<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">Vestnik RUDN. International Relations</journal-id><journal-title-group><journal-title xml:lang="en">Vestnik RUDN. International Relations</journal-title><trans-title-group xml:lang="ru"><trans-title>Вестник Российского университета дружбы народов. Серия: Международные отношения</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2313-0660</issn><issn publication-format="electronic">2313-0679</issn><publisher><publisher-name xml:lang="en">федеральное государственное автономное образовательное учреждение высшего образования «Российский университет дружбы народов имени Патриса Лумумбы» (РУДН)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">31405</article-id><article-id pub-id-type="doi">10.22363/2313-0660-2022-22-2-238-255</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>THEMATIC DOSSIER</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>ТЕМАТИЧЕСКОЕ ДОСЬЕ</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">The Securitization of Cyberspace: From Rulemaking to Establishing Legal Regimes</article-title><trans-title-group xml:lang="ru"><trans-title>Секьюритизация информационного пространства: от конструирования норм до создания правовых режимов</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-1479-2785</contrib-id><name-alternatives><name xml:lang="en"><surname>Ramich</surname><given-names>Mirzet S.</given-names></name><name xml:lang="ru"><surname>Рамич</surname><given-names>Мирзет Сафетович</given-names></name></name-alternatives><bio xml:lang="en"><p>Assistant, the Department of Theory and History of International Relations</p></bio><bio xml:lang="ru"><p>ассистент кафедры теории и истории международных отношений</p></bio><email>ramich-ms@rudn.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4321-3191</contrib-id><name-alternatives><name xml:lang="en"><surname>Piskunov</surname><given-names>Danil A.</given-names></name><name xml:lang="ru"><surname>Пискунов</surname><given-names>Данил Андреевич</given-names></name></name-alternatives><bio xml:lang="en"><p>Student, the Department of Theory and History of International Relations</p></bio><bio xml:lang="ru"><p>студент кафедры теории и истории международных отношений</p></bio><email>piskunov_da@mail.ru</email><xref ref-type="aff" rid="aff1"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">Peoples’ Friendship University of Russia (RUDN University)</institution></aff><aff><institution xml:lang="ru">Российский университет дружбы народов</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2022-07-03" publication-format="electronic"><day>03</day><month>07</month><year>2022</year></pub-date><volume>22</volume><issue>2</issue><issue-title xml:lang="en">Non-Western World in Cyberspace</issue-title><issue-title xml:lang="ru">Незападный мир в киберпространстве</issue-title><fpage>238</fpage><lpage>255</lpage><history><date date-type="received" iso-8601-date="2022-07-03"><day>03</day><month>07</month><year>2022</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2022, Ramich M.S., Piskunov D.A.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2022, Рамич М.С., Пискунов Д.А.</copyright-statement><copyright-year>2022</copyright-year><copyright-holder xml:lang="en">Ramich M.S., Piskunov D.A.</copyright-holder><copyright-holder xml:lang="ru">Рамич М.С., Пискунов Д.А.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by-nc/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/international-relations/article/view/31405">https://journals.rudn.ru/international-relations/article/view/31405</self-uri><abstract xml:lang="en"><p style="text-align: justify;">With the development of information and communication technologies (ICTs), the Internet has become increasingly important in terms of national security, economic development, and global leadership. Apparently, conflicts and contentious issues in cyberspace requires creating rules and development of regulation. The authors examine the process of making up rules in cyberspace from the perspective of M. Castells’ network society theory and B. Buzan’ securitization theory. According to M. Castells, key challenges have gradually altered in the network society and power relations and social management are based on the control of communication and information which embraces a network society. Furthermore, the authors investigate the development of the Internet in the context of securitization theory. It is stressed that cyberspace has become a full-fledged political space with the central position of digital sovereignty and information security. The article for the first time proposes a comprehensive periodization of international relations’ transformation in cyberspace. Afterwards, the authors consider the appearance of tensions between actors in cyber space, which include political and economic threats. It encourages state actors to establish a preliminary regulation and to agree on norms regulating state behavior in cyberspace. These mechanisms have become a venue for promoting different concepts of cyber law and establishing legal regimes. In conclusion the authors analyze the hierarchy of actors in global Internet governance to assess the actors’ influence on the establishment of legal regimes in cyberspace. The main assessment criteria are as follows: ability to influence global production chains of high-tech goods, ability to conduct offensive and defensive cyber operations, and influence on the formation of international legal regimes. The authors divide actors into two major groups - rule-markers capable of influencing the global information space and constructing legal regimes, and rule-takers that are an object of great powers competition in cyberspace.</p></abstract><trans-abstract xml:lang="ru"><p style="text-align: justify;">С развитием информационно-коммуникационных технологий (ИКТ) сеть Интернет стала приобретать большее значение с точки зрения национальной безопасности, экономического развития и мирового лидерства. Конфликты и спорные вопросы, возникающие в информационном пространстве, требуют согласования норм и выработки инструментов правового регулирования. Авторы статьи рассматривают процесс конструирования норм в информационном пространстве с точки зрения теории «сетевого общества» М. Кастельса и теории секьюритизации. По мнению М. Кастельса, в «сетевом обществе» произошла смена ключевых вызовов и угроз, а управление им стало осуществляться за счет инструментов контроля над информацией и формирования фреймов. Вместе с тем авторы, анализируя развитие сети Интернет с точки зрения концепции секьюритизации, приходят к выводу, что информационное пространство стало полноценным политическим пространством с центральным положением «цифрового суверенитета» и информационной безопасности. В статье впервые предлагается комплексная периодизация процесса трансформации международных отношений в информационном пространстве. Возникновение в информационном пространстве точек напряженности, которые несут экономические и политические риски, побуждает государственных акторов к формированию предварительного регулирования и согласованию норм поведения в информационном пространстве. Такой процесс конструирования предварительного регулирования был начат под эгидой ООН в рамках двух механизмов, созданных США и Россией. Эти механизмы стали площадкой для продвижения концепций регулирования и создания правовых режимов. В заключении авторы анализируют иерархию акторов в глобальном управлении информационным пространством с целью оценить влияние акторов на создание правовых режимов. Основными критериями оценки выступают способность влиять на глобальные цепочки производства высокотехнологичных товаров, проводить наступательные и оборонительные кибероперации и влиять на формирование международно-правовых режимов. Среди таких акторов авторы выделяют две группы: rule maker, способных воздействовать на глобальное информационное пространство и конструировать правовые режимы, и rule taker, которые выступают объектом конкуренции держав в информационном пространстве.</p></trans-abstract><kwd-group xml:lang="en"><kwd>network society</kwd><kwd>cyberspace</kwd><kwd>securitization</kwd><kwd>US</kwd><kwd>China</kwd><kwd>Russia</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>сетевое общество</kwd><kwd>информационное пространство</kwd><kwd>секьюритизация</kwd><kwd>США</kwd><kwd>КНР</kwd><kwd>Россия</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><citation-alternatives><mixed-citation xml:lang="en">Buchanan, B. (2017). The cybersecurity dilemma: Hacking, Trust And Fear Between Nations. New York, NY: Oxford University Press.</mixed-citation><mixed-citation xml:lang="ru">Баланс сил в ключевых регионах мира: концептуализация и прикладной анализ / под ред. Д. А. Дегтерева, М. А. Никулина, М. С. Рамича. Москва : РУДН, 2021.</mixed-citation></citation-alternatives></ref><ref id="B2"><label>2.</label><citation-alternatives><mixed-citation xml:lang="en">Buzan, B. (1983). People, states, and fear: The national security problem in international relations. Brighton: Wheatsheaf Books.</mixed-citation><mixed-citation xml:lang="ru">Данилин И. В. Американо-китайская технологическая война: риски и возможности для КНР и глобального технологического сектора // Сравнительная политика. 2020а. Т. 11, № 4. С. 160—176. https://doi.org/10.24411/2221-3279-2020-10056</mixed-citation></citation-alternatives></ref><ref id="B3"><label>3.</label><citation-alternatives><mixed-citation xml:lang="en">Buzan, B., &amp; Hansen, L. (2009). The evolution of international security studies. Cambridge: Cambridge University Press.</mixed-citation><mixed-citation xml:lang="ru">Данилин И. В. Концептуализация стратегии США в технологической войне против КНР: экономика, политика, технонационализм // Международная аналитика. 2020b. Т. 11, № 4. С. 21—38.</mixed-citation></citation-alternatives></ref><ref id="B4"><label>4.</label><citation-alternatives><mixed-citation xml:lang="en">Buzan, B., &amp; Wæver, O. (2003). Regions and powers: The structure of international security. Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9780511491252</mixed-citation><mixed-citation xml:lang="ru">Дегтерев Д. А. Оценка современной расстановки сил на международной арене и формирование многополярного мира. Москва : Русайнс, 2020.</mixed-citation></citation-alternatives></ref><ref id="B5"><label>5.</label><citation-alternatives><mixed-citation xml:lang="en">Castells, M. (2011). Network theory. A network theory of power. International journal of communication, 5(15), 773-787.</mixed-citation><mixed-citation xml:lang="ru">Дегтерев Д. А., Рамич М. С., Цвык А. В. США — КНР: «властный транзит» и контуры «конфликтной биполярности» // Вестник Российского университета дружбы народов. Серия: Международные отношения. 2021. Т. 21, № 2. С. 210—231. https://doi.org/10.22363/2313-0660-2021-21-2-210-231</mixed-citation></citation-alternatives></ref><ref id="B6"><label>6.</label><citation-alternatives><mixed-citation xml:lang="en">Castells, M. (2013). Communication power. Oxford: Oxford University Press.</mixed-citation><mixed-citation xml:lang="ru">Дегтерев Д. А., Рамич М. С., Пискунов Д. А. Подходы США и КНР к глобальному управлению киберпространством: «новая биполярность» в «сетевом обществе» // Вестник международных организаций. 2021. Т. 16, № 3. С. 7—33. https://doi.org/10.17323/1996-7845-2021-03-01</mixed-citation></citation-alternatives></ref><ref id="B7"><label>7.</label><citation-alternatives><mixed-citation xml:lang="en">Danilin, I. V. (2020a). The U.S. - China technology war: Risks and opportunities for P.R.C. and global tech sector. Comparative Politics Russia, 11(4), 160-176. (In Russian). https://doi.org/10.24411/2221-3279-2020-10056</mixed-citation><mixed-citation xml:lang="ru">Зиновьева Е. С. Киберсдерживание и цифровая дилемма безопасности в американском экспертном дискурсе // Международные процессы. 2019а. Т. 17, № 3. С. 51—65. https://doi.org/10.17994/IT.2019.17.3.58.4</mixed-citation></citation-alternatives></ref><ref id="B8"><label>8.</label><citation-alternatives><mixed-citation xml:lang="en">Danilin, I. V. (2020b). Conceptualizing American strategy in the technology war against China: Economy, geopolitics, techno-nationalism. Journal of International Analytics, 11(4), 21-38. (In Russian). https://doi.org/10.46272/2587-8476-2020-11-4-21-38</mixed-citation><mixed-citation xml:lang="ru">Зиновьева Е. С. Международное сотрудничество по обеспечению информационной безопасности: субъекты и тенденции эволюции: дис. … д-ра полит. наук: 23.00.04. Москва : МГИМО, 2019b.</mixed-citation></citation-alternatives></ref><ref id="B9"><label>9.</label><citation-alternatives><mixed-citation xml:lang="en">Davis, J. A., &amp; Lewis, C. (2019). Beyond the United Nations group of governmental experts: Norms of responsible nation-state behavior in cyberspace. The Cyber Defense Review, 161-168.</mixed-citation><mixed-citation xml:lang="ru">Манойло А. В. Информационный фактор цветных революций и современных технологий демонтажа политических режимов // Вестник МГИМО-Университета. 2014. № 6 (39). С. 61—67. https://doi.org/10.24833/2071-8160-2014-6-39-61-67</mixed-citation></citation-alternatives></ref><ref id="B10"><label>10.</label><citation-alternatives><mixed-citation xml:lang="en">Degterev, D. A. (2020). Assessment of the current international arrangement of forces and the formation of a multipolar world. Moscow: Ru-Science publ. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Международная информационная безопасность: новая геополитическая реальность / под ред. Е. С. Зиновьевой, М. Б. Алборовой. Москва : Аспект Пресс, 2021.</mixed-citation></citation-alternatives></ref><ref id="B11"><label>11.</label><citation-alternatives><mixed-citation xml:lang="en">Degterev, D. A., Nikulin, M. A., &amp; Ramich, M. S. (Eds.). (2021). Balance of powers in key regions: Conceptualization and applied analysis. Moscow: RUDN publ. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Международная информационная безопасность: теория и практика : в 3 т. Т. 1 / под общ. ред. А. В. Крутских. Москва : Аспект Пресс, 2019.</mixed-citation></citation-alternatives></ref><ref id="B12"><label>12.</label><citation-alternatives><mixed-citation xml:lang="en">Degterev, D. A., Ramich, M. S., &amp; Piskunov, D. A. (2021). U.S. - China approaches to global Internet governance: “New bipolarity” in terms of “the network society”. International Organisations Research Journal, 16(3), 7-33. https://doi.org/10.17323/1996-7845-2021-03-01</mixed-citation><mixed-citation xml:lang="ru">Понька Т. И., Рамич М. С., У Ю. Информационная политика и информационная безопасность КНР: развитие, подходы и реализация // Вестник Российского университета дружбы народов. Серия: Международные отношения. 2020. Т. 20, № 2. С. 382—394. https://doi.org/10.22363/2313-0660-2020-20-2-382-394</mixed-citation></citation-alternatives></ref><ref id="B13"><label>13.</label><citation-alternatives><mixed-citation xml:lang="en">Degterev, D. A., Ramich, M. S., &amp; Tsvyk, A. V. (2021). U.S. - China: “Power transition” and the outlines of “conflict bipolarity”. Vestnik RUDN. International Relations, 21(2), 210-231. https://doi.org/10.22363/2313-0660-2021-21-2-210-231</mixed-citation><mixed-citation xml:lang="ru">Buchanan B. The Cybersecurity Dilemma: Hacking, Trust and Fear between Nations. New York, NY : Oxford University Press, 2017.</mixed-citation></citation-alternatives></ref><ref id="B14"><label>14.</label><citation-alternatives><mixed-citation xml:lang="en">Deibert, R. J., &amp; Rohozinski, R. (2010). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15-32. https://doi.org/10.1111/j.1749-5687.2009.00088.x</mixed-citation><mixed-citation xml:lang="ru">Buzan B. People, States, and Fear: The National Security Problem in International Relations. Brighton : Wheatsheaf Books, 1983.</mixed-citation></citation-alternatives></ref><ref id="B15"><label>15.</label><citation-alternatives><mixed-citation xml:lang="en">Hansen, L., &amp; Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53(4), 1155-1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x</mixed-citation><mixed-citation xml:lang="ru">Buzan B., Hansen L. The Evolution of International Security Studies. Cambridge : Cambridge University Press, 2009.</mixed-citation></citation-alternatives></ref><ref id="B16"><label>16.</label><citation-alternatives><mixed-citation xml:lang="en">Hjalmarsson, O. (2013). The securitization of cyberspace. How the Web was won. Lund University Libraries, 1-28. Retrieved from http://lup.lub.lu.se/student-papers/record/3357990</mixed-citation><mixed-citation xml:lang="ru">Buzan B., Wæver O. Regions and Powers: The Structure of International Security. Cambridge : Cambridge University Press, 2003. https://doi.org/10.1017/CBO9780511491252</mixed-citation></citation-alternatives></ref><ref id="B17"><label>17.</label><citation-alternatives><mixed-citation xml:lang="en">Krutskikh, A. V. (Ed.). (2019). International information security: Theory and Practice (Volume 1). Moscow: Aspekt Press publ. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Castells M. Communication Power. Oxford : Oxford University Press, 2013.</mixed-citation></citation-alternatives></ref><ref id="B18"><label>18.</label><citation-alternatives><mixed-citation xml:lang="en">Levinson, N. S. (2021). Idea entrepreneurs: The United Nations open-ended working group &amp; cybersecurity. Telecommunications Policy, 45(6), 1-11. https://doi.org/10.1016/j.telpol.2021.102142</mixed-citation><mixed-citation xml:lang="ru">Castells M. Network Theory. A Network Theory of Power // International Journal of Communication. 2011. Vol. 5, no. 15. P. 773—787.</mixed-citation></citation-alternatives></ref><ref id="B19"><label>19.</label><citation-alternatives><mixed-citation xml:lang="en">Manoylo, A. V. (2014). Information factor color revolutions and modern technology of dismantling of political regimes. MGIMO Review of International Relations, (6), 61-67. (In Russian). https://doi.org/10.24833/2071-8160-2014-6-39-61-67</mixed-citation><mixed-citation xml:lang="ru">Davis J. A., Lewis C. Beyond the United Nations Group of Governmental Experts: Norms of Responsible Nation-State Behavior in Cyberspace // The Cyber Defense Review. 2019. P. 161—168.</mixed-citation></citation-alternatives></ref><ref id="B20"><label>20.</label><citation-alternatives><mixed-citation xml:lang="en">Maurer, T. (2018). Cyber mercenaries: The state, hackers, and power. Cambridge: Cambridge University Press. https://doi.org/10.1017/9781316422724</mixed-citation><mixed-citation xml:lang="ru">Deibert R. J., Rohozinski R. Risking Security: Policies and Paradoxes of Cyberspace Security // International Political Sociology. 2010. Vol. 4, no. 1. P. 15—32. https://doi.org/10.1111/j.1749-5687.2009.00088.x</mixed-citation></citation-alternatives></ref><ref id="B21"><label>21.</label><citation-alternatives><mixed-citation xml:lang="en">Mueller, M. L. (2020). Against sovereignty in cyberspace. International Studies Review, 22(4), 779-801. https://doi.org/10.1093/isr/viz044</mixed-citation><mixed-citation xml:lang="ru">Hansen L., Nissenbaum H. Digital Disaster, Cyber Security, and the Copenhagen School // International Studies Quarterly. 2009. Vol. 53, no. 4. P. 1155—1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x</mixed-citation></citation-alternatives></ref><ref id="B22"><label>22.</label><citation-alternatives><mixed-citation xml:lang="en">Nye, J. S. (2016). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44-71. https://doi.org/10.1162/ISEC_a_00266</mixed-citation><mixed-citation xml:lang="ru">Hjalmarsson O. The Securitization of Cyberspace. How the Web Was Won // Lund University Libraries. 2013. P. 1—28. URL: http://lup.lub.lu.se/student-papers/record/3357990  (accessed: 26.02.2022).</mixed-citation></citation-alternatives></ref><ref id="B23"><label>23.</label><citation-alternatives><mixed-citation xml:lang="en">Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly. 5(4), 18-38.</mixed-citation><mixed-citation xml:lang="ru">Levinson N. S. Idea Entrepreneurs: The United Nations Open-Ended Working Group &amp; Cybersecurity // Telecommunications Policy. 2021. Vol. 45, no. 6. P. 1—11. https://doi.org/10.1016/j.telpol.2021.102142</mixed-citation></citation-alternatives></ref><ref id="B24"><label>24.</label><citation-alternatives><mixed-citation xml:lang="en">Ponka, T. I., Ramich, M. S., &amp; Wu, Y. (2020). Information policy and information security of PRC: Development, approaches and implementation. Vestnik RUDN. International Relations, 20(2), 382-394. (In Russian). https://doi.org/10.22363/2313-0660-2020-20-2-382-394</mixed-citation><mixed-citation xml:lang="ru">Maurer T. Cyber Mercenaries: The State, Hackers, and Power. Cambridge : Cambridge University Press, 2018. https://doi.org/10.1017/9781316422724</mixed-citation></citation-alternatives></ref><ref id="B25"><label>25.</label><citation-alternatives><mixed-citation xml:lang="en">Rattray, G. J. (2009). An environmental approach to understanding cyberpower. In F. D. Kramer, S. H. Starr &amp; L. K. Wentz (Eds.), Cyberpower and national security (pp. 253-274). Washington, DC: National Defense University Press, Potomac Books.</mixed-citation><mixed-citation xml:lang="ru">Mueller M. L. Against Sovereignty in Cyberspace // International Studies Review. 2020. Vol. 22, no. 4. P. 779—801. https://doi.org/10.1093/isr/viz044</mixed-citation></citation-alternatives></ref><ref id="B26"><label>26.</label><citation-alternatives><mixed-citation xml:lang="en">Stevens, T. (2012). A cyberwar of ideas? Deterrence and norms in cyberspace. Contemporary Security Policy, 33(1), 148-170. https://doi.org/10.1080/13523260.2012.659597</mixed-citation><mixed-citation xml:lang="ru">Nye J. S. Deterrence and Dissuasion in Cyberspace // International Security. 2016. Vol. 41, no. 3. P. 44—71. https://doi.org/10.1162/ISEC_a_00266</mixed-citation></citation-alternatives></ref><ref id="B27"><label>27.</label><citation-alternatives><mixed-citation xml:lang="en">Williams, R. D. (2020). Beyond Huawei and TikTok: Untangling US concerns over Chinese tech companies and digital security. Working Paper for the Penn Project on the Future of U.S. - China Relations, 1-44. Retrieved from https://www.brookings.edu/wp-content/uploads/2020/10/FP_20201030_huawei_tiktok_williams.pdf</mixed-citation><mixed-citation xml:lang="ru">Nye J. S. Nuclear Lessons for Cyber Security? // Strategic Studies Quarterly. 2011. Vol. 5, no. 4. P. 18—38.</mixed-citation></citation-alternatives></ref><ref id="B28"><label>28.</label><citation-alternatives><mixed-citation xml:lang="en">Xingdong, F., &amp; Du, L. (2019). Zhongmei keji jingzhengde weilai qushiyanjiu - quanqiu keji chuangxin qudongxiade chanye youshi zhuanyi、chongtu yuzai pingheng. Renminluntan xueshuqianyan [Study on the future trends of Sino-U.S. technological competition - industrial advantage transfer, conflict and rebalancing driven by global technological innovation. People's Forum Academic Frontiers], 4(24), 46-59. (In Chinese). https://doi.org/10.16619/j.cnki.rmltxsqy.2019.24.004</mixed-citation><mixed-citation xml:lang="ru">Rattray G. J. An Environmental Approach to Understanding Cyberpower // Cyberpower and National Security / ed. by F. D. Kramer, S. H. Starr, L. K. Wentz. Washington, DC : National Defense University Press, Potomac Books, 2009. P. 253—274.</mixed-citation></citation-alternatives></ref><ref id="B29"><label>29.</label><citation-alternatives><mixed-citation xml:lang="en">Zhao, S. (2021). The US - China rivalry in the emerging bipolar world: Hostility, alignment, and power balance. Journal of Contemporary China, 31(134), 169-185. https://doi.org/10.1080/10670564.2021.1945733</mixed-citation><mixed-citation xml:lang="ru">Stevens T. A Cyberwar of Ideas? Deterrence and Norms in Cyberspace // Contemporary Security Policy. 2012. Vol. 33, no. 1. P. 148—170. https://doi.org/10.1080/13523260.2012.659597</mixed-citation></citation-alternatives></ref><ref id="B30"><label>30.</label><citation-alternatives><mixed-citation xml:lang="en">Zinovieva, E. S. (2019a). Concepts of cyberdeterrence and digital security dilemma in the US academic literature. International Trends, 17(3), 51-65. (In Russian). https://doi.org/10.17994/IT.2019.17.3.58.4</mixed-citation><mixed-citation xml:lang="ru">Williams R. D. Beyond Huawei and TikTok: Untangling US Concerns Over Chinese Tech Companies and Digital Security // Working Paper for the Penn Project on the Future of U.S. — China Relations. 2020. P. 1—44. URL: https://www.brookings.edu/wp-content/uploads/2020/10/FP_20201030_huawei_tiktok_williams.pdf  (accessed: 26.02.2022).</mixed-citation></citation-alternatives></ref><ref id="B31"><label>31.</label><citation-alternatives><mixed-citation xml:lang="en">Zinovieva, E. S. (2019b). International cooperation to ensure information security: subjects and trends of evolution [thesis]. Moscow: MGIMO publ. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Xingdong F., Du L. Zhongmei keji jingzhengde weilai qushiyanjiu — quanqiu keji chuangxin qudongxiade chanye youshi zhuanyi、chongtu yuzai pingheng // Renminluntan xueshuqianyan [Изучение будущих тенденций китайско-американской технологической конкуренции — интенсивность, конфликт и перебалансирование, обусловленные глобальными технологическими инновациями // Народный форум Академические границы]. 2019. Vol. 4, no 24. P. 46—59. (На китайском языке). https://doi.org/10.16619/j.cnki.rmltxsqy.2019.24.004</mixed-citation></citation-alternatives></ref><ref id="B32"><label>32.</label><citation-alternatives><mixed-citation xml:lang="en">Zinovieva, E. S., &amp; Alborova, M. B. (Eds.). (2021). International information security: A new geopolitical reality. Moscow: Aspekt Press publ. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Zhao S. The US — China Rivalry in the Emerging Bipolar World: Hostility, Alignment, and Power Balance // Journal of Contemporary China. 2021. Vol. 31, no. 134. P. 169—185. https://doi.org/10.1080/10670564.2021.1945733</mixed-citation></citation-alternatives></ref></ref-list></back></article>
