Sovereignty and Ciber-Sovereignty

China in redefining ciberspace

Authors

DOI:

https://doi.org/10.23925/2675-8253.2022v3n1A7

Keywords:

cyber-sovereignty, China, internet governance, cyberspace, sovereignty

Abstract

The key questions of cyberspace and internet governance are central to the contemporary debate on technology; which are discussed in this article. To understand the various implications of this debate and orient the discussion, the further questions are proposed: what is China’s role in the development of new relations with technology? How is the process of its cyberspace governance developing? What are the international impacts of the Chinese cyber-sovereign  agenda? What is at stake in cyber-sovereignty and what is the centrality of this notion for the international trends of internet governance?

Author Biography

Bernardo João do Rego Monteiro Moreira, Universidade Federal Fluminense

Bernardo João do Rego Monteiro Moreira é pesquisador pelo Programa Institucional de Bolsas de Iniciação Científica do CNPq/UFF, pesquisador vinculado ao Grupo de Análise em Política Internacional (GAPI) – PPGCP/UFF e graduando em Ciências Sociais pela Universidade Federal Fluminense.

References

ALLEN, Jason Grant; LASTRA, Rosa María. Border Problems: Mapping the Third Border. The Modern Law Review, vol. 83, nº 3, p. 505–538, 30 jan. 2020. DOI 10.1111/1468-2230.12506. Disponível em: http://dx.doi.org/10.1111/1468-2230.12506

BARAM, Gil; MENASHRI, Harel. Why can’t we be friends? Challenges to international cyberwarfare cooperation efforts and the way ahead. Comparative Strategy, vol. 38, nº 2, p. 89–97, 4 mar. 2019. DOI 10.1080/01495933.2019.1573069. Disponível em: http://dx.doi.org/10.1080/01495933.2019.1573069.

BAUMAN, Zygmunt. Reconnaissance Wars of the Planetary Frontierland. Theory, Culture & Society, vol. 19, nº 4, p. 81–90, ago. 2002. DOI 10.1177/0263276402019004006. Disponível em: http://dx.doi.org/10.1177/0263276402019004006.

CULP, Andrew. Dark Deleuze. São Paulo: GLAC edições, abril de 2020.

GIDDENS, Anthony. As consequências da modernidade. São Paulo: Editora Unesp, 1991.

HONG, Yu; GOODNIGHT, G. Thomas. How to think about cyber sovereignty: the case of China. Chinese Journal of Communication, vol. 13, nº 1, p. 8–26, 12 nov. 2019. DOI 10.1080/17544750.2019.1687536. Disponível em: http://dx.doi.org/10.1080/17544750.2019.1687536.

HUI, Yuk. The Question Concerning Technology In China: An Essay in Cosmotechnics. Falmouth: Urbanomic, 2016.

IASIELLO, Emilio. China’s Cyber Initiatives Counter International Pressure. Journal of Strategic Security, vol. 10, nº 1, p. 1–16, mar. 2017. DOI 10.5038/1944-0472.10.1.1548. Disponível em: http://dx.doi.org/10.5038/1944-0472.10.1.1548.

KHANNA, Pallavi. STATE SOVEREIGNTY AND SELF-DEFENCE IN CYBERSPACE. BRICS Law Journal, vol. 5, nº 4, p. 139–154, 15 dez. 2018. DOI 10.21684/2412-2343-2018-5-4-139-154. Disponível em: http://dx.doi.org/10.21684/2412-2343-2018-5-4-139-154.

KOKAS, Aynne. Platform Patrol: China, the United States, and the Global Battle for Data Security. The Journal of Asian Studies, vol. 77, nº 4, p. 923–933, nov. 2018. DOI 10.1017/s0021911818002541. Disponível em: http://dx.doi.org/10.1017/s0021911818002541.

LAND, Nick. Fanged Noumena: Collected Writings 1987-2007. Falmouth/New York: Urbanomic/Sequence Press, 2011.

LOH, Dylan MH; HEISKANEN, Jaakko. Liminal sovereignty practices: Rethinking the inside/outside dichotomy. Cooperation and Conflict, vol. 55, nº 3, p. 284–304, 9 mar. 2020. DOI 10.1177/0010836720911391. Disponível em: http://dx.doi.org/10.1177/0010836720911391.

LIU, Jinhe. China’s data localization. Chinese Journal of Communication, vol. 13, nº 1, p. 84–103, 20 ago. 2019. DOI 10.1080/17544750.2019.1649289. Disponível em: http://dx.doi.org/10.1080/17544750.2019.1649289.

MORGENTHAU, Hans Joachim. Politics among nations: the struggle for power and peace. New York: Knopf, 1976.

PLANTIN, Jean-Christophe; DE SETA, Gabriele. WeChat as infrastructure: the techno-nationalist shaping of Chinese digital platforms. Chinese Journal of Communication, vol. 12, nº 3, p. 257–273, 21 fev. 2019. DOI 10.1080/17544750.2019.1572633. Disponível em: http://dx.doi.org/10.1080/17544750.2019.1572633.

QI, Aimin; SHAO, Guosong; ZHENG, Wentong. Assessing China’s Cybersecurity Law. Computer Law & Security Review, vol. 34, nº 6, p. 1342–1354, dez. 2018. DOI 10.1016/j.clsr.2018.08.007. Disponível em: http://dx.doi.org/10.1016/j.clsr.2018.08.007.

SCHULZE, Matthias. From cyber-utopia to cyber-war: normative change in cyberspace. 2018. Friedrich-Schiller-Universität Jena, 2018. DOI 10.22032/DBT.35107. Disponível em: https://www.db-thueringen.de/receive/dbt_mods_00035107.

TAYLOR, Richard D. “Data localization”: The internet in the balance. Telecommunications Policy, vol. 44, nº 8, p. 102003, set. 2020. DOI 10.1016/j.telpol.2020.102003. Disponível em: http://dx.doi.org/10.1016/j.telpol.2020.102003.

TIMMERS, Paul. CHALLENGED BY "DIGITAL SOVEREIGNTY". Journal of Internet Law, vol 23, (6), pp. 1-20, 2019.

WALTZ, K. N. Theory of international politics. Long Grove, IL: Waveland Press, 2010.

YANG, Feng; MUELLER, Milton L. Internet governance in China: a content analysis. Chinese Journal of Communication, vol. 7, nº 4, p. 446–465, 16 jul. 2014. DOI 10.1080/17544750.2014.936954. Disponível em: http://dx.doi.org/10.1080/17544750.2014.936954.

Published

2022-09-29

How to Cite

Moreira, B. J. do R. M. (2022). Sovereignty and Ciber-Sovereignty: China in redefining ciberspace. Revista Avesso: Pensamento, Memória E Sociedade, 3(1). https://doi.org/10.23925/2675-8253.2022v3n1A7

Issue

Section

Artigos