Academic literature on the topic 'Cyber sovereignty'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber sovereignty.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber sovereignty"
Wu, Chien-Huei. "Sovereignty Fever: The Territorial Turn of Global Cyber Order." Zeitschrift für ausländisches öffentliches Recht und Völkerrecht / Heidelberg Journal of International Law 81, no. 3 (2021): 651–76. http://dx.doi.org/10.17104/0044-2348-2021-3-651.
Full textRo'is, Nur. "Cyber Sovereignty Gotong Royong, Indonesia’a Way of Dealing with the Challenges of Global Cyber Sovereignty." Pancasila and Law Review 3, no. 1 (June 29, 2022): 15–30. http://dx.doi.org/10.25041/plr.v3i1.2573.
Full textDilisen, Melike Melis. "Sovereignty Over Cyber Territories." International Journal of Interdisciplinary Civic and Political Studies 13, no. 2 (2018): 1–11. http://dx.doi.org/10.18848/2327-0071/cgp/v13i02/1-11.
Full textZhu, Lixin, and Wei Chen. "Chinese Approach to International Law with Regard to Cyberspace Governance and Cyber Operation: From the Perspective of the Five Principles of Peaceful Co-existence." Baltic Yearbook of International Law Online 20, no. 1 (December 19, 2022): 187–208. http://dx.doi.org/10.1163/22115897_02001_010.
Full textMikhalevich, Ekaterina A. "The Сoncept of Сyber Sovereignty of the People’s Republic of China: Development History and Essence." RUDN Journal of Political Science 23, no. 2 (December 15, 2021): 254–64. http://dx.doi.org/10.22363/2313-1438-2021-23-2-254-264.
Full textKhanna, Pallavi. "STATE SOVEREIGNTY AND SELF-DEFENCE IN CYBERSPACE." BRICS Law Journal 5, no. 4 (December 15, 2018): 139–54. http://dx.doi.org/10.21684/2412-2343-2018-5-4-139-154.
Full textCorn, Gary P., and Robert Taylor. "Sovereignty in the Age of Cyber." AJIL Unbound 111 (2017): 207–12. http://dx.doi.org/10.1017/aju.2017.57.
Full textIsnarti, Rika. "A Comparison of Neorealism, Liberalism, and Constructivism in Analysing Cyber War." Andalas Journal of International Studies (AJIS) 5, no. 2 (November 1, 2016): 151. http://dx.doi.org/10.25077/ajis.5.2.151-165.2016.
Full textWenhong, Xu. "Challenges to Cyber Sovereignty and Response Measures." World Economy and International Relations 64, no. 2 (2020): 89–99. http://dx.doi.org/10.20542/0131-2227-2020-64-2-89-99.
Full textO. Melnikova. "China's Experience in Protecting National Cyber Sovereignty." International Affairs 69, no. 001 (February 28, 2023): 89–102. http://dx.doi.org/10.21557/iaf.83567173.
Full textDissertations / Theses on the topic "Cyber sovereignty"
Andal, Stephenie Lois. "Cyber Sovereignty: A New Vision in China." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/18137.
Full textRandall, Jason. "Cyber-Sovereignty: The Power of Social Media on the Arab Spring in Tunisia and Egypt." DigitalCommons@Robert W. Woodruff Library, Atlanta University Center, 2017. http://digitalcommons.auctr.edu/cauetds/108.
Full textNordström, Caroline. "The Regulation of Cyber Operations Below the Threshold of Article 2(4) of the Charter : An Assessment of Rule 4 of the Tallinn Manual 2.0." Thesis, Uppsala universitet, Juridiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-383921.
Full textRoberts, Anthea Elizabeth. "Is International Law International?" Phd thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/124611.
Full textWang, Ching-An, and 王清安. "Exploring PRC's Concept of Cyber Sovereignty (2011~2017)." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/wz62m2.
Full text國防大學
戰略研究所
106
With increased threats of cyberspace, the security in many fields, such as politics, economy, military and social infrastructure, may be damaged in a certain level. It may also create a great impact on the matter of national and individual security. Cyberspace has been seen as the 5th space followed by the spaces of land, sea, air, and outer space. Therefore, it becomes a vital factor for to compete for one another in such potential cyberspace. However, though the term of “cyber sovereignty[網路主權]” was mentioned at the first time in a China’s white paper in 2011, it has not been clearly defined yet. In 2016, Chinese government proposed to establish so-called China’s cyber sovereignty. The proposal was merely aimed on strengthening cyber security to consolidate the position of Chinese leadership. However, it is also arguable that China is likely to establish the cyber superpower through claiming the cyber sovereignty under Xi Jinping’s ruling. Thus, China’s governmental reports have been collected as empirical data for the research in order to argue how Xi’s administration carries the real sovereignty into virtual cyberspace. In other words, as the research investigates, the strategic implication of establishing cyber sovereignty for China is not only to confident the interest and security in cyberspace, but also to create a legitimacy for the state to conduct counter-attacks as defensive measures, since the cyber sovereignty can be perceived as being violated once if the cyberspace were attacked.
Gordon, Barrie James. "Aspekte van regsbeheer in die konteks van die Internet." Thesis, 2016. http://hdl.handle.net/10500/21929.
Full textThe world is currently structured in different states, and this is premised on the International law concept of sovereignty. States have the capacity to structure their own affairs, but the development of the Internet as a globally distributed network has violated this principle. It would seem that the development of the Internet would mean the end of sovereignty and statehood. A historical overview shows that regulators were initially unsure of how this new medium should be dealt with. It appeared that new technologies that could fragment the Internet, could be used to enforce state bound law. Several states of the world have used different methodologies trying to regulate the Internet at state level, and this led to the random way in which the Internet is currently regulated. This study examines various aspects of legal regulation in the context of the Internet, and determines how the Internet is currently regulated. Appropriate legislation of several states are discussed throughout the study. Four prominent states, which made several important interventions regarding the regulation of the Internet, are highlighted further. It is the United States, the People’s Republic of China, the European Union as the representative of European countries, and South Africa. Aspects that need to be addressed on International law level, such as international organizations and international legal theories regarding the regulation of the Internet, are also discussed. The findings that follow from this study are used to make several recommendations, which in turn are used to construct a new model for a more meaningful way in which the Internet could be regulated. Since the present study is undertaken in the context of the International law, the study is concluded with a discussion of cyber sovereignty, which is a discussion of how sovereignty should be applied with regards to the Internet. The conclusion is enlightening—the development of the Internet does not indicate the end of sovereignty, but rather confirms it.
Criminal and Procedural Law
LLD
Books on the topic "Cyber sovereignty"
Egloff, Florian J. Semi-State Actors in Cybersecurity. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197579275.001.0001.
Full textGolia, Angelo Jr, Matthias C. Kettemann, and Raffaela Kunz, eds. Digital Transformations in Public International Law. Nomos Verlagsgesellschaft mbH & Co. KG, 2022. http://dx.doi.org/10.5771/9783748931638.
Full textBolt, Paul J., and Sharyl N. Cross. Emerging Non-traditional Security Challenges. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198719519.003.0005.
Full textPowers, Shawn M., and Michael Jablonski. Geopolitics and the Internet. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039126.003.0001.
Full textPowers, Shawn M., and Michael Jablonski. Conclusion. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039126.003.0009.
Full textBook chapters on the topic "Cyber sovereignty"
Maleh, Yassine, and Youness Maleh. "Cyber Sovereignty in Morocco." In SpringerBriefs in Cybersecurity, 77–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18475-8_7.
Full textFang, Binxing. "Positions of States Toward Cyberspace and Cyber-Relating Regulations." In Cyberspace Sovereignty, 243–320. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0320-3_8.
Full textLi, Hui, and Xin Yang. "Sovereignty and Network Sovereignty." In Co-governed Sovereignty Network, 1–28. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2670-8_1.
Full textEldem, Tuba. "Between multi-stakeholderism and cyber sovereignty." In Routledge Companion to Global Cyber-Security Strategy, 395–408. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-33.
Full textMidson, David. "Geography, Territory and Sovereignty in Cyber Warfare." In New Technologies and the Law of Armed Conflict, 75–93. The Hague: T.M.C. Asser Press, 2013. http://dx.doi.org/10.1007/978-90-6704-933-7_6.
Full textIbrahim, Amjad, and Theo Dimitrakos. "Towards Collaborative Security Approaches Based on the European Digital Sovereignty Ecosystem." In Collaborative Approaches for Cyber Security in Cyber-Physical Systems, 123–44. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-16088-2_6.
Full textSchläger, Christian, André Ebert, Andy Mattausch, and Michael Beck. "Enabling Cyber Sovereignty: with Knowledge, Not with National Products." In Digital Marketplaces Unleashed, 895–904. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-49275-8_79.
Full textLi, Hui, and Xin Yang. "Interpretation of Network Sovereignty." In Co-governed Sovereignty Network, 29–60. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2670-8_2.
Full textGow, Lisa. "Permutations of Popular Sovereignty Before, During and After the Scottish Independence Referendum." In From Cold War to Cyber War, 43–63. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-19087-7_4.
Full textDuisberg, Alexander. "Legal Aspects of IDS: Data Sovereignty—What Does It Imply?" In Designing Data Spaces, 61–90. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_5.
Full textConference papers on the topic "Cyber sovereignty"
Roguski, Przemyslaw. "Layered Sovereignty: Adjusting Traditional Notions of Sovereignty to a Digital Environment." In 2019 11th International Conference on Cyber Conflict (CyCon). IEEE, 2019. http://dx.doi.org/10.23919/cycon.2019.8756900.
Full textCattaruzza, Amaël, Didier Danet, Stéphane Taillat, and Arthur Laudrain. "Sovereignty in cyberspace: Balkanization or democratization." In 2016 International Conference on Cyber Conflict (CyCon U.S.). IEEE, 2016. http://dx.doi.org/10.1109/cyconus.2016.7836628.
Full textMaurer, Tim, Isabel Skierka, Robert Morgus, and Mirko Hohmann. "Technological sovereignty: Missing the point?" In 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace (CyCon). IEEE, 2015. http://dx.doi.org/10.1109/cycon.2015.7158468.
Full textPark, Tina J., and Michael Switzer. "R2P & Cyberspace: Sovereignty as a Responsibility." In 2020 12th International Conference on Cyber Conflict (CyCon). IEEE, 2020. http://dx.doi.org/10.23919/cycon49761.2020.9131729.
Full textKushwaha, Neal, Przemyslaw Roguski, and Bruce W. Watson. "Up in the Air: Ensuring Government Data Sovereignty in the Cloud." In 2020 12th International Conference on Cyber Conflict (CyCon). IEEE, 2020. http://dx.doi.org/10.23919/cycon49761.2020.9131718.
Full textDelerue, Francois. "Covid-19 and the Cyber Pandemic: A Plea for International Law and the Rule of Sovereignty in Cyberspace." In 2021 13th International Conference on Cyber Conflict (CyCon). IEEE, 2021. http://dx.doi.org/10.23919/cycon51939.2021.9468306.
Full textIndrajit, Richardus Eko, Marsetio Marsetio, Rudy AG Gultom, Pujo Widodo, Resmanto W. Putro, Pantja Djati, Siswo Hadi, Budi Pramono, and Luhut Simbolon. "Unraveling the Complexity of Developing a National Cyber Defense Sovereignty Policy: A Case Study of Indonesia." In 2021 Sixth International Conference on Informatics and Computing (ICIC). IEEE, 2021. http://dx.doi.org/10.1109/icic54025.2021.9632946.
Full textNiyobuhungiro, Joel. "Challenges of State Sovereignty and the Right of State to Self-defense: The Case of Cyber Attacks." In 2nd International Conference Postgraduate School. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0007549206680671.
Full textVEVERA, Victor Adrian, and Sorin TOPOR. "THE COMMUNICATIONAL DIMENSION OF DIGITAL DIPLOMACY." In SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE. Publishing House of “Henri Coanda” Air Force Academy, 2022. http://dx.doi.org/10.19062/2247-3173.2021.22.12.
Full textBandara, Eranga, Xueping Liang, Peter Foytik, and Sachin Shetty. "Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform." In 2021 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, 2021. http://dx.doi.org/10.1109/smartcomp52413.2021.00057.
Full text