Skip to main content

Cyberspace Governance and State Sovereignty

  • Chapter
  • First Online:
Democracy and an Open-Economy World Order

Abstract

Cyberspace is a socio-political and technological domain with unique characteristics. Cyberspace transcends territorial and legal boundaries and is mostly owned and managed by the private sector. The fact that states are unable to secure cyberspace on their own, forces them to develop cooperative mechanisms with other states and international organizations, but also with the private sector. This reality raises a number of issues regarding the most effective model of governance. Viewing cyberspace as a global commons, balancing between state sovereignty and the fragmentation of cyberspace, debating between multilateral governance and multi-stakeholderism and establishing cyber norms, sketch a rather complex picture of cyberspace governance. The cases of ITU, ICANN, IGF and NETmundial offer us a pragmatic insight into the power politics of cyberspace. Cyberspace is a geopolitical arena, where states compete with each other, but are also being challenged by the private sector.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    According to Professor Nazli Choucri, cyberspace is characterized by: temporality (replaces conventional temporality with near instantaneity), physicality (transcends constraints of geography and physical location), permeation (penetrates boundaries and jurisdictions), fluidity (manifests sustained shifts and reconfigurations), participation (reduces barriers to activism and political expression), attribution (obscures identities of actors and links to action) and accountability (bypasses mechanisms of responsibility).

  2. 2.

    The Internet of Things (IoT) is a concept that aims to connect various devices or objects—things through wireless and wired connections and create an environment where users can interact at any time with the digital and the physical world. The IoT is mobile, virtual, built on cloud computing and networks of data gathering sensors and is growing rapidly. Mobile applications and sensors are now operating in cars, refrigerators, machinery, medical technology and smart phones.

  3. 3.

    Big Data is a term that refers to large and complex sets of data, both structured and unstructured, that surpasses the ability of typical database software tools to capture, store, manage and analyze. The challenges that Big Data poses, relate to the ‘3Vs’ characteristics: volume, variety and velocity.

  4. 4.

    Dark Web is a part of Internet that is intentionally hidden; it is not indexed by search engines and is inaccessible through standard web browsers. An example of Dark Web is the Tor network that offers its users anonymity by encrypting data and sending them through other routers.

  5. 5.

    Hybrid refers to the combination of two different elements. As Weitzenboeck points out, it does not differentiate between either/or, but combines both-and. In the case of cyberspace governance, hybrid governance would involve both the public and the private sector. It is worth asking whether cyberspace governance could be approached as a case of hybrid governance, where different methods of governance—that surpass the boundaries between the public and the private, the national and the international—could regulate specific areas of cyberspace.

  6. 6.

    For more details see https://www.eff.org/

  7. 7.

    For more details see http://www.itu.int/en/Pages/default.aspx

  8. 8.

    In 2011 China, Russia, Tajikistan and Uzbekistan first circulated an International Code of Conduct on Information Security for the consideration of UN member-states. The United States and other western states dismissed the code, with the argument that it would lead to state’s control of Internet and online content. In 2015 China, Russia, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan, have jointly submitted an update of their International Code of Conduct on Information Security to the UN Secretary General, stressing once more the need for new international law for cyberspace.

  9. 9.

    For more details see https://www.icann.org/

  10. 10.

    For more details see http://www.intgovforum.org/

  11. 11.

    For more details see http://netmundial.br/

References

  • Bajaj, K. (2014). Cyberspace: Post Snowden. Strategic Analysis, 38, 582–587.

    Article  Google Scholar 

  • Barlow, J. P. (1996). A declaration of the independence of cyberspace. https://www.eff.org/cyberspace-independence

  • Betz, D., & Stevens, T. (2011). Cyberspace and the state. Toward a strategy for cyber-power (Adelphi Paper 424). Oxon: IISS, Routledge.

    Google Scholar 

  • Boothby, W. H. (2014). Conflict law. Hague: T.M.C Asser Press.

    Book  Google Scholar 

  • Chertoff, M., & Simon, T. (2015). The impact of the dark web on Internet Governance and Cyber Security (Global Commission on Internet Governance: Paper Series No. 6). The Centre for International Governance. Retrieved Feburary 20, 2016, from https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf

  • Choucri, N. (2012). Cyberpolitics in international relations. Cambridge, MA: The MIT Press.

    Google Scholar 

  • Cornish, P. (2015). Governing cyberspace through constructive ambiguity. Survival, 57, 153–176.

    Article  Google Scholar 

  • Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data. Foreign Affairs, 92, 27–40.

    Google Scholar 

  • Deibert, R. (2013). Bounding cyber power: Escalation and restrain in global cyberspace (Internet Governance Papers: Paper No. 6). The Centre for International Governance Innovation. Retrieved Feburary 20, 2016, from https://www.cigionline.org/sites/default/files/no6_2.pdf

  • Deibert, R. (2015). The geopolitics of cyberspace after Snowden. Current History, 114, 9–15.

    Google Scholar 

  • Deibert, R., & Crete-Nishihata, M. (2012). Global governance and the spread of cyberspace controls. Global Governance, 18, 339–361.

    Google Scholar 

  • Demchak, C., & Dombrowski, P. (2011). Rise of a cybered Westphalian age. Strategic Studies Quarterly, 5, 32–61.

    Google Scholar 

  • Demidov, O. (2014). ICT in the BRICS agenda before the 2015 summit: Installing the missing pillar? Security Index: A Russian Journal on International Security, 20, 127–132.

    Google Scholar 

  • DeNardis, L. (2014). The global war for internet governance. New Haven: Yale University Press.

    Book  Google Scholar 

  • Dilipraj, E. (2014). Internet governance: The shift from monopoly to multi-party (National Defence and Aerospace Power, Issue Brief 99/14).

    Google Scholar 

  • Dingwerth, K. (2008). From international politics to global governance? The case of nature conservation (Garnet Working Paper No. 46(8)). Institute for Intercultural and International Studies, University of Bremen. Retrieved Feburary 20, 2016, from http://www2.warwick.ac.uk/fac/soc/pais/research/researchcentres/csgr/garnet/workingpapers/4608.pdf

  • Dunn Cavelty, M. (2010). Cyber-security. In P. Burgess (Ed.), The Routledge handbook of new security studies. London: Routledge.

    Google Scholar 

  • Ebert, H., & Mauer, T. (2013). Contested cyberspace and rising powers. Third World Quarterly, 34, 1054–1074.

    Article  Google Scholar 

  • Emerson, R. G. (2016). Limits to a cyber-threat. Contemporary Politics, 22, 178–196.

    Article  Google Scholar 

  • Finkelstein, L. S. (1995). What is global governance? Global Governance, 1, 367–372.

    Google Scholar 

  • Glen, C. (2014). Internet governance: Territorializing cyberspace? Politics Policy, 42, 635–657.

    Article  Google Scholar 

  • Jayawardane, S., Larik, J., & Jackson, E. (2015). Cyber governance: Challenges, solutions and lessons for effective global governance (Policy Brief No. 17). The Hague Institute for Global Justice. Retrieved Feburary 20, 2016, from http://www.thehagueinstituteforglobaljustice.org/wp-content/uploads/2015/12/PB17-Cyber-Governance.pdf

  • Kremer, J. F., & Müller, B. (2014). Cyberspace and international relations. In Theory, prospects and challenges. Heidelberg: Springer.

    Google Scholar 

  • Kruger, L. (2015). The future of internet governance: Should the United States relinquish its authority over ICANN? Congressional Research Service Report. https://www.fas.org/sgp/crs/misc/R44022.pdf

  • Kurbalija, J. (2014). An introduction to internet governance. Msida: Diplo Foundation.

    Google Scholar 

  • Lewis, J. A. (2010). Cybersecurity: Next steps to protect critical infrastructure, testimony to the US Senate Committee on commerce, science and transportation. Retrieved February 23, 2010, from https://www.gpo.gov/fdsys/pkg/CHRG-111shrg57888/pdf/CHRG-111shrg57888.pdf

  • Liaropoulos, A. (2015). A human-centric approach on cybersecurity: Securing the human in the era of cyber-phobia. Journal of Information Warfare, 14(4), 15–24.

    Google Scholar 

  • Liaropoulos, A. (2016). Reconceptualising cyber security: Safeguarding human rights in the era of cyber surveillance. International Journal of Cyber Warfare and Terrorism, 6, 33–41.

    Article  Google Scholar 

  • Mihr, A. (2014). Good cyber governance: The human rights and multi-stakeholder approach. Georgetown Journal of International Affairs, International Engagement on Cyber, 4, 24–34. http://schd.ws/hosted_files/igf2015/6b/Good%20CyberGovernance-Mihr-2014.pdf

  • Nocetti, J. (2015). Contest and conquest: Russia and global internet governance. International Affairs, 99, 111–130.

    Article  Google Scholar 

  • Nye, J. S. (2014). The regime complex for managing global cyber activities (Global Commission on Internet Governance: Paper Series No. 1). The Centre for International Governance. https://www.cigionline.org/sites/default/files/gcig_paper_no1.pdf

  • Nye, J. S., & Donahue, J. (2010). Governance in a globalizing world. Washington, DC: Brookings Institution Press.

    Google Scholar 

  • Patrick, S. (2014). The unruled world. The case for good enough global governance. Foreign Affairs, 93, 58–73.

    Google Scholar 

  • Pohle, J. (2015). Multistakeholderism unmasked: How the netmundial initiative shifts battlegrounds in internet governance. Global Policy. http://www.globalpolicyjournal.com/blog/05/01/2015/multistakeholderism-unmasked-how-netmundial-initiative-shifts-battlegrounds-internet

  • Rosenau, J. (1995). Governance in the twenty-first century. Global Governance, 1, 13–43.

    Google Scholar 

  • Rosenau, J., & Czempiel, E. O. (1992). Governance without government: Order and change in the world politics. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Slack, C. (2016). Wired yet disconnected: The governance of international cyber relations. Global Policy, 7, 69–78.

    Article  Google Scholar 

  • Weber, R. H. (2013). Internet of things—Governance quo vadis? Computer Law, Security Review, 29, 341–347.

    Article  Google Scholar 

  • Weitzenboeck, E. M. (2014). Hybrid net: The regulatory framework of ICANN and the DNS. International Journal of Law and Information Technology, 22, 49–73.

    Article  Google Scholar 

  • West, S. (2014). Globalizing Internet governance: Negotiating cyberspace agreements in the post-Snowden era. Conference Paper, TPRC 42: The 42nd Research Conference on Communication, Information and Internet Policy. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2418762##

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew N. Liaropoulos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Liaropoulos, A.N. (2017). Cyberspace Governance and State Sovereignty. In: Bitros, G., Kyriazis, N. (eds) Democracy and an Open-Economy World Order. Springer, Cham. https://doi.org/10.1007/978-3-319-52168-8_2

Download citation

Publish with us

Policies and ethics