Abstract
Cyberspace is a socio-political and technological domain with unique characteristics. Cyberspace transcends territorial and legal boundaries and is mostly owned and managed by the private sector. The fact that states are unable to secure cyberspace on their own, forces them to develop cooperative mechanisms with other states and international organizations, but also with the private sector. This reality raises a number of issues regarding the most effective model of governance. Viewing cyberspace as a global commons, balancing between state sovereignty and the fragmentation of cyberspace, debating between multilateral governance and multi-stakeholderism and establishing cyber norms, sketch a rather complex picture of cyberspace governance. The cases of ITU, ICANN, IGF and NETmundial offer us a pragmatic insight into the power politics of cyberspace. Cyberspace is a geopolitical arena, where states compete with each other, but are also being challenged by the private sector.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
According to Professor Nazli Choucri, cyberspace is characterized by: temporality (replaces conventional temporality with near instantaneity), physicality (transcends constraints of geography and physical location), permeation (penetrates boundaries and jurisdictions), fluidity (manifests sustained shifts and reconfigurations), participation (reduces barriers to activism and political expression), attribution (obscures identities of actors and links to action) and accountability (bypasses mechanisms of responsibility).
- 2.
The Internet of Things (IoT) is a concept that aims to connect various devices or objects—things through wireless and wired connections and create an environment where users can interact at any time with the digital and the physical world. The IoT is mobile, virtual, built on cloud computing and networks of data gathering sensors and is growing rapidly. Mobile applications and sensors are now operating in cars, refrigerators, machinery, medical technology and smart phones.
- 3.
Big Data is a term that refers to large and complex sets of data, both structured and unstructured, that surpasses the ability of typical database software tools to capture, store, manage and analyze. The challenges that Big Data poses, relate to the ‘3Vs’ characteristics: volume, variety and velocity.
- 4.
Dark Web is a part of Internet that is intentionally hidden; it is not indexed by search engines and is inaccessible through standard web browsers. An example of Dark Web is the Tor network that offers its users anonymity by encrypting data and sending them through other routers.
- 5.
Hybrid refers to the combination of two different elements. As Weitzenboeck points out, it does not differentiate between either/or, but combines both-and. In the case of cyberspace governance, hybrid governance would involve both the public and the private sector. It is worth asking whether cyberspace governance could be approached as a case of hybrid governance, where different methods of governance—that surpass the boundaries between the public and the private, the national and the international—could regulate specific areas of cyberspace.
- 6.
For more details see https://www.eff.org/
- 7.
For more details see http://www.itu.int/en/Pages/default.aspx
- 8.
In 2011 China, Russia, Tajikistan and Uzbekistan first circulated an International Code of Conduct on Information Security for the consideration of UN member-states. The United States and other western states dismissed the code, with the argument that it would lead to state’s control of Internet and online content. In 2015 China, Russia, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan, have jointly submitted an update of their International Code of Conduct on Information Security to the UN Secretary General, stressing once more the need for new international law for cyberspace.
- 9.
For more details see https://www.icann.org/
- 10.
For more details see http://www.intgovforum.org/
- 11.
For more details see http://netmundial.br/
References
Bajaj, K. (2014). Cyberspace: Post Snowden. Strategic Analysis, 38, 582–587.
Barlow, J. P. (1996). A declaration of the independence of cyberspace. https://www.eff.org/cyberspace-independence
Betz, D., & Stevens, T. (2011). Cyberspace and the state. Toward a strategy for cyber-power (Adelphi Paper 424). Oxon: IISS, Routledge.
Boothby, W. H. (2014). Conflict law. Hague: T.M.C Asser Press.
Chertoff, M., & Simon, T. (2015). The impact of the dark web on Internet Governance and Cyber Security (Global Commission on Internet Governance: Paper Series No. 6). The Centre for International Governance. Retrieved Feburary 20, 2016, from https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf
Choucri, N. (2012). Cyberpolitics in international relations. Cambridge, MA: The MIT Press.
Cornish, P. (2015). Governing cyberspace through constructive ambiguity. Survival, 57, 153–176.
Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data. Foreign Affairs, 92, 27–40.
Deibert, R. (2013). Bounding cyber power: Escalation and restrain in global cyberspace (Internet Governance Papers: Paper No. 6). The Centre for International Governance Innovation. Retrieved Feburary 20, 2016, from https://www.cigionline.org/sites/default/files/no6_2.pdf
Deibert, R. (2015). The geopolitics of cyberspace after Snowden. Current History, 114, 9–15.
Deibert, R., & Crete-Nishihata, M. (2012). Global governance and the spread of cyberspace controls. Global Governance, 18, 339–361.
Demchak, C., & Dombrowski, P. (2011). Rise of a cybered Westphalian age. Strategic Studies Quarterly, 5, 32–61.
Demidov, O. (2014). ICT in the BRICS agenda before the 2015 summit: Installing the missing pillar? Security Index: A Russian Journal on International Security, 20, 127–132.
DeNardis, L. (2014). The global war for internet governance. New Haven: Yale University Press.
Dilipraj, E. (2014). Internet governance: The shift from monopoly to multi-party (National Defence and Aerospace Power, Issue Brief 99/14).
Dingwerth, K. (2008). From international politics to global governance? The case of nature conservation (Garnet Working Paper No. 46(8)). Institute for Intercultural and International Studies, University of Bremen. Retrieved Feburary 20, 2016, from http://www2.warwick.ac.uk/fac/soc/pais/research/researchcentres/csgr/garnet/workingpapers/4608.pdf
Dunn Cavelty, M. (2010). Cyber-security. In P. Burgess (Ed.), The Routledge handbook of new security studies. London: Routledge.
Ebert, H., & Mauer, T. (2013). Contested cyberspace and rising powers. Third World Quarterly, 34, 1054–1074.
Emerson, R. G. (2016). Limits to a cyber-threat. Contemporary Politics, 22, 178–196.
Finkelstein, L. S. (1995). What is global governance? Global Governance, 1, 367–372.
Glen, C. (2014). Internet governance: Territorializing cyberspace? Politics Policy, 42, 635–657.
Jayawardane, S., Larik, J., & Jackson, E. (2015). Cyber governance: Challenges, solutions and lessons for effective global governance (Policy Brief No. 17). The Hague Institute for Global Justice. Retrieved Feburary 20, 2016, from http://www.thehagueinstituteforglobaljustice.org/wp-content/uploads/2015/12/PB17-Cyber-Governance.pdf
Kremer, J. F., & Müller, B. (2014). Cyberspace and international relations. In Theory, prospects and challenges. Heidelberg: Springer.
Kruger, L. (2015). The future of internet governance: Should the United States relinquish its authority over ICANN? Congressional Research Service Report. https://www.fas.org/sgp/crs/misc/R44022.pdf
Kurbalija, J. (2014). An introduction to internet governance. Msida: Diplo Foundation.
Lewis, J. A. (2010). Cybersecurity: Next steps to protect critical infrastructure, testimony to the US Senate Committee on commerce, science and transportation. Retrieved February 23, 2010, from https://www.gpo.gov/fdsys/pkg/CHRG-111shrg57888/pdf/CHRG-111shrg57888.pdf
Liaropoulos, A. (2015). A human-centric approach on cybersecurity: Securing the human in the era of cyber-phobia. Journal of Information Warfare, 14(4), 15–24.
Liaropoulos, A. (2016). Reconceptualising cyber security: Safeguarding human rights in the era of cyber surveillance. International Journal of Cyber Warfare and Terrorism, 6, 33–41.
Mihr, A. (2014). Good cyber governance: The human rights and multi-stakeholder approach. Georgetown Journal of International Affairs, International Engagement on Cyber, 4, 24–34. http://schd.ws/hosted_files/igf2015/6b/Good%20CyberGovernance-Mihr-2014.pdf
Nocetti, J. (2015). Contest and conquest: Russia and global internet governance. International Affairs, 99, 111–130.
Nye, J. S. (2014). The regime complex for managing global cyber activities (Global Commission on Internet Governance: Paper Series No. 1). The Centre for International Governance. https://www.cigionline.org/sites/default/files/gcig_paper_no1.pdf
Nye, J. S., & Donahue, J. (2010). Governance in a globalizing world. Washington, DC: Brookings Institution Press.
Patrick, S. (2014). The unruled world. The case for good enough global governance. Foreign Affairs, 93, 58–73.
Pohle, J. (2015). Multistakeholderism unmasked: How the netmundial initiative shifts battlegrounds in internet governance. Global Policy. http://www.globalpolicyjournal.com/blog/05/01/2015/multistakeholderism-unmasked-how-netmundial-initiative-shifts-battlegrounds-internet
Rosenau, J. (1995). Governance in the twenty-first century. Global Governance, 1, 13–43.
Rosenau, J., & Czempiel, E. O. (1992). Governance without government: Order and change in the world politics. Cambridge: Cambridge University Press.
Slack, C. (2016). Wired yet disconnected: The governance of international cyber relations. Global Policy, 7, 69–78.
Weber, R. H. (2013). Internet of things—Governance quo vadis? Computer Law, Security Review, 29, 341–347.
Weitzenboeck, E. M. (2014). Hybrid net: The regulatory framework of ICANN and the DNS. International Journal of Law and Information Technology, 22, 49–73.
West, S. (2014). Globalizing Internet governance: Negotiating cyberspace agreements in the post-Snowden era. Conference Paper, TPRC 42: The 42nd Research Conference on Communication, Information and Internet Policy. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2418762##
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Liaropoulos, A.N. (2017). Cyberspace Governance and State Sovereignty. In: Bitros, G., Kyriazis, N. (eds) Democracy and an Open-Economy World Order. Springer, Cham. https://doi.org/10.1007/978-3-319-52168-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-52168-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52167-1
Online ISBN: 978-3-319-52168-8
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)