
Comparative Legal Perspectives on Cyberspace Security Governance: A Review of Frameworks and Implication
DOI:
https://doi.org/10.30564/jcsr.v7i1.8555Abstract
This review critically examines Li Zhi’s Legal Comparisons and Implications of Cyberspace Security Governance, situating it within ongoing scholarly debates on international law, comparative jurisprudence, and the multidimensional challenges of global cybersecurity. By providing a nuanced textual and comparative analysis of major legal frameworks—ranging from the Tallinn Manual 2.0 to national statutes in the United States, the European Union, and Asia—Li’s work contributes significantly to clarifying conceptual boundaries between network security and cyberspace security. Drawing on authoritative comparative law studies and incorporating insights from multi-stakeholder governance research, this review highlights the book’s core theoretical contributions, its critical appraisal of divergent international governance models, and the practical implications of its policy recommendations. Although the volume effectively outlines current governance challenges and norms, it also opens new avenues for future inquiry into rapidly evolving technologies and their legal ramifications. In doing so, this review not only underscores Li’s methodological rigor and integrative approach but also encourages further scholarship to refine and adapt the global legal order for a more secure and equitable cyberspace.
Keywords:
Cyberspace Security; International Law; Comparative Legal Analysis; Multi-Stakeholder Governance; Cross-Jurisdictional CooperationReferences
[1] Nye, J.S., 2010. Cyber power, 1–24. Harvard Kennedy School, Belfer Center for Science and International Affairs: Cambridge, UK.
[2] Finnemore, M., Hollis, D.B., 2016. Constructing norms for global cybersecurity. American Journal of International Law. 110(3), 425–479.
[3] Deibert, R.J., 2013. Black code: Inside the battle for cyberspace. Signal.
[4] Shackelford, S.J., 2014. Managing cyber attacks in international law, business, and relations: In search of cyber peace. Cambridge University Press: Cambridge, UK.
[5] Creemers, R., 2023. Cybersecurity law and regulation in China: Securing the smart state. China Law and Society Review. 6(2), 111–145.
[6] Kello, L., 2017. The virtual weapon and international order. Yale University Press: London, UK.
[7] Schmitt, M.N. (Ed.), 2017. Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press: Cambridge, UK.
[8] Hathaway, O.A., Crootof, R., Levitz, P., et al., 2012. The law of cyber-attack. Calif. L. Rev. 100, 817.
[9] Roscini, M., 2014. Cyber operations and the use of force in international law. Oxford University Press: Oxford, UK.
[10] Samuel, G., 2014. An introduction to comparative law theory and method. Bloomsbury Publishing: London, UK.
[11] Hoecke, M.V., 2011. Methodologies of legal research. Which kind of method for what kind of discipline.
[12] Cane, P., Kritzer, H. (Eds.), 2012. The Oxford handbook of empirical legal research. OUP: Oxford, UK.
[13] Shuster, M., 2024. Critical theory: The basics. Routledge: London, UK.
Downloads
How to Cite
Issue
Article Type
License
Copyright © 2025 Author(s)

This is an open access article under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License.