Academic literature on the topic 'Cyber sovereignty'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber sovereignty.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber sovereignty"

1

Wu, Chien-Huei. "Sovereignty Fever: The Territorial Turn of Global Cyber Order." Zeitschrift für ausländisches öffentliches Recht und Völkerrecht / Heidelberg Journal of International Law 81, no. 3 (2021): 651–76. http://dx.doi.org/10.17104/0044-2348-2021-3-651.

Full text
Abstract:
This paper argues that the utopia of a borderless and interconnected cyberspace loses its charm and the global cyber order is witnessing a territorial turn. The proliferation of the notion of cyber sovereignty and its variances is a symptom reflecting sovereign states' attempt to retain autonomy and control gradually eroded with the digitalisation of societies and economies. The sovereignty fever can be attributed to four reasons: political ambition, economic value, security concerns, and human rights. However, sovereignty is not the last word in debates concerning the future of digital society, for even liberal democracies have advanced ideas of technological or digital sovereignty, and data sovereignty, for their own very different purposes.
APA, Harvard, Vancouver, ISO, and other styles
2

Ro'is, Nur. "Cyber Sovereignty Gotong Royong, Indonesia’a Way of Dealing with the Challenges of Global Cyber Sovereignty." Pancasila and Law Review 3, no. 1 (June 29, 2022): 15–30. http://dx.doi.org/10.25041/plr.v3i1.2573.

Full text
Abstract:
State sovereignty is born together with the independence of a country, as well as sovereignty in cyberspace. The state has sovereignty in cyberspace as in its territorial space so that it has jurisdictional authority, but in reality, there are unclear territorial boundaries in cyberspace. Indonesia today still has a dependence on foreign cyberinfrastructure, which causes a high level of cyber vulnerability and low cyber sovereignty resilience. Indonesia has local wisdom known as "Gotong Royong," this conception of local wisdom can be applied to face the global challenges of cyber sovereignty. This study also compares the resilience of Indonesia's cyber sovereignty with the People's Republic of China using a normative legal research methodology with a comparative law approach. Indonesia's limitations in maintaining its cyber sovereignty can be anticipated by using the concept of Gotong Royong cyber sovereignty, which is the implementation of the Universal People's Defense System as regulated in Law Number 3 of 2002 concerning National Defense. The implementation of Cyber Gotong Royong sovereignty involves all citizens, regions, and other national resources.
APA, Harvard, Vancouver, ISO, and other styles
3

Dilisen, Melike Melis. "Sovereignty Over Cyber Territories." International Journal of Interdisciplinary Civic and Political Studies 13, no. 2 (2018): 1–11. http://dx.doi.org/10.18848/2327-0071/cgp/v13i02/1-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Lixin, and Wei Chen. "Chinese Approach to International Law with Regard to Cyberspace Governance and Cyber Operation: From the Perspective of the Five Principles of Peaceful Co-existence." Baltic Yearbook of International Law Online 20, no. 1 (December 19, 2022): 187–208. http://dx.doi.org/10.1163/22115897_02001_010.

Full text
Abstract:
Since sovereign States under international law are still the dominant force in coping with cyberspace threats and carrying out international governance of cyberspace, the Five Principles of Peaceful Coexistence, initiated by China, have their unique advantages in cyberspace application. In the process of constructing international norms of cyber security and cyber operation, it is necessary to develop their new significance. Firstly, cyberspace sovereignty is the extension of State sovereignty in cyberspace, so cyber sovereignty should be mutually respected. Secondly, each State should promise not to infringe, attack or destroy the cyberspace of another State, while each State bears the responsibility and enjoys the right to protect its cyberspace from threat, interference and destruction. Thirdly, cyberspace should not be utilised to interfere in the internal affairs or destabilise the political, economic and social order of other States, and the diversities of cyberspace policies in different States should be respected. Fourthly, all States should fulfil their duty on international cyberspace governance and enjoy cyber fruits together, thus enabling a democratic and transparent governance mechanism to be established. Lastly, cyberspace should be a peaceful, secure and open space, in which China is dedicated to strengthening cooperation with other countries, maintaining cyber security together, and building a shared future for humankind.
APA, Harvard, Vancouver, ISO, and other styles
5

Mikhalevich, Ekaterina A. "The Сoncept of Сyber Sovereignty of the People’s Republic of China: Development History and Essence." RUDN Journal of Political Science 23, no. 2 (December 15, 2021): 254–64. http://dx.doi.org/10.22363/2313-1438-2021-23-2-254-264.

Full text
Abstract:
The transformation of cyber sovereignty into an independent concept is a recent phenomenon, and thus its development and distribution is currently underway, which indicates the relevance of studying this topic. Being one of the most influential actors of contemporary international politics, China uses the concept of cyber sovereignty to promote its national interests and is able to shape the rules in the highly volatile field of international cyberspace. The study is based on quantitative and qualitative content analysis of legal acts and concept of Chinas cyber sovereignty. The author defines a concept of cyber sovereignty and identifies its place in the system of international law and in the architecture of international information security. Chinas concept of cyber sovereignty does not imply the division of a common cyberspace into separate segments but contributes to the creation of a cyber community of a common destiny, in which states can exercise their rights to govern the Internet on the principles of equality, justice, cooperation, peace and rule of law. It is concluded that this concept can be used as the basis for the formation of an international legal framework that regulates relations between states in the field of cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
6

Khanna, Pallavi. "STATE SOVEREIGNTY AND SELF-DEFENCE IN CYBERSPACE." BRICS Law Journal 5, no. 4 (December 15, 2018): 139–54. http://dx.doi.org/10.21684/2412-2343-2018-5-4-139-154.

Full text
Abstract:
Given the increasing role and use of cyberspace in our daily lives, it is important to consider the large-scale dynamics of the cyber forum. Shifting the focus from individuals to nation states as participants that engage in activities in cyberspace raises doubts over the status of nations in this domain. Do they continue to remain sovereign entities on such a platform? Do they have the right to defend themselves against attacks from other nations? These questions have been subject to a lot of debate in the context of international law. The aim of this paper is to study the implications of the principle of state sovereignty and selfdefence in cyberspace. The paper focuses on two prime considerations of sovereignty and self-defence in the context of cyberspace and its link to international law. Thus the scope is limited to concepts such as territorial jurisdiction, sovereignty, attribution and selfdefence. While doing so, the researcher seeks to answer questions such as, Is international law applicable to cyberspace? Can cyberspace be called a sovereign domain? Do principles of territorial jurisdiction apply to cyberspace? How does the attribution mechanism work in cyberspace? Under what circumstances are states permitted to exercise the right of self-defence against cyber attacks? and What are the deficiencies in international law governing cyberspace?
APA, Harvard, Vancouver, ISO, and other styles
7

Corn, Gary P., and Robert Taylor. "Sovereignty in the Age of Cyber." AJIL Unbound 111 (2017): 207–12. http://dx.doi.org/10.1017/aju.2017.57.

Full text
Abstract:
International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states’ cyber activities.
APA, Harvard, Vancouver, ISO, and other styles
8

Isnarti, Rika. "A Comparison of Neorealism, Liberalism, and Constructivism in Analysing Cyber War." Andalas Journal of International Studies (AJIS) 5, no. 2 (November 1, 2016): 151. http://dx.doi.org/10.25077/ajis.5.2.151-165.2016.

Full text
Abstract:
Cyberwar can be considered as one of phenomena in International Relations. However, recently, there are not many literature about International Relations theory talking about cyber war or cyberspace generally. The phenomena of cyberspace is matter to International Relations as it involved sovereignty, state interactions and other elements in International Relations theory. On the other hand, cyber space blurs many concept in International Relations such as sovereignty is borderless in the realms of cyber space. Therefore, this articles analyses three perspectives in International Relations in analyzing cyber war. It explains what cyber war in context of International Relations, how three theories in International Relations with their elements analyses actors and interaction in cyber space. Finally, it found that Neorealism is the most adequate theory among other two theories in analyzing cyber war.
APA, Harvard, Vancouver, ISO, and other styles
9

Wenhong, Xu. "Challenges to Cyber Sovereignty and Response Measures." World Economy and International Relations 64, no. 2 (2020): 89–99. http://dx.doi.org/10.20542/0131-2227-2020-64-2-89-99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

O. Melnikova. "China's Experience in Protecting National Cyber Sovereignty." International Affairs 69, no. 001 (February 28, 2023): 89–102. http://dx.doi.org/10.21557/iaf.83567173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber sovereignty"

1

Andal, Stephenie Lois. "Cyber Sovereignty: A New Vision in China." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/18137.

Full text
Abstract:
Research on China’s strategy of cyber sovereignty to date has been inadequate, conceiving of the blueprint as a domestic Party censorship and surveillance mechanism, effectively minimising its foreign policy significance. Additionally, existing understandings have privileged the Western sovereignty paradigm, whose tenets have not been updated to reflect the impact of media and communication on today’s cross-bordered world. This interdisciplinary thesis challenges the prevailing narratives. It probes China’s power strategy of cyber sovereignty, arguing that it is not only a state-of-the-art experiment in regulating digital flows of information within China, but also a significant Party power strategy in facilitating their bold ambition to become a leader in global cyberspace. It makes the case that cyber sovereignty is an entirely new form of sovereign power, one that has harnessed the tools of the digital revolution in cutting-edge ways, forcing a rethinking of the classical mould of sovereignty. It offers an analytical redescription of this prototype of sovereignty, and the thesis contributes to the literature by offering an original interpretation of this form of power by illustrating its complex dynamics and paradoxical features. The thesis summarises the emergence of the concept of cyber sovereignty, identifying the theoretical and analytical cleavages in the literature. It also introduces the features of this new model of power, and establishes Hong Kong’s significance as a laboratory for cyber sovereignty. The thesis then conducts a pointed vivisection of the historical and contemporary literature on sovereignty, before delineating the re-envisioned model of cyber sovereignty. And lastly, the thesis positions Hong Kong as simultaneously the greatest expression of, yet challenge to China’s strategy of cyber sovereignty. Drawing from field research interviews, this interpretivist thesis peels back the blanketed layers, sedimented histories, and theoretical ideologies that intersect, diverge, and shroud understanding of this new modality of power. The thesis offers a prism through which to observe the political dynamics of the contemporary Chinese polity, now emerging as a global power, to more fully grasp the implications of cyber sovereignty in the international order.
APA, Harvard, Vancouver, ISO, and other styles
2

Randall, Jason. "Cyber-Sovereignty: The Power of Social Media on the Arab Spring in Tunisia and Egypt." DigitalCommons@Robert W. Woodruff Library, Atlanta University Center, 2017. http://digitalcommons.auctr.edu/cauetds/108.

Full text
Abstract:
This dissertation assesses the role of social media and its effects on the Arab Spring. The research will be guided by two questions: Could the use of American Dot.com social networking websites (e.g. Facebook, Google, Twitter, and YouTube) by Tunisians and Egyptians during the Arab Spring, to overthrow their governments, be characterized as a violation of Tunisia’s and Egypt’s sovereignty (cyber-sovereignty)? Secondly, what was the significance of the abovementioned social networking websites during the Arab Spring? The first question will be examined by using Kingdon’s Multiple Streams Theory; the problem, policy, and political streams have to converge simultaneously in order to create a window of opportunity to enact change. For this to occur, it is the responsibility of the policy entrepreneur to combine the three streams. The policy entrepreneur is an individual(s) who are tasked with the responsibility of integrating the three streams. During the Arab Spring, social media served as a mechanism for citizens to bypass government censorship to chronicle and narrate events as they occurred. As a result, I assert that it was the use of social media in this manner by the policy entrepreneurs that violated the sovereignty of both Tunisia and Egypt. The second question will be analyzed by administering questionnaires and reviewing tertiary sources to assess the significance of the abovementioned social networking websites during the Arab Spring. By examining the two research questions together, the conclusion of this analysis will potentially provide the basis for political cooperation towards an international cyber-sovereignty doctrine. The Arab Spring was far greater than Tunisia and Egypt. However, I felt it was of the utmost importance to focus on the origin of the Arab Spring, as well as the significance in which the role of social media became instrumental. Analyzing the role of social media, the transformation of power, and cyber-sovereignty in both countries through four (individual, state, organizational, and international) layers of analysis will help to assess the role of social media during the Arab Spring and to generate layers of protection to mitigate its influence.
APA, Harvard, Vancouver, ISO, and other styles
3

Nordström, Caroline. "The Regulation of Cyber Operations Below the Threshold of Article 2(4) of the Charter : An Assessment of Rule 4 of the Tallinn Manual 2.0." Thesis, Uppsala universitet, Juridiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-383921.

Full text
Abstract:
The cyber domain poses great challenges to the existing international law framework, resulting in the international community's frustration in finding sustainable long-term solutions to the international regulation of cyberspace. This thesis reflects upon foundational concepts of the jus ad bellum framework, such as State sovereignty and the use of force. The principal issue discussed in this thesis is the emergence of a customary international norm prohibiting violations of sovereignty, essentially targeting lowintensity cyber attacks. Violations of sovereignty were classified as a primary rule in Rule 4 of the Tallinn Manual 2.0 (2017), which sparked a debate about the rule's true existence as a customary norm. This thesis assesses whether violations of sovereignty can currently be extrapolated as a primary rule of customary international law. It thereafter discusses the need for such a rule, as well as the risks of such a rule emerging as a customary norm.
APA, Harvard, Vancouver, ISO, and other styles
4

Roberts, Anthea Elizabeth. "Is International Law International?" Phd thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/124611.

Full text
Abstract:
International lawyers are familiar with the question: “Is international law law?” But this thesis instead asks the question: “Is international law international?” Using a variety of methods, this work sheds light on some of the ways in which international law as a transnational legal field is constructed by international law academics, and is conceptualized in international law textbooks, in the five permanent members of the Security Council: the People’s Republic of China, the French Republic, the Russian Federation, the United Kingdom of Great Britain and Northern Ireland, and the United States of America. It explores how different national communities of international lawyers construct and pass on their understandings of “international law” in ways that belie the field’s claim to universality, perpetuating certain forms of difference and dominance. By adopting a comparative approach, it aims to make international lawyers more aware of the frames that shape their own understandings of and approaches to the field, as well as how these might be similar to or different from the frames adopted by those coming from other states, regions or geopolitical groupings. It also examines how some of these patterns might be disrupted as a result of shifts in geopolitical power, such as the movement from unipolar power toward greater multipolarity and the growing confrontations between Western liberal democratic states (like the United States, the United Kingdom, and France) and non-Western authoritarian states (like China and Russia).
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Ching-An, and 王清安. "Exploring PRC's Concept of Cyber Sovereignty (2011~2017)." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/wz62m2.

Full text
Abstract:
碩士
國防大學
戰略研究所
106
With increased threats of cyberspace, the security in many fields, such as politics, economy, military and social infrastructure, may be damaged in a certain level. It may also create a great impact on the matter of national and individual security. Cyberspace has been seen as the 5th space followed by the spaces of land, sea, air, and outer space. Therefore, it becomes a vital factor for to compete for one another in such potential cyberspace. However, though the term of “cyber sovereignty[網路主權]” was mentioned at the first time in a China’s white paper in 2011, it has not been clearly defined yet. In 2016, Chinese government proposed to establish so-called China’s cyber sovereignty. The proposal was merely aimed on strengthening cyber security to consolidate the position of Chinese leadership. However, it is also arguable that China is likely to establish the cyber superpower through claiming the cyber sovereignty under Xi Jinping’s ruling. Thus, China’s governmental reports have been collected as empirical data for the research in order to argue how Xi’s administration carries the real sovereignty into virtual cyberspace. In other words, as the research investigates, the strategic implication of establishing cyber sovereignty for China is not only to confident the interest and security in cyberspace, but also to create a legitimacy for the state to conduct counter-attacks as defensive measures, since the cyber sovereignty can be perceived as being violated once if the cyberspace were attacked.
APA, Harvard, Vancouver, ISO, and other styles
6

Gordon, Barrie James. "Aspekte van regsbeheer in die konteks van die Internet." Thesis, 2016. http://hdl.handle.net/10500/21929.

Full text
Abstract:
Die wêreld soos dit vandag bestaan, is gebaseer op die Internasionaalregtelike konsep van soewereiniteit. State het die bevoegdheid om hulle eie sake te reël, maar die ontwikkeling van die Internet as ’n netwerk wat globaal verspreid is, het hierdie beginsel verontagsaam. Dit wou voorkom asof die Internet die einde van soewereiniteit en staatskap sou beteken. ’n Geskiedkundige oorsig toon dat reguleerders aanvanklik onseker was oor hoe hierdie nuwe medium hanteer moes word. Dit het geblyk dat nuwe tegnologieë wat fragmentasie van die Internet bewerkstellig, gebruik kon word om staatsgebonde regsreëls af te dwing. Verskeie state van die wêreld het uiteenlopende metodologieë gevolg om die Internet op staatsvlak te probeer reguleer, en dit het tot die lukraak-wyse waarop die Internet tans gereguleer word, aanleiding gegee. Hierdie studie bespreek verskeie aspekte van regsbeheer in die konteks van die Internet, en bepaal daardeur hoe die Internet tans gereguleer word. Toepaslike wetgewing van verskeie state word regdeur die studie bespreek. Vier prominente state, wat verskeie belangrike ingrepe ten aansien van Internetregulering gemaak het, word verder uitgelig. Dit is die Verenigde State van Amerika, die Volksrepubliek van Sjina, die Europese Unie as verteenwoordiger van Europese state, en Suid-Afrika. Aspekte wat op Internasionaalregtelike vlak aangespreek moet word, soos internasionale organisasies en internasionale regsteorieë ten aansien van die regulering van die Internet, word ook onder die loep geneem. Die bevindings wat uit die studie volg, word gebruik om verskeie aanbevelings te maak, en die aanbevelings word uiteindelik in ’n nuwe model saamgevoegom’n sinvoller wyse van regulering van die Internet voor te stel. Aangesien die huidige studie in die konteks van die Internasionale reg onderneem word, word die studie afgesluit met ’n bespreking van kubersoewereiniteit, wat ’n uiteensetting is van hoe soewereiniteit ten aansien van die Internet toegepas behoort te word. Die gevolgtrekking is insiggewend — die ontwikkeling van die Internet het nie die einde van soewereiniteit beteken nie, maar het dit juis bevestig.
The world is currently structured in different states, and this is premised on the International law concept of sovereignty. States have the capacity to structure their own affairs, but the development of the Internet as a globally distributed network has violated this principle. It would seem that the development of the Internet would mean the end of sovereignty and statehood. A historical overview shows that regulators were initially unsure of how this new medium should be dealt with. It appeared that new technologies that could fragment the Internet, could be used to enforce state bound law. Several states of the world have used different methodologies trying to regulate the Internet at state level, and this led to the random way in which the Internet is currently regulated. This study examines various aspects of legal regulation in the context of the Internet, and determines how the Internet is currently regulated. Appropriate legislation of several states are discussed throughout the study. Four prominent states, which made several important interventions regarding the regulation of the Internet, are highlighted further. It is the United States, the People’s Republic of China, the European Union as the representative of European countries, and South Africa. Aspects that need to be addressed on International law level, such as international organizations and international legal theories regarding the regulation of the Internet, are also discussed. The findings that follow from this study are used to make several recommendations, which in turn are used to construct a new model for a more meaningful way in which the Internet could be regulated. Since the present study is undertaken in the context of the International law, the study is concluded with a discussion of cyber sovereignty, which is a discussion of how sovereignty should be applied with regards to the Internet. The conclusion is enlightening—the development of the Internet does not indicate the end of sovereignty, but rather confirms it.
Criminal and Procedural Law
LLD
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyber sovereignty"

1

Egloff, Florian J. Semi-State Actors in Cybersecurity. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197579275.001.0001.

Full text
Abstract:
What does the global telecommunications company Huawei, a hacking-for-hire outfit in India, and Russian cyber criminals have in common? They all share a special relationship to the state, which significantly shapes the politics of cyber(in-)security. The relationships between these actors and states are complex and constantly evolving, yet not well understood. Semi-State Actors in Cybersecurity provides an insightful theoretical and empirical analysis of the political challenges raised through the interaction between such semi-state actors and states. The book uses a historical analogy to pirates, privateers, and mercantile companies to uncover the political constitution and interaction of cybercrime, state-sponsored hackers, and large technology companies. Drawing on historical archival sources and innovative theory, it identifies the parallels between today’s cyber(in-)security and the historical quest for gold and glory on the high seas during the 16th–19th centuries. The book explains what the co-presence of semi-state actors means for national and international security and shows that the proximity to the state in these relationships is a key determinant of cyber(in-)security. Through so doing, it clarifies how semi-state actors were historically and contemporarily linked to understandings of statehood, sovereignty, and the legitimacy of the state. Semi-State Actors in Cybersecurity offers insights with regard to the political use of state proximity by attackers and defenders, state collaboration with cyber criminals, and the cooperative and conflictive relations of large technology companies to the state. This offers a fresh perspective for understanding the international politics of cyber(in-)security.
APA, Harvard, Vancouver, ISO, and other styles
2

Golia, Angelo Jr, Matthias C. Kettemann, and Raffaela Kunz, eds. Digital Transformations in Public International Law. Nomos Verlagsgesellschaft mbH & Co. KG, 2022. http://dx.doi.org/10.5771/9783748931638.

Full text
Abstract:
Sovereignty, security, rights, participation: these four macro-issues have been deeply affected by the impact of digital technologies on the inner infrastructures of public international law. But what role does international law play for the internet? And how have the internet and the platforms, rogue actors, cyber weapons, and multistakeholder approaches to law-making influenced international law? This book examines the reciprocal influences between digital technologies and public international law and contributes to further debunk the persisting myth of the internet as an unregulated space. By these means, it current and future fields of inquiry emerging from the interface between public international law and digital technologies which will become even more relevant in the future. With contributions by Angelo Jr Golia, Matthias Kettemann, Raffaela Kunz, Pia Hüsch, Edoardo Celeste, Uchenna Jerome Orji, Alena Douhan, Stefanie Schmahl, Rossella Pulvirenti, Adam Krzywoń, Katharina Luckner and Vera Strobel.
APA, Harvard, Vancouver, ISO, and other styles
3

Bolt, Paul J., and Sharyl N. Cross. Emerging Non-traditional Security Challenges. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198719519.003.0005.

Full text
Abstract:
Chapter 5 focuses on three emerging non-traditional security challenges identified as critical concerns or “main threats” for both Russia and China: color revolutions, cyber and information security, and terrorism and violent extremism. There is a high degree of coincidence between Russian and Chinese perspectives on these issues, recognizing the vulnerabilities that each presents for state security. Russia and China oppose color revolutions, strongly argue that authoritarian regimes have full international legitimacy, and resist attempts to undermine sovereignty in promoting democratization or regime transition. China and Russia attempt to influence international standards on freedom of expression in cyberspace by urging greater UN control over the Internet and engaging in censorship to protect state stability over free expression. While Russia, China, and the West struggle against terrorists who use violence to reshape the international order, China and Russia define terrorism more broadly to include all who might threaten to undermine the current government.
APA, Harvard, Vancouver, ISO, and other styles
4

Powers, Shawn M., and Michael Jablonski. Geopolitics and the Internet. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039126.003.0001.

Full text
Abstract:
This book proposes a broader perspective of cyber war, conceptualized as the utilization of digital networks for geopolitical purposes, including covert attacks against another state's electronic systems as well as the myriad ways the Internet is used to further a state's economic and military agendas. In particular, it examines the historical genesis of the “internet freedom” movement and considers the political, economic, and geopolitical factors driving internet-freedom policies, such as the U.S. State Department's freedom-to-connect doctrine. The book argues that efforts to create a singular, universal internet built upon Western legal, political, and social preferences alongside the “freedom to connect” is driven primarily by economic and geopolitical motivations rather than the humanitarian and democratic ideals that typically accompany related policy discourse. This introduction discusses the geopolitics of information and introduces the debates over internet freedom and information sovereignty. It also offers a brief review of the literature, describes a political economy approach to internet freedom, and provides an overview of the book's chapters.
APA, Harvard, Vancouver, ISO, and other styles
5

Powers, Shawn M., and Michael Jablonski. Conclusion. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039126.003.0009.

Full text
Abstract:
This book has argued that the real cyber war is a competition among different political economies of the information society. It has shown how discourses of “internet freedom” serve to legitimize a particular political economy of globalism and how the increasingly vocal call for information sovereignty serves a legitimating function for state efforts to govern highly complex societies in a world wired for globally instantaneous communications. By emphasizing four lines of conceptual inquiry—history, social totality, moral philosophy, and praxis—a political-economy framework places the internet-freedom movement in the broader geopolitical and economic context within which strategic actors are competing for resources and power. The book has also examined the various economic and political interests at stake in debates over internet governance by focusing on Google's efforts to dominate each of the four distinct aspects of the information economy, the economics of internet connectivity, and the myth of multistakeholderism. In closing, the book revisits the idea that data is the new oil.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyber sovereignty"

1

Maleh, Yassine, and Youness Maleh. "Cyber Sovereignty in Morocco." In SpringerBriefs in Cybersecurity, 77–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18475-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fang, Binxing. "Positions of States Toward Cyberspace and Cyber-Relating Regulations." In Cyberspace Sovereignty, 243–320. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0320-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Hui, and Xin Yang. "Sovereignty and Network Sovereignty." In Co-governed Sovereignty Network, 1–28. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2670-8_1.

Full text
Abstract:
AbstractNational sovereignty is the basic subject of the theory and practice of contemporary international law, occupies a crucial position. In order to studying the sovereignty of internet, we need to have an accurate cognition on the traditional concept of sovereignty. In this chapter, we introduce sovereignty from three perspectives: the historical background of traditional sovereignty, the adaptability of sovereignty in cyberspace or network sovereignty, and the sovereignty in the cyber era. Finally, we define sovereignty in cyberspace from the perspective of jurisprudence.
APA, Harvard, Vancouver, ISO, and other styles
4

Eldem, Tuba. "Between multi-stakeholderism and cyber sovereignty." In Routledge Companion to Global Cyber-Security Strategy, 395–408. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Midson, David. "Geography, Territory and Sovereignty in Cyber Warfare." In New Technologies and the Law of Armed Conflict, 75–93. The Hague: T.M.C. Asser Press, 2013. http://dx.doi.org/10.1007/978-90-6704-933-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ibrahim, Amjad, and Theo Dimitrakos. "Towards Collaborative Security Approaches Based on the European Digital Sovereignty Ecosystem." In Collaborative Approaches for Cyber Security in Cyber-Physical Systems, 123–44. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-16088-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schläger, Christian, André Ebert, Andy Mattausch, and Michael Beck. "Enabling Cyber Sovereignty: with Knowledge, Not with National Products." In Digital Marketplaces Unleashed, 895–904. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-49275-8_79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Hui, and Xin Yang. "Interpretation of Network Sovereignty." In Co-governed Sovereignty Network, 29–60. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2670-8_2.

Full text
Abstract:
AbstractIn recent years, with the integration of the Internet and various economic and social fields, the security situation in cyberspace has been changing rapidly. There are more and more network games at the national level and the network attack and defense have become more intense. Network sovereignty has become one of sovereignty that all states are striving for. Cyber war against national targets has emerged and will not abate. Major countries have successively set up cyberspace forces. These facts have demonstrated the existence of a new frontier for humanity, national interests, and digital sovereignty in cyberspace, and demonstrated the absence of international rules or laws that effectively coordinate the management of this space. The chaos in the online media during the US presidential election in 2020, in which the incumbent US president has been banned from several public accounts by major online social media, shows that there is still a long way to go in terms of citizens’ digital human rights and the reasonable and orderly legislative and judicial administration of domestic cyberspace management. All of these topics are discussed in detail in this chapter.
APA, Harvard, Vancouver, ISO, and other styles
9

Gow, Lisa. "Permutations of Popular Sovereignty Before, During and After the Scottish Independence Referendum." In From Cold War to Cyber War, 43–63. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-19087-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Duisberg, Alexander. "Legal Aspects of IDS: Data Sovereignty—What Does It Imply?" In Designing Data Spaces, 61–90. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_5.

Full text
Abstract:
AbstractThe claim of data sovereignty is inherently linked to putting the legal instruments and tools in the hands of each participant in the ecosystem, allowing freedom of contract as well as ensuring that exercising data exchange and consorted data usage in the data economy is in compliance with general and specific regulations, ranging from anti-trust to GDPR and cyber-security regulations as well as sector specific regulations. The IDS provides a framework and a technology to allow the parties to limit their transaction costs and to ensure effective enforcement through the concept of usage control. In a future world, this will include increased automation of contract execution (conclusion, performance, and enforcement), whereas the steps to reach that goal are plentiful and, as of now, still require to “set the scene” with the means of the traditional contractual agreements. This article provides an overview and orientation on the key legal areas and aspects to consider for stakeholders, participants, and the business more generally and in the application of the IDS architecture.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber sovereignty"

1

Roguski, Przemyslaw. "Layered Sovereignty: Adjusting Traditional Notions of Sovereignty to a Digital Environment." In 2019 11th International Conference on Cyber Conflict (CyCon). IEEE, 2019. http://dx.doi.org/10.23919/cycon.2019.8756900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cattaruzza, Amaël, Didier Danet, Stéphane Taillat, and Arthur Laudrain. "Sovereignty in cyberspace: Balkanization or democratization." In 2016 International Conference on Cyber Conflict (CyCon U.S.). IEEE, 2016. http://dx.doi.org/10.1109/cyconus.2016.7836628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maurer, Tim, Isabel Skierka, Robert Morgus, and Mirko Hohmann. "Technological sovereignty: Missing the point?" In 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace (CyCon). IEEE, 2015. http://dx.doi.org/10.1109/cycon.2015.7158468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Park, Tina J., and Michael Switzer. "R2P & Cyberspace: Sovereignty as a Responsibility." In 2020 12th International Conference on Cyber Conflict (CyCon). IEEE, 2020. http://dx.doi.org/10.23919/cycon49761.2020.9131729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kushwaha, Neal, Przemyslaw Roguski, and Bruce W. Watson. "Up in the Air: Ensuring Government Data Sovereignty in the Cloud." In 2020 12th International Conference on Cyber Conflict (CyCon). IEEE, 2020. http://dx.doi.org/10.23919/cycon49761.2020.9131718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Delerue, Francois. "Covid-19 and the Cyber Pandemic: A Plea for International Law and the Rule of Sovereignty in Cyberspace." In 2021 13th International Conference on Cyber Conflict (CyCon). IEEE, 2021. http://dx.doi.org/10.23919/cycon51939.2021.9468306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Indrajit, Richardus Eko, Marsetio Marsetio, Rudy AG Gultom, Pujo Widodo, Resmanto W. Putro, Pantja Djati, Siswo Hadi, Budi Pramono, and Luhut Simbolon. "Unraveling the Complexity of Developing a National Cyber Defense Sovereignty Policy: A Case Study of Indonesia." In 2021 Sixth International Conference on Informatics and Computing (ICIC). IEEE, 2021. http://dx.doi.org/10.1109/icic54025.2021.9632946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Niyobuhungiro, Joel. "Challenges of State Sovereignty and the Right of State to Self-defense: The Case of Cyber Attacks." In 2nd International Conference Postgraduate School. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0007549206680671.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

VEVERA, Victor Adrian, and Sorin TOPOR. "THE COMMUNICATIONAL DIMENSION OF DIGITAL DIPLOMACY." In SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE. Publishing House of “Henri Coanda” Air Force Academy, 2022. http://dx.doi.org/10.19062/2247-3173.2021.22.12.

Full text
Abstract:
Diplomacy has emerged in interstate relations as a mechanism that facilitates the achievement of state objectives, with the task of promoting and protecting state sovereignty. It has had to be reinvented with every important discovery in world history and with every substantial change in the field of communication. The fourth industrial revolution changed the whole panoply of interpersonal and interstates relations, having an important effect on the way international relations unfolded. The emergence of 24/7 news networks, social networks, blogs and streaming has led diplomacy to enter a new stage of its transformation and adaptation to the realities of the contemporary world, giving rise to the so-called digital diplomacy. In this article cyber diplomacy is described from its communicational dimension point of view underlining its importance for assuring national interest of states.
APA, Harvard, Vancouver, ISO, and other styles
10

Bandara, Eranga, Xueping Liang, Peter Foytik, and Sachin Shetty. "Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform." In 2021 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, 2021. http://dx.doi.org/10.1109/smartcomp52413.2021.00057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography