Startseite Constructing cybersecurity discourse via deconstructing legislation
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Constructing cybersecurity discourse via deconstructing legislation

  • Le Cheng

    Le Cheng is Chair Professor of Law, Professor of Cyber Studies and Professor of Legal Discourse and Translation at Zhejiang University. He serves as the Executive Vice Dean of Zhejiang University’s Academy of International Strategy and Law, Acting Head of International Institute of Cyberspace Governance, Editor-in-Chief of International Journal of Legal Discourse, Editor-in-Chief of International Journal of Digital Law and Governance, Co-Editor of Comparative Legilinguistics (International Journal for Legal Communication), former Co-Editor of Social Semiotics, and editorial member of Semiotica, Pragmatics & Society, and International Journal for the Semiotics of Law. As a highly-cited scholar, he has published widely in the areas of international law, digital law and governance, cyber law, semiotics, discourse studies, terminology, and legal discourse and translation.

    ORCID logo
    , Jiaxuan Qiu

    Jiaxuan Qiu is research fellow at Zhejiang University. Her research interests include legal discourse, cybersecurity laws, gender studies, and global governance.

    ORCID logo EMAIL logo
    und Yi Yang

    Yi Yang is a research fellow at New York University. Her research interests include in legal discourse, law and literature, and modern education.

    ORCID logo
Veröffentlicht/Copyright: 15. November 2023
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

Based on a self-built corpus of Chinese cybersecurity legislation, this study explores the construction of China’s official cybersecurity discourse via deconstructing cybersecurity legislation from the perspective of system theory. Analysis focusing on the internal features of the discourse obtains the themes, actors, and legal relations in China’s cybersecurity legislation. Among four pairs of legal relations, system theory provides an explanation for the tension between public-private legal relationship and private-private legal relationship, that is, whether the legislative system chooses to delegate network operators with administrative function depends on how the system perceives the nature of cybersecurity issues and integrate new issues into securitization process. Furthermore, the external features of legislation discourse reveal the changes in the number of all levels of cybersecurity legislation. It is found that the coupling resonance of the political system and the legal system promotes the development of relevant legislation, and facilitates the self-development legislation system to transfer from diversified legislation to unified legislation.


Corresponding author: Jiaxuan Qiu, Guanghua Law School, Zhejiang University, Zhejiang, China, E-mail:

About the authors

Le Cheng

Le Cheng is Chair Professor of Law, Professor of Cyber Studies and Professor of Legal Discourse and Translation at Zhejiang University. He serves as the Executive Vice Dean of Zhejiang University’s Academy of International Strategy and Law, Acting Head of International Institute of Cyberspace Governance, Editor-in-Chief of International Journal of Legal Discourse, Editor-in-Chief of International Journal of Digital Law and Governance, Co-Editor of Comparative Legilinguistics (International Journal for Legal Communication), former Co-Editor of Social Semiotics, and editorial member of Semiotica, Pragmatics & Society, and International Journal for the Semiotics of Law. As a highly-cited scholar, he has published widely in the areas of international law, digital law and governance, cyber law, semiotics, discourse studies, terminology, and legal discourse and translation.

Jiaxuan Qiu

Jiaxuan Qiu is research fellow at Zhejiang University. Her research interests include legal discourse, cybersecurity laws, gender studies, and global governance.

Yi Yang

Yi Yang is a research fellow at New York University. Her research interests include in legal discourse, law and literature, and modern education.

References

Burdette, David A. 1999. Unified insolvency legislation in South Africa: Obstacles in the path of the unification process. De Jure 32. 44.Suche in Google Scholar

Buzan, Barry, Ole Wæver & Jaap de Wilde. 1998. Security: A new framework for analysis. Boulder: Lynne Rienner Publishers.10.1515/9781685853808Suche in Google Scholar

Canongia, Claudia & Raphael Mandarino. 2012. Cybersecurity: The new challenge of the information society. In Maria Manuela Cruz-Cunha, Patricia Gonçalves, Nuno Lopes, Eva Maria Miranda & Goran D. Putnik (eds.), Handbook of research on business social networking: Organizational, managerial, and technological dimensions, 165–184. Hershey: IGI Global.10.4018/978-1-61350-168-9.ch009Suche in Google Scholar

Chen, Yunsheng. 2021. Reflections on the systematic theory of constitutional law in China. Chinese Journal of Law 43(2). 19–34.Suche in Google Scholar

Cheng, Le, Jiamin Pei & Marcel Danesi. 2019. A sociosemiotic interpretation of cybersecurity in U.S. legislative discourse. Social Semiotics 29(3). 286–302. https://doi.org/10.1080/10350330.2019.1587843.Suche in Google Scholar

Cheng, Le & Xiuli Liu. 2022. Exploring Chinese cyber discourse: Integrating political and legal perspectives. International Journal of Legal Discourse 7(1). 33–52. https://doi.org/10.1515/ijld-2022-2063.Suche in Google Scholar

Cheng, Le, Yuxin Liu & Yun Zhao. 2021. Exploring the U.S. Institutional discourse about critical information infrastructure protection (CIIP): A corpus-based analysis. International Journal of Legal Discourse 6(2). 323–347. https://doi.org/10.1515/ijld-2021-2058.Suche in Google Scholar

Cheung, Tai Ming. 2018. The rise of China as a cybersecurity industrial power: Balancing national security, geopolitical, and development priorities. Journal of Cyber Policy 3(3). 306–326. https://doi.org/10.1080/23738871.2018.1556720.Suche in Google Scholar

Dunn Cavelty, Myriam. 2013. From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review 15(1). 105–122. https://doi.org/10.1111/misr.12023.Suche in Google Scholar

Erk, Katrin. 2012. Vector space models of word meaning and phrase meaning: A survey. Language and Linguistics Compass 6(10). 635–653. https://doi.org/10.1002/lnco.362.Suche in Google Scholar

Fu, Zitang & Shangen Zhang. 2016. Rule of law construction and assessment at the local level. Social Sciences in China 37(1). 93–112. https://doi.org/10.1080/02529203.2015.1133487.Suche in Google Scholar

Gries, Stefan Th. 2020. Corpus linguistics and the law: Extending the field from a statistical perspective. Brooklyn Law Review 86. 321.Suche in Google Scholar

Gu, Jianya. 2006. New views on standard of the legal hierarchy. Journal of Zhejiang University 20(6). 42–50.Suche in Google Scholar

Hu, Xuejun. 2021. Research on the impact of dynamic system theory under civil code upon traditional judging methods in civil litigation. Law Science 66(10). 140–153.Suche in Google Scholar

Jelić, Zoran I. 1998. A note on Adolf Merkl’s theory of administrative law: On the occasion of the 70th anniversary of the publication of Merkl’s General administrative law. Facta Universitatis – Series: Law and Politics 1(2). 147–155.Suche in Google Scholar

Ji, Weidong & Haibin Qi. 1987. 系统论方法在法学研究中的应用及其局限——兼论法学方法论问题 [The Application and Limitations of Systems Theory Method in Legal Research——also Discussing Legal Methodology Issues]. Social Sciences in China 8(1). 167–180.Suche in Google Scholar

Kemmerer, Richard A. 2003. Cybersecurity. 25th International Conference on Software Engineering, 2003. Proceedings, 705–715. New York: IEEE.10.1109/ICSE.2003.1201257Suche in Google Scholar

Klimburg, Alexander. 2018. The darkening web: The war for cyberspace. London: Penguin.Suche in Google Scholar

Lawson, Sean. 2012. Putting the “War” in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States. Chicago: First Monday.10.5210/fm.v17i7.3848Suche in Google Scholar

Lessig, Lawrence. 2009. Code: And other laws of cyberspace. Sydney: ReadHowYouWant.Suche in Google Scholar

Li, Zheng. 2022. Joint investigation of transnational crimes based on Luhmann’s system theory of law. Journal of Public Security Science 5(1). 82–106+124.Suche in Google Scholar

Luhmann, Niklas. 1995. Social systems. Redwood City: Stanford University Press.Suche in Google Scholar

Luhmann, Niklas & Kastner Fatima. 2004. Law as a social system. Oxford: Oxford University Press on Demand.Suche in Google Scholar

Lyu, Zi. 2022. The evolution and evaluation of UK cyber security strategy. Journal of Intelligence 41(06). 37–44+71.Suche in Google Scholar

Miao, Weishan, Hongjun Zhu & Zhangmin Chen. 2018. Who’s in charge of regulating the internet in China: The history and evolution of China’s internet regulatory agencies. China Media Research 14(3). 1–7.Suche in Google Scholar

Miao, Weishan, Jian Xu & Hongjun Zhu. 2019. From technological issue to military-diplomatic affairs: Analysis of China’s official cybersecurity discourse (1994–2016). https://doi.org/10.1007/978-94-024-1202-4_61-1.Suche in Google Scholar

Nobles, R. & D. Schiff. 2012. Observing law through systems theory. London: Bloomsbury Publishing.Suche in Google Scholar

Parsons, Talcott & Edward A. Shils. 2001. The social system. Toward a general theory of action. London: Routledge.Suche in Google Scholar

Qi, Ming. 2012. The analysis of Chinese food safety issues: Legislations and governmental supervision. Chinese Law & Government 45(1). 3–9. https://doi.org/10.2753/clg0009-4609450100.Suche in Google Scholar

Qian, Xuesen. 1979. Vigorously develop systems engineering and establish a system of systematic science as soon as possible. Beijing: Guangming Daily.Suche in Google Scholar

Sampford, Charles J. G. 1989. The disorder of law: A critique of legal theory. https://philpapers.org/rec/SAMTDO-3 (accessed 20 October 2023).Suche in Google Scholar

Solan, Lawrence M. & Tammy Gales. 2016. Finding ordinary meaning in law: The judge, the dictionary or the corpus? International Journal of Legal Discourse 1(2). 253–276. https://doi.org/10.1515/ijld-2016-0016.Suche in Google Scholar

Stevenson, Charles Leslie. 1938. Persuasive definitions. Mind 47(187). 331–350. https://doi.org/10.1093/mind/xlvii.187.331.Suche in Google Scholar

Sun, Yuxiu & Cheng Le. 2017. Linguistic variation and legal representation in legislative discourse: A corpus-based multi-dimensional study. International Journal of Legal Discourse 2(2). 315–339. https://doi.org/10.1515/ijld-2017-0017.Suche in Google Scholar

Van Dijk, Teun Adrianus. 1997. Discourse as social interaction, 2. New York: Sage.Suche in Google Scholar

Ventre, Daniel. 2014. Discourse regarding China: Cyberspace and cybersecurity. In Daniel Ventre (ed.), Chinese cybersecurity and cyberdefense, 199–282. Hoboken, NJ, USA: John Wiley & Sons.10.1002/9781119009009.ch8Suche in Google Scholar

Von Bertalanffy, Ludwig. 1973. The meaning of general system theory. General system theory: Foundations, development, applications. George Braziller Inc 30. 53.Suche in Google Scholar

Wang, Shoudu. 2021. The construction of security narrative of U.S. Cyberspace security: A discourse analysis of U.S. National Security Strategy (1987–2017). Journal of Intelligence 40(3). 104–111+38.Suche in Google Scholar

Warner, Michael. 2012. Cybersecurity: A pre-history. Intelligence and National Security 27(5). 781–799. https://doi.org/10.1080/02684527.2012.708530.Suche in Google Scholar

Weiss, Moritz & Vytautas Jankauskas. 2019. Securing cyberspace: How states design governance arrangements. Governance 32(2). 259–275. https://doi.org/10.1111/gove.12368.Suche in Google Scholar

Wiener, Norbert. 1988. The human use of human beings: Cybernetics and society, 320. Boston: Da Capo Press.Suche in Google Scholar

Xiong, Jining. 2011. Systems engineering of legal institution/rule of law and social engineering. Systems Engineering – Theory & Practice 31(1). 187–194.Suche in Google Scholar

Yang, Cui. 2022. The coupling of political and legal structures in Local Government Cooperation in China–an analysis from the perspective of social system theory. Journal of Southwest Petroleum 24(4). 96–103. University(Social Sciences Edition)Suche in Google Scholar

Zhang, Zhixun. 2015. Legal governance of food safety issues in a perspective of system theory. Legal Forum 30(1). 99–105.Suche in Google Scholar

Zhang, Yan. 2021. The dual foundation of cybersecurity legislation. Social Sciences in China 42(10). 83–104+205–206.Suche in Google Scholar

Received: 2023-01-19
Accepted: 2023-09-10
Published Online: 2023-11-15
Published in Print: 2023-12-15

© 2023 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 6.11.2025 von https://www.degruyterbrill.com/document/doi/10.1515/ijld-2023-2014/html
Button zum nach oben scrollen