Sovereignty as a Factor in Securing, Securitizing, and Fragmenting Cyberspace

Authors

  • Taťána Jančárková Palacký University in Olomouc

DOI:

https://doi.org/10.26881/gsp.2023.2.09

Keywords:

sovereignty, cyberspace, securitization, fragmentation of cyberspace

Abstract

Information and communication technologies have played an important role in shaping the globalized world we live in today. While it is an accepted fact that globalization has challenged the understanding of the concept of sovereignty, the link between sovereignty and cyberspace is often not thought of at all. There are, however, multiple ways in which sovereignty has affected cyberspace as we know it. This article looks at how the notion of sovereignty contributes to the security, securitization, and, eventually, the possible fragmentation of cyberspace.

Downloads

Download data is not yet available.

References

Access Now, Internet shutdowns in 2021: The return of digital authoritarianism, 28 April 2022, https://www.accessnow.org/wp-content/uploads/2022/05/2021-KIO-Report-May-24-2022. pdf.

Barlow J.P., A Declaration of the Independence of Cyberspace, 8 February 1996, https://www.eff. org/cyberspace-independence.

Besson S., Sovereignty [in:] Max Planck Encyclopedia of Public International Law, OUP 2011, https:// opil.ouplaw.com/display/10.1093/law:epil/9780199231690/law-9780199231690-e1472?rskey=eOob0X&result=1&prd=OPIL.

Blessing J., The Global Spread of Cyber Forces, 2000–2018 [in:] 13th International Conference on Cyber Conflict: Going Viral, eds. T. Jančárková, L. Lindström, G. Visky, P. Zotz, Tallinn 2021.

Bumiller E., Shanker T., Panetta Warns of Dire Threat of Cyberattack on U.S., “New York Times”, 11 October 2012, https://www.nytimes.com/2012/10/12/world/panetta-warns-ofdire-threat-of-cyberattack.html.

Buzan B., Waever O., de Wilde J., Security: A New Framework for Analysis, London 1998. Krasner S., Sovereignty. Organized Hypocrisy, Princeton 1999.

Lasar M., Nazi hunting: How France first “civilized” the Internet, “Ars Technica”, 22 June 2011, https:// arstechnica.com/tech-policy/2011/06/how-france-proved-that-the-internetis-not-global/.

LICRA et UEJF v. Yahoo! Inc., Tribunal de Grande Instance de Paris, RG 05308 (22 May 2000). NATO, Warsaw Summit Communiqué, 9 July 2016, https://www.nato.int/cps/en/natohq/official_ texts_133169.htm.

Permanent Court of Arbitration, Island of Palmas Case (The Netherlands v United States), case no. 1925-01, award, https://pcacases.com/web/sendAttach/714.

United Nations, Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, A/68/98, 24 June 2013, https://documents-dds-ny.un.org/doc/UNDOC/GEN/N13/371/66/PDF/N1337166.pdf?OpenElement.

Viswanatha A., Menn J., Obama’s Response to the Sony Hack Says a Lot about US Cyber Policy, “Business Insider”, 14 January 2016, https://www.businessinsider.com/r-incyberattacks-such-assony-strike-obama-turns-to-name-and-shame-2015-1.

Downloads

Published

2023-06-15

How to Cite

Jančárková, T. (2023). Sovereignty as a Factor in Securing, Securitizing, and Fragmenting Cyberspace. Gdańsk Legal Studies, (2(59)/2023), 109–116. https://doi.org/10.26881/gsp.2023.2.09