2022
DOI: 10.1080/23738871.2022.2041061
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…Many of these policy strategies can be understood as seeking to reinforce what Krasner defined as interdependence sovereignty and are focused primarily on control, both internally and externally. The Russian and Chinese notions of digital sovereignty focus on the control of internal and external information flows (Broeders et al 2019; Creemers 2020; Kurowska 2020). These interpretations of digital sovereignty are usually justified in terms of the people's right to self‐determination and aim to block the interference of quasi‐sovereign tech giants, foreign state intervention and the free flow of information, all of which are considered a threat to regime continuity.…”
Section: Sovereignty Between Authority and Controlmentioning
confidence: 99%
“…Many of these policy strategies can be understood as seeking to reinforce what Krasner defined as interdependence sovereignty and are focused primarily on control, both internally and externally. The Russian and Chinese notions of digital sovereignty focus on the control of internal and external information flows (Broeders et al 2019; Creemers 2020; Kurowska 2020). These interpretations of digital sovereignty are usually justified in terms of the people's right to self‐determination and aim to block the interference of quasi‐sovereign tech giants, foreign state intervention and the free flow of information, all of which are considered a threat to regime continuity.…”
Section: Sovereignty Between Authority and Controlmentioning
confidence: 99%
“…In studying how political actors work to advance ‘rules of the road’ in cyberspace (Broeders et al, 2022; Giles, 2012; Mazanec, 2015; Raymond, 2019), scholars have relied primarily on informal-theoretic, case study, and interpretative methods to develop and evaluate theories. Such approaches have offered valuable insights.…”
mentioning
confidence: 99%