摘要(Abstract):
尽管网络空间主权已经成为中国处理网络事务的根本指针,但其理论价值和法律意蕴均未得到充分阐明。面对与现实空间既区分又交融的网络空间,国家主权既要坚持对网络空间的适用性,反对消解主权的"网络自身主权论"和弱化主权的"多利益攸关方治理模式",又要根据网络空间"互联、互通、互动"的特质适时而变:在内部主权的层面上,建构基本立法权、简约行政权和类型化的司法管辖权;在外部主权的层面上,主张网络安全、平等参与、共同利用、善意合作的国际法新秩序。
关键词(KeyWords):
Abstract:
Keywords:
基金项目(Foundation): the Major Program Research on Legal Countermeasures for Main Issues of the Internet Security supported by a grant from the National Social Science Fund of China, and Prof. Zhang Xinbao is the leading researcher of the project group
作者(Author): 张新宝;许可;Liu Jiajia;
Email:
参考文献(References):
- 1See President Xi Jinping Attends the Opening Ceremony of the Second World Internet Conference and Addresses Keynote Speech,People's Daily,December 17,2015,at 1.
- 2See Ruo Ying,What Is the Internet Sovereignty?,13 Red Flag Manuscript(2014);Zhi Zhenfeng,Internet Sovereignty Leads to the New Pattern of Internet Governance,People's Daily,January 5,2016,at 5.
- 3See Ren Mingyan,National Information Sovereignly Issue Study at the Background of Internet,6 Hebei Law Science(2007).
- 4See Yu Li,Network Dominance:New National Power with Internet on the International Politics,4 Academic Journal of Zhengzhou University(Philosophy and Social Science Edition)(2012).
- 5Timothy S.Wu,Cyberspace Sovereignty?The Internet and the International System,10(3)Harvard Journal of Law&Technology.647-666(1997).
- 6This article discusses the challenge of internet to traditional territory sovereignty including"information sovereignty"and establishes an autonomous mode of cyberspace.David R.Johnson&David G.Post,Law and Borders:The Rise of Law in Cyberspace,48(5)Stanford Law Review,1367-1402(1996).
- 7See John P.Barlow,A Declaration of the Independence of Cyberspace,Tsinghua Discussion of Rule of Law(4th version).10(2004).(Li Xu&Li Xiaowu trans.,Gao Hongjun ed.,Tsinghua University Publishing Company).
- 8 See JOSEPH NYE,THE FUTURE OF POWER,at 171(Wang Jimei trans.,CITIC Publishing Company,2012).
- 9 Jack L.Goldsmith,The Internet and the Abiding Significance of Territorial Sovereignty,5(2)Indiana Journal of Global Legal Studies,475-491(1998).
- 10 ABRAHAM M.DENMARK&JAMES MULVENON ed.,CONTESTED COMMONS:THE FUTURE OF AMERICAN POWER IN AMULTIPOLARWORLD,CENTER FOR ANEW AMERICA SECURITY,2010,at http://www.cnas.org/files/documents/publications/CNAS%20Contested%20Commons_l.pdf(Last visited on January 22,2016);See official opinion Chris C.Demchak&Peter Dombrowski,Rise of a Cybered Westphalian Age,5(1)Strategic Studies Quarterly,32(2011);Justyna Hofmokl,The Internet Commons:Towards an Eclectic Theoretical Framework,4(1)International Journal of the Commons,226-250(2010);Roger Hurwitz,Depleted Trust in the Cyber Commons,6(3)Strategic Studies Quarterly,20-45(2012).
- 11 For example,Sean Kanuck,the review drafter of American White House internet policy states that the global public sphere lacks theoretical support of international law and political economy,see Sean Kanuck,Sovereign Discourse on Cyber Conflict under International Law,8 Texas Law Review,1571-1580(2010);Scott J.Shackelford,Associate Professor of Indiana University points out that the network space is"hypocritical public sphere"(pseudocommons).see Scott J.Shackelford,Toward Cyberpeace:Managing Cyberattacks through Polycentric Governance,62(5)American University Law Review,1285-1296(2013);Patrick W Franzese,officer of American strategic command analyzes the 5 features of the global public sphere but the network space bears none of them,see Patrick W.Franzese,Sovereignty in Cyberspace:Can it Exist?,64 Air Force Law Review,14-17(2009).
- 12 SARAH MYERS WEST,GLOBALIZING INTERNET GOVERNANCE:NEGOTIATING CYBERSPACE AGREEMENTS IN THE POST-SNOWDEN ERA,TPRC CONFERENCE PAPER,at http://ssrn.com/abstract=2418762(Last visited on January 2,2016).
- 13 See JOSEPH A.KAIMILYLI&JIMMY FOLKE,THE END OF THE SOVEREIGNTY:GRADUALLY SHRINKING DEBRIS OF WORLD POLITICS,at 13(Li Dongyan trans.,Zhejiang People's Publishing Company,2001).
- 14 See Wang Yu,The Definition of Sovereignty and Its Application in Recovering Hongkong and Macao by Chinese Government,2 Study of One Nation Two System(2012).
- 15 See Grotius,The Rights of Law and Peace,at 88(He Qinhua trans.,Shanghai People's Publishing Company,2005).
- 16 Ivan Simonovi,Relative Sovereignty of the Twenty First Century,25(3)Hastings International&Comparative Law Review,371-372(2002).
- 17 See Zhu Yuchao,Principles of National Sovereignty:Pillar of Global Relationship or"Systematic Hypocrisy",3 Politics Review of Zhongshan University(2008).
- 18 See YU KEPING ET AL.,GLOBALIZATION AND NATIONAL SOVEREIGNTY,at 13(Social Sciences Academic Press,2003).
- 19 JAMES CRAWFORD&MARTTI KOSKENNIEMI,THE CAMBRIDGE COMPANION TO INTERNATIONAL LAW,at 118(Cambridge University Press,2012).
- 20 Id.,124.
- 21 Yang Zewei,Theory of Sovereignty:Sovereignty Issue of the International Law and the Study of Its Trend,at 266-267(Peking University Press,2006).
- 22 Boutros Boutros-Ghali,Empowering the United Nations,72(5)Foreign Affairs,98-99(1992/3).
- 23 See LOUIS HENKING,INTERNATIONAL LAW:POLITICS AND VALUE,at 13(Zhang Naigen et al.trans.,China University of Political Science and Law Press,2005).
- 24 LI HAOPEI,THE DEFINITION AND ORIGIN OF INTERNATIONAL LAW,at 7(Guizhou People's Press,1994).
- 25 See JAMS&WALTZ REVISED,OPPENHEIM INTERNATIONAL LAW(BOOK 1 VOLUME 1).at 92(Wang Tieya et al.trans.,China Encyclopedia Press,1995).
- 26 See Wang Yizhou,National Sovereignty at the Background of Contemporary International Politics,6Europe(1993).
- 27 See MKOLAOS ZAHARIADIS,COMPARATIVE POLITICS:THEORY,CASES AND METHODS,at 158(Ning Sao et al.trans.,Peking University,2008).
- 28 ROBERT KEOHANE&JOSEPH NYE,POWER AND DEPENDENCE(3RD VERSION).at 9(Men Honghua trans.,Peking University Press,2002).
- 29 See OPPENHEIM INTERNATIONAL LAW(Book 1 Volume 1).at 101(Lauterpacht revised,Wang Tieya&Chen Tiqiang trans.,Commercial Press,1989).
- 30 See Mao Weizhun&Bu Yongguang,Responsible Sovereignty:Theoretic Origin,Revolution Vein and Dispute Challenge,2 Study of International Safety(2014).
- 31 ANTONIO CASSESE,INTERNATIONAL LAW,at 15(Oxford University Press,2005).
- 32 Amitai Etzioni,Sovereignty as Responsibility,50(1)Journal of World Affairs,72(2006).
- 33 James Crawford&Martti Koskenniemi,The Cambridge Companion to International Law,at 132(Cambridge University Press,2012).
- 34 See former UN special judge of international court of justice Ian Brownlee's commentary about sovereignty,see IAN BROWNLEE,PRINCIPLES OF PUBLIC INTERNATIONAL LAW,at 257(Zeng Lingliang trans.,Law Press,2007).
- 35 HUI ZHIBIN,STRATEGIC STUDY OF GLOBAL INTERNET SPACE INFORMATION AND SAFETY,at 8(Shanghai Global Book Press,2013).
- 36THE UK CYBER SECURITY STRATEGY,at https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/ukcyber-security-strategy-final.pdf(Last visited onDecember 1,2015).
- 37 ITU,ITU TOOLKIT FOR CYBERCRIME LEGISLATION,at https://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrimelegislation.pdf(Last visited on January 22,2016).
- 38Timothy S.Wu,supra note 5,649.
- 39 David D.Clark&Marjory S.Blumenthal,Rethinking the Design of the Internet:The End to End Arguments vs.the Brave New World,71-79,1(1)ACM Transactions on Internet Technology(2001).
- 40 WU XIUMING,MASTERS SWITCH:TRANSFORMATION OF INFORMATION EMPIRE,at 170(CITIC Publishing House,2011).
- 41 LAWRENCE LESSIG,CODE AND OTHER LAWS OF CYBERSPACE,at 32(Harvard University Press,1999).
- 42 Id.,32,36-39(2009).
- 43 THE OXFORD HANDBOOK OF REGULATION,at 527-533(Robert Baldwin,Martin Cave&Martin Lodge,ed.,Oxford University Press,2010).
- 44 Raymund Werle&Eric J.Iversen,Promoting Legitimacy in Technical Standardization,2(1)Science,Technology&Innovation Studies,19-39(2006).
- 45 ANGELE A.GILROY,ACCESS TO BROADBAND NETWORKS:THE NET NEUTRALITY DEBATE,CONGRESSIONAL RESEARCH SERVICE,2015,at http://fas.org/sgp/crs/misc/R40616.pdf(Lastvisited onDecember 21,2015).
- 46 MAUREEN K.OHLHAUSEN,THE OPEN INTERNET:REGULATING TO SAVE THE UNREGULATED INTERNET?,at http://www.ftc.gov/speeches/ohlhausen/121026mannheim.pdf(Last visited on December 21,2015).
- 47 On January 14,2014,the US Washington D.C.Court of Appeals made decision for Verizon V FCC that"The court ruled that the FCC did not have the authority to impose the order in its entirety."
- 48 DAVID R.JOHNSON&DAVID G.POST,THE RISE OF LAW ON THE GLOBAL NETWORK,in BORDERS IN CYBERSPACE:INFORMATION POLICY AND THE GLOBAL INFORMATION INFRASTRUCTURE,at 3(Brian Kahin/Charles Nesson ed.,MIT Press,1997).
- 49 Julie E.Cohen,Cyberspace as/and Space,107(1)Columbia Law Review,211(2007).
- 50 Orin S.Kerr,The Problem of Perspective in Internet Law,91 Georgetown Law Journal,360-361(2003).
- 51 Trotter Hardy,The Proper Legal Regime for"Cyberspace",55 University of Pittsburgh Law Review,993-995(1994).
- 52 DARIN BARNEY,CONCEPTS OF INTERNET SOCIETY:TECHNOLOGY,ECONOMICS,POLITICS AND IDENTIFICATION,at 31(Huang Shouyi trans.,Weber Publication International Ltd.,2012).
- 53 Julie E.Cohen,supra note 49,237-243.
- 54 On Heterotopia,see Michel Foucault,Des Espace Autresi,6 World Philosophy(Wang Zhe trans.,2006).
- 55 On great potential of digital information,see VIKTOR MAYER-SCHONBERGER,BIG DATA A REVOLUTION THAT WILL TRANSFORM HOW WE LIVE,WORK,AND THINK,at 98-126(Zhou Tao trans.,Zhejiang People's Publishing House,2013).
- 56 Based on the definition of digitized information,this article does not make distinction between information sovereignty and data sovereignty.
- 57 Larry Diamond,Liberation Technology,21(3)Journal of Democracy,70(2010).
- 58 Precursor of the internet is ARPANET initiated by ARPA in 1974,which is highly political.
- 59 See Zhang Xinbao,From Privacy to Personal Information:Theory of Re-measuring Interests and Institutional Arrangements,3 China Legal Science(2015).
- 60 Ronald Deibert&Rafal Rohozinski,Liberation vs.Control:The Future of Cyberspace,21(4)Journal of Democracy,55(2010).
- 61 WANG KONGXIANG,INTERNATIONAL LAW IN THE REGULATION OF INTERNET,at 100-103(Law Press,2015).
- 62 ROBERT BALDWIN,MARTIN CAVE&MARTIN LODGE,THE OXFORD HANDBOOK OF REGULATION,at 533-542(Oxford University Press,2010).
- 63 JACK GOLDSMITH&TIM WU,WHO CONTROLS THE INTERNET?ILLUSIONS OF A BORDERLESS WORLD,at 145(Oxford University Press,2006).
- 64 ZACHARY PETERSON,MARK GONDREE&ROBERT BEVERLY,A POSITION PAPER ON DATA SOVEREIGNTY:THE IMPORTANCE OF GEOLOCATING DATA IN THE CLOUD,PROCEEDINGS OF THE 8TH USENIX CONFERENCE ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION,2011,at https://ww.usenix.org/legacy/event/hotcloudll/tech/final_files/Peterson.pdf(Last visited on January 2,2016).
- 65 JONAH FORCE HILL,THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN:ANALYSIS AND RECOMMENDATIONS FOR US POLICYMAKERS AND BUSINESS LEADERS,IN THE HAGUE INSTITUTE FOR GLOBAL JUSTICE,CONFERENCE ON THE FUTURE OF CYBER GOVERNANCE,2014,at http://ssrn.com/abstract=2430275(Last visited on January 2,2016).
- 66 Christopher Rudolph,Sovereignty and Territorial Borders in a Global Age,7(1)International Studies Review,1-20(2005).
- 67 Stephen D.Kmsnem,Biding Sovereignty,22(3)International Political Science Review,229-251(2001).
- 68 HOFMANN JEANETTE,INTERNET GOVERNANCE:A REGULATIVE IDEA IN FLUX,in INTERNET GOVERNANCE:AN INTRODUCTION,at 74-108(Ravi Kumar Jain Bandamutha ed.,Icfai University Press,2007).
- 69 WSIS,TUNIS AGENDA FOR THE INFORMATION SOCIETY,at http://www.itu.int/net/wsis/docs2/tunis/off/6revl.html(Last visited on January 2,2016).
- 70 MARKUS KUMMER,MULTI-STAKEHOLDER COOPERATION:REFLECTIONS ON THE EMERGENCE OF A NEW PHRASEOLOGY IN INTERNATIONAL COOPERATION,at http://www.intemetsociety/org/blog/2013/05/multistakeholder-cooperationreflections-emergence-newphraseology-international(Last visited on January 2,2016).
- 71LAWRENCE STRICKLING,MOVING TOGETHER BEYOND DUBAI,at http://www.ntia.doc.gov/blog/2013/moving-together-beyonddubai(Last visited on January 2,2016).
- 72 AVRI DORIA,USE[AND ABUSE]OF MULTI-STAKEHOLDERISM IN THE INTERNET,at http://psg.com/~avri/papers/Use%20and%20Abuse%20of%20MSism-130902.pdf(Last visited on January 2,2016).
- 73 MAX WEBER,BASIC CONCEPTS IN SOCIOLOGY,at 34(Gu Zhonghua trans.,Gunagxi Normal University Press,2005).
- 74 JAMES A.LEWIS,INTERNET GOVERNANCE:INEVITABLE TRANSITIONS,THE CENTRE FOR INTERNATIONAL GOVERNANCE INNOVATION,at https://www.cigionline.org/sites/default/files/no4.pdf(Last visited on January 2,2016).
- 75 MILTON L.MULLER,THE GLOBAL POLITICS OF INTERNET GOVERNANCE,at 318(Zhou Cheng,Lu Rui,Xia Xue&Zheng Kailun trans.,Shanghai Jiao Tong University Press,2015).
- 76 JOHN E.SAVAGE&BRUCE W.MCCONNELL,EXPLORING MULTI-STAKEHOLDER INTERNET GOVERNANCE,BREAKTHROUGH GROUP WORKING PAPER,at http://www2.ewi.info/sites/default/files/Exploring%20Multi-Stakeholder20Internet%20Governance_McConnell%20and%20Savage%20BG%20Paper.pdf(Last visited on January 2,2016).
- 77 Neil Weinstock Netanel,Cyberspace Self-governance:A Skeptical View from Liberal Democratic Theory,88(2)California Law Review,395-498(2000).
- 78 THE NATIONAL MILITARY STRATEGY OF UNITED STATES 2011,at http://58.30.31.210:9999/www.defense.gov/Portals/l/Documents/pubs/2011-National-Military-Strategy.pdf(Last visited on January 2,2016).
- 79 Han Xueqing&Wang Yiwei,Global Commons:Thought Origin,Concept Spectrum,Academic Reflection,6 Chinese Social Sciences(2014).
- 80 DIVISION OF ENVIRONMENTAL LAW AND CONVENTIONS,EG OF THE GLOBAL COMMONS,at http://www.unep.org/delc/GlobalCommons/tabid/54404/(Last visited on January 2,2016).
- 81 Zhang Ming,From"Partial"Governance to"Global"Governance,11 World Economics and Politics(2013).
- 82 Wang Yiwei,Global Commons and American Smart Hegemony,4 Journal of Tongji University(JCR Social Science Edition)(2012).
- 83 THE US DEPARTMENT OF DEFENSE,THE STRATEGY FOR HOMELAND DEFENSE AND CIVIL SUPPORT,at http://fas.org/man/eprint/homedefstrat.pdf(Last visited on January 2,2016).
- 84S un Can&Zheng Pujian,Summarizing"Global Commons"Researches in China's Academic Circle,3 Journal of Strategy and DecisionMaking(2014).
- 85 WILLIAM J.MITCHALL,E-TOPIA:UNBAN LIFE,JIM-BUT NOT AS WE KNOW IT,at 13(Wu Qidi et al.trans.,Shanghai Scientific and Technological Publishing House,2005).
- 86Scott J.Shackelford,supra note 11,1288.
- 87 MARK RAYMOND,THE INTERNET AS A GLOBAL COMMONS?,at https://www.cigionline.oig/publications/2012/10/intemet-globalcommons(Last visited on January 2,2016).
- 88 Shen Yi,Debates on Principles of Cyberspace Governance and China's Strategic Choice,2 Diplomatic Review(2015).
- 89 PRISM(surveillance program).at https://en.wikipedia.org/wiki/PRISM(surveillance program).(Last visited on January 2,2016).
- 90 Michael A.Heller,The Tragedy of the Anticommons:Property in the Transition from Marx to Markets,111(3)Harvard Law Review,621-688(1998).
- 91 Timothy S.Wu,supra note 5.
- 92 ALEXANDER KLIMBURG,THE INTERNET YALTA,CENTER FOR A NEW AMERICAN SECURITY(CNAS)COMMENTARY,at http://wwwxras.org/files/documents/publications/CNAS_WCIT_conimentary.pdf#.UU8UjMyEmII.wordpress(Last visited on January2,2016).
- 93 Yang Jian,Information Technology Cyberspace:Power,Network Economy Character and Wealth Distribution,11 Shanghai Academy of Social Sciences(2008).
- 94 Liu Jianwei&Yu Dongping,Discussion on Politicization of Cyberspace,6 Studies on International Relations(2013).
- 95 PANAYOTIS A YANNAKOGEORGOS&ADAM B LOWTHER,CONFLICT AND COOPERATION IN CYBERSPACE:THE CHALLENGE TO NATIONAL SECURITY,at 283-287(CRC Press,2013).
- 96 Network Readiness Index weighs the maturity in effectively utilizing information and commumcation technology of various countries from three perspectives:the environment of information and commumcation technology in overall business,supervision and infrastructure;readiness level of individual,enterprise and government in using and benefiting from information and communication technology;conditions in employing the newest information and commumcation technology in reality.INTERPRETATIONS ON 2014 NETWORK READINESS INDEX RANKING LIST,at http://cioclub.chinabyte.com/259/12938259.shtml(Last visited on December 1,2015).
- 97 Eric Talbot Jensen,Cyber Sovereignty:The Way Ahead,50(2)Texas International Law Journal,283-284(2015).
- 98 LIU JUNNING,DIRECT DEMOCRACY AND INDIRECT DEMOCRACY,at 37(Shanghai Sanlian Bookstore Press,1998).
- 99 RALF BENDRATH,THE RETURN OF THE STATE IN CYBERSPACE:THE HYBRID REGULATION OF GLOBAL DATA PROTECTION,in MYRIAM DUNN,SAI FELICIA,KRISHNA-HENSEL&VICTOR MAUER,THE RESURGENCE OF THE STATE:TRENDS AND PROCESSES IN CYBERSPACE GOVERNANCE,at 9-34(Ashgate Publishing Ltd,2007).
- 100 See Cai Cuihong,Discussions on Major Power Responsibility in Cyberspace Governance,1 Contemporary World&Socialis(2015).
- 101 DOUGLASS C.NORTH,STRUCTURE AND CHANGE IN ECONOMIC HISTORY,at 123(Shanghai Sanlian Bookstore Press,Shanghai People's Publishing House,1994).
- 102 GROUP OF GOVERNMENTAL EXPERTS ON DEVELOPMENTS IN THE FIELD OF INFORMATION AND TELECOMMUNICATIONS IN THE CONTEXT OF INTERNATIONAL SECURITY,at https://ccdcoe.org/sites/default/files/documents/UN-150722-GGEReport2015.pdf(Last visited on January 2,2016).
- 103 WANG TIEYA&ZHOU ZHONGHAI,INTERNATIONAL LAW PAPER OF ZHOU GENGSHENG,at 395(Shenzhen Haitian Press,1999).
- 104 CHEN XUJING,RECENT THEORIES OF SOVEREIGNTY,at 157(Zhang Shibao trans.,Tsinghua University Press,2010).
- 105 Differentiation between political sovereignty and legal sovereignty is put forward by Dai Xue,an Britain jurist.DAI XUE,INTRODUCTION TO THE STUDY OF THE LAW OF THE CONSTITUTION,at 148(Lei Binnan trans.,China Legal Publishing House,2001).Moreover,ANDREW HEYWOOD,POLITICAL THEORY:AN INTRODUCTION(THIRD VERSION).at 104-106(Li Zhi trans.,China Renmin University Press,2009);MERRIAM,HISTORY OF THE THEORY OF SOVEREIGNTY SINCE ROUSSEAU,at 181-182(BiHonghai trans.,Law Press,2006).
- 106 HEDEAKI SHINODA,RE-EXAMINING SOVEREIGNTY:FROM CLASSICAL THEORYTO GLOBALAGE,at 147-150(Qi Yuan trans.,Commercial Press,2005).
- 107 JIWEIDONG,NEW STUDY ON CONSTITUTIONAL GOVERNANCE:LEGAL AND SOCIAL CHANGES IN GLOBALIZATION,at 220(Beijing University Press,2002).
- 108 About differentiations between Power and Right in sovereignty,see ANTONIO CASSESE,supra note 31,49-51.
- 109 JEAN BODIN,THEORY OF SOVEREIGNTY,at 102-145(Li Weihai&Qian Junwen trans.,Beijing University Press,2008).
- 110 Yu Feng,New Interpretations of"Sovereign Power Transition",3 Journal of Hainan University(2003).What should be explained is that sovereignty and right of sovereignty nature in law of the sea are different.For example,the country in exclusive economic zone enjoys right of sovereignty nature,while it does not have the sovereignty.
- 111 Here adopting the criticism of Frank H.Easterbrook about"law of the Internet".Frank H.Easterbrook,Cyberspace and the Law of the Horse,1 University of Chicago Legal Forum,207-216(1996).
- 112 Mao Weiwei&Bu Yongguang,Responsible Sovereignty:Theoretical Origin,Evolution Context,Conflict Challenge,2 National Security Studies(2014).
- 113 ALBERT-LASZLO BARABASI,LINKED:HOW EVERYTHING IS CONNECTED TO EVERYTHING ELSE AND WHAT IT MEANS FOR SCIENCE,BUSINESS AND EVERYDAY LIFE,at 173(Xu Bin trans.,Hunan Science&Technology Press,2001).
- 114 Yu Keping,An Introduction to Governance and Good Governance,5 Marxism&Reality(1999).
- 115 Ji Weiclong,The Significance of Legal Procedure,1 Social Sciences in China(1993).
- 116 Xiong Guangqing,Relations between and among Individual,Society,State and Super-sate from the Principle of Subsidiarity,5 Journal of Renmin University of China(2012).
- 117 JOHN AGNEW,GLOBALIZATION AND SOVEREIGNTY,at 32-35(Rowman&Littlefield Publishers,2009).
- 118 In the case,for the behavior that Yahoo auctioned Nazi products on the websites,the court believed it was illegal for French users to approach and visit the websites involving Nazi products.Consequently,the court ordered Yahoo to close the French access to the websites.Subsequently,Yahoo prosecuted the case to the district court of San Jose for abrogating the judgment of French court.There were two reasons:first,Yahoo was an Internet Company based on the United States and the service it provided totally complied with the American law;second,the judgment violated the regulation of the First Amendment to the US Constitution.The case fully demonstrated the predicament caused by sovereignty conflicts and unilateral actions.Stephen J.Kobrin,Territoriality and the Governance of Cyberspace,32(4)Journal of International Business Studies,671-672(2001).
- 119 Robert O.Keohane&Joseph Nye Jr,Power and Interdependence in the Information Age,77(5)Foreign Affairs(1998).
- 120 Adeno Addis,Thin State in Thick Globalism:Sovereignty in the Information Age,37(1)Vanderbilt Journal of Transnational Law(2004).
- 121 It integrates the definitions of cy