Welcome to Francis Academic Press

Academic Journal of Humanities & Social Sciences, 2024, 7(11); doi: 10.25236/AJHSS.2024.071114.

Research on the Legal Liability Distribution Mechanism of Cybersecurity under the Endogenous Security Concept of 6G Networks

Author(s)

Jiazheng Lv

Corresponding Author:
Jiazheng Lv
Affiliation(s)

Southwest University of Political Science and Law, Chongqing, 400000, China

Abstract

This paper examines the restructuring of cybersecurity legal liability distribution mechanisms under the 6G endogenous security concept. It begins by analyzing the conceptual characteristics of 6G endogenous security and its challenges to traditional cybersecurity legal liability systems, highlighting the necessity for restructuring liability distribution mechanisms. Subsequently, it elaborates on the current cybersecurity legal liability distribution mechanism and its limitations in the 6G era. Building upon this foundation, the paper proposes four aspects of restructuring the cybersecurity legal liability distribution mechanism under the 6G endogenous security concept: diversified repositioning of liability subjects, dynamic division and coordination of liability scope, technologically intelligent liability determination standards, and innovative improvement of accountability mechanisms. Furthermore, the paper presents three legal countermeasures to ensure the effective implementation of 6G endogenous security liability distribution mechanism: improving legislation to establish a legal framework adapted to the 6G era, strengthening supervision to implement efficient technical support and monitoring mechanisms, and fostering innovation to facilitate a multi-party collaborative security ecosystem. These measures collectively aim to enhance the regulatory framework governing cybersecurity liability in the emerging 6G network environment.

Keywords

6G Networks, Endogenous Security, Legal Liability, Distribution Mechanism, Liability Restructuring

Cite This Paper

Jiazheng Lv. Research on the Legal Liability Distribution Mechanism of Cybersecurity under the Endogenous Security Concept of 6G Networks. Academic Journal of Humanities & Social Sciences (2024) Vol. 7, Issue 11: 92-97. https://doi.org/10.25236/AJHSS.2024.071114.

References

[1] Liao Jianxin, Qi Qi, Wang Jingyu et al., 6G Intelligent Service Networking: Vision, Architecture, and Key Technologies. Sci Sin Inform, 2024, 54(5): 991-1024.

[2] Global 6G Technology Conference, White Paper on 6G Network Endogenous Security Architecture and Technology (March 9, 2023).

[3] Liu Guangyi, Zhang Huimin, Tong Zhou, et al. 6G Mobile Information Network Architecture: Transition from Communication to Everything as a Service [J]. Science China Information Sciences, 2024, 54(5): 1236-1266.

[4] Kazmi, S.H.A.; Hassan, R.; Qamar, F.; Nisar, K.; Ibrahim, A.A.A. Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions. Symmetry 2023, 15, 1147.

[5] Chen Bing. The Legal Dimensions and Development of China's High-Quality Digital Economy Development [J]. Journal of Shanghai University of Political Science and Law (Series on Rule of Law), 2024, 39(05): 72-94.

[6] Guo Chunzhen, Huang Yaopeng. Dual Asymmetric Cooperation: Operation and Optimization of Platform Content Governance Subject Responsibility [J]. Zhejiang Acad. J., 2024, 5: 78-92.

[7] Wang Siyuan. On Network Operators' Security Assurance Obligations [J]. Contemporary Law Review, 2017, 1: 101-115.

[8] Wu Weiming. Measures for Cybersecurity Review and the Construction of 'New Cybersecurity Concept' [J]. Information Security and Communication Privacy, 2020, 6: 25-35.

[9] Li Xinglin & Zhang Huimin. Constructing a Multi-subject Co-governance Model for Cybersecurity Prevention and Control [J]. Journal of Guangxi Police College, 2020, 2: 55-70.

[10] Guo Jing. Attribution of Responsibility Based on Human-Machine Joint Actors [J]. Studies in Dialectics of Nature, 2020, 36(11): 88-98.

[11] Weng Jie. On the Legal Definition of Network Service Providers in China [J]. Journal of Xinjiang Education Institute, 2017, 3: 122-135.

[12] Hong Yanqing, 'Management-Based Regulation' - Reconstruction of Network Operators' Security Protection Obligations Glob. L. Rev., vol. 4, 2016, 145-160.

[13] Wan Ke. Research on Legal Protection of Personal Information in the Context of Cybersecurity [D]. Southwestern University of Finance and Economics, 2020.

[14] Letaief, Khaled Ben et al., The Roadmap to 6G - AI Empowered Wireless Networks, ArXiv 1, 2019:1-20 

[15] V.-L. Nguyen, P.-C. Lin, B.-C. Cheng, R.-H. Hwang & Y.-D. Lin, Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges, IEEE Communications Surveys & Tutorials 201, 2021: 201-230

[16] Guo Chunxia. Product Safety Regulatory Game Based on Responsibility Chain [J]. China Securities & Futures, 2011, 6(6): 66-75.

[17] Chen Jidong. Legal Construction of Smart Contracts [J]. Oriental Law, 2019, 3: 112-125.

[18] Tang Yanjun & Xiao Changchun. Blockchain Assists Network Anti-corruption: A Technology-System Synergy Perspective [J]. Theory Herald, 2020, 10: 89-100.

[19] Zhang Baowen, Xu Xinhong, Kong Guodong, et al. Research on Credit Security Assessment System for Cyberspace Subjects [C]. Proceedings of the Third National Information Security Classification Protection Technology Conference, 2014: 156-170.

[20] Li Jia. On the Construction of Collaborative Protection Mechanism between Legal Norms and Technical Norms for Information Security [J]. Academic Exchange, 2014, 11: 78-90.

[21] Chen Tianying & Chen Jianfeng. Intelligent Big Data Security Supervision and System Implementation [J]. Communications of the ACM, 2017, 2: 45-55.

[22] Geng Tongtong. Establishing National Network Security Innovation Fund to Promote Leapfrog Development of Network Security Industry [J]. China Info. Security, 2016, (3): 34-45.

[23] Ji Xinsheng, Wu Jiangxing, Jin Liang, et al. Discussion on a new paradigm of endogenous security towards 6G networks [J]. Frontiers of Information Technology & Electronic Engineering, 2022, 23(10): 1421-1450.

[24] Hu Zhenhua, Liu Jingyue & Zhou Kongning. Research on Public-Private Cooperation Mechanism of PPP Model Based on Evolutionary Game [J]. Business Research, 2016, (7): 9-17.