The Treachery of Images in the Digital Sovereignty Debate
暂无分享,去创建一个
[1] Paul Timmers,et al. Ethics of AI and Cybersecurity When Sovereignty is at Stake , 2019, Minds and Machines.
[2] Cees T. A. M. de Laat,et al. A Responsible Internet to Increase Trust in the Digital World , 2020, J. Netw. Syst. Manag..
[3] Kieron O'Hara,et al. Four internets , 2020, Commun. ACM.
[4] L. Floridi. The Fight for Digital Sovereignty: What It Is, and Why It Matters, Especially for the EU , 2020, Philosophy & Technology.
[5] Towards a Transatlantic Concept of Data Privacy , 2019 .
[6] P. Kennedy. The rise and fall of the great powers : economic change and military conflict from 1500 to 2000 , 1989 .
[7] P. Berger,et al. Politics Among Nations: The Struggle for Power and Peace , 1950 .
[8] The ‘wicked problem’ of data localisation , 2017 .
[9] Jim Kurose,et al. Computer Networking: A Top-Down Approach , 1999 .
[10] Jukka Ruohonen,et al. The GDPR Enforcement Fines at Glance , 2020, ArXiv.
[11] J. Steiner. Concept Stretching: The Case of Deliberation , 2008 .
[12] A. Ingham,et al. The Rise and Fall of the Great Powers: Economic Change and Military Conflict from 1500 to 2000 , 1989 .
[13] Alberto Dainotti,et al. Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table , 2019, Internet Measurement Conference.
[14] Matthias Jarke. Data Sovereignty and the Internet of Production , 2020, CAiSE.
[15] Lawrence Siry. Cloudy days ahead: Cross-border evidence collection and its impact on the rights of EU citizens , 2019, New Journal of European Criminal Law.
[16] H. Rosenblatt. The Lost History of Liberalism , 2018 .
[17] F. Fabbrini,et al. Competing Jurisdictions: Data Privacy Across the Borders , 2020, Palgrave Studies in Digital Business & Enabling Technologies.
[18] H. Albrecht. Data, Data Banks and Security , 2020, European Journal for Security Research.
[19] Jukka Ruohonen. A Few Observations About State-Centric Online Propaganda , 2021, ArXiv.
[20] Fabien Terpan,et al. EU–US negotiations on law enforcement access to data: divergences, challenges and EU law procedures and options , 2020, International Data Privacy Law.
[21] Alan Chong,et al. Information Warfare? , 2014 .
[22] Ariel I. Ahram. Concepts and Measurement in Multimethod Research , 2013 .
[23] Andrew Aberdein. The Vices of Argument , 2016 .
[24] H. Laroche,et al. How Could You be so Gullible? Scams and Over-Trust in Organizations , 2018, Journal of Business Ethics.
[25] Norma Möllers. Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State , 2018 .
[26] J. Cortada. The Digital Flood: The Diffusion of Information Technology Across the U.S., Europe, and Asia , 2012 .
[27] Els Kindt. Why research may no longer be the same: About the territorial scope of the New Data Protection Regulation , 2016, Comput. Law Secur. Rev..
[28] Harriet Moynihan. The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention , 2019 .
[29] Bryan Garsten. Liberalism and the Rhetorical Vision of Politics , 2012 .
[30] Stephane Couture,et al. What does the notion of “sovereignty” mean when referring to the digital? , 2019, New Media Soc..
[31] Anna-Maria Osula. Transborder access and territorial sovereignty , 2015, Comput. Law Secur. Rev..
[32] T. Christakis. 'European Digital Sovereignty': Successfully Navigating Between the 'Brussels Effect' and Europe’s Quest for Strategic Autonomy , 2020, SSRN Electronic Journal.
[33] Jukka Ruohonen. An Acid Test for Europeanization: Public Cyber Security Procurement in the European Union , 2019, European Journal for Security Research.
[34] G. Sartori. Concept Misformation in Comparative Politics , 1970, American Political Science Review.
[35] Jukka Ruohonen. Do Cyber Capabilities and Cyber Power Incentivize International Cooperation? , 2020, ArXiv.
[36] Milton L. Mueller. Against Sovereignty in Cyberspace , 2020, International Studies Review.
[37] Richard. Youngs. Political order and political decay: from the industrial revolution to the globalisation of democracy , 2015 .
[38] Mika Kerttunen,et al. International Cybersecurity: Orchestral Manoeuvres in the Dark , 2018 .
[39] Alaa Assaf,et al. Contesting sovereignty in cyberspace , 2020, International Cybersecurity Law Review.
[40] David Midson. Geography, Territory and Sovereignty in Cyber Warfare , 2014 .
[41] Luca Belli,et al. Selling your soul while negotiating the conditions: from notice and consent to data control by design , 2017 .
[42] B. Gross. The Digital Flood: The Diffusion of Information Technology Across the U.S., Europe, and Asia by James W. Cortada (review) , 2015 .
[43] G. Sartori. The Essence of the Political in Carl Schmitt , 1989 .
[44] S. Sen. Unfinished Conquest: Residual Sovereignty and the Legal Foundations of the British Empire in India , 2013 .
[45] D. Philpott. Westphalia, Authority, and International Society , 1999 .
[46] N. Robins. Loot: in search of the East India Company, the world’s first transnational corporation , 2002 .
[47] Giovane C. M. Moura,et al. Clouding up the Internet: how centralized is DNS traffic becoming? , 2020, Internet Measurement Conference.
[48] Claudia Landwehr,et al. Defending democracy against technocracy and populism: Deliberative democracy's strengths and challenges , 2020 .
[49] A. Osiander. Sovereignty, International Relations, and the Westphalian Myth , 2001, International Organization.
[50] Bruce Schneier. Technologists vs. Policy Makers , 2020, IEEE Secur. Priv..
[51] Erik Gartzke,et al. The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth , 2013, International Security.
[52] Hans J. Morgenthau,et al. Politics among nations;: The struggle for power and peace , 1948 .
[53] Jesse Haapoja,et al. Data agency at stake: MyData activism and alternative frames of equal participation , 2019, New Media Soc..
[54] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[55] J. Barlow. A Declaration of the Independence of Cyberspace , 2021, Commonplace.
[56] Siobhan Daly. The Ladder of Abstraction: A Framework for the Systematic Classification of Democratic Regime Types , 2003 .
[57] T. Christov. The invention of Hobbesian anarchy , 2017 .
[58] G. Sartori. Comparing and Miscomparing , 1991 .
[59] C. W. Morris. Imagined communities: Reflections on the origin and spread of nationalism , 1995 .