Journal articles on the topic 'Cyber sovereignty'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber sovereignty.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wu, Chien-Huei. "Sovereignty Fever: The Territorial Turn of Global Cyber Order." Zeitschrift für ausländisches öffentliches Recht und Völkerrecht / Heidelberg Journal of International Law 81, no. 3 (2021): 651–76. http://dx.doi.org/10.17104/0044-2348-2021-3-651.
Full textRo'is, Nur. "Cyber Sovereignty Gotong Royong, Indonesia’a Way of Dealing with the Challenges of Global Cyber Sovereignty." Pancasila and Law Review 3, no. 1 (June 29, 2022): 15–30. http://dx.doi.org/10.25041/plr.v3i1.2573.
Full textDilisen, Melike Melis. "Sovereignty Over Cyber Territories." International Journal of Interdisciplinary Civic and Political Studies 13, no. 2 (2018): 1–11. http://dx.doi.org/10.18848/2327-0071/cgp/v13i02/1-11.
Full textZhu, Lixin, and Wei Chen. "Chinese Approach to International Law with Regard to Cyberspace Governance and Cyber Operation: From the Perspective of the Five Principles of Peaceful Co-existence." Baltic Yearbook of International Law Online 20, no. 1 (December 19, 2022): 187–208. http://dx.doi.org/10.1163/22115897_02001_010.
Full textMikhalevich, Ekaterina A. "The Сoncept of Сyber Sovereignty of the People’s Republic of China: Development History and Essence." RUDN Journal of Political Science 23, no. 2 (December 15, 2021): 254–64. http://dx.doi.org/10.22363/2313-1438-2021-23-2-254-264.
Full textKhanna, Pallavi. "STATE SOVEREIGNTY AND SELF-DEFENCE IN CYBERSPACE." BRICS Law Journal 5, no. 4 (December 15, 2018): 139–54. http://dx.doi.org/10.21684/2412-2343-2018-5-4-139-154.
Full textCorn, Gary P., and Robert Taylor. "Sovereignty in the Age of Cyber." AJIL Unbound 111 (2017): 207–12. http://dx.doi.org/10.1017/aju.2017.57.
Full textIsnarti, Rika. "A Comparison of Neorealism, Liberalism, and Constructivism in Analysing Cyber War." Andalas Journal of International Studies (AJIS) 5, no. 2 (November 1, 2016): 151. http://dx.doi.org/10.25077/ajis.5.2.151-165.2016.
Full textWenhong, Xu. "Challenges to Cyber Sovereignty and Response Measures." World Economy and International Relations 64, no. 2 (2020): 89–99. http://dx.doi.org/10.20542/0131-2227-2020-64-2-89-99.
Full textO. Melnikova. "China's Experience in Protecting National Cyber Sovereignty." International Affairs 69, no. 001 (February 28, 2023): 89–102. http://dx.doi.org/10.21557/iaf.83567173.
Full textCorn, Gary P., and Robert Taylor. "Concluding Observations on Sovereignty in Cyberspace." AJIL Unbound 111 (2017): 282–83. http://dx.doi.org/10.1017/aju.2017.77.
Full textMaria de Liguori Sakunab, Alfonsus, and Anggraeni Silvia. "Strategi Lebanon Dalam Meningkatkan Keamanan Ruang Siber." Jurnal Kajian Ilmiah 21, no. 2 (May 27, 2021): 195–208. http://dx.doi.org/10.31599/jki.v21i2.563.
Full textRizal, Muhamad, and Yanyan Yani. "Cybersecurity Policy and Its Implementation in Indonesia." JAS (Journal of ASEAN Studies) 4, no. 1 (August 9, 2016): 61. http://dx.doi.org/10.21512/jas.v4i1.967.
Full textGorian, Ella. ""Digital Nationalism" as the Embodiment of the Chinese Doctrine of the "Five Principles of Peaceful Coexistence"." Международное право и международные организации / International Law and International Organizations, no. 4 (April 2022): 82–97. http://dx.doi.org/10.7256/2454-0633.2022.4.39303.
Full textBarrinha, André, and G. Christou. "Speaking sovereignty: the EU in the cyber domain." European Security 31, no. 3 (July 3, 2022): 356–76. http://dx.doi.org/10.1080/09662839.2022.2102895.
Full textShen, Yi. "Cyber Sovereignty and the Governance of Global Cyberspace." Chinese Political Science Review 1, no. 1 (March 2016): 81–93. http://dx.doi.org/10.1007/s41111-016-0002-6.
Full textMueller, Milton L. "Against Sovereignty in Cyberspace." International Studies Review 22, no. 4 (September 20, 2019): 779–801. http://dx.doi.org/10.1093/isr/viz044.
Full textDuwi Wahyuni, Dhiah Ayu, Tri Legionosuko, and Sutrimo Sumarlan. "Cyber community empowerment policy as an effort to strengthen cyber defense." Strategi Perang Semesta 8, no. 1 (July 31, 2022): 103. http://dx.doi.org/10.56555/sps.v8i1.1196.
Full textAulianisa, Sarah Safira, and Indirwan Indirwan. "Critical Review of the Urgency of Strengthening the Implementation of Cyber Security and Resilience in Indonesia." Lex Scientia Law Review 4, no. 1 (May 8, 2020): 33–48. http://dx.doi.org/10.15294/lesrev.v4i1.38197.
Full textMiroshnichenko, Olga I., and Darya S. Proscurina. "STATE SOVEREIGNTY: DIFFERENTIATION OF THE CATEGORY IN CYBER REALITIES." Азиатско-Тихоокеанский регион: экономика, политика, право, no. 3 (2018): 9–20. http://dx.doi.org/10.24866/1813-3274/2018-3/9-20.
Full textZubko, O. M. "CYBER SOVEREIGNTY AS A NEW CATEGORY IN ADMINISTRATIVE LAW." Kyiv Law Journal, no. 4 (2021): 190–94. http://dx.doi.org/10.32782/klj/2021.4.28.
Full textSchmitt, Michael N., and Liis Vihul. "Sovereignty in Cyberspace: Lex Lata Vel Non?" AJIL Unbound 111 (2017): 213–18. http://dx.doi.org/10.1017/aju.2017.55.
Full textPinko, Eyal. "Maritime Cyber Threats and Challenges." National security and the future 20, no. 1-2 (January 9, 2020): 63–70. http://dx.doi.org/10.37458/nstf.20.1-2.7.
Full textMuawwan, Muawwan. "Three Perspective Theory of Cyber Sovereignty dalam Strategi Keamanan Siber Singapura." Jurnal Kajian Ilmiah 21, no. 2 (May 27, 2021): 171–84. http://dx.doi.org/10.31599/jki.v21i2.562.
Full textHummel, Patrik, Matthias Braun, Max Tretter, and Peter Dabrock. "Data sovereignty: A review." Big Data & Society 8, no. 1 (January 2021): 205395172098201. http://dx.doi.org/10.1177/2053951720982012.
Full textHong, Yu, and G. Thomas Goodnight. "How to think about cyber sovereignty: the case of China." Chinese Journal of Communication 13, no. 1 (November 12, 2019): 8–26. http://dx.doi.org/10.1080/17544750.2019.1687536.
Full textCuihong, Cai. "Global Cyber Governance: China’s Contribution and Approach." China Quarterly of International Strategic Studies 04, no. 01 (January 2018): 55–76. http://dx.doi.org/10.1142/s2377740018500069.
Full textDevine, Andrew. "Contesting the Digital World Order." Politikon: The IAPSS Journal of Political Science 42 (September 16, 2019): 61–79. http://dx.doi.org/10.22151/politikon.42.3.
Full textŠARF, PIKA. "LEGALITY OF LOW-INTENSITY CYBER OPERATIONS UNDER INTERNATIONAL LAW." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017 ISSUE 19/3 (September 15, 2017): 81–93. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.3.5.
Full textOktaviani, Putri Bilqis, and Anggraeni Silvia. "Strategi Keamanan Siber Malaysia." Jurnal Kajian Ilmiah 21, no. 1 (January 15, 2021): 69–84. http://dx.doi.org/10.31599/jki.v21i1.447.
Full textHasan, Krida Eva Setyawan. "Perlunya Tentara Nasional Indonesia Memiliki Angkatan Siber Guna Menghadapi Era Cyber warfare." Journal of Education, Humaniora and Social Sciences (JEHSS) 5, no. 1 (July 31, 2022): 264–74. http://dx.doi.org/10.34007/jehss.v5i1.1192.
Full textPutra, Tommy Mandala, I. Wayan Midhio, and Deni D.A.R. "The Challenges of Civil-Military Cooperation in The Face of Cyber Threats in Indonesia." International Journal of Research and Innovation in Social Science 06, no. 02 (2022): 471–74. http://dx.doi.org/10.47772/ijriss.2022.6221.
Full textHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Full textMitchell, Andrew D., and Theodore Samlidis. "Cloud services and government digital sovereignty in Australia and beyond." International Journal of Law and Information Technology 29, no. 4 (December 1, 2021): 364–94. http://dx.doi.org/10.1093/ijlit/eaac003.
Full textTerry, Patrick C. R. "“Don't Do as I Do”—The US Response to Russian and Chinese Cyber Espionage and Public International Law." German Law Journal 19, no. 3 (June 1, 2018): 613–26. http://dx.doi.org/10.1017/s207183220002280x.
Full textYurievich, Mamychev Alexey, Zolochevskaya Elena Yurievna, Miroshnichenko Olga Igorevna, Yevtushenko Sergey Aleksandrovich, and Kerimov Oleg Yuryevich. "National Sovereignty: Socio-Political Transformation in Context of Modern Cyber Realities." Journal of Politics and Law 12, no. 3 (July 10, 2019): 11. http://dx.doi.org/10.5539/jpl.v12n3p11.
Full textWicaksana Prakasa, Satria Unggul, and Noviandi Nur P.E. "ANALYSIST OF CYBER ESPIONAGE IN INTERNATIONAL LAW AND INDONESIAN LAW." Humanities & Social Sciences Reviews 7, no. 3 (April 2, 2019): 38–44. http://dx.doi.org/10.18510/hssr.2019.736.
Full textSilvia, Anggraeni, and Adi Muhajirin. "Strategi Keamanan Siber Nasional Qatar." Jurnal Keamanan Nasional 7, no. 1 (August 13, 2021): 1–22. http://dx.doi.org/10.31599/jkn.v7i1.477.
Full textCaranto Morford, Ashley, and Jeffrey Ansloos. "Indigenous sovereignty in digital territory: a qualitative study on land-based relations with #NativeTwitter." AlterNative: An International Journal of Indigenous Peoples 17, no. 2 (June 2021): 293–305. http://dx.doi.org/10.1177/11771801211019097.
Full textGupta, Shubh, and Reeta Sony. "Quest of Data Colonialism and Cyber Sovereignty: India’s Strategic Position in Cyberspace." Legal Issues in the Digital Age 2, no. 2 (July 27, 2021): 70–81. http://dx.doi.org/10.17323/2713-2749.2021.2.68.81.
Full textMenshikov, Р., and L. Mikhina. "THE SYSTEM OF COUNTERING INFORMATION SECURITY THREATS OF THE PEOPLEJS REPUBLIC OF CHINA." TRANSBAIKAL STATE UNIVERSITY JOURNAL 28, no. 1 (2022): 124–39. http://dx.doi.org/10.21209/2227-9245-2022-28-1-124-139.
Full textJoshua, Ayobamidele. "An Assessment of International Law on the Use of Cyber-Espionage as a Substitute for Traditional Spying." European Journal of Law and Political Science 1, no. 4 (September 20, 2022): 1–8. http://dx.doi.org/10.24018/ejpolitics.2022.1.4.21.
Full textSpáčil, Jakub. "Plea of Necessity: Legal Key to Protection against Unattributable Cyber Operations." Masaryk University Journal of Law and Technology 16, no. 2 (September 30, 2022): 215–39. http://dx.doi.org/10.5817/mujlt2022-2-4.
Full textBasdeo, Vinesh M., Moses Montesh, and Bernard Khotso Lekubu. "SEARCH FOR AND SEIZURE OF EVIDENCE IN CYBER ENVIRONMENTS: A LAW-ENFORCEMENT DILEMMA IN SOUTH AFRICAN CRIMINAL PROCEDURE." Journal of Law, Society and Development 1, no. 1 (September 1, 2014): 48–67. http://dx.doi.org/10.25159/2520-9515/874.
Full textKasper, Agnes, Anna-Maria Osula, and Anna Molnár. "EU cybersecurity and cyber diplomacy." IDP Revista de Internet Derecho y Política, no. 34 (December 13, 2021): 1–15. http://dx.doi.org/10.7238/idp.v0i34.387469.
Full textHenriksen, Anders. "Lawful State Responses to Low-Level Cyber-Attacks." Nordic Journal of International Law 84, no. 2 (June 1, 2015): 323–51. http://dx.doi.org/10.1163/15718107-08402008.
Full textSpector, Phil. "In Defense of Sovereignty, in the Wake of Tallinn 2.0." AJIL Unbound 111 (2017): 219–23. http://dx.doi.org/10.1017/aju.2017.56.
Full textZeng, Jinghan, Tim Stevens, and Yaru Chen. "China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of “Internet Sovereignty”." Politics & Policy 45, no. 3 (June 2017): 432–64. http://dx.doi.org/10.1111/polp.12202.
Full textDouhan, Alena F. "Adapting the Human Rights System to the Cyber Age." Max Planck Yearbook of United Nations Law Online 23, no. 1 (December 3, 2020): 249–89. http://dx.doi.org/10.1163/18757413_023001009.
Full textGhappour, Ahmed. "Tallinn, Hacking, and Customary International Law." AJIL Unbound 111 (2017): 224–28. http://dx.doi.org/10.1017/aju.2017.59.
Full text