Loading [MathJax]/extensions/MathMenu.js
Sovereignty in cyberspace: Balkanization or democratization | IEEE Conference Publication | IEEE Xplore

Sovereignty in cyberspace: Balkanization or democratization


Abstract:

Inherently linked to States' sovereignty and its relationship with third-party stakeholders, the governance of cyberspace has become a subject of great debate and controv...Show More

Abstract:

Inherently linked to States' sovereignty and its relationship with third-party stakeholders, the governance of cyberspace has become a subject of great debate and controversies. One of the most prominent of them -the dominance of the United States as an hegemon- has raised concerns and triggered diverging reactions within the international community. Looking at recent events such as the invalidation of the Safe Harbor Agreement through the lenses of the balance of power, we found that the reassertion of States in cyberspace is dependent on the political significance given to cyberspace as both a transnational realm and an American-dominated space. If most States have adopted a balancing policy vis-à-vis the US by means of either critical cooperation (EU, France) or what could be described as a form of containment (Russia, China), some others pursue free-riding policies (Ireland, Luxembourg), causing regional struggles. We suggest that, given this fragmentation of the Web, regulation of cyberspace would be best served through a multilateral mode of governance which could enhance collective security.
Date of Conference: 21-23 October 2016
Date Added to IEEE Xplore: 02 February 2017
ISBN Information:
Conference Location: Washington, DC, USA
References is not available for this document.

I. Introduction

The last semester of 2015 saw several attempts from States to tighten their control over the digital domain. The Russian Duma passed a bill in September mandating Internet Service Providers (ISPs) to locate servers hosting data from Russian citizens in Russia, thus protecting these data from what was perceived as an intrusive global surveillance by the NSA (and allowing the FSB to spy on Russian dissenters). The following month, the European Court of Justice struck down the Safe Harbor Agreement which until then permitted US companies to transfer data from European users outside the European Union. Despite their similarities in terms not only of sovereignty but also of mistrust vis arthur.laudrain@kel.ac.uk). vis the United States, these two events reveal the deeply rooted ambiguities of cyberspace. However, their implications for international security and cooperation between States are far from similar.

Select All
1.
B. Buzan and G. Lawson, The Global Transformation: History Modernity and the Making of International Relations, Cambridge:Cambridge University Press, 2015.
2.
A. Bendiek, "Beyond US Hegemony: The Future of a Liberal Order of the Internet" in Liberal Order in a Post-Western World, Washington, DC:Transatlantic Academy, pp. 57-69, 2014.
3.
D.C. Copeland, Economic Interdependence and War, Princeton, NJ:Princeton UP, 2014.
4.
J.R. Lindsay, "The Impact of China on Cybersecurity: Fiction and Friction", Int. Sec., vol. 39, no. °3, pp. 7-47, 2014.
5.
B. Buchanan, "The Cybersecurity Dilemma: Hacking Trust and Fear Between Nations" in Hurst & Co. Forth, London, 2016.
6.
S. D. Krasner, Sovereignty: Organised Hypocrisy.
7.
T. Stevens and D. Betz, "Cyberspace and the State: Toward a Strategy for Cyber-Power", Adelphi Series, vol. 51, no. ° 424, pp. 6-158, Nov. 2011.
8.
C.P. Kindleberger, The World in Depression 1929–1939, Berkeley, CA:University of California Press, 1973.
9.
R. Gilpin, War and Change in World Politics, Cambridge:Cambridge University Press, 1981.
10.
"Obama Meets Swisher", Recode, Feb. 2015.
11.
H. Farrell and A. Newman, "The Transatlantic Data War. Europe Fights Back Against the NSA", Foreign Affairs, vol. 95, no. °1, pp. 214-134, Jan.-Feb. 2016.
12.
E. Nakashima, "Top E.U. Court Strikes Down Major Data-Sharing Pact Between U.S. and Europe", The Washington Post, Oct. 2015.
13.
B. Posen, "Command of the Commons: The Military Foundation of US Hegemony", Int. Sec., vol. 28, no. °1, pp. 5-46, Summer 2003.
14.
R.N. Lebow and S. Reich, Good Bye Hegemony! Power and Influence in the International System, Princeton, NJ:Princeton UP, pp. 35-49, 2014.
15.
J. Agnew, Globalization & Sovereignty, New York, NY:Rowman & Littlefield, 2009.
16.
M. Castells, "A Network Theory of Power", Int. Jour. of Com., vol. 5, pp. 773-787, 2011.
17.
D. Betz, Carnage and Connectivity: Landmarks in the Decline of Conventional Military Power, London:Hurst & Co., 2015.
18.
D. M. Faris, "La révolte en réseau: le « printemps arabe » et les médias sociaux", Politique étrangère, no. °1, pp. 99-109, Feb. 2012.
19.
J. Abassi, "Information and Communication Technology in the Middle East: Situation as of 2010 and Prospective Scenarios for 2030", CASE Network Reports No. 105.
20.
V. Silver, "Post-revolt Tunisia can alter e-mail with ‘Big Brother’ software", Bloomberg Technology, Dec. 2011, [online] Available: http://www.bloomberg.com/news/2011-12-12/tunisia-after-revolt-can-alter-e-mails-with-big-brother-software.htm.
21.
B. Wagner, "Push-button-autocracy in Tunisia: Analysing the role of Internet infrastructure institutions and international markets in creating a Tunisian censorship regime", Telecommunications Policy, vol. 36, no. 6, pp. 484-492, Jul. 2012.
22.
J. R. Lindsay and T. M. Cheung, China and Cybersecurity: Espionage Strategy and Politics in the Digital Domain, New-York, NY:OUP, 2015.
23.
J. C. Davies, "Toward a Theory of Revolution", Am. Socio. Rev., vol. 27, no. 1, pp. 5-19, Feb. 1962.
24.
B. Dickson, The Dictator's Dilemma: The Chinese Communist Party's Strategy for Survival, New-York, NY:OUP, 2016.
25.
T. Wu and J. Goldsmith, Who controls the Internet? Illusions of a Borderless World, New-York, NY:OUP, 2016.
26.
L. Clark, "Tim Berners-Lee: We Need to Re-Decentralize the Web", Wired, Feb. 2014.
27.
M. Todorova, Imagining the Balkans, London:Oxford University Press, 1997.
28.
M. C. Libicki, "Crisis and Escalation in Cyberspace" in RAND Corp. Santa Monica, CA., MG-1215-AF, 2012.
29.
J. A. Lewis, "‘Compelling Opponents to Our Will’ The Role of Cyberwarfare in Ukraine", Cyber War in Perspective: Russian Aggression against Ukraine, pp. 39-48, 2015.
30.
J. Nocetti, "Guerre de l'information: le web russe en Ukraine" in Focus Stratégique, IFRI, Paris, no. °62, Sept. 2015.
Contact IEEE to Subscribe

References

References is not available for this document.