Home Linguistics & Semiotics From space to law: a five-layer construction of cyber governance
Article
Licensed
Unlicensed Requires Authentication

From space to law: a five-layer construction of cyber governance

  • Le Cheng

    Le Cheng is Chair Professor of Law and Professor of Legal Discourse and Translation at Zhejiang University. He serves as the Executive Vice Dean of Zhejiang University’s Academy of International Strategy and Law. His research interests and publications are in the areas of international law, digital law, data governance, semiotics, discourse studies, terminology, and legal discourse and translation.

    ORCID logo EMAIL logo
    and Yang Xiao

    Yang Xiao is a PhD. candidate at Guanghua Law School, Zhejiang University, specializing in the cutting-edge intersection of Digital Law and International Law.

    ORCID logo
Published/Copyright: October 17, 2025

Abstract

Existing models of cyberspace often focus excessively on the technical dimension, failing to systematically integrate the interconnections between network phenomena, security risks, and cyber governance. To bridge this gap, this paper constructs a five-layer analytical framework that deconstructs cyberspace into interconnected geographical, physical, code, information, and social layers, and sequentially conducts a “phenomenon-risk-law” analysis for each layer. Specifically, based on authoritative industry reports, this paper dissects the primary risk phenomena at each level, ranging from geopolitical and supply chain threats at the foundational layers to data breaches and cognitive manipulation at the abstract layers. It then investigates the corresponding legal and governance challenges, revealing differentiated response strategies through a comparative analysis of regulatory practices in China, the United States, and Europe.


Corresponding author: Le Cheng, Guanghua Law School and School of International Studies, Zhejiang University, Hangzhou, China, E-mail:

About the authors

Le Cheng

Le Cheng is Chair Professor of Law and Professor of Legal Discourse and Translation at Zhejiang University. He serves as the Executive Vice Dean of Zhejiang University’s Academy of International Strategy and Law. His research interests and publications are in the areas of international law, digital law, data governance, semiotics, discourse studies, terminology, and legal discourse and translation.

Yang Xiao

Yang Xiao is a PhD. candidate at Guanghua Law School, Zhejiang University, specializing in the cutting-edge intersection of Digital Law and International Law.

References

Albert, Kendra, Emily Armbruster, Elizabeth Brundige, Elizabeth Denning, Kimberly Kim, Lorelei Lee, Lindsey Ruff, Korica Simon & Yueyu Yang. 2021. FOSTA in legal context. Columbia Human Rights Law Review 52(3). 1–90.10.2139/ssrn.3663898Search in Google Scholar

Barlow, John Perry. 1996. A declaration of the independence of cyberspace. Electronic Frontier Foundation. https://www.eff.org/cyberspace-independence (accessed 26 September 2025).Search in Google Scholar

BBC News. 2020. Twitter hack: Staff tricked by phone spear-phishing scam. BBC News. https://www.bbc.com/news/technology-53607374 (accessed 26 September 2025).Search in Google Scholar

Belli, Dimitri, Paolo Barsocchi & Filippo Palumbo. 2024. Connectivity standards alliance matter: State of the art and opportunities. Internet of Things 25. 101005. https://doi.org/10.1016/j.iot.2023.101005.Search in Google Scholar

Benkler, Yochai. 2000. From consumers to users: Shifting the deeper structures of regulation toward sustainable commons and user access. Federal Communications Law Journal 52(3). 561–579.Search in Google Scholar

Bloomberg, L. P. 2024. Widespread flooding disrupts cross-border transport in Germany. SWI swissinfo.ch https://www.swissinfo.ch/eng/widespread-flooding-disrupts-cross-border-transport-in-germany/79344677 (accessed 29 April 2025).Search in Google Scholar

Bricheno, Lucy M., Isobel Yeo, Michael A. Clare, James E. Hunt, Allan Griffiths, Lionel Carter, Peter J. Talling, Megan Baker, Stuart Wilson, Matthew West, Semisi Panuve & Samuiela Fonua. 2024. The diversity, frequency and severity of natural hazard impacts on subsea telecommunications networks. Earth-Science Reviews 259. 104972. https://doi.org/10.1016/j.earscirev.2024.104972.Search in Google Scholar

Camden, Neil. 2024. Cybersecurity and “the human layer”. Principle Networks. https://www.principle-networks.com/resources/blog/cybersecurity-and-the-human-layer/(accessed 26 September 2025).Search in Google Scholar

Chavez-Dreyfuss, Gertrude & Michelle Price. 2021. How hackers stole $613 million in crypto tokens from poly network. Reuters. https://www.reuters.com/technology/how-hackers-stole-613-million-crypto-tokens-poly-network-2021-08-12/(accessed 26 September 2025).Search in Google Scholar

Chen, Zhiyuan, Runze Geng, Zhaoxia Jia, Heng Wang & Hu Fan. 2024. Securing privacy in the digital age: The quest for judicial protection of personal information. Journal of Infrastructure, Policy and Development 8(12). 1–16.10.24294/jipd.v8i12.9253Search in Google Scholar

Chen, Jihong & Jiabin Sun. 2021. Understanding the Chinese data security law. International Cybersecurity Law Review 2(2). 209–221. https://doi.org/10.1365/s43439-021-00038-3.Search in Google Scholar

Cheng, Le & Yijin Guo. 2025. Privacy protection on social media platforms: Overdisclosure of online behavioral data is labeling users. International Journal of Digital Law and Governance 2(1). 107–133. https://doi.org/10.1515/ijdlg-2025-0001.Search in Google Scholar

Cheng, Le, Jing Han & Jamshid Nasirov. 2024a. Ethical considerations related to personal data collection and reuse: Trust and transparency in language and speech technologies. International Journal of Legal Discourse 9(2). 217–235. https://doi.org/10.1515/ijld-2024-2010.Search in Google Scholar

Cheng, Le & Xiuli Liu. 2022. Exploring Chinese cyber discourse: Integrating political and legal perspectives. International Journal of Legal Discourse 7(1). 33–52. https://doi.org/10.1515/ijld-2022-2063.Search in Google Scholar

Cheng, Le & Xiuli Liu. 2024. Unravelling power of the unseen: Towards an interdisciplinary synthesis of generative AI regulation. International Journal of Digital Law and Governance 1(1). 29–51. https://doi.org/10.1515/ijdlg-2024-0008.Search in Google Scholar

Cheng, Le, Xiuli Liu & Chunlei Si. 2024b. Identifying stance in legislative discourse: A corpus-driven study of data protection laws. Humanities and Social Sciences Communications 11(1). 1–13. https://doi.org/10.1057/s41599-024-03322-9.Search in Google Scholar

Cheng, Le & Jamshid Nasirov. 2025. Promoting trust and security in the digital domain: A discourse analysis of legal constructs. International Journal of Legal Discourse 10(1). 13–34. https://doi.org/10.1515/ijld-2025-2003.Search in Google Scholar

Clark, David D. 2010. Characterizing cyberspace: Past, present and future (ECIR working paper no. 2010-3). Cambridge, MA: MIT Political Science Department.Search in Google Scholar

Congressional Research Service. 2001. Terrorism: Section by section analysis of the USA PATRIOT act (CRS report no. RL31200). Washington, D.C.: Congressional Research Service. https://www.congress.gov/crs_external_products/RL/PDF/RL31200/RL31200.3.pdf (accessed 26 September 2025).Search in Google Scholar

Creemers, Rogier. 2023. The Chinese conception of cybersecurity: A conceptual, institutional and regulatory genealogy. Journal of Contemporary China 33(146). 173–188. https://doi.org/10.1080/10670564.2023.2196508.Search in Google Scholar

Determann, Lothar & Jennifer Tam. 2021. The California privacy rights act of 2020: A broad and complex data-processing regulation that applies to businesses worldwide. Journal of Data Protection & Privacy 4(1). 7–21. https://doi.org/10.69554/gclk6627.Search in Google Scholar

Detrow, Scott. 2018. What did Cambridge analytica do during the 2016 election? NPR https://www.npr.org/2018/03/20/595338116/what-did-cambridge-analytica-do-during-the-2016-election (accessed 26 September 2025).Search in Google Scholar

Elsig, Manfred & Svea Klotz. 2018. Data flow–related provisions in preferential trade agreements (WTI working paper no. 03/2018). Bern: World Trade Institute, University of Bern. https://www.wti.org/media/filer_public/5f/92/5f920ca0-45b6-42e8-ad84-dae13c275c2a/wti_wp_03_2018_data_flow_related_provisions_in_ptas.pdf (accessed 26 September 2025).Search in Google Scholar

Fragale, Matteo & Vittoria Grilli. 2024. Deepfake, deep trouble: The European AI act and the fight against AI-generated misinformation. Columbia Journal of European Law (Preliminary Reference Blog). https://cjel.law.columbia.edu/preliminary-reference/2024/deepfake-deep-trouble-the-european-ai-act-and-the-fight-against-ai-generated-misinformation (accessed 26 September 2025).Search in Google Scholar

Gao, Gaodi, Qingqi Guo, Dong Jiang, Zhanbei Wang, Chuanglin Fang & Hao Mengmeng. 2019. The theoretical basis and technical path of cyberspace geography. Acta Geographica Sinica 74(9). 1709–1722.Search in Google Scholar

Gladstone, John A. 2003. Determining jurisdiction in cyberspace: The “Zippo” test or the “effects” test? In Proceedings of InSITE 2003: Where parallels intersect, Vol. 3, 1185–1196. Santa Rosa, CA: Informing Science Institute.Search in Google Scholar

Gomez, Michael A. 2017. Layers of cyberspace. IAFOR Journal of Politics, Economics & Law 4(1). 7–22.10.22492/ijpel.4.1.04Search in Google Scholar

Gstrein, Oskar J. & Andrej Zwitter. 2021. Extraterritorial application of the GDPR: Promoting European values or power? Internet Policy Review 10(3). https://policyreview.info/articles/analysis/extraterritorial-application-gdpr-promoting-european-values-or-power (accessed 26 September 2025).10.14763/2021.3.1576Search in Google Scholar

Guo, Qingqi, Gaodi Gao, Kai Sun, Shumin Chen, Dong Jiang & Hao Mengmeng. 2021. The construction of cyberspace elements hierarchical system based on man–land–network relationship. Geographical Research 40(1). 109–118.Search in Google Scholar

Gurzick, David & G. Lutters Wayne. 2009. Towards a design theory for online communities. In Proceedings of the 4th international conference on design science research in information systems and technology, 1–15. New York: Association for Computing Machinery.10.1145/1555619.1555634Search in Google Scholar

Harrison, Jason, Naghmeh Asadizanjani & Mark Tehranipoor. 2021. On malicious implants in PCBs throughout the supply chain. Integration, the VLSI Journal 79. 12–22. https://doi.org/10.1016/j.vlsi.2021.03.002.Search in Google Scholar

Imperva. 2025. What is the OSI model: 7 layers explained. Imperva. https://www.imperva.com/learn/application-security/osi-model/(accessed 29 April 2025).Search in Google Scholar

Inomata, Satoshi & Tadashi Hanaka. 2024. Measuring exposure to network concentration risk in global supply chains: Volume versus frequency. Structural Change and Economic Dynamics 68. 177–193. https://doi.org/10.1016/j.strueco.2023.10.002.Search in Google Scholar

Jiang, Bo, Xingyou You, Kewen Li, Tianqi Li, Xintong Wang & Dechao Si. 2024. Virtual geo-cyber environments: Metaphorical visualization of virtual cyberspace with geographical knowledge. International Journal of Digital Earth 17(1). 1–22. https://doi.org/10.1080/17538947.2024.2324959.Search in Google Scholar

Johnson, David R. & David G. Post. 1996. Law and borders – The rise of law in cyberspace. Stanford Law Review 48(5). 1367–1402. https://doi.org/10.2307/1229390.Search in Google Scholar

Katzenmaier, Joe. 2022. OSI model and physical layer security. Sepio https://sepiocyber.com/blog/osi-model/(accessed 29 April 2025).Search in Google Scholar

Kawasumi, Yusuke & Hiroki Tanaka. 2019. Impact of GDPR on cross-border data flows and cybersecurity. Computer Law & Security Report 35(4). 202–215.Search in Google Scholar

Khosshalpour, Ehsan. 2025. A review of layered models of cyberspace and proposal of a new model. Science and Technology Policy Letters. Advance online publication.Search in Google Scholar

Kleinwächter, Wolfgang, Matthias C. Kettemann & Max Senges (eds.), 2019. Towards a global framework for cyber peace and digital cooperation: An agenda for the 2020s. Berlin: Internet governance forum. https://www.hiig.de/wp-content/uploads/2019/11/Kleinwa%CC%88chter-Kettemann-Senges-eds.-Global-Framework-for-Cyber-Peace-2019.pdf (accessed 26 September 2025).Search in Google Scholar

Kramer, Franklin D. 2009. Cyberpower and national security: Policy recommendations for a strategic framework. In Franklin D. Kramer, Stuart H. Starr & Larry K. Wentz (eds.), Cyberpower and national security, 677–700. Washington, D.C. & Dulles, VA: National Defense University Press & Potomac Books.Search in Google Scholar

Kuner, Christopher. 2015. Extraterritoriality and regulation of international data transfers in EU data protection law. International Data Privacy Law 5(3). 235–245. https://doi.org/10.1093/idpl/ipv019.Search in Google Scholar

Kuner, Christopher. 2017. Reality and illusion in internet governance. International Journal of Law and Info Technology 25(4). 332–356.Search in Google Scholar

Lake, John. 2024. Differences: TCP/IP vs OSI model. OrhanErgun.net. https://orhanergun.net/tcp-ip-vs-osi-model (accessed 29 April 2025).Search in Google Scholar

Lessig, Lawrence. 2001. The future of ideas: The fate of the commons in a connected world. New York: Random House.Search in Google Scholar

Lewis, James A. 2018. Cognitive effect and state conflict in cyberspace. Washington, D.C.: Center for Strategic and International Studies. https://www.csis.org/analysis/cognitive-effect-and-state-conflict-cyberspace (accessed 26 September 2025).Search in Google Scholar

Lewis, James A. 2022. Creating accountability for global cyber norms. Washington, D.C.: Center for Strategic and International Studies. https://www.csis.org/analysis/creating-accountability-global-cyber-norms (accessed 26 September 2025).Search in Google Scholar

Li, Jiahong, Yang Zhang & Li Shuo. 2025. Mapping the landscape of cybersecurity research: A bibliometric analysis. International Journal of Legal Discourse 10(1). 99–119. https://doi.org/10.1515/ijld-2025-2006.Search in Google Scholar

Libicki, Martin C. 2009. Conquest in cyberspace: National security and information warfare. Cambridge: Cambridge University Press.Search in Google Scholar

Mačák, Kubo. 2016. Decoding article 8 of the International Law Commission’s articles on state responsibility: Attribution of cyber operations by non-state actors. Journal of Conflict and Security Law 21(3). 405–428. https://doi.org/10.1093/jcsl/krw014.Search in Google Scholar

Magrathea Telecommunications Ltd. 2025. Guidance on the UK telecommunications security framework (version 2.1). Reading, UK: Magrathea Telecommunications Ltd. https://www.magrathea-telecom.co.uk/wp-content/uploads/Guidance-on-the-UK-Telecommunications-Security-Framework-v2-1.pdf (accessed 30 April 2025).Search in Google Scholar

Margulies, Peter. 2013. Sovereignty and cyber attacks: Technology’s challenge to the law of state responsibility. Melbourne Journal of International Law 14(2). 496–519.Search in Google Scholar

Martel, Marine. 2023. Warnings from the US: The relevance of filter bubbles in polarized countries. Digital, Governance and Sovereignty Chair. Sciences Po https://www.sciencespo.fr/public/chaire-numerique/en/2023/06/06/student-essay-warnings-from-the-us-the-relevance-of-filter-bubbles-in-polarized-countries/(accessed 26 September 2025).Search in Google Scholar

Mathur, Raghav. 2023. An in-depth study of the Budapest convention on cybercrime. Cyber Law Reporter 2(4). 45–52.Search in Google Scholar

Mbanaso, Uchenna M. & Emmanuel S. Dandaura. 2015. The cyberspace: Redefining a new world. IOSR Journal of Computer Engineering 17(3). 17–24.Search in Google Scholar

Medeiros, Breno P. & Leticia R. F. Goldoni. 2020. The fundamental conceptual trinity of cyberspace. Contexto Internacional 42(1). 31–54. https://doi.org/10.1590/s0102-8529.2019420100002.Search in Google Scholar

Menthe, D. C. 1998. Jurisdiction in cyberspace: A theory of international spaces. Michigan Telecommunications and Technology Law Review 4. 69–101.Search in Google Scholar

Mondschein, Christopher F. & Chris Monda. 2019. The EU’s general data protection regulation (GDPR) in a research context. In Pascal Kubben, Michel Dumontier & Andre Dekker (eds.), Fundamentals of clinical data science, 49–61. Cham: Springer.10.1007/978-3-319-99713-1_5Search in Google Scholar

Mueller, Milton & Farzaneh Badiei. 2015. Governing internet territory: ICANN, sovereignty claims, property rights and country code top-level domains (working paper no. 2575450). Rochester, NY: Social Science Research NetworkSearch in Google Scholar

Mündges, Simon & Kyungeun Park. 2024. But did they really? Platforms’ compliance with the code of practice on disinformation in review. Internet Policy Review 13(3). 1–25. https://doi.org/10.14763/2024.3.1786.Search in Google Scholar

Munga, Joseph. 2025. Beneath the waves: Addressing vulnerabilities in Africa’s undersea digital infrastructure. Washington, D.C.: Carnegie Endowment for International Peace. https://carnegieendowment.org/2025/04/03/beneath-the-waves-addressing-vulnerabilities-in-africa-s-undersea-digital-infrastructure-pub-92083 (accessed 26 September 2025).Search in Google Scholar

Nasirov, Jahongir & Le Cheng. 2024. Enhancing cybersecurity in climate technology transfer: The interaction of environmental law with digital security. International Journal of Digital Law and Governance 1(1). 187–206. https://doi.org/10.1515/ijdlg-2024-0009.Search in Google Scholar

National Institute of Standards and Technology. 2017. An introduction to information security (NIST special publication 800-12 Rev. 1). Gaithersburg, MD: U.S. Department of Commerce.Search in Google Scholar

Neuwirth, Rostam J. 2024. The global institutional governance of AI: A four-dimensional perspective. International Journal of Digital Law and Governance 1(1). 113–153. https://doi.org/10.1515/ijdlg-2024-0004.Search in Google Scholar

Pehlivan, Cise Nil. 2021. Global perspectives on privacy. Global Privacy Law Review 2(3). 170–173. https://doi.org/10.54648/gplr2021022.Search in Google Scholar

Postel, Jon. 1981. Transmission control protocol (RFC 793). Reston, VA: Internet Engineering Task Force. https://www.rfc-editor.org/rfc/rfc793.txt (accessed 26 September 2025).Search in Google Scholar

Pöyhönen, Jani & Martti Lehto. 2024. Architecture framework for cyber security management. The European Conference on Cyber Warfare and Security 23(1). 388–397. https://doi.org/10.34190/eccws.23.1.2340.Search in Google Scholar

Pultarova, Tereza. 2024. Solar superstorm caused largest “mass migration” of satellites in history. Space.com. https://www.space.com/may-solar-storm-largest-mass-migration-satellites (accessed 29 April 2025).Search in Google Scholar

Quach, Katyanna. 2022. Google, oracle cloud servers wilt in UK heatwave, take down websites. The Register. https://www.theregister.com/2022/07/19/google_oracle_cloud/(accessed 29 April 2025).Search in Google Scholar

Rasanah (International Institute for Iranian Studies). 2024. Israel’s attack on Hezbollah’s communication devices: Contexts and significations. https://rasanah-iiis.org/english/position-estimate/israels-attack-on-hezbollahs-communication-devices-contexts-and-significations/(accessed 15 May 2025).Search in Google Scholar

Roguski, Przemysław. 2019. Layered sovereignty: Adjusting traditional notions of sovereignty to a digital environment. In Tomáš Minárik, Siim Alatalu, Stefano Biondi, Matteo Signoretti, Inan Tolga & Gabor Visky (eds.), 2019 11th international conference on cyber conflict: Silent battle, 453–476. Tallinn: NATO CCD COE Publications.10.23919/CYCON.2019.8756900Search in Google Scholar

Rozenshtein, Alan Z. 2019. Fourth amendment reasonableness after carpenter. Yale Law Journal Forum 128. 943–960.Search in Google Scholar

Rozenshtein, Alan Z. 2024. Interpreting the ambiguities of section 230. Yale Journal on Regulation Bulletin https://www.yalejreg.com/bulletin/interpreting-the-ambiguities-of-section-230/(accessed 26 September 2025).Search in Google Scholar

Salgado, Thiago V. E., M. de Souza Jussara & T. de Souza Jr Ruan. 2023. Each at its own pace: Third-party dependency and centralization around the world. Ithaca, NY: arXiv.Search in Google Scholar

Sartonen, Matti, Aki-Mauri Huhtinen & Martti Lehto. 2016. Rhizomatic target audiences of the cyber domain. Journal of Information Warfare 15(4). 1–13.Search in Google Scholar

Schmid, Evelyne & Aslɪ Ö. Erceiş. 2023. The attribution of omissions: Due diligence in cyberspace and state responsibility. Swiss Review of International Law 33. 577–596.Search in Google Scholar

Schmidt, Niklas. 2015. Sociological approach to cyberspace conceptualization and implications for international security. Prague: Charles University Prague unpublished manuscript.Search in Google Scholar

Shahine, Alaa. 2008. Internet services in Egypt and India disrupted. Reuters. https://www.reuters.com/article/business/internet-services-in-egypt-and-india-disrupted-idUSL30178577/ (accessed 7 August 2025).Search in Google Scholar

Sheldon, John B. 2011. Deciphering cyberpower: Strategic purpose in peace and war. Strategic Studies Quarterly 5(2). 95–116.Search in Google Scholar

Sheldon, John B. 2012. State of the art: Attackers and targets in cyberspace. The Journal of Military and Strategic Studies 14(2). 1–19.Search in Google Scholar

Singh, Aayush. 2025. Let’s talk to the internet: Understanding the application layer. DEV Community. https://dev.to/singhaayush/lets-talk-to-the-internet-understanding-the-application-layer-12fe (accessed 29 April 2025).Search in Google Scholar

Solove, Daniel J. & Woodrow Hartzog. 2014. The FTC and the new common law of privacy. Columbia Law Review 114(3). 583–676.10.2139/ssrn.2312913Search in Google Scholar

Spurny, Vojtech, Pavel Munster, Adam Tomasov, Tomas Horvath & Edvin Skaljo. 2022. Physical layer components security risks in optical fiber infrastructures. Sensors 22(2). 1–17. https://doi.org/10.3390/s22020588.Search in Google Scholar

Swire, Peter & L. B. de Gouvêa. 2017. Data localization: A global perspective. Harvard Journal of Law and Technology 29(1). 149–176.Search in Google Scholar

United Nations Conference on Trade and Development. 2006. The layered internet architecture: Governance principles and policies. In Information economy report 2006, 159–192. New York & Geneva: United Nations.Search in Google Scholar

United Nations Institute for Disarmament Research. 2019. GGE recommendations on international law and norms of responsible state behaviour. Geneva: UNIDIR. https://unidir.org/files/2019-10/GGE-Recommendations-International-Law.pdf (accessed 26 September 2025).Search in Google Scholar

University of Oxford. 2021. Social media manipulation by political actors an industrial scale problem – Oxford report. https://www.ox.ac.uk/news/2021-01-13-social-media-manipulation-political-actors-industrial-scale-problem-oxford-report (accessed 26 September 2025).Search in Google Scholar

U.S. Marine Corps Forces Cyberspace Command. 2016. FINAL MARFORCYBER trifold [Brochure]. Fort Meade, MD: U.S. Marine Corps Forces Cyberspace Command.Search in Google Scholar

Venables, Anthony. 2021. Modelling cyberspace to determine cybersecurity training requirements. Frontiers in Education 6. 1–11. https://doi.org/10.3389/feduc.2021.768037.Search in Google Scholar

Wang, Armstrong. 2020. Cyber sovereignty at its boldest: A Chinese perspective. Ohio State Technology Law Journal 16. 395–430.Search in Google Scholar

Wee, Clarisse K. G. 2025. Artificial illusion: Global governance challenges of deepfake technology. IAPP. https://iapp.org/news/a/artificial-illusion-global-governance-challenges-of-deepfake-technology (accessed 23 April 2025).Search in Google Scholar

Wheeler, Richard. 2025. Global server load balancing: Why is it important? Nashua, NH: Kemp Technologies. https://kemptechnologies.com/global-server-load-balancing/(accessed 26 September 2025).Search in Google Scholar

Wheeler, David A. & Gregory N. Larsen. 2003. Techniques for cyber attack attribution (IDA paper P-3792). Alexandria, VA: Institute for Defense Analyses.10.21236/ADA468859Search in Google Scholar

Wilde, Gijs & Enrico Landi. 2024. Exploring law enforcement hacking as a tool against transnational cyber crime. Washington, D.C.: Carnegie Endowment for International Peace. https://carnegieendowment.org/research/2024/04/exploring-law-enforcement-hacking-as-a-tool-against-transnational-cyber-crime?center=europe (accessed 26 September 2025).Search in Google Scholar

Woolley, J. & C. Campbell. 2018. Data localization laws and cybersecurity: The new Frontier. International Journal of Law and Info Technology 26(2). 123–152.Search in Google Scholar

World Internet Conference. 2023. Sovereignty in cyberspace: Theory and practice (version 4.0). Wuzhen: World Internet Conference. https://cn.wicinternet.org/2023-11/09/content_36955448.htm (accessed 26 September 2025).Search in Google Scholar

Xiao, Yang & Xun Sun. 2025. Integration of soft and hard laws: Profiling legal protection for “AI for All”. International Journal of Digital Law and Governance 2(1). 223–252. https://doi.org/10.1515/ijdlg-2025-0003.Search in Google Scholar

Xiong, Yu, Hao Wu, Xiaofei Ding & Jinxi Wu. 2023. Supplier geographical concentration and corporate innovation. Finance Research Letters 56. 1–8. https://doi.org/10.1016/j.frl.2023.104117.Search in Google Scholar

Xu, Chang, Yu Zhang, Feng Shi, Hongyu Shan, Biao Guo, Yulei Li & Ping Xue. 2023. Measuring the centrality of DNS infrastructure in the wild. Applied Sciences 13(9). 1–18. https://doi.org/10.3390/app13095739.Search in Google Scholar

Yang, Li & Jieren Hu. 2024. Data transactions in China: Legislation, promotion, and regulation. International Journal of Digital Law and Governance 1(2). 413–437. https://doi.org/10.1515/ijdlg-2024-0018.Search in Google Scholar

Yu, Alan. 2024. Data centers transformed northern Virginia’s economy, but residents are wary of more expansion. WHYY. https://whyy.org/articles/data-centers-northern-virginia-economy-expansion-pushback/(accessed 26 September 2025).Search in Google Scholar

Zhang, Li, Guofeng Wang, Xingyou You, Zhongwen Liu, Li Ma, Jing Tian & Ming Su. 2023. Research on the cyberspace map and its conceptual model. ISPRS International Journal of Geo-Information 12(9). 1–21. https://doi.org/10.3390/ijgi12090353.Search in Google Scholar

Zhang, Zeyu, Can Zhou, Min Chen, Yu Cao & Shaojian Fan. 2025. A data model and method framework for cyberspace map visualization. ISPRS International Journal of Geo-Information 14(2). 1–25. https://doi.org/10.3390/ijgi14020070.Search in Google Scholar

Zhao, Qijin. 2022. American data privacy and protection act: Latest, closest, yet still fragile attempt toward comprehensive federal privacy legislation. Harvard Journal of Law & Technology Digest. https://jolt.law.harvard.edu/digest/addpa-latest-closest-yet-still-fragile (accessed 26 September 2025).Search in Google Scholar

Zhao, Yiran & Yulin Guo. 2024. Liability regulation on short video platforms: Balancing freedom of expression and copyright protection. International Journal of Legal Discourse 9(2). 313–338. https://doi.org/10.1515/ijld-2024-2014.Search in Google Scholar

Zhao, Yilin & Zeshen Ren. 2025. The alignment of values: Embedding human dignity in algorithmic bias governance for the AGI era. International Journal of Digital Law and Governance 2(1). 169–195. https://doi.org/10.1515/ijdlg-2025-0006.Search in Google Scholar

Zhou, Xiaohua. 2021. Manifestation of national sovereignty in cyberspace from the perspective of jurisdiction. Anquan Neican [Security Reference]. https://www.secrss.com/articles/37657 (accessed 26 September 2025).Search in Google Scholar

Zimmermann, Hubert. 1980. OSI reference model—the ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28(4). 425–432. https://doi.org/10.1109/tcom.1980.1094702.Search in Google Scholar

Zittrain, Jonathan L. 2008. The future of the Internet—And how to stop it. New Haven, CT: Yale University Press.Search in Google Scholar

Zurich Insurance Group. 2024. The rising risk of misinformation and disinformation. https://www.zurich.com/knowledge/topics/global-risks/the-rising-risk-of-misinformation-and-disinformation (accessed 26 September 2025).Search in Google Scholar

Received: 2025-02-05
Accepted: 2025-07-30
Published Online: 2025-10-17
Published in Print: 2025-11-25

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 11.3.2026 from https://www.degruyterbrill.com/document/doi/10.1515/ijld-2025-2013/html
Scroll to top button