2016 International Conference on Cyber Conflict (CyCon U.S.) 2016
DOI: 10.1109/cyconus.2016.7836628
|View full text |Cite
|
Sign up to set email alerts
|

Sovereignty in cyberspace: Balkanization or democratization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 14 publications
0
1
0
1
Order By: Relevance
“…Early concerns were mainly commercial and technical, focusing, for example, on internet service providers refusing to "peer" with each other (Sagawa 1997;Frieden 1998). Later concerns took on a markedly more geopolitical tinge, stressing how the once "global" web was being fragmented by anti-American enemies such as China and Russia (Earle, Madek 2002;Wu 2004;Werbach 2008;Kuner et al 2015;Cattaruzza et al 2016). Despite the hand-wringing of these critics, the internet was always already balkanized.…”
Section: Balkanization Crisis?mentioning
confidence: 99%
“…Early concerns were mainly commercial and technical, focusing, for example, on internet service providers refusing to "peer" with each other (Sagawa 1997;Frieden 1998). Later concerns took on a markedly more geopolitical tinge, stressing how the once "global" web was being fragmented by anti-American enemies such as China and Russia (Earle, Madek 2002;Wu 2004;Werbach 2008;Kuner et al 2015;Cattaruzza et al 2016). Despite the hand-wringing of these critics, the internet was always already balkanized.…”
Section: Balkanization Crisis?mentioning
confidence: 99%
“…Kämen die Unternehmen diesen Forderungen nicht nach, dürften sie ihre Dienste nicht auf russischem Territorium anbieten, und der Zugriff auf deren Onlinepräsenzen würde auf russischem Territorium geblockt (vgl. O'Driscoll 2020).Einige Publikationen betonen, dass analoge gesetzliche Regulierungen zur Datenlokalisierung oder zur Transparentmachung und Nachvollziehbarkeit von Datenströmen auch in anderen Ländern erlassen wurden, beispielsweise in China (vgl Cattaruzza et al 2016),. ebenso wie der Einbau von Backdoors in vergleichbarer Weise auch von der NSA gefordert wurde (vgl.…”
unclassified