Cyberspace & Sovereignty


Book Description

How do you describe cyberspace comprehensively?This book examines the relationship between cyberspace and sovereignty as understood by jurists and economists. The author transforms and abstracts cyberspace from the perspective of science and technology into the subject, object, platform, and activity in the field of philosophy. From the three dimensions of 'ontology' (cognition of cyberspace and information), 'epistemology' (sovereignty evolution), and 'methodology' (theoretical refinement), he uses international law, philosophy of science and technology, political philosophy, cyber security, and information entropy to conduct cross-disciplinary research on cyberspace and sovereignty to find a scientific and accurate methodology. Cyberspace sovereignty is the extension of modern state sovereignty. Only by firmly establishing the rule of law of cyberspace sovereignty can we reduce cyber conflicts and cybercrimes, oppose cyber hegemony, and prevent cyber war. The purpose of investigating cyberspace and sovereignty is to plan good laws and good governance. This book argues that cyberspace has sovereignty, sovereignty governs cyberspace, and cyberspace governance depends on comprehensive planning. This is a new theory of political philosophy and sovereignty law.




CYBERSPACE SOVEREIGNTY


Book Description




Cyber Sovereignty


Book Description




China’s Digital Authoritarianism


Book Description

This book provides a governance perspective on China’s digital authoritarianism by examining the political and institutional dynamics of the country’s internet sector in a historical context. Using leading theories of authoritarian institutions, it discusses China’s approach to the internet and methods of implementation in terms of party-state institutions and policy processes. This provides a much-needed ‘inside out’ perspective on digital authoritarianism that avoids the perception of China as some coherent and static monolith. The study also offers a powerful rationale for China’s cyber sovereignty as an externalisation of its domestic internet governance framework and broader political-economic context. As China shifts from rule-taker to rule-maker in world politics, the Chinese Dream (zhongguo meng) is now going global. Beijing’s digital authoritarian toolkit is being promoted and exported to other authoritarian regimes, making China a major driver of digital repression at the global level.




China, Africa, and the Future of the Internet


Book Description

China is transforming Africa's information space. It is assisting African broadcasters with extensive loans, training and exchange programmes and has set up its own media operations on the continent in the form of CCTV Africa. In the telecommunications sector, China is helping African governments to expand access to the internet and mobile phones, with rapid and large-scale success. While Western countries have ambiguously linked the need to fight security threats with restrictions of the information space, China has been vocal in asserting the need to control communication to ensure stability and development. Featuring a wealth of interviews with a variety of actors – from Chinese and African journalists in Chinese media to Chinese workers for major telecommunication companies – this highly original book demonstrates how China is both contributing to the 'Africa rising' narrative while exploiting the weaknesses of Western approaches to Africa, which remain trapped between an emphasis on stability and service delivery, on the one hand, and the desire to advocate human rights and freedom of expression on the other. Arguing no state can be understood without attention to its information structure, the book provides the first assessment of China’s new model for the media strategies of developing states, and the consequences of policing Africa’s information space for geopolitics, security and citizenship.




Quo Vadis, Sovereignty?


Book Description

This book presents an interdisciplinary exploration of digital sovereignty in China, which are addressed mainly from political, legal and historical point of views. The text leverages a large number of native Chinese experts among the authors at a time when literature on China’s involvement in internet governance is more widespread in the so-called “West”. Numerous Chinese-language documents have been analysed in the making of this title and furthermore, literature conceptualising digital sovereignty is still limited to journal articles, making this one of the earliest collective attempts at defining this concept in the form of a book. Such characteristics position this text as an innovative academic resource for students, researchers and practitioners in international relations (IR), law, history, media studies and philosophy.




The Unwanted Gaze


Book Description

As thinking, writing, and gossip increasingly take place in cyberspace, the part of our life that can be monitored and searched has vastly expanded. E-mail, even after it is deleted, becomes a permanent record that can be resurrected by employers or prosecutors at any point in the future. On the Internet, every website we visit, every store we browse in, every magazine we skim--and the amount of time we skim it--create electronic footprints that can be traced back to us, revealing detailed patterns about our tastes, preferences, and intimate thoughts. In this pathbreaking book, Jeffrey Rosen explores the legal, technological, and cultural changes that have undermined our ability to control how much personal information about ourselves is communicated to others, and he proposes ways of reconstructing some of the zones of privacy that law and technology have been allowed to invade. In the eighteenth century, when the Bill of Rights was drafted, the spectacle of state agents breaking into a citizen's home and rummaging through his or her private diaries was considered the paradigm case of an unconstitutional search and seizure. But during the impeachment of President Bill Clinton, prosecutors were able to subpoena Monica Lewinsky's bookstore receipts and to retrieve unsent love letters from her home computer. And the sense of violation that Monica Lewinsky experienced is not unique. In a world in which everything that Americans read, write, and buy can be recorded and monitored in cyberspace, there is a growing danger that intimate personal information originally disclosed only to our friends and colleagues may be exposed to--and misinterpreted by--a less understanding audience of strangers. Privacy is important, Rosen argues, because it protects us from being judged out of context in a world of short attention spans, a world in which isolated bits of intimate information can be confused with genuine knowledge. Rosen also examines the expansion of sexual-harassment law that has given employers an incentive to monitor our e-mail, Internet browsing habits, and office romances. And he suggests that some forms of offensive speech in the workplace--including the indignities allegedly suffered by Paula Jones and Anita Hill--are better conceived of as invasions of privacy than as examples of sex discrimination. Combining discussions of current events--from Kenneth Starr's tapes to DoubleClick's on-line profiles--with inno-vative legal and cultural analysis, The Unwanted Gaze offers a powerful challenge to Americans to be proactive in the face of new threats to privacy in the twenty-first century.




Demystifying Treaty Interpretation


Book Description

Will appeal to scholars, practitioners and general readers engaging with treaty interpretation at all levels and will enhance the reader's knowledge and mastery of the interpretive process. It will shed light on all those relevant elements and/or connections that the traditional rule-based approach to treaty interpretation largely overlooks.