บทบาทของผู้ประกอบการเชิงปทัสถานของสหรัฐฯ ในการเผยแพร่ปทัสถานด้านความมั่นคงไซเบอร์ในเวทีระหว่างประเทศ

Main Article Content

ธนาวิทย์ หวังภุชเคนทร์
พงศ์พิสุทธิ์ บุษบารัตน์

บทคัดย่อ

บทความวิจัยชิ้นนี้ต้องการศึกษาแนวคิดเรื่องปทัสถานความมั่นคงไซเบอร์ซึ่งเป็นประเด็นถกเถียงในเวทีสากลมาตั้งแต่ปี ค.ศ. 1998 ทั้งนี้ ผู้เขียนมุ่งพิจารณาการเผยแพร่ปทัสถานแบบตะวันตกซึ่งสหรัฐฯ เป็นแกนกลางในการผลักดันผ่านการดำเนินการและยุทธศาสตร์ของตัวแสดงต่างๆ ของตนไม่ว่าจะเป็นรัฐบาล ผู้เชี่ยวชาญ และภาคเอกชน ซึ่งถือว่าเป็นผู้ประกอบการเชิงปทัสถานที่ทำการเผยแพร่ปทัสถานไซเบอร์นี้ อย่างไรก็ตาม แม้ว่าผู้ประกอบการเชิงปทัสถานเหล่านี้จะพยายามอย่างต่อเนื่องในการโน้มน้าวประเทศต่างๆ แต่ยังประสบอุปสรรคค่อนข้างมาก เห็นได้จากการถกเถียงอย่างต่อเนื่องในการประชุมสมัชชาใหญ่ของสหประชาชาติในวาระความมั่นคงด้านเทคโนโลยีสารสนเทศและการสื่อสาร ผลการศึกษาชี้ให้เห็นถึงความท้าทายที่มักเกิดขึ้นจากการเผยแพร่ปทัสถานแบบตะวันตกในด้านการตีความปทัสถานโดยเฉพาะในประเด็นที่ว่า พื้นที่ไซเบอร์ควรเป็นอิสระหรือควรถูกควบคุมโดยรัฐ อันจะนำไปสู่แนวทางในการปฏิบัติภายในประเทศที่ต่างกัน นอกจากนี้ การแข่งขันระหว่างมหาอำนาจในช่วงทศวรรษที่ผ่านมาเป็นปัจจัยที่สำคัญเช่นกัน โดยเฉพาะรัสเซียและจีนในห้วงที่ผ่านมาที่ต่อต้านและท้าทายการยอมรับปทัสถานที่ชี้นำโดยสหรัฐฯ มากขึ้น ทั้งยังเสนอทางเลือกในการตีความและตัวแบบของปทัสถานในด้านนี้เพื่อสร้างกรอบข้อถกเถียงในเวทีระหว่างประเทศต่อไป

Downloads

Download data is not yet available.

Article Details

รูปแบบการอ้างอิง
หวังภุชเคนทร์ ธ. ., & บุษบารัตน์ พ. . (2024). บทบาทของผู้ประกอบการเชิงปทัสถานของสหรัฐฯ ในการเผยแพร่ปทัสถานด้านความมั่นคงไซเบอร์ในเวทีระหว่างประเทศ. วารสารรัฐศาสตร์และรัฐประศาสนศาสตร์, 15(1), 281–318. สืบค้น จาก https://so05.tci-thaijo.org/index.php/polscicmujournal/article/view/264019
ประเภทบทความ
บทความวิชาการ

เอกสารอ้างอิง

Acharya, A. (2004). How Ideas Spread: Whose Norms Matter? Norm Localization and Institutional Change in Asian Regionalism. International Organization, 58(2), 239-275.

Adler, E. (1997). Seizing the Middle Ground: Constructivism in World Politics. European Journal of International Relations, 3(3), 319-363.

Arora, P. (2019). Politics of Algorithms, Indian Citizenship, and the Colonial Legacy. In Punathambekar, A., & Mohan, S. (Eds.). Global Digital Cultures: Perspectives from South Asia (pp. 37–52). N.P.: University of Michigan Press.

Arquilla, J., & Ronfeldt, D. (Eds.). (1997). In Athena's Camp: Preparing for Conflict in the Information Age. Santa Monica: Rand Corporation.

Axelrod, R. (1997). The Complexity of Cooperation: Agent-Based Models of Competition and Collaboration. Princeton: Princeton University Press.

Badescu, C. G. (2011). Humanitarian Intervention and the Responsibility to Protect: Security and Human Rights. New York: Routledge.

Braithwaite, J. (1994). A Sociology of Modelling and the Politics of Empowerment. British Journal of Sociology, 45(3), 445-479.

Cai, C. (2018). Global Cyber Governance: China's Contribution and Approach. China Quarterly of International Strategic Studies, 4(1), 55-76.

Cybersecurity Tech Accord. (2023). Signatories. Retrieved June 4, 2023, from https://cybertechaccord.org/signatories/

Deitelhoff, N., & Wolf, K. (2013). Business and Human Rights: How Corporate Norm Violators Become Norm Entrepreneurs. In Risse, T., Sikkink, K., & Ropp, C. S. (Eds.). The Persistent Power of Human Rights: From Commitment to Compliance (pp. 222-238). Cambridge: Cambridge University Press.

Deitelhoff, N., & Zimmermann, L. (2019). Norms Under Challenge: Unpacking the Dynamics of Norm Robustness. Journal of Global Security Studies, 4(1), 2-17.

DeNardis, L. (2012). Hidden Levers of Internet Control: An Infrastructure-Based Theory of Internet Governance. Information, Communication & Society, 15(5), 720-738.

Finnemore, M. (2017). Cybersecurity and the Concept of Norms. Retrieved February 4, 2023, from https://carnegieendowment.org/2017/11/30/cybersecurity-and-concept-of-norms-pub-74870

Finnemore, M., & Sikkink, K. (1998). International Norm Dynamics and Political Change. International Organization, 50(4), 887-918.

Gleckman, H. (2018). Multistakeholder Governance and Democracy: A Global Challenge. New York: Routledge.

Gold, J. (2021). Unexpectedly, All UN Countries Agreed on a Cybersecurity Report. So What?. Retrieved February 4, 2023, from https://www.cfr.org/blog/unexpectedly-all-un-countries-agreed-cybersecurity-report-so-what

Greenwood, F. (2020). Data Colonialism, Surveillance Capitalism and Drones. In Specht, D. (Ed.). Mapping Crisis: Participation, Datafication and Humanitarianism in the Age of Digital Mapping (pp. 89–118). University of London Press.

Hobbs, C. (Ed.). (2020). Europe’s Digital Sovereignty: From Rulemaker to Superpower in the Age of US-China Rivalry. N.P.: European Council on Foreign Relations.

Hoffmann, M. (2003). Entrepreneurs and Norm Dynamics: An Agent-based Model of the Norm Life Cycle. Retrieved February 4, 2023, from http://www.polisci.upenn.edu/ps-i/Pamla/Hoffmann_norms.doc

Hurel, L. M., & Lobato, C. L. (2018). Unpacking Cyber Norms: Private Companies as Norm Entrepreneurs. Journal of Cyber Policy, 3(1), 61-76.

International Committee of the Red Cross. (1949). Geneva Convention Relative to the Protection of Civilian Persons in Time of War (Fourth Geneva Convention), 12 August 1949, 75 UNTS 287. Retrieved February 4, 2023, from https://www.refworld.org/docid/3ae6b36d2.html

Internet Engineering Task Force. (2023). Mission and Principles. Retrieved February 4, 2023, from https://www.ietf.org/about/introduction/

Jiayi, L. (2021). The Qualities and Strengths of Consultative Democracy Practiced Through the Chinese People’s Political Consultative Conference. Retrieved February 4, 2023, from http://en.qstheory.cn/2022-01/18/c_699097.htm

Katzenstein, P. (Ed.). (1996). The Culture of National Security: Norms and Identity in World Politics. New York: Columbia University Press.

Khalil, L. (2020). Digital Authoritarianism, China and COVID. (Research report). N.P.: Lowy Institute for International Policy.

Kolton, M. (2017). Interpreting China’s Pursuit of Cyber Sovereignty and its Views on Cyber Deterrence. The Cyber Defense Review, 2(1), 119–154.

Kratochwil, F. (1989). Rules, Norms, and Decisions. Cambridge: Cambridge University Press.

Li, Y. (2019). Global Cyberspace Governance: State Actors and the China-US Cyber Relationship. Contemporary International Relations, 29(2), 105-124.

Lotrionte, C. (2018). Reconsidering the Consequences for State-Sponsored Hostile Cyber Operations under International Law. The Cyber Defense Review, 3(2), 73-114.

Lu, W. (2014). Cyber Sovereignty Must Rule Global Internet. Retrieved February 4, 2023, from https://www.huffpost.com/entry/china-cyber-sovereignty_b_6324060

Margaret, K., & Sikkink, K. (1998). Activists Beyond Borders: Transnational Advocacy Networks in International Politics. Ithaca: Cornell University Press.

Mueller, M. (2009). Ruling the Root: Internet Governance and the Taming of Cyberspace. Cambridge, MA: MIT Press.

Mueller, M., Mathiason, J., & Klein, H. (2007). The Internet and Global Governance: Principles and Norms for a New Regime. Global Governance: A Review of Multilateralism and International Organizations, 13(2), 237-254.

O’Connell, E. M., & Arimatsu, L. (2012). Cyber Security and International Law. Retrieved February 4, 2023, from https://www.chathamhouse.org/sites/default/files/public/Research/International%20Law/290512summary.pdf

Ostrom, E. (2000). Collective Action and the Evolution of Social Norms. Journal of Economic Perspectives, 14(3), 137-158.

Risse, T., Ropp, S., & Sikkink, K. (Eds.). (1999). The Power of Human Rights: International Norms and Domestic Change. Cambridge: Cambridge University Press.

Rodriguez, M. (2017). Declaration by the Representative of Cuba at the Final Session of the Group of Governmental Experts. Retrieved February 4, 2023, from https://www.justsecurity.org/wp-content/uploads/2017/06/Cuban-Expert-Declaration.pdf

Schmitt, N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge, UK: Cambridge University Press.

Schmitt, N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Warfare. Cambridge, UK: Cambridge University Press.

Sherman, J. (2021). Digital Authoritarianism and Implications for US National Security. The Cyber Defense Review, 6(1), 107-118.

Smith, B. (2017). The Need for a Digital Geneva Convention. Retrieved June 4, 2023, from https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/

Streinz, T. (2021). RCEP's Contribution to Global Data Governance. Retrieved February 4, 2023, from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3826217

Sukumar, A. M. (2017). The UN GGE Failed. Is International Law in Cyberspace Doomed as Well?. Retrieved February 4, 2023, from https://www.lawfareblog.com/un-gge-failed-international-law-cyberspace-doomed-well

United Nations General Assembly. (1998). Report of the 1st Committee: Role of Science and Technology in the Context of International Security, Disarmament and Other Related Fields. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/264457?ln=en

United Nations General Assembly. (1999). Report of the 1st Committee: General Assembly, 54th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/351558?ln=en&v=pdf

United Nations General Assembly. (2000). Report of the 1st Committee: General Assembly, 55th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/427170?ln=en&v=pdf

United Nations General Assembly. (2001). Report of the 1st Committee: General Assembly, 56th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/452991?ln=en&v=pdf

United Nations General Assembly. (2002). Report of the 1st Committee: General Assembly, 57th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/478670?ln=en&v=pdf

United Nations General Assembly. (2003). Report of the 1st Committee: General Assembly, 58th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/506848?ln=en&v=pdf

United Nations General Assembly. (2004). Report of the 1st Committee: General Assembly, 59th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/535822/files/A_59_454-EN.pdf

United Nations General Assembly. (2005). Report of the 1st Committee: General Assembly, 60th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/561130?ln=en&v=pdf

United Nations General Assembly. (2006). Report of the 1st Committee: General Assembly, 61st session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/587060?ln=en&v=pdf

United Nations General Assembly. (2007). Report of the 1st Committee: General Assembly, 62nd session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/612351?ln=en&v=pdf

United Nations General Assembly. (2008). Report of the 1st Committee: General Assembly, 63rd session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/641397?ln=en&v=pdf

United Nations General Assembly. (2009). Report of the 1st Committee: General Assembly, 64th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/671471?ln=en&v=pdf

United Nations General Assembly. (2010). Report of the 1st Committee: General Assembly, 65th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/693819?ln=en&v=pdf

United Nations General Assembly. (2011). Report of the 1st Committee: General Assembly, 66th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/715997?ln=en&v=pdf

United Nations General Assembly. (2012). Report of the 1st Committee: General Assembly, 67th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/738631?ln=en&v=pdf

United Nations General Assembly. (2013). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 4, 2023, from https://digitallibrary.un.org/record/753055

United Nations General Assembly. (2014). Report of the 1st Committee: General Assembly, 69th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/782912?ln=en&v=pdf

United Nations General Assembly. (2015). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 4, 2023, from https://digitallibrary.un.org/record/799853

United Nations General Assembly. (2016). Report of the 1st Committee: General Assembly, 71st session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/848219?ln=en&v=pdf

United Nations General Assembly. (2018a), Report of the 1st Committee: General Assembly, 73rd session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 4, 2023, from https://digitallibrary.un.org/record/1654007?ln=en

United Nations General Assembly. (2018b). UN Resolution 73/27. Retrieved February 4, 2023, from https://undocs.org/en/A/RES/73/27

United Nations General Assembly. (2019). Report of the 1st Committee: General Assembly, 74th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/3836338?ln=en&v=pdf

United Nations General Assembly. (2020), Report of the General Assembly, Advancing Responsible State Behavior in Cyberspace in the Context of International Security. Retrieved February 17, 2023, from https://digitallibrary.un.org/record/3893847?ln=en

United Nations General Assembly. (2021). Report of the 1st Committee: General Assembly, 76th session, Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved February 23, 2023, from https://digitallibrary.un.org/record/3948700?ln=en&v=pdf

United Nations General Assembly. (2022), Report of the General Assembly, Programme of Action to Advance Responsible State Behaviour in the Use of Information and Communications Technologies in the Context of International Security. Retrieved February 17, 2023, from https://digitallibrary.un.org/record/3996919?ln=en

United Nations. (2024). Charter of the United Nations. Retrieved March 5, 2024, from https://www.un.org/en/sections/un-charter/un-charter-full-text

Yau, H. (2019). An Assessment of Cyberpower Within the Triangular Relations of Taiwan-Us-China and Its Implications. International Journal of Taiwan Studies, 2(2), 264-291.

Yeli, H. (2017). A Three-Perspective Theory of Cyber Sovereignty. PRISM, 7(2), 108-115.