Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2016, Volume 18, Issue 6 doi: 10.15302/J-SSCAE-2016.06.018

A Review of Major Viewpoints on Cyber Sovereignty around the World

1. Academy of Equipment of PLA, Beijing 101416, China;

2. China United Network Communications Limited, Beijing 100089, China

Funding project:中国工程院重大咨询项目“网络空间安全战略研究”(2015-ZD-10) Received: 2016-10-12 Revised: 2016-10-20 Available online: 2016-12-13 15:28:55.000

Next Previous

Abstract

As well as bringing great convenience, cyberspace poses new problems and challenges. Cyber sovereignty, in particular, constitutes the basic principle for solving national interest conflicts that arise in the process of cyberspace development. This paper provides a review and an analysis of three typical viewpoints on cyber sovereignty from around the world; namely, advocating for cyber sovereignty, opposing it, or being indifferent to it. We also give an overview of the attitudes of important international organizations and major countries toward cyber sovereignty. Our purpose is to provide an objective description of the cyber sovereignty situation.

References

[ 1 ] Gao H J, Tsinghua journal of rule of law (fourth edition) [M]. Bei-jing: Tsinghua University Press, 2004. Chinese.

[ 2 ] Post D G. In search of Jefferson’s moose: Notes on the state of cyberspace [M]. New York: Oxford University Press, 2009. link1

[ 3 ] Clinton H R. Speech on internet freedom [EB/OL]. (2010-01-23) [2016-09-12]. http://www.checkinnews.cn/EditText_view.action?-textId=67582. Chinese. link1

[ 4 ] Clinton H R. Speech on internet freedom II [EB/OL]. (2011-01-23 [2016-09-12]. http://blog.renren.com/share/307262991/ 5137535771. Chinese. link1

[ 5 ] Lewis J A. Sovereignty and the role of government in cyberspace [J]. Brown Journal of World Affairs, 2010, 16 (2): 55–65. link1

[ 6 ] Liaropoulos A. Exercising state sovereignty in cyberspace: An 094A Review of the Major Viewpoints on Cyber Sovereignty Around the Worldinternal cyber-order under construction? [C]// Hart D, editor. Pro-ceedings of the 8th international conference on information war-fare and security ICIW 2013. Denver, Colorado, USA: Academic Publishing and Conferences International Limited, 2013: 136–145.

[ 7 ] Lindsay J R, Cheung T M, Reveron D S. China and cybersecurity: Espionage, strategy, and politics in the digital domain [M]. Lon-don: Oxford University Press, 2015. link1

[ 8 ] Wu T S. Cyberspace sovereignty?—The internet and the interna-tional system [J]. Harvard Journal of Law & Technology, 1997, 10 (3): 648–655. link1

[ 9 ] Tuukkanen T. Sovereignty in the cyber domain [M]// Rantapel-konen J, Salminen M, editors. The Fog of Cyber Defence. Helsin-ki: National Defense University, Department of Leadership and Military Pedagogy, 2013: 37–45. link1

[10] Jensen E T. Cyber sovereignty: The way ahead [J].Texas International Law Journal, 2014, 50 (2): 275–304. link1

[11] International Group of Experts at the Invitation of the NATO Cooperative Cyber Defense Centre of Excellence. Tallinn manual on the international law applicable to cyber warfare [M]. Zhu L X, Zhu Y X, Chen W, et al, translators. Beijing: National Defense Industry Press, 2016. Chinese.

[12] Jensen E T. Sovereignty and neutrality in cyber conflict [J].Social Science Electronic Publishing, 2011, 35: 815–841. link1

[13] United Nations. Sixty-eighth session, item 94 of the provisional agenda: Group of governmental experts on developments in the field of information and telecommunications in the context of in-ternational security (A/68/98) [R/OL]. (2013-06-24) [2016-09-10]. link1

[14] United Nations. Seventieth session, item 93 of the provisional agenda: Group of governmental experts on developments in the field of information and telecommunications in the context of international security (A/70/174) [R/OL]. (2015-07-22) [2016-09-10]. link1

Related Research