The cyberspace has become the "fifth strategic domain" after the land, the sea, the air and the space, providing a new platform for geopolitical games. The developed countries dominate the formulation of cyberspace rules and hold a large portion of cyberspace strategic resources, leaving a huge gap of the global cyberspace development. This paper makes a social network analysis by using the Lorenz curve to quantitatively describe the pattern and the current allocation of the global cyberspace resources. It is shown that the physical infrastructures of the cyberspace, such as the submarine cables, the Internet data centers and the Internet exchange points, are mainly located in Europe and North America. The convergence of the submarine cables in specific areas has formed several major "points of the throat" for the Internet data traffic, namely, the Luzon Strait, the Malacca Strait, the Suez Canal, the Red Sea and the Mantel Strait. Egypt, the United States, Indonesia, Japan, the Philippines, the United Kingdom, and Cote d'Ivoire play key roles in the entire network structure, carrying a large amount of Internet data traffic; in terms of virtual resources in the cyberspace, there is also a serious uneven distribution, with a small population in Europe and the United States sharing most of the network resources. China has come out of the backward situation in the field of IPv6, but there is still a large distance to go for the development in the future. This paper puts forward corresponding policy recommendations in terms of the construction of the cyberspace infrastructure such as the submarine cables and the data centers, and the virtual resources in the global cyberspace. Besides, this study emphasizes the needs to defend cyberspace sovereignty and national security, strengthen the research and application of new cybersecurity technologies, draw the geographical map of cyberspace, and improve the capability of national cybersecurity assurance.
CHEN Shuai
,
GUO Qiquan
,
GAO Chundong
,
HAO Mengmeng
,
JIANG Dong
. Contentions of cyberspace resources in global geopolitical game[J]. Science & Technology Review, 2021
, 39(22)
: 85
-93
.
DOI: 10.3981/j.issn.1000-7857.2021.22.010
[1] 高春东, 郭启全, 江东, 等. 网络空间地理学的理论基础与技术路径[J]. 地理学报, 2019, 74(9):1709-1722.
[2] 郭启全, 高春东, 郝蒙蒙, 等. 发展网络空间可视化技术支撑网络安全综合防控体系建设[J]. 中国科学院院刊, 2020, 35(7):917-924.
[3] 杜德斌, 段德忠, 刘承良, 等. 1990年以来中国地理学之地缘政治学研究进展[J]. 地理研究, 2015, 34(2):199-212.
[4] 郭启全, 高春东, 孙开锋, 等. 基于"人-地-网" 关系的网络空间要素层次体系建设[J]. 地理研究, 2021, 40(1):109-118.
[5] 王礼茂, 牟初夫, 陆大道. 地缘政治演变驱动力变化与地缘政治学研究新趋势[J]. 地理研究, 2016, 35(1):3-13.
[6] 蔡翠红. 网络地缘政治:中美关系分析的新视角[J]. 国际政治研究, 2018, 39(1):9-37, 5.
[7] 王川. 网络地缘政治:定义、特征及其对中国西北边疆安全的影响[J]. 喀什师范学院学报, 2012, 33(4):12-16.
[8] 吴世忠. 网络时代地缘政治的新特征[J]. 中国信息安全, 2013(8):40-42.
[9] 冯涛, 姬炜, 汶建龙. 网络空间地缘政治问题研究[J]. 未来与发展, 2017, 41(1):15-18.
[10] 木子衂. 网络空间渐成全球政治博弈新"角斗场"[J]. 党政视野, 2016(1):41.
[11] 薛琳. 东北亚网络地缘政治成因及展望[D]. 沈阳:辽宁大学, 2019.
[12] 陈文胜. 地缘政治视域下的网络空间及其安全[J]. 学术界, 2020(2):87-97.
[13] 鲁传颖. 网络空间治理的力量博弈、理念演变与中国战略[J]. 国际展望, 2016, 8(1):117-134, 157.
[14] 沈逸. 全球网络空间治理原则之争与中国的战略选择[J]. 外交评论(外交学院学报), 2015, 32(2):65-79.
[15] 王永, 李翔, 任国明, 等. 全球网络空间测绘地图研究综述[J]. 信息技术与网络安全, 2019, 38(5):1-6.
[16] 曹伟. 网络地缘政治的分析与建构[J]. 中国信息安全, 2020(2):76-78.
[17] 王淑芳, 葛岳静, 刘玉立. 中美在南亚地缘影响力的时空演变及机制[J]. 地理学报, 2015, 70(6):864-878.
[18] 王淑芳, 葛岳静, 曹原, 等. 中国周边地缘影响力的建模与测算——以南亚为例[J]. 地理科学进展, 2014, 33(6):738-747.
[19] 张继鹏, 刘德鑫, 张家来, 等. 关于综合国力评价克莱因理论模型的缺陷性分析[J]. 当代经济科学, 2006, (1):69-74, 126-127.
[20] Jansen van Vuuren J, Leenen L. A model for measuring perceived cyberpower[C]//Proceedings of the 13th International Conference on Cyber Warfare and Security. Washington D C, USA:National Defence University, 2018.
[21] The Belfer Center for Science and International Affairs. National Cyber power index 2020[EB/OL]. (2020-09-16)[2021-09-20]. https://www.belfercenter.org/publication/national-cyber-power-index-2020.
[22] The International Telecommunication Union. global cybersecurity index[EB/OL]. (2021-06-01)[2021-09-20]. https://www.itu.int/en/ITU-D/Cybersecurity/Pages/globalcybersecurity-index.aspx.
[23] The potomac institute for policy studies Cyber readiness index[EB/OL]. (2020-12-01)[2021-09-20]. https://www.potomacinstitute.org/academic-centers/cyber-readinessindex.
[24] Takeshita H, Sato M, Inada Y, et al. Past, current and future technologies for optical submarine cables[C]//Proceedings of the 2019 IEEE/ACM Workshop on Photonics-Optics Technology Oriented Networking, Information and Computing Systems (PHOTONICS) 2019. Denver, CO, USA:IEEE, 2019.
[25] 张存刚, 李明, 陆德梅. 社会网络分析——一种重要的社会学研究方法[J]. 甘肃社会科学, 2004(2):109-111.
[26] 朱庆华, 李亮. 社会网络分析法及其在情报学中的应用[J]. 情报理论与实践, 2008(2):179-183, 174.
[27] 刘军. 整体网分析讲义[M]. 上海:格致出版社, 2009.
[28] Gastwirth J L. A general definition of the Lorenz curve[J]. Econometrica:Journal of the Econometric Society, 1971:1037-1039.
[29] Gastwirth J L. The estimation of the Lorenz curve and Gini index[J]. The review of economics and statistics, 1972:306-316.
[30] 延静, 胡丽霞, 李宇红. 经济指标与商情指数[M]. 北京:现代教育出版社, 2012.
[31] 崔友平. 论现有收入分配不均等性指标的缺陷与改进[J]. 山东经济, 2008(1):28-32.
[32] 蔡翠红, 王天禅. 新冠疫情下网络空间全球治理的机遇与挑战[J]. 国际论坛, 2021, 23(1):3-17, 155.
[33] 桂畅旎. 新冠疫情对于网络空间的影响:机遇与挑战[J]. 中国信息安全, 2020(8):82-85.
[34] 中国网信网.《国家网络空间安全战略》 (全文)[J]. 中国信息安全, 2017(1):26-31.