2. Fry J. D. Privacy, predictability and Internet surveillance in the U.S. and China: bet-ter the devil you know? // University of Pennsylvania Journal of International Law. 2015. Vol. 37. Р. 419-501.
3. Quinn J. A Peek оver the Great Firewall: a breakdown of China's new cybersecurity law // SMU Science and Technology Law Review. 2017. Vol. 20, № 2. Р. 407-436.
4. Stevenson C. Breaching the Great Firewall: China's Internet Censorship and the quest for freedom of expression in a connected world // Boston College International & Com-parative Law Review. 2007. Vol. 30, № 2. Р. 531-558. URL: https://lawdigitalcommons.bc.- edu /cgi /viewcontent. cgi?article=1074&context=iclr
5. Kissel T. K. License to Blog: Internet Regulation in the People's Republic of China // Indiana International & Comparative Law Review. 2007. Vol. 17, № 1. Р. 229-268. URL: https://mckinneylaw.iu.edu/iiclr/pdf/vol17p229.pdf
6. Lee J.-A., Liu C.-Y. Real-name registration rules and the fading digital anonymity in China // Washington International Law Journal. 2016. Vol. 25, № 1. Р. 1-34. URL: https: // digitalcommons. law. uw. edu /cgi /viewcontent.cgi?article=1717&context=wilj
7. Zheng H. Regulating the Internet: China's law and practice // Beijing Law Review. 2013. Vol. 4, № 1. Р. 37-41. URL: https://www.researchgate.net/publication/271293880_- Regulating_the_Internet_China's_Law_and_Practice
8. Безрукова О. В., Капитонова Е. А., Кулешова Г. П. [и др.]. Терроризм, права чело-века и демократические ценности в России и за рубежом. М. : Юрлитинформ, 2019. 232 с.
9. Романовский Г. Б., Романовская О. В. Права человека и борьба с терроризмом: зарубежный опыт. М. : Проспект, 2021. 192 с.
10. Barber P. Bull in the China market: the gap between investor expectations and au-ditor liability for Chinese financial statement frauds // Duke Journal of Comparative & Inter-national Law. 2013. Vol. 24. Р. 349-402. URL: https://scholarship.law.duke.edu/cgi/view- content. cgi? article= 1402&context= djcil
11. Cheung A. S. Y. The business of governance: China's legislation on content regula-tion in cyberspace // International Law and Politics. 2005. Vol. 38, № 1. Р. 1-38. URL: https: //www.nyujilp.org/wp-content/uploads/2013/02/38.1_2-Cheung.pdf
12. Паненков А. А. Кибертерроризм как реальная угроза национальной безопасности России // Право и кибербезопасность. 2014. № 1. С. 12-19.
13. Услинский Ф. А. Кибертерроризм в России: его свойства и особенности // Право и кибербезопасность. 2014. № 1. С. 6-11.
14. Чернядьева Н. А. О международных подходах правового регулирования борьбы с кибертерроризмом // Информационное право. 2016. № 2. С. 26-29.
15. Бельский А. И., Якимова В. И. Кибертерроризм как один из наиболее опасных видов международного терроризма // Российский следователь. 2020. № 5. С. 66-70.
16. Антонян Е. А., Аминов И. И. Блокчейн-технологии в противодействии кибер-терроризму // Актуальные проблемы российского права. 2019. № 6. С. 167-177.
17. Данильченко Э. Д. Правовая основа противодействия правоохранительных ор-ганов кибертерроризму // Транспортное право. 2015. № 4. С. 27-32.
18. Паненков А. А. Система преступлений в сфере компьютерной информации, входящих в структуру террористической деятельности (кибертерроризм) как реальная угроза внешнему и внутреннему контурам национальной безопасности России // Военно-юридический журнал. 2014. № 4. С. 3-13.
19. Чжэн И. Сотрудничество РФ и КНР в борьбе с кибертерроризмом / / Вестник Московского государственного областного университета. 2018. № 2. С. 204-213.
20. Adamski H. Hassreden (Hate Speech) im internet. Zum streit um das Netzwerk-durchsetzungsgesetz (NetzDG) // Gesellschaft. Wirtschaft. Politik. 2018. № 1. S. 135-142.
References
1. Romanovsky G.B., Kuleshova G.P., Kapitonova E.A. Legal Framework for Countering Cyberterrorism in Russia and Abroad from the Social and Political Perspective. Vserossiyskiy kriminologicheskiy zhurnal = All-Russian Criminology Journal. 2020;14(1):156-165.
(In Russ.)
2. Fry J.D. Privacy, Predictability and Internet Surveillance in the U.S. and China: Bet-ter the Devil You Know? University of Pennsylvania Journal of International Law. 2015;37: 419-501.
3. Quinn J.A Peek over the Great Firewall: A Breakdown of China's New Cybersecurity Law. SMU Science and Technology Law Review. 2017;20(2):407-436.
4. Stevenson C. Breaching the Great Firewall: China's Internet Censorship and the Quest for Freedom of Expression in a Connected World. Boston College International & Com-parative Law Review. 2007;30(2):531-558. Available at: https://lawdigitalcommons.bc.edu/- cgi/viewcontent. cgi?article=1074&context=iclr
5. Kissel T.K. License to Blog: Internet Regulation in the People's Republic of China. In-diana International & Comparative Law Review. 2007;17(1):229-268. Available at:
https://mckinneylaw.iu.edu/iiclr/pdf/vol17p229.pdf
6. Lee J.-A., Liu C.-Y. Real-Name Registration Rules and the Fading Digital Anonymity in China. Washington International Law Journal. 2016;25(1):1-34. Available at: https://digital- commons. law. uw. edu / cgi/ viewcontent.cgi?article=1717&context=wilj
7. Zheng H. Regulating the Internet: China's Law and Practice. Beijing Law Review. 2013;4(1):37-41. Available at: https://www.researchgate.net/publication/271293880_Regu- lating_the_Internet_China's_Law_and_Practice
8. Bezrukova O.V., Kapitonova E.A., Kuleshova G.P. [et al.]. Terrorizm, prava cheloveka i demokraticheskie tsennosti v Rossii i za rubezhom = Terrorism, Human Rights and Democratic Values in Russia and Abroad. Moscow: Yurlitinform, 2019:232. (In Russ.)
9. Romanovsky G.B., Romanovskaya O.V. Prava cheloveka i borba s terrorizmom: za- rubezhnyy opyt = Human Rights and Fight against Terrorism: Foreign Practices. Moscow: Prospekt, 2021:192. (In Russ.)
10. Barber P. Bull in the China Market: The Gap between Investor Expectations and Auditor Liability for Chinese Financial Statement Frauds. Duke Journal of Comparative & Inter-national Law. 2013;24:349-402. Available at: https://scholarship.law.duke.edu/cgi/view- content. cgi? article= 1402&context= djcil
11. Cheung A.S.Y. The Business of Governance: China's Legislation on Content Regula-tion in Cyberspace. International Law and Politics. 2005;38(1):1-38. Available at:
https: //www.nyujilp.org/wp-content/uploads/2013/02/38.1_2-Cheung.pdf
12. Panenkov A.A. Cyberterrorism as a Real Threat to the National Security of Russia. Fravo i kiberbezopasnost = Law and Cybersecurity. 2014;(1): 12-19. (In Russ.)
13. Uslinskiy F.A. Cyberterrorism in Russia: Properties and Features. Pravo i kiber-bezopasnost = Law and Cybersecurity. 2014;(1):6-11. (In Russ.)
14. Chernyadieva N.A. On International Approaches to Legal Regulation of Fight against Cyberterrorism. Informatsionnoepravo = Information Law. 2016;(2):26-29. (In Russ.)
15. Belskiy A.I., Yakimova V.I. Cyberterrorism as One of the Most Dangerous Types of In-ternational Terrorism. Rossiyskiy sledovatel = Russian Investigator. 2020;(5):66-70. (In Russ.)
16. Antonyan E.A., Aminov I.I. Blockchain Technologies in Countering Cyberterrorism. Aktualnye problemy rossiyskogo prava = Topical Issues in Russian Law. 2019;(6):167-177. (In Russ.)
17. Danilchenko E.D. Legal Framework for Law Enforcement Agencies to Counter Cyberterrorism. Transportnoe pravo = Transport Law. 2015;(4):27-32. (In Russ.)
18. Panenkov A.A. System of Cybercrimes Included in Terrorist Activity (Cyberterrorism) as a Real Threat to the External and Internal Contours of the National Security in Russia. Voenno-yuridicheskiy zhurnal = Military Law Journal. 2014;(4):3-13. (In Russ.)
19. Chzhen I. Cooperation between the Russian Federation and the People's Republic of China in Fight against Cyberterrorism. Vestnik Moskovskogo gosudarstvennogo oblastnogo uni- versiteta = Bulletin of Moscow State Region University. 2018;(2):204-213. (In Russ.)
20. Adamski H. Hassreden (Hate Speech) im internet. Zum Streit um das Netzwerk-durchsetzungsgesetz (NetzDG). Gesellschaft. Wirtschaft. Politik. 2018;(1):135-142.
Размещено на Allbest