Startseite Visualizing international studies on cyberspace sovereignty: concept, rationality, and legitimacy
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Visualizing international studies on cyberspace sovereignty: concept, rationality, and legitimacy

  • Jianzhong Shi

    Jianzhong Shi is Professor and Vice President of China University of Political Science and Law. He also serves as Director of Center for Competition Law of China University of Political Science and Law, Vice President of China Law Association on Science and Technology, and Vice President of Society of Economic Law of China Law Society. His research interests and publications are in the areas of antimonopoly law, company act, economic law, and digital law.

    ORCID logo
    und Ming Xu

    Ming Xu is Research Fellow in the Institute of Cross-cultural and Regional Studies, School of International Studies, Zhejiang University. Her research fields include (socio-)semiotics, cyberspace sovereignty, data protection laws, forensic linguistics, and corpus linguistics.

    ORCID logo EMAIL logo
Veröffentlicht/Copyright: 25. November 2021
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

This study visualizes the international cyberspace sovereignty studies collected in Web of Science Core Collection to construct knowledge bases, development status, and dynamic trends drawing on scientometric method by instrument CiteSpace (5.7.R5). The findings show that the international studies on cyberspace sovereignty have phased and interdisciplinary characteristics. Its research theories, perspectives, and methods will be affected by practical and legal environment in the international contexts. Additionally, this study discusses its rationality to gain the concept through temporal evolution, spatial variation, and linguistic rank; explores its legitimacy through existing necessity, Common Law of Nature spirit and Positive Law foundation; and finally puts forward its implementation path. Furthermore, the logical basis and jurisprudential basis have established the status of cyberspace sovereignty in international law.


Corresponding author: Ming Xu, School of International Studies, Zhejiang University, Hangzhou, China, E-mail:

Funding source: National Social Science Foundation

Award Identifier / Grant number: 20ZDA062

About the authors

Jianzhong Shi

Jianzhong Shi is Professor and Vice President of China University of Political Science and Law. He also serves as Director of Center for Competition Law of China University of Political Science and Law, Vice President of China Law Association on Science and Technology, and Vice President of Society of Economic Law of China Law Society. His research interests and publications are in the areas of antimonopoly law, company act, economic law, and digital law.

Ming Xu

Ming Xu is Research Fellow in the Institute of Cross-cultural and Regional Studies, School of International Studies, Zhejiang University. Her research fields include (socio-)semiotics, cyberspace sovereignty, data protection laws, forensic linguistics, and corpus linguistics.

  1. Research funding: This work was supported by the major project of the National Social Science Foundation under Grant 20ZDA062.

References

Barcomb, Kris, Dennis Krill, Robert Mills & Michael Saville. 2012. Establishing cyberspace sovereignty. International Journal of Cyber Warfare and Terrorism 3. 26–28.10.4018/ijcwt.2012070103Suche in Google Scholar

Bobbitt, Philip. 2008. Terror and consent: The wars for the twenty-first century. New York: Alfred A. Knopf.Suche in Google Scholar

Bodenheimer, Edgar. 1962. Jurisprudence: The philosophy and method of the law. Cambridge: Harvard University Press.10.4159/harvard.9780674733107Suche in Google Scholar

Bomse, Amy L. 2001. The dependence of cyberspace. Duke Law Journal 50(6). 1717–1749. https://doi.org/10.2307/1373046.Suche in Google Scholar

Cattaruzza, Amael, Didier Danet, Stephane Taillat & Arthur Laudrain. 2016. Sovereignty in cyberspace: Balkanization or democratization. Paper presented at IEEE International Conference on Cyber Conflict, NATO Cooperat Cyber Def Ctr Excellence, 21–23 October.10.1109/CYCONUS.2016.7836628Suche in Google Scholar

Chen, Chaomei. 2006. CiteSpace II: Detecting and visualizing emerging trends and transient patterns in scientific literature. Journal of the American Society for Information Science and Technology 57(3). 359–377. https://doi.org/10.1002/asi.20317.Suche in Google Scholar

Cheng, Le & Jiamin Pei. 2018. Interpreting cybersecurity law: A semiotic perspective. Journal of Zhejiang University 48(6). 135–139.Suche in Google Scholar

Cheng, Le & Xin Wang. 2018. Cyber asset in judicial discourses: A socio-semiotic interpretation. Social Semiotics 29(4). 507–523. https://doi.org/10.1080/10350330.2018.1487110.Suche in Google Scholar

Cheng, Le, Jiamin Pei & Marcel Danesi. 2019. A sociosemiotic interpretation of cybersecurity in U.S. legislative discourse. Social Semiotics 29(3). 286–302. https://doi.org/10.1080/10350330.2019.1587843.Suche in Google Scholar

Czosseck, Christian & Katharina Ziolkowski. 2013. State actors and their proxies in cyberspace. Peacetime Regime for State Activities in Cyberspace 1. 1–3.Suche in Google Scholar

Czosseck, Christian & Kenneth Geers. 2009. Borders in cyberspace: Can sovereignty adapt to the challenges of cyber security? The Virtual Battlefield: Perspectives on Cyber Warfare 3. 88.Suche in Google Scholar

Deibert, Ronald J. 2018. Toward a human-centric approach to cybersecurity. Ethics and International Affairs 32(4). 411–424. https://doi.org/10.1017/s0892679418000618.Suche in Google Scholar

Efremov, Aleksei A. 2017. The formation of the concept of national information sovereignty. Journal of Higher School of Economics 1. 201–205. https://doi.org/10.17323/2072-8166.2017.1.201.215.Suche in Google Scholar

Egbert, Jesse. 2015. Publication type and discipline variation in published academic writing: Investigating statistical interaction in corpus data. International Journal of Corpus Linguistics 20(1). 1–29. https://doi.org/10.1075/ijcl.20.1.01egb.Suche in Google Scholar

Eichensehr, Kristen E. 2015. The cyber-law of nations. The Georgetown Law Journal 103(2). 317–380.Suche in Google Scholar

Eldem, Tuba. 2021. International cybersecurity norms and responsible cyber sovereignty. Istanbul Hukuk Mecmuasi 79(1). 347–378. https://doi.org/10.26650/mecmua.2021.79.1.0010.Suche in Google Scholar

Fang, Binxing. 2018. Cyberspace sovereignty. Beijing: Science Press.10.1007/978-981-13-0320-3Suche in Google Scholar

Federico, Paolo, Florian Heimerl, Steffen Koch & Silvia Miksch. 2017. A survey on visual approaches for analyzing scientific literature and patents. IEEE Transactions on Visualization and Computer Graphics 23(9). 2179–2198. https://doi.org/10.1109/tvcg.2016.2610422.Suche in Google Scholar

Godwin III, James B., Andrey Kulpim, Karl F. Rauscher & Valery Yaschenko (eds.). 2014. Critical terminology foundations 2: Russia-U.S. bilateral on cybersecurity. Moscow: East-West Institute.Suche in Google Scholar

Hare, Forrest. 2009. Borders in cyberspace: Can sovereignty adapt to the challenges of cyber security? The Virtual Battlefield: Perspectives on Cyber Warfare 3. 88–105.Suche in Google Scholar

Herzog, Stephen. 2011. Revisiting the Estonian cyberattacks: Digital threats and multinational responses. Journal of Strategic Security 4(2). 4. https://doi.org/10.5038/1944-0472.4.2.3.Suche in Google Scholar

Hou, Jianhua, Yang Xiucai & Chen Chaomei. 2018. Emerging trends and new developments in information science: A document co-citation analysis (2009–2016). Scientometrics 115(2). 869–892. https://doi.org/10.1007/s11192-018-2695-9.Suche in Google Scholar

Hunter, Dan. 2003. Cyberspace as place and the tragedy of the digital anticommons. California Law Review 92(2). 439–519. https://doi.org/10.2307/3481336.Suche in Google Scholar

Jensen, Eric T. 2012. Sovereignty and neutrality in cyber conflict. Fordham International Law Journal 35(3). 815–841.Suche in Google Scholar

Jensen, Eric T. 2015. Cyber sovereignty: The way ahead. Texas International Law Journal 50. 275. https://doi.org/10.1016/j.wsif.2014.10.006.Suche in Google Scholar

Jensen, Eric. T. 2017. The Tallinn manual 2.0: Highlights and insights. Georgetown Journal of International Law 48. 735–778. https://doi.org/10.1080/00908320.2017.1328927.Suche in Google Scholar

Kukkola, Juha. 2018. Russian cyber power and structural asymmetry. Paper presented at Proceedings of the 13th International Conference on Cyber Warfare and Security. National Defence University: Washington DC, 8–9 March.Suche in Google Scholar

Lantis, Jeffrey S. & Daniel J. Bloomberg. 2018. Changing the code? Norm contestation and US antipreneurism in cyberspace. International Relations 32(2). 149–172. https://doi.org/10.1177/0047117818763006.Suche in Google Scholar

Lakoff, George & Mark Turner. 1989. More than cool reason: A field guide to poetic metaphor. Chicago: The University of Chicago Press.10.7208/chicago/9780226470986.001.0001Suche in Google Scholar

Lessig, Lawrence. 2000. Cyberspace and privacy: A new legal paradigm? Foreword. Stanford Law Review 52(5). 987–1001. https://doi.org/10.2307/1229508.Suche in Google Scholar

Libicki, Martin C. 2007. Conquest in cyberspace: National security and information warfare. Cambridge: Cambridge University Press.10.1017/CBO9780511804250Suche in Google Scholar

Lyon, David. 2015. The snowden stakes: Challenges for understanding surveillance today. Surveillance and Society 13(2). 139–152. https://doi.org/10.24908/ss.v13i2.5363.Suche in Google Scholar

Marusek, Sarah & Anne Wager (eds.). 2021. Law and visual jurisprudence. Switzerland: Springer.Suche in Google Scholar

Mey, Jacob L. 2017. Discourse, interests, and the law: Some pragma-legal reflections. International Journal of Legal Discourse 2(1). 13–27. https://doi.org/10.1515/ijld-2017-0004.Suche in Google Scholar

Mingers, John & Loet Leydesdorff. 2015. A review of theory and practice in scientometrics. European Journal of Operational Research 246(1). 1–19. https://doi.org/10.1016/j.ejor.2015.04.002.Suche in Google Scholar

Mueller, Milton L. 2020. Against sovereignty in cyberspace. International Studies Review 22(4). 779–801. https://doi.org/10.1093/isr/viz044.Suche in Google Scholar

Nalimov, Vasily V. & Zinaida M. Mul’chenko. 1971. Measurement of science: Study of the development of science as an information process. Washington DC: Foreign Technology Division.Suche in Google Scholar

Nugraha, Yudhistira, KautsarinaKautsarina & Ashwin, S. Sastrosubroto. 2015. Towards data sovereignty in cyberspace. In 2015 3rd international conference on information and communication technology (ICoICT), 465–471. IEEE.10.1109/ICoICT.2015.7231469Suche in Google Scholar

Nye, Joseph S. 2011. The future of power. New York: Public Affairs.Suche in Google Scholar

Park, Gwijeong, Fangxin Chen & Le Cheng. 2021. A study on the millennials usage behavior of social network services: Effects of motivation, density, and centrality on continuous intention to use. Sustainability 13(5). 2071–1050. https://doi.org/10.3390/su13052680.Suche in Google Scholar

Šarčević, Susan. 1985. Translation of culture-bound terms in law. Multilingua 4(3). 127–133.10.1515/mult.1985.4.3.127Suche in Google Scholar

Schmitt, Michael N. (ed.). 2013. Tallinn manual on the international law applicable to cyber warfare. Cambridge: Cambridge University Press.10.1017/CBO9781139169288Suche in Google Scholar

Schmitt, Michael N (ed.). 2017. Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge: Cambridge University Press.10.1017/9781316822524Suche in Google Scholar

Shen, Yi. 2016. Cyber sovereignty and the governance of global cyberspace. Chinese Political Science Review 1. 81–93. https://doi.org/10.1007/s41111-016-0002-6.Suche in Google Scholar

Siedler, Endresen R. 2016. Hard power in cyberspace: CNA as a political means. In 2016 8th international conference on cyber conflict (CyCon), 23–36. IEEE.10.1109/CYCON.2016.7529424Suche in Google Scholar

Slaughter, Anne M. 2004. A new world order. Princeton: Princeton University Press.Suche in Google Scholar

Stevens, Tim. 2016. Cyber security and the politics of time. Cambridge: Cambridge University Press.10.1017/CBO9781316271636Suche in Google Scholar

Wagner, Anne & Aleksandra Matulewska. 2020. Instrumentalization of law as a socially constituted sign-system. International Journal of Legal Discourse 5(2). 127–130. https://doi.org/10.1515/ijld-2020-2041.Suche in Google Scholar

Wagner, Anne, Aleksandra Matulewska & Le Cheng. 2020. Law as a culturally constituted sign-system: A space for interpretation. International Journal of Legal Discourse 5(2). 239–267. https://doi.org/10.1515/ijld-2020-2041.Suche in Google Scholar

Weber, Rolf H. 2015. Realizing a new global cyberspace framework. Heidelberg: Springer-Verlag.10.1007/978-3-662-44677-5Suche in Google Scholar

Wu, Timothy S. 1996. Cyberspace sovereignty: The internet and the international system. Harvard Journal of Law and Technology 10. 647–648.Suche in Google Scholar

Received: 2021-04-06
Accepted: 2021-09-01
Published Online: 2021-11-25
Published in Print: 2021-12-20

© 2021 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 7.11.2025 von https://www.degruyterbrill.com/document/doi/10.1515/ijld-2021-2056/html?lang=de
Button zum nach oben scrollen