/pdffiles/PUB790.pdf.
[41] SOLANSKY S T,BECK T E.Enhancing Community Safety and Security through Understanding Interagency Collaboration in Cyber-Terrorism Exercises[J].Administration & Society,2009,40(8):852-875.