In recent years we have been able to observe the emergence and mainstreaming of a EU discourse on digital sovereignty, which highlights the importance of gaining back control of EU digital infrastructure and technological production, based on the EU’s perceived loss of economic competitiveness, limited capacity to innovate, high degree of dependence on foreign digital infrastructures and service providers, and, related to all these factors, difficulty in providing EU citizens with a high level of cybersecurity. Bearing in mind that a considerable percentage of these infrastructures and service providers are under private sector control, the present article asks how this sovereignty discourse conceptualises the role of the private sector in ...
Published online: 09 September 2022EU Digital Sovereignty has emerged as a priority for the EU Cyber...
The EU has evolved much cyber law over the course of two decades. The EU has approached cyber regula...
Cyberspace has evolved as a domain of overlapping and essentially contested authorities. This paper ...
The notion of digital sovereignty, also often referred to as technological sovereignty, has been gai...
The EU’s revised Cybersecurity Strategy (2020) has been constructed in the context of increasing geo...
The European Union (EU) has, with increasing frequency, outlined an intention to strengthen its \u20...
The Internet has been labelled as an independent and universal space throughout the 1990s and until ...
The notion of digital sovereignty, also often referred to as technological sovereignty, has been gai...
The protection of cyberspace has become one of the highest security priorities of governments worldw...
This article analyses the recent use of European Union (EU) terminology of digital sovereignty and s...
The adoption of the Digital Market Acts (DMA) marked a significant development in the direction of t...
In the last decade, cybersecurity has swiftly turned into a strategic issue and became an important ...
Recent analyses of international affairs highlight that states are increasingly exploiting the key p...
This article critically examines the current discourse on the legal status and substance of the inte...
Tech companies have gradually and informally assumed the role of international lawmakers on globa...
Published online: 09 September 2022EU Digital Sovereignty has emerged as a priority for the EU Cyber...
The EU has evolved much cyber law over the course of two decades. The EU has approached cyber regula...
Cyberspace has evolved as a domain of overlapping and essentially contested authorities. This paper ...
The notion of digital sovereignty, also often referred to as technological sovereignty, has been gai...
The EU’s revised Cybersecurity Strategy (2020) has been constructed in the context of increasing geo...
The European Union (EU) has, with increasing frequency, outlined an intention to strengthen its \u20...
The Internet has been labelled as an independent and universal space throughout the 1990s and until ...
The notion of digital sovereignty, also often referred to as technological sovereignty, has been gai...
The protection of cyberspace has become one of the highest security priorities of governments worldw...
This article analyses the recent use of European Union (EU) terminology of digital sovereignty and s...
The adoption of the Digital Market Acts (DMA) marked a significant development in the direction of t...
In the last decade, cybersecurity has swiftly turned into a strategic issue and became an important ...
Recent analyses of international affairs highlight that states are increasingly exploiting the key p...
This article critically examines the current discourse on the legal status and substance of the inte...
Tech companies have gradually and informally assumed the role of international lawmakers on globa...
Published online: 09 September 2022EU Digital Sovereignty has emerged as a priority for the EU Cyber...
The EU has evolved much cyber law over the course of two decades. The EU has approached cyber regula...
Cyberspace has evolved as a domain of overlapping and essentially contested authorities. This paper ...