Skip to main content

Interpretation of the Concept of “Cyberspace Sovereignty”

  • Chapter
  • First Online:
Cyberspace Sovereignty
  • 1190 Accesses

Abstract

Now the concept of cyberspace sovereignty has attracted more and more attention. With the evolution of time, there have been various interpretations about the concept of cyberspace sovereignty, but the fundamental ideas of those interpretations are all about determination of the ownership of rights over networks and the space in which networks are involved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Xinhuanet. “What Is ‘Network Sovereignty’?”. http://news.xinhuanet.com/politics/2014-07/10/c_126736910.htm [2016-8-23].

  2. 2.

    National Security Law of the People’s Republic of China, voted through by the Standing Committee of National People’s Congress on July 1, 2015. http://www.gov.cn/xinwen/2015-07/01/content_2888316.htm [2016-9-1].

  3. 3.

    Xi Jinping’s Speech at the Opening Ceremony of the 2nd World Internet Conference (Full Text). http://news.xinhuanet.com/fortune/2015-12/16/c_1117481089.htm [2016-10-2].

  4. 4.

    Xi Jinping’ Speech at the Symposium on Cybersecurity and IT Application (Published in Full). http://news.cctv.com/2016/04/25/ARTIa8uTHXqX8JF25uz6S7Yh160425.shtml [2016-8-27].

  5. 5.

    Item 94 of the Provisional Agenda of the Sixty-eighth Session of the General Assembly of the United Nations, Developments in the field of information and telecommunications in the context of international security. http://www.un.org/ga/search/view_doc.asp?symbol=A/68/98&referer=/english/&Lang=C [2016-9-1].

  6. 6.

    Google Public DNS: 70 billion requests a day and counting. http://archive.feedblitz.com/732152/~4140902 [2016-9-13].

  7. 7.

    Declaration of Principles (2003), Geneva. http://www.itu.int/net/wsis/outcome/booklet/declaration_Bzh.html [2016-9-13].

  8. 8.

    The UN document A/66/359, a draft for discussion of the International Code of Conduct for Information Security submitted by the Russian Federation, Tajikistan, Uzbekistan and China on September 12, 2011. http://www.un.org/zh/documents/view_doc.asp?symbol=A/66/359 [2016-8-30].

  9. 9.

    Keir Giles. Russia’s Public Stance on Cyberspace Issues. https://ccdcoe.org/publications/2012proceedings/2_1_Giles_RussiasPublicStanceOn-CyberInformationWarfare.pdf [2016-9-13].

  10. 10.

    Keir Giles. “Information Troops”—A Russian Cyber Command?//Proceedings of 3rd International Conference on Cyber Conflict, Tallinn, Estonia, 2011: 45-60. https://ccdcoe.org/publications/2011proceedings/2011_Proceedings.pdf [2016-12-31].

  11. 11.

    Cyberspace activities shall be subject to the principle of sovereignty. http://www.npc.gov.cn/npc/xinwen/lfgz/lfdt/2015-07/23/content_1941830.htm [2016-9-13].

  12. 12.

    Cyberspace activities shall be subject to the principle of sovereignty.

  13. 13.

    In Sept., 2005, Zoellick, the US Deputy State Secretary then, delivered a speech on the subject of relations between the US and China. In order to develop the China-US relations and try to resolve differences between the US and China in trade and security, in the speech, Zoellick introduced the concept of “stakeholder”, and proposed that the U.S. and China both belong to stakeholders. The introduction of the concept provided a good idea and strategy for the Bush administration and the US mainstream society, and won the international community’s praise.

  14. 14.

    Internet of Things: Privacy & Security in a Connected World (FTC Staff Report). 2015. https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf [2016-8-27].

  15. 15.

    Cloud Computing Network Security Review of the First Batch of Cloud Platforms Is Complete. http://finance.huanqiu.com/roll/2016-09/9465615.html [2016-10-2].

  16. 16.

    The Privacy, Data Protection And Cybersecurity Law Review. First Edition. 2014-11. http://www.sidley.com/~/media/files/publications/2014/11/the-privacy-data-protection-and-cybersecurity-la__/files/japan/fileattachment/japan.pdf [2016-8-27].

  17. 17.

    The Japanese Act on the Protection of Personal Information (Law No. 57 of H15). http://www.iolaw.org.cn/showNews.asp?id=12426 [2016-9-27].

  18. 18.

    Exploration of the Personal Data Protection System in Russia. http://www.cctb.net/llyj/lldt/llqy/201405/t20140521_307367.htm [2016-8-30].

  19. 19.

    Germany passes data retention law. http://www.freepatentsonline.com/article/Information-Management-Journal/184698633.html [2016-8-27].

  20. 20.

    The European Court of Justice Declares the US-EU “Safe Harbor” Agreement Invalid. http://dw.com/p/1GjEg [2016-8-30].

  21. 21.

    Convention télégraphique internationale de Paris (1865) et. Règlement de service international (1865). http://www.itu.int/dms_pub/itu-s/oth/02/09/S02090000015201PDFF.PDF [2016-10-3].

  22. 22.

    International Telegraph Union (ITU). http://news.xinhuanet.com/english/2003-04/17/content_837415.htm [2016-10-3].

  23. 23.

    Convention radiotélégraphique internationale (1906: Berlin, Allemagne). http://www.itu.int/dms_pub/itu-s/oth/02/09/S02090000125201PDFF.PDF [2016-10-3].

  24. 24.

    International Radiotelegraph Conference (Berlin, 1906). http://www.itu.int/en/history/Pages/RadioConferences.aspx?conf=36&dms=S0201000010 [2016-10-3].

  25. 25.

    International Telecommunication Convention (Madrid, 1932). http://www.itu.int/dms_pub/itu-s/oth/02/09/S02090000055201PDFE.PDF [2016-10-3].

  26. 26.

    International Telegraph Conference (Madrid, 1932). http://www.itu.int/en/history/Pages/Plenipotentiary-Conferences.aspx?conf=5&dms=S0201000018 [2016-10-3].

  27. 27.

    ITU became a United Nations specialized agency in 1947. http://www.itu.int/en/about/Pages/history.aspx [2016-10-3].

  28. 28.

    MEMORANDUM OF UNDERSTANDING BETWEEN THE U.S. DEPARTMENT OF COMMERCE AND INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS. https://www.icann.org/resources/unthemed-pages/icann-mou-1998-11-25-en [2016-10-3].

  29. 29.

    Root Zone Database. http://www.iana.org/domains/root/db [2016-10-3].

  30. 30.

    The US Government Agreed to Transfer the Management Power of Internet Names. http://news.china.com/internationalgd/10000166/20160819/23325782.html [2016-8-27].

  31. 31.

    The Primary Root Server. http://baike.baidu.com/link?url=twQNJnSn0DyXf-mrZwRflq5U9VuYy6HlxW_oL1Q5ymscv-ygQ65QlFaU5VZL8HPpQLqNn166_XwEsqAGwMLzda [2016-9-13].

  32. 32.

    The CNNIC proposes early joining the ICANN to speak more for China. 2000. http://www.cnnic.cn/gywm/xwzx/rdxw/2000nrd/201207/t20120710_31258.htm [2016-8-27].

  33. 33.

    The Uniform Domain Name Dispute Resolution Policy. https://www.icann.org/resources/pages/policy-2012-02-25-zh [2016-9-13].

  34. 34.

    The Rules for Uniform Domain Name Dispute Resolution Policy (the “Rules”). https://www.icann.org/resources/pages/udrp-rules-2015-03-12-zh [2016-9-13].

  35. 35.

    Uniform Domain Name Dispute Resolution Policy. https://www.icann.org/resources/pages/policy-2012-02-25-zh [2016-8-27].

  36. 36.

    Xinhuanet. Multilateral Game and Unilateral Challenge of Global Internet Governance: Exploration of the US’s Motivations for Hyping Internet Security Issues. 2013-3. http://news.xinhuanet.com/world/2013-03/04/c_114882943.htm [2016-8-27].

  37. 37.

    Bush GW (2003) The national strategy for the physical protection of critical infrastructures and key assets. Executive office of the president Washington DC. http://www.globalsecurity.org/security/library/policy/national/physical_strategy2003.pdf [2016-9-27].

  38. 38.

    The U.S. Department of Defense. Strategy for Operating in Cyberspace (Full Text). http://3y.uu456.com/bp_7ww9a4uavc565jb3uu38_1.html [2016-9-27].

  39. 39.

    Cai CH (2010) The evolution and evaluation of the US’s national strategy of information security. Information Network Security 1:71–73.

  40. 40.

    Newsgd. The power to manage the global internet falls in the hands of the US, and the ITU’s fight ends in nothing. 2005-11. http://www.southcncom/it/itgdxw/200511250430.htm. [2016-8-27].

  41. 41.

    Chinadaily. Multilateral Game and Unilateral Challenge of Global Internet Governance: Exploration of the US’s Motivations for Hyping Internet Security Issues. 2013-3. http://www.chinadaily.com.cn/hqzx/2013-03/04/content_16274913.htm [2016-8-27].

  42. 42.

    Internet Governance Forum To Hold Inaugural Session In Athens. http://www.un.org/press/en/2006/pi1747.doc.htm [2016-10-3].

  43. 43.

    NetEase Tech. Brazil: the right of assigning the internet domain names should not be controlled by the US alone. http://tech.163.com/07/1114/00/3T7HJ6GC000915BF.html [2016-9- 22].

  44. 44.

    NTIA-ICANN. http://www.ntia.doc.gov/category/icann [2016-10-3].

  45. 45.

    Affirmation of Commitments by the United States Department of Commerce and the Internet Corporation for Assigned names and Numbers. https://www.icann.org/en/system/files/files/affirmation-of-commitments-30sep09-en.pdf [2016-9-13].

  46. 46.

    H.R. 5548 (111th): Protecting Cyberspace as a National Asset Act of 2010. https://www.govtrack.us/congress/bills/111/hr5548/text [2016-9-13].

  47. 47.

    Full text: Human Rights Record of the United States in 2010. 2011-4. http://www.scio.gov.cn/ztk/dtzt/2014/2013nmgdrqjl/2013nmgdrqjl1/Document/1365460/1365460_1.htm [2016-8-27].

  48. 48.

    The story behind the deletion of the Iraqi domain name IQ. http://www.edu.cn/xxh/fei/zxz/201410/t20141016_1190504.shtml [2016-9-13].

  49. 49.

    The whole story of the suspension of Libyan national top-level domain service. http://www.inforsec.org/wp/?p=86 [2016-9-13].

  50. 50.

    Microsoft cut off the MSN service in Cuba, Iran, Syria, Sudan and North Korea. http://m.zol.com.cn/article/1352025.html [2016-10-3].

  51. 51.

    The United States’ “Twitter” cannot make waves in Iran. http://news.cntv.cn/20110223/105486.shtml [2016-10-3].

  52. 52.

    Hegemonism is everywhere: the US double standard of internet management. http://news.xinhuanet.com/politics/2014-01/24/c_126055482.htm [2016-9-13].

  53. 53.

    The White House Office of the Press Secretary, Executive Order–Blocking Property Of Certain Persons And Prohibiting Certain Transactions With Respect To The Crimea Region Of Ukraine. https://www.whitehouse.gov/the-press-office/2014/12/19/executive-order-blocking-property-certain-persons-and-prohibiting-certai [2016-12-2].

  54. 54.

    The US government announced that it would transfer the power to manage domain names—who dominates the voice in the internet? http://www.scio.gov.cn/zhzc/9/6/Document/1369631/1369631.htm [2016-10-3].

  55. 55.

    Remarks by Assistant Secretary Strickling at the State of the Net Conference 1/27/2015. http://www.ntia.doc.gov/speechtestimony/2015/remarks-assistant-secretary-strickling-state-net-conference-1272015 [2016-10-3].

  56. 56.

    IANA Stewardship Transition Proposal Assessment Report. https://www.ntia.doc.gov/files/ntia/publications/iana_stewardship_transition_assessment_report.pdf [2016-10-3].

  57. 57.

    Transfer progress of the IANA’s power of management: the NTIA announces that the IANA transition proposal meets the four principles in the US government's statement. http://mp.weixinqq.com/s?__biz=MjM5MTgzNDk4Mw==&mid=2652355164&idx=4&sn=e8de2327a2da739c14f49808dd8c7f6b. [2016-10-3].

  58. 58.

    The United States officially abandons the power to manage internet resources and ends the nearly 20-year-control. http://view.inews.qq.com/a/20161001A0173J00 [2016-10-3].

  59. 59.

    15 nations agree to start working together to reduce cyberwarfare threat. http://www.washingtonpost.com/wp-dyn/content/article/2010/07/16/AR2010071605882.html [2016-9-13].

  60. 60.

    Lang P. Cyberspace security: A new global agenda. 2013-10. http://theory.rmlt.com.cn/2013/1022/168334_6.shtml [2016-8-27].

  61. 61.

    Information Office of the State Council of the People’s Republic of China, the Internet in China (White Paper). 2010-6. http://www.scio.gov.cn/zxbd/tt/Document/1011194/1011194.htm [2016-8-27].

  62. 62.

    The China’s National Defence in 2010. http://www.scio.gov.cn/zfbps/ndhf/2011/Document/883535/883535.htm [2016-8-30].

  63. 63.

    International Information. London Conference on Cyberspace. 2011-11. http://www.cicir.ac.cn/chinese/Article_3596.html [2016-8-27].

  64. 64.

    The Xinhua News Agency. The Budapest “Conference on Cyberspace” opens. 2012-10. http://news.xinhuanet.com/2012-10/05/c_113280038.htm [2016-12-31].

  65. 65.

    Guanchazhe. The US refuses to sign the new International Telecommunication Regulations, and insists on holding the power to manage the internet. 2012-12. http://m.guancha.cn/america/2012_12_15_114361?XGYD [2016-8-27].

  66. 66.

    The NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual on the International Law Applicable to Cyber Warfare, 2013. http://www.jku.at/intlaw/content/e275831/e275836/e276629/Tallinn_Manual_CW.pdf [2016-9-8].

  67. 67.

    People’s Liberation Army Daily. The NATO’s Manual on Cyber Warfare: Find the Legal Basis for Manipulating Cyberspace. 2014-10. http://www.chinanews.com/mil/2014/10-24/6712323.shtml [2016-8-27].

  68. 68.

    S.754—Cybersecurity Information Sharing Act of 2015. https://www.congress.gov/bill/114th-congress/senate-bill/754 [2016-10-3].

  69. 69.

    Science and Technology Daily. Maintenance of Cybersecurity Requires Settlement of Disputes over Cyberspace Sovereignty. 2015-11. http://scitech.people.com.cn/n/2015/1117/c1057-27822151.html [2016-8-27].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Binxing Fang .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Science Press and Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Fang, B. (2018). Interpretation of the Concept of “Cyberspace Sovereignty”. In: Cyberspace Sovereignty . Springer, Singapore. https://doi.org/10.1007/978-981-13-0320-3_3

Download citation

Publish with us

Policies and ethics