The Treachery of Images in the Digital Sovereignty Debate

This short theoretical and argumentative essay contributes to the ongoing deliberation about the so-called digitalfug sovereignty, as pursued particularly in the European Union (EU). Drawing from classical political science literature, the essay approaches the debate through paradoxes that arise from applying classical notions of sovereignty to the digital domain. With these paradoxes and a focus on the Peace of Westphalia in 1648, the essay develops a viewpoint distinct from the conventional territorial notion of sovereignty. Accordingly, the lesson from Westphalia has more to do with the capacity of a state to govern. It is also this capacity that is argued to enable the sovereignty of individuals within the digital realm. With this viewpoint, the essay further advances another, broader, and more pressing debate on politics and democracy in the digital era.

[1]  Paul Timmers,et al.  Ethics of AI and Cybersecurity When Sovereignty is at Stake , 2019, Minds and Machines.

[2]  Cees T. A. M. de Laat,et al.  A Responsible Internet to Increase Trust in the Digital World , 2020, J. Netw. Syst. Manag..

[3]  Kieron O'Hara,et al.  Four internets , 2020, Commun. ACM.

[4]  L. Floridi The Fight for Digital Sovereignty: What It Is, and Why It Matters, Especially for the EU , 2020, Philosophy & Technology.

[5]  Towards a Transatlantic Concept of Data Privacy , 2019 .

[6]  P. Kennedy The rise and fall of the great powers : economic change and military conflict from 1500 to 2000 , 1989 .

[7]  P. Berger,et al.  Politics Among Nations: The Struggle for Power and Peace , 1950 .

[8]  The ‘wicked problem’ of data localisation , 2017 .

[9]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach , 1999 .

[10]  Jukka Ruohonen,et al.  The GDPR Enforcement Fines at Glance , 2020, ArXiv.

[11]  J. Steiner Concept Stretching: The Case of Deliberation , 2008 .

[12]  A. Ingham,et al.  The Rise and Fall of the Great Powers: Economic Change and Military Conflict from 1500 to 2000 , 1989 .

[13]  Alberto Dainotti,et al.  Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table , 2019, Internet Measurement Conference.

[14]  Matthias Jarke Data Sovereignty and the Internet of Production , 2020, CAiSE.

[15]  Lawrence Siry Cloudy days ahead: Cross-border evidence collection and its impact on the rights of EU citizens , 2019, New Journal of European Criminal Law.

[16]  H. Rosenblatt The Lost History of Liberalism , 2018 .

[17]  F. Fabbrini,et al.  Competing Jurisdictions: Data Privacy Across the Borders , 2020, Palgrave Studies in Digital Business & Enabling Technologies.

[18]  H. Albrecht Data, Data Banks and Security , 2020, European Journal for Security Research.

[19]  Jukka Ruohonen A Few Observations About State-Centric Online Propaganda , 2021, ArXiv.

[20]  Fabien Terpan,et al.  EU–US negotiations on law enforcement access to data: divergences, challenges and EU law procedures and options , 2020, International Data Privacy Law.

[21]  Alan Chong,et al.  Information Warfare? , 2014 .

[22]  Ariel I. Ahram Concepts and Measurement in Multimethod Research , 2013 .

[23]  Andrew Aberdein The Vices of Argument , 2016 .

[24]  H. Laroche,et al.  How Could You be so Gullible? Scams and Over-Trust in Organizations , 2018, Journal of Business Ethics.

[25]  Norma Möllers Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State , 2018 .

[26]  J. Cortada The Digital Flood: The Diffusion of Information Technology Across the U.S., Europe, and Asia , 2012 .

[27]  Els Kindt Why research may no longer be the same: About the territorial scope of the New Data Protection Regulation , 2016, Comput. Law Secur. Rev..

[28]  Harriet Moynihan The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention , 2019 .

[29]  Bryan Garsten Liberalism and the Rhetorical Vision of Politics , 2012 .

[30]  Stephane Couture,et al.  What does the notion of “sovereignty” mean when referring to the digital? , 2019, New Media Soc..

[31]  Anna-Maria Osula Transborder access and territorial sovereignty , 2015, Comput. Law Secur. Rev..

[32]  T. Christakis 'European Digital Sovereignty': Successfully Navigating Between the 'Brussels Effect' and Europe’s Quest for Strategic Autonomy , 2020, SSRN Electronic Journal.

[33]  Jukka Ruohonen An Acid Test for Europeanization: Public Cyber Security Procurement in the European Union , 2019, European Journal for Security Research.

[34]  G. Sartori Concept Misformation in Comparative Politics , 1970, American Political Science Review.

[35]  Jukka Ruohonen Do Cyber Capabilities and Cyber Power Incentivize International Cooperation? , 2020, ArXiv.

[36]  Milton L. Mueller Against Sovereignty in Cyberspace , 2020, International Studies Review.

[37]  Richard. Youngs Political order and political decay: from the industrial revolution to the globalisation of democracy , 2015 .

[38]  Mika Kerttunen,et al.  International Cybersecurity: Orchestral Manoeuvres in the Dark , 2018 .

[39]  Alaa Assaf,et al.  Contesting sovereignty in cyberspace , 2020, International Cybersecurity Law Review.

[40]  David Midson Geography, Territory and Sovereignty in Cyber Warfare , 2014 .

[41]  Luca Belli,et al.  Selling your soul while negotiating the conditions: from notice and consent to data control by design , 2017 .

[42]  B. Gross The Digital Flood: The Diffusion of Information Technology Across the U.S., Europe, and Asia by James W. Cortada (review) , 2015 .

[43]  G. Sartori The Essence of the Political in Carl Schmitt , 1989 .

[44]  S. Sen Unfinished Conquest: Residual Sovereignty and the Legal Foundations of the British Empire in India , 2013 .

[45]  D. Philpott Westphalia, Authority, and International Society , 1999 .

[46]  N. Robins Loot: in search of the East India Company, the world’s first transnational corporation , 2002 .

[47]  Giovane C. M. Moura,et al.  Clouding up the Internet: how centralized is DNS traffic becoming? , 2020, Internet Measurement Conference.

[48]  Claudia Landwehr,et al.  Defending democracy against technocracy and populism: Deliberative democracy's strengths and challenges , 2020 .

[49]  A. Osiander Sovereignty, International Relations, and the Westphalian Myth , 2001, International Organization.

[50]  Bruce Schneier Technologists vs. Policy Makers , 2020, IEEE Secur. Priv..

[51]  Erik Gartzke,et al.  The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth , 2013, International Security.

[52]  Hans J. Morgenthau,et al.  Politics among nations;: The struggle for power and peace , 1948 .

[53]  Jesse Haapoja,et al.  Data agency at stake: MyData activism and alternative frames of equal participation , 2019, New Media Soc..

[54]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[55]  J. Barlow A Declaration of the Independence of Cyberspace , 2021, Commonplace.

[56]  Siobhan Daly The Ladder of Abstraction: A Framework for the Systematic Classification of Democratic Regime Types , 2003 .

[57]  T. Christov The invention of Hobbesian anarchy , 2017 .

[58]  G. Sartori Comparing and Miscomparing , 1991 .

[59]  C. W. Morris Imagined communities: Reflections on the origin and spread of nationalism , 1995 .