技术安全化的动因及其治理模式研究
A Study on the Drivers of Technology Securitization and Its Governance Models
摘要: 在全球竞争加剧和新一轮科技革命快速发展的背景下,技术问题正逐渐从经济与产业领域进入国家安全治理框架,呈现出明显的安全化趋势。本文在安全化理论与国际政治经济学相关研究基础上,分析技术安全化形成的主要动因,包括新技术的两用属性、全球供应链重组以及全球技术治理体系碎片化等因素,并比较美国、欧盟和新兴经济体在技术安全化治理方面形成的不同模式。研究认为,技术安全化已成为影响全球科技竞争格局的重要趋势。对中国而言,需要在保持开放合作的同时,加强关键核心技术能力建设、提升产业链供应链安全水平并完善技术安全治理体系,以在全球技术竞争中保持战略主动。
Abstract: Against the backdrop of intensifying global strategic competition and the rapid advancement of a new wave of technological revolution, technological issues are increasingly moving beyond the realms of economics and industry and entering the framework of national security governance, showing a clear trend toward securitization. Based on securitization theory and research in international political economy, this paper analyzes the main drivers behind technological securitization, including the dual-use nature of emerging technologies, the restructuring of global supply chains, and the fragmentation of global technology governance. It also compares the different governance models adopted by the United States, the European Union, and emerging economies in addressing technological securitization. The study argues that technological securitization has become a key trend shaping the global landscape of technological competition. For China, it is necessary to strengthen capabilities in key core technologies, enhance the security of industrial and supply chains, and improve the technology security governance system while maintaining openness and cooperation, so as to maintain strategic initiative in global technological competition.
参考文献
|
[1]
|
Buzan, B., Wæver, O. and De Wilde, J. (1998) Security: A New Framework for Analysis. Lynne Rienner Publishers.
|
|
[2]
|
Stritzel, H. (2007) Towards a Theory of Securitization: Copenhagen and Beyond. European Journal of International Relations, 13, 357-383. [Google Scholar] [CrossRef]
|
|
[3]
|
Balzacq, T., Léonard, S. and Ruzicka, J. (2016) ‘Securitization’ Revisited: Theory and Cases. International Relations, 30, 494-531. [Google Scholar] [CrossRef]
|
|
[4]
|
Luttwak, E.N. (1990) From Geopolitics to Geo-Economics: Logic of Conflict, Grammar of Commerce. The National Interest, 20, 17-23.
|
|
[5]
|
Kirshner, J. (2003) Money Is Politics. Review of International Political Economy, 10, 645-660. [Google Scholar] [CrossRef]
|
|
[6]
|
Farrell, H. and Newman, A. (2016) The New Interdependence Approach: Theoretical Development and Empirical Demonstration. Review of International Political Economy, 23, 713-736. [Google Scholar] [CrossRef]
|
|
[7]
|
Edler, J., Meyer-Krahmer, F. and Reger, G. (2002) Changes in the Strategic Management of Technology: Results of a Global Benchmarking Study. R&D Management, 32, 149-164. [Google Scholar] [CrossRef]
|
|
[8]
|
Zou, Y., Zhu, J., Wang, X. and Hanzo, L. (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proceedings of the IEEE, 104, 1727-1765. [Google Scholar] [CrossRef]
|
|
[9]
|
UN Trade & Development (2025) Word Investment Report 2025. https://unctad.org/publication/world-investment-report-2025
|
|
[10]
|
粟锋, 黄颖, 周莎莎, 等. 面向国家安全情报的美国数据治理体系研究: 历程、架构和启示[J]. 图书馆, 2025(9): 18-25.
|
|
[11]
|
蔡芳. 新中国成立以来国家安全观的创立发展研究[D]: [博士学位论文]. 长春: 东北师范大学, 2024.
|