Sovereignty in The Digital Age
Sovereignty in The Digital Age
Sovereignty in The Digital Age
Paul Timmers
Abstract The century-old concept of state sovereignty is acquiring new and hotly
debated meaning, due to digital disruption and technology-without-borders, domi-
nance by powerful—often foreign-owned—global tech companies, and cyber-
undermining by malicious states. Sovereignty, as we know it, is also threatened by
rising geopolitical tensions, war, and global challenges such as climate change,
pandemics, and global cyber-crime. This chapter deals with the future of sovereignty
in a digital and geopolitically contested age. It starts with an introduction into
international relations, sovereignty, and strategic autonomy thinking. It reflects on
the impact of digital technology on the international system of states. Then the
chapter provides an analysis and some practical guidance to tackle the challenges of
developing public policy for sovereignty in the digital, and digital humanistic, age.
Finally, two case studies and a set of questions invite the reader to a deeper dive.
1 Introduction
Sovereignty means that states or countries have autonomy1 in how they manage their
internal affairs. Consequently, countries should respect each other’s sovereignty.
This is, of course, only one and a highly simplified Platonic ideal image of sover-
eignty. We will go deeper into the multiplicity of perspectives on sovereignty and
international relations.
When we say sovereignty, generally here we are talking about state sovereignty
rather than the sovereignty of an individual person. However, the two are closely
related. Sovereignty concerns the power arrangements in society, notably between
the citizens and the “state.” A government or ruler who is systematically not
1
Autonomy does not at all imply autarky. Rather there are several options to realize and safeguard
sovereignty, as Sect. 4 discusses in detail (while also clarifying the notion of digital sovereignty).
P. Timmers (✉)
Public Governance Institute, University of Oxford, Leuven University, Leuven, Belgium
e-mail: paul.timmers@kuleuven.be
accepted by the people is in trouble. People in a country who are not accepted by the
government or the ruler are in trouble. One way to arrange for the allocation of
power between citizens and state is democracy and respect for fundamental human
rights. These are two relational notions that link state and individual sovereignty.
They are also at the heart of what digital humanism stands for.
Why would we spend time on such a century-old concept? The reason is that in
today’s geopoliticized digital age, sovereignty is under severe pressure. There is a
sovereignty gap between the aspirations for state sovereignty and hard reality (Kello,
2017). The hard reality consists of the threats of geopolitical conflict, the pervasively
disruptive nature of digital technologies and big tech, and global threats such as
cyber-crime, pandemic, and climate change (see Fig. 1). These three forces are not
halted by the human-created borders between countries; they do not respect sover-
eignty. The international system of states is being disrupted and perhaps fundamen-
tally reshaped. No wonder that heads of states are very worried. Since 2017,
sovereignty and the related notion of strategic autonomy have been Chefsache.
But they are not sitting ducks and have come forward with a multitude of public
policies to safeguard, defend, and even strengthen sovereignty.
Here we focus on public policies that address the interplay of digital technologies
and sovereignty. That is, public policy that shapes sovereignty and the digital age fit
for what we want.
The central problem is to develop public policy for sovereignty in the digital age.
What we need for this is to shed light and to understand: to shed light on the
possible shapes of sovereignty in the digital age, and the desired ones, which is a
political choice, and to understand the interplay of technology and society. This is
not easy at all. However, not addressing the problem leaves us in the hands of
unaccountable powers, undemocratic authoritarians, and uncontrollable technology
development. This would precisely be counter to what digital humanism is about.
Sovereignty in the Digital Age 573
Sovereignty and geopolitics are key aspects of the reality that digital humanism
seeks to influence.
We now first give a brief introduction to perspectives on international relations,
sovereignty, and strategic autonomy. That puts us in a position to discuss the impact
of digital technologies. Then we can address the challenges of developing public
policy for sovereignty in the digital age and illustrate these by concrete cases in two
hot topics of cybersecurity and artificial intelligence (AI).
2 International Relations
3 Sovereignty
Sovereignty as one of our central themes turns out to be a hard to pin down concept.
State sovereignty has emerged from at least three thinkers. Bodin (1529) came up
with the concept of the sovereign as a person who exercises absolute and undivided
power with impact both internal to the state and in the external affairs of the state.
Hobbes (1588) developed the doctrine of supreme sovereignty based on a unitary
body politic of rulers and rule, free from supreme accountability (except, perhaps to
God). Jean-Jacques Rousseau (1762), an Enlightenment thinker, advocated popular
sovereignty and a social contract which evolved into the thinking that the relation-
ship citizen-state sovereignty is legitimized by choice of the citizens with
corresponding obligations of the state toward citizens (Stanford University, n.d.).
In the second half of the sixteenth and first half of the seventeenth century,
European kings, warlords, and the Holy Roman Empire almost continuously fought
with each other. This brought devastation to Europe and millions of people died. In
1648, the Treaties of Westphalia were signed that set out to end the warring by
recognizing states as the locus of sovereignty. It was the birth of the state-based
system of relationships between sovereigns, which became the sovereign states-
based system of international relations in much of the world.
Obviously, international relations have evolved over the centuries. Likewise, the
concept of sovereignty is evolving and may well appear to be rather fuzzy. Perhaps
we have to accept that sovereignty is an essentially contested concept, as is religion
or art (Gallie, 1956).
Still, that does not stop us deepening our understanding and continuing the
discourse on sovereignty and its future. Today, international relations have evolved
from states into supranational organizations such as the UN and its agencies as well
as regional law-based alliances of states such as the European Union (EU) that pool
and share sovereignty. While countries and states do not have diminished in rele-
vance, an important body of international law has emerged, and though frequently
contested it is still ever-expanding along with global challenges (Klabbers, 2021).
In an age where power is linked to control of technology and where global
challenges transcend the powers of any individual state, we must take into account
international corporations—such as big tech—and their influence on geopolitics.
Similarly of great importance are international collaborations such as civil society
activism, standardization by the technology community and industrial alliances, as
well as multistakeholder collaborations. These can be meeting places for common
opinion building and voluntary action but can also have power, either de facto or
sometimes also de jure under national, regional, or international law, to manage
important assets of economy, society, justice, or democracy. An instructive case in
the digital domain is ICANN (Internet Corporation for Assigned Names and Num-
bers). This is a private international multistakeholder organization that manages the
Internet domain name system. ICANN is effective in achieving international
576 P. Timmers
compliance to global domain name management, not in the least thanks to its
multistakeholder approach, yet it is not an organization under international law.2
Sovereignty requires internal and external legitimacy (Biersteker, 2012). Internal
legitimacy is acceptance of the authority of the government by the citizens. External
legitimacy is the acceptance of the state by foreign countries. Sovereignty concerns
three “assets” that need to be governed: (1) power, which is called foundational
sovereignty; (2) physical and nowadays also digital assets which comprise above all
territory and therefore is called territorial sovereignty; and (3) the institutional
organization of economy, society, and democracy, which is called institutional
sovereignty (Bickerton et al., 2022).
The key notions of internal and external legitimacy map onto foundational,
territorial, and institutional sovereignty. For instance, where state sovereignty is
about power arrangements, these need to be recognized internally and externally.
To be effective the state needs to have authority in the organization of government
and public services, and democracy needs to be an authoritative institution, for
instance, with an organization to ensure free elections. “Territory” may be seen as
any resources or assets that “belong to us” (i.e., not to “them”). These are of a
geographic, natural, or digital origin and can also be taken to include the population,
values, and culture. This territorial view clearly requires internal and external
recognition and thereby legitimacy. Finally, the institutions of government need to
be internally accepted, while their external legitimacy is a matter of—sometimes
disputed—international relations, such as extraterritorial jurisdiction (Klabbers,
2021, pp. 106–108).
State sovereignty is quite different from sovereignty of the individual, but
nevertheless, they are related through the internal legitimacy dimension of sover-
eignty. Control over what belongs to us as individuals (our body and life, our
thoughts, our preferences, our choices in social relations and democracy) will likely
lead to tensions in the relationship between state and individual when the state also
seeks control. Such tensions manifest themselves in authoritarian regimes where
there is suppression of free speech. They also show up when national security or
safety or public health is at stake. Some felt that their personal freedom was unjustly
curtailed during the COVID-19 pandemic and for some the state lost legitimacy.
A difficult question is also who exercises control over what is shared between
citizens and the state. The canonical example is citizen identity (or eID for its digital
form). Does it belong to you or to the state? Clearly, it is a sovereign asset and
issuing the citizen ID is a function of the sovereign (i.e., the state), a fonction
régalienne. However, many of our electronic identities are issued by Internet
companies, and some we use over and over, including for public services such as
Facebook or Google or Apple ID. Can our eID also belong to a corporation rather
than the state? The EU seeks to answer such questions in its EU Digital Wallet law.
Such a digital wallet includes the national eID, which is issued and recognized by the
2
ICANN is a US 501(c)3 nonprofit, with obligations for transparency and to spend its budget on its
mission, and is subject to the Court of California.
Sovereignty in the Digital Age 577
state, and furthermore contains personal attributes that are under self-sovereign, that
is, exclusive citizen control. Moreover, with the EU Digital Markets Act, the big tech
platforms (so-called gatekeepers) have to accept identification with the nationally
recognized ID. Therefore, a citizen eID or enriched citizen eID such as a digital
wallet in Europe is unlikely to come under exclusive corporate control.3
4 Strategic Autonomy
Much ink has been spilled in the last few years on the notion of strategic autonomy,
certainly in European debates. While some would argue that this is yet another
essentially contested concept (General Secretariat, 2021), research reveals that this is
actually not the case. There are at least two origins of the notion of strategic
autonomy (Timmers, 2019). One is in the French defense/military doctrine that
considers it as the capacities and capabilities to defend sovereignty. After WWII,
this was also translated by France to the ability to project military power wherever
necessary in the world ( force de frappe) and the need to have the atomic bomb. The
other origin is in Indian diplomacy, again especially after WWII, which was the
doctrine that India should have independence from either Beijing, Moscow, or
Washington, which also has strong defense/military undertones, that is,
non-alignment.
Clearly, both tell us that strategic autonomy is seen as a means to an end, the end
being sovereignty. The means consist of capabilities and capacities and control.
Also, clearly, today the notion of strategic autonomy goes beyond the military
domain, since sovereignty in the geopolitical digital age is threatened across econ-
omy, society, and democracy—national defense included. In the USA, economic
security is equated to national security. In China, economic geo-competition is
translated into a competition (with the West) for global system dominance and US
hegemony is no longer accepted.
This leads us to the following definition: strategic autonomy consists of the
capabilities, capacities, and control to decide and act on essential aspects of our
economy, society, and democracy.
Is this a clear and operational definition? One could criticize that “essential” and
“our” are not defined. Indeed, these terms link to what is meant by “our” sovereignty.
They have to be interpreted in the discourse on who “we” are and how we interpret
sovereignty, which is not a matter of definition but rather of assessment and
judgment.
3
In theory, the government of the EU Member State can notify a corporate eID/eWallet as being
compliant with the EU’s Digital Wallet law. However, if there are few strings attached, this could be
seen as a handover of a sovereign asset to commercial interests (which was not uncommon in the
past and even in the present when this concerns natural resources such as oil/gas or minerals).
578 P. Timmers
The other terms are clearer: capabilities are what we know, capacities are how
much we can do, and control is the say we have over capabilities and capacities,
decisions and actions. This makes the definition quite operational: we can identify
and even often measure capabilities and capacities and control or at least use proxies
for these. Examples—far from an exhaustive list—of such proxies are patents and
skilled professionals (capabilities), investments and market share (capacities), share-
holding, and security scrutiny requirements (control).
Furthermore, by having such an operational definition, we become aware that
often in many aspects strategic autonomy will not be absolute but only relative to
other countries. It will also only be partial. It is unlikely, except perhaps for the
superpowers USA and China, to have total control and have all necessary capabil-
ities and capacities, in other words, to have autarky. Economically, this is actually
undesirable because, even for the superpowers, lack of scale leads to inefficiencies
compared to division of roles across countries, i.e., specialization and global supply
chains. An illustration is that for the semiconductor industry, a global industrial
ecosystem costs in the order of one trillion dollars less than fully localized “self-
sufficient” supply chains (Boston Consulting Group and Semiconductor Industry
Association, 2021). How else to address strategic autonomy? There are essentially
four ways (see Fig. 2).
First, we already mentioned autarky. Second, countries can impose a risk man-
agement approach to strategic autonomy, that is, doing the best possible according to
the state of the art, but otherwise accepting vulnerabilities as an unavoidable risk.
Hopefully that residual risk is not disastrous, i.e., one can bounce back, one has
resilience. Risk management may not seem wise (do you want to put the state
at risk?), but it is actually the approach that many countries have followed from
the 1970s until recently. They were encouraged that globalization would reduce
Sovereignty in the Digital Age 579
70
60
50
40
30
20
10
0
1978
1994
2014
1984
1998
2000
2002
1974
1990
1976
2016
1982
1986
1992
2008
1972
1980
2010
2012
1970
2004
1988
1996
2006
2018
2020
Fig. 3 Global trade (% of GDP, CC-BY 4.0 license, World Bank)
stability of the domain name system globally. A successful past example is the 1987
Montreal Protocol to curb the emissions of CFK gases that destroy the ozone layer.
Paradoxically, while global collaboration seems to be about giving up control and
thereby losing sovereignty, the opposite can be true as well. Sovereignty can be
strengthened by jointly nurturing global commons. This holds true when the global
threats surpass the power of any individual country—such as climate change, cyber-
crime, or pandemics. It also holds true when there is a tragedy of the commons
situation, that is, either free-riders egotistically destroy the beneficial source or going
solo impedes the development of the much greater benefits of the common good,
from which, in turn, sovereignty can be strengthened. The great political philosopher
Alexis de Tocqueville observed this when studying democracy in America in the
nineteenth century, finding that the motivation to collaborate and provide benefits to
others is “self-interest rightly understood” (de Tocqueville, 1864).
The scale of collaboration does not necessarily have to be global. Regional
collaboration as in the EU, which is legally based in the EU Treaties, may be seen
by the EU member states as a win-lose situation as far as national sovereignty is
concerned. It appears obvious that countries lose sovereignty by having to comply
with EU laws, while the EU as a supranational entity gains sovereignty. But this is
not always true. A case in point is the EU Digital COVID Pass which provides a
triple win: it enabled EU member states to better deal within their own country with
the pandemic and thus strengthened internal legitimacy of government vs citizens. It
also built a European common good, an EU sovereign asset which increased
the legitimacy of the EU in relation to European citizens. Finally, it increased the
standing and influence of the EU in the world, i.e., its external legitimacy, as the EU
COVID Pass has been recognized and copied by 65 countries and over 1 billion
people across the world.
Strategic autonomy is a key concept for sovereignty in the digital age. It can take
many shapes and degrees of realization. But the debate is sometimes confused by
misunderstandings on terminology and fallacies. Often strategic autonomy in digital
matters is—mistakenly—called digital sovereignty, whereas authors actually discuss
capabilities, capacities, and control rather than sovereignty.
There are also fallacies about strategic autonomy. One is that authors equate
strategic autonomy to autarky or self-sufficiency which has the smell of protection-
ism. But autarky is only one approach and actually the rarest. Moreover, protection-
ism may be a legitimate policy measure to strengthen strategic autonomy, but the
converse may also be true. Moreover, strengthening mutual interdependencies can
reduce the risk that the foreign country would be tempted to undermine its partner’s
sovereignty.
There are two more fallacies on which we can be brief. One is the “we can have it
all” fata morgana. Strategic autonomy does not come for free. The total investments
for strong independence (such as in semiconductors, cloud, networks, AI, green
industry, medicines, etc.) far surpass the resources of most countries. Another is the
“let’s take back control” fallacy (the slogan of Brexit). As (Martin Wolf, 2019)
convincingly and scathingly argued, you cannot take back control on something you
never had. As an example, for the EU, cloud strategic autonomy is not about taking
Sovereignty in the Digital Age 581
back control but rather about either building up an EU cloud industry that can
compete with the big foreign cloud providers (who have 70% of the market in the
EU), or accepting to play a value-added role to the big cloud providers in trust
services and AI with as a consequence long-term geopolitical dependency on the
USA, or changing the paradigm and building up strategic autonomy in edge-cloud, a
new form of decentralized and distributed cloud.
(continued)
582 P. Timmers
control. In the early days of the Internet, it was believed that the global Internet
protocols and its fully decentralized implementation (intelligence distributed into all
the network-connected computers) would create an independent de-territorialized
cyberspace where “governments of the Industrial World, you wary giants of flesh
and steel, [. . .], you are not welcome among us. You have no sovereignty where we
gather” (Barlow, 1996). A dream that has been shattered to the extent that nowadays
we better talk of splinternet rather than Internet (O’Hara et al., 2021). Still, the dream
of global citizenship, escaping from the shackles of state sovereignty and big tech,
lives on the basis of new technologies such as self-sovereign identity and blockchain
enabled Web3.
The examples above, to develop technologies that respect sovereignty (“law is
code”), are always also about restoring the balance of power, back to the state and
back to citizens, away from foreign states and away from private companies. But we
have also shown that sovereignty-respecting technology architectures may not
always be possible—let alone whether the power struggle can be won by sovereign
states and their citizens.
Power in the digital age is qualitatively and quantitatively different from power in
the nineteenth and first half of the twentieth century. The rise of artificial general
intelligence (AGI) and concerns about fundamental erosion of human autonomy
(digital slavery) and geopolitical disruption (tech war) are serious. While we can
learn from the past and from human nature, it would be naïve and dangerous to
assume that history repeats itself that “we have been here before.”
Policies for sovereignty in the digital age must take both geopolitics and technology
into account. Ab initio these two must be on equal footing. Both shape and can be
shaped by public policy.
Public policy can have many goals, which can include the safeguarding and
strengthening of sovereignty in the digital age, i.e., we are looking for digital
strategic autonomy policy. This is a new form of policy-making, different from the
past, as it explicitly addresses strategic autonomy and responds to the nature of
digital technologies.
Digital technologies are characterized by their speed of development, the scale of
their impact, the systemic effect they have in economy or society, and the synchro-
nicity that they enable, meaning that powerful actors can combine several technol-
ogies and gain huge competitive and financial advantages (Timmers, 2022b,
pp. 13–15). That last point is somewhat abstract but well-illustrated by the devel-
opment of large language models (LLMs) that enable generative AI such as OpenAI/
Microsoft’s ChatGPT and Google’s Bard. The big tech companies that can afford the
billions of investment for collecting and analyzing the data are not only AI compa-
nies but also cloud companies that possess huge computing capacity, as also raised
by Digital Humanism Initiative (DIGHUM, 2023). They are also leaders in
Sovereignty in the Digital Age 585
cybersecurity and in the next generation, quantum computing, and in the race toward
artificial general intelligence (AGI). They are among the few that have the means to
synchronize the research and development of several key technologies. If they can
exercise unrestrained commercial behavior with this integrated suite of powerful
technologies, they are bound to be seen by governments as posing a threat to
sovereignty. For AI and AGI, see the related case study and Discussion
Questions (#6).
We see several examples of digital strategic autonomy policy today, such as the
2022 USA Chips and Science Act, the broad-ranging China 2025 initiative, and the
2021 European Digital Single Market Act to combat illegal and dangerous content
on the Internet and its 2022 EU Chips Act.
Industrial policies get increasingly focused on sovereignty in the digital age.
Industrial policy is “a deliberate attempt by the government [. . .] to orientate
industrial development towards specific paths” (Bianchi & Labory, 2020). Tradi-
tionally, industrial policy would focus on an industrial ecosystem, where the interest
is in national competitiveness, and the individual firm’s interests, which include
business performance and business strategies for markets and alliances. When
sovereignty is at stake, geopolitical interests must be given an equally key role in
designing industrial policy. The three perspectives are (simplified) captured in Fig. 5.
Combining these three perspectives is quite challenging. It requires understand-
ing how to join up geopolitical interests, national competitiveness, and company
interests. It also requires consistency joining up a wide variety of traditionally
separate policy areas. These are, firstly, because of the geopolitical dimension
foreign trade, foreign direct investment (FDI), export controls, and defense and
security policies. Secondly, because of the industrial ecosystem dimension, we
need to consider the producers (think of an area such as semiconductors or pharma);
their suppliers; their inputs or “factor conditions” such as knowledge, capital, and
raw materials; and the presence of the government as both a buyer and regulator. We
then need to think of policy actions for general R&D, investment, standardization,
586 P. Timmers
market access, consumer protection, skills, and public procurement. Third, because
of the interests of individual firms, we need to think of targeted innovation and
investment and taxation policy, aimed at specific (classes of) firms and possible
digital transition and employment policy to buffer the shock of digitalization.
It is quite a tall order to master all these policy instruments, let alone to make sure
that they reinforce each other. We are also hampered by a lack of theoretical and
academic understanding. Excellent models and theories exist for industrial and
innovation ecosystems, even for economic networks and platform economies, as
applied by, for instance, OECD and World Economic Forum, or by competition
authorities. We also have a vast corpus of theoretical and practical knowledge about
firms’ interests and strategies, as mostly taught at business schools. A very rich field,
as shown above, exists in terms of theories of international relations. But there is a
paucity in models and theories that connect and integrate the three perspectives.
7 Conclusions
The central problem is to develop public policy for sovereignty in the digital age.
We clearly do not have a simple recipe and not even a cookbook for public policy
for sovereignty in the digital age, as we want it, which for digital humanism must
include to “shape technologies in accordance with human values and needs.”
We saw that the challenges include to understand perspectives on international
relations and sovereignty and to understand the nature of digital technologies and the
digital technology ecosystem and the motivations of individual actors such as tech
companies. We need to combine these perspectives in order to arrive at sensible
public policy for sovereignty in the digital age, while there is neither a ready-made
model nor does traditional education train the students who go on to work in
government, business, civil society, or academia for such integrated policy-making.
This chapter aims to give at least some handles to that extent.
The best current approach probably is to examine concrete cases that concern
both sovereignty and digital technologies, come forward with policy interventions,
and then examine their consistency, coherence, completeness, and impact. We need
to add to this also flexibility, given our limited insight and the speed of development
of technology and sometimes also the speed of developments in geopolitics (think of
the war against Ukraine and global challenges such as COVID-19).
Traditional policy instruments such as regulation struggle to deliver in this
respect, but that does not mean that they become irrelevant. Rather, the challenge
is to adapt policy-making to the reality of geopolitics and technology.
Let’s then finish with two cases and with an invitation to the reader to come up
with additional or alternative policy interventions and to then reflect on how these
relate to digital humanism. The first case is on ICT supply chain security and the
second on generative AI such as ChatGPT. The first is more mature, has already
shown to lead to posing threats to sovereignty, and has already led to concrete policy
Sovereignty in the Digital Age 587
action. The second is more recent with still many unknowns but evolving fast with
potentially huge consequences for sovereignty.
Hopefully these cases provide the reader with a stepping stone and motivation to
make a reality of integrated policy-making for sovereignty in the digital—Digital
Humanistic—age.
(continued)
4
Log4J Vulnerability Explained: What It Is and How to Fix It | Built In
5
SolarWinds hack explained: Everything you need to know (techtarget.com).
6
Kaseya VSA ransomware attack - Wikipedia
588 P. Timmers
(continued)
7
Generative AI creates original content. Some examples are ChatGPT (text and computer code),
BLOOM (text, images), GLM (text), OPT, Galactica (science), Stable Diffusion (art), DALL-E (art,
images), VALL-E (voice), and Galactica (scientific articles). Generative AI is based on several
techniques, prominent in these are large language models and generative pretrained transformers
(GPT).
Sovereignty in the Digital Age 589
8
Colonial Pipeline hack explained: Everything you need to know (techtarget.com).
9
In the USA, the Center for AI and Digital Policy requested the FTC to impose a moratorium on
commercial GPT (CAIDP, 2023).
10
Vienna Manifesto on Digital Humanism – DIGHUM (tuwien.ac.at)
590 P. Timmers
If you read French (hopefully the book will get a translation), providing an
excellent overview of the development of industrial policy and the shape it may
take when sovereignty concerns are on the rise.
References
Altman, S. (2023). Planning for AGI and beyond | OpenAI [WWW Document]. Accessed 3.28.23,
from https://openai.com/blog/planning-for-agi-and-beyond
Art, R. J., & Jervis, R. (2016). International politics: Enduring concepts and contemporary issues
(13th ed.). Pearson.
Barlow, J. P. (1996). A declaration of the independence of cyberspace [WWW Document]. Electron.
Front. Found. Accessed 9.13.22, from https://www.eff.org/cyberspace-independence
Bianchi, P., & Labory, S. (2020). European industrial policy: A comparative perspective. In
A. Oqubay, C. Cramer, H.-J. Chang, & R. Kozul-Wright (Eds.), The Oxford handbook of
industrial policy (pp. 593–620). Oxford University Press. https://doi.org/10.1093/oxfordhb/
9780198862420.013.22
Bickerton, C., Brack, N., Coman, R., & Crespy, A. (2022). Conflicts of sovereignty in contempo-
rary Europe: A framework of analysis. Comparative European Politics, 20, 257–274. https://
doi.org/10.1057/s41295-022-00269-6
Biersteker, T., (2012). State, sovereignty and territory. In Handbook of international relations. Sage
Publications Ltd. Especially recommended for the issue of sovereignty.
Boston Consulting Group, Semiconductor Industry Association. (2021). Strengthening the Global
Semiconductor Supply Chain in an Uncertain Era | BCG [WWW Document]. Accessed 1.27.22,
from https://www.bcg.com/publications/2021/strengthening-the-global-semiconductor-supply-
chain
Bubeck, S., Chandrasekaran, V., Eldan, R., Gehrke, J., Horvitz, E., Kamar, E., Lee, P., Lee, Y.T.,
Li, Y., Lundberg, S., Nori, H., Palangi, H., Ribeiro, M.T., & Zhang, Y. (2023). Sparks of
Artificial General Intelligence: Early experiments with GPT-4.
CAIDP. (2023). OPEN AI (FTC 2023) Complaint [WWW Document]. Center for AI and Digital
Policy. Accessed 3.28.23, from https://www.caidp.org/cases/openai/
Carlsnaes, W., Risse, R., Simmons, B. (Eds). (2012). Handbook of international relations. Sage
Publications Ltd.
Cohen, J. E. (2019). Between truth and power: The legal constructions of informational capitalism.
Cohen, E. (2022). Souveraineté industrielle: Vers un nouveau modèle productif. Odile Jacob.
Daniels, J., & Murgia, M. (2023). Deepfake ‘news’ videos ramp up misinformation in Venezuela |
Financial Times. Financial Times.
De Filippi, P., & Wright, A. (2019). Blockchain and the Law. Harvard University Press.
de Tocqueville, A. (1864). Comment Les Américains Combattent L’individualisme Par La Doctrine
De L’intérêt Bien Entendu. In I. I. Tome (Ed.), De La Démocratie En Amérique (pp. 198–203).
Michel Lévy.
Digital Humanism Initiative DIGHUM. (2019). Vienna manifesto on digital humanism –
DIGHUM.
Digital Humanism Initiative DIGHUM. (2023). Statement of the digital humanism initiative on
ChatGPT – DIGHUM. Accessed 3.28.23, from https://dighum.ec.tuwien.ac.at/statement-of-the-
digital-humanism-initiative-on-chatgpt/
Eriksson, J., & Newlove-Eriksson, L. M. (2021). Theorizing technology and international relations:
Prevailing perspectives and new horizons. In Technology and international relations (pp. 3–22).
Edward Elgar.
592 P. Timmers
Farrell, H., & Newman, A. L. (2019). Weaponized interdependence: How global economic
networks shape state coercion. International Security, 44, 42–79. https://doi.org/10.1162/isec_
a_00351
Fukuyama, F. (2022). Liberalism and its discontents. Macmillan.
Gallie, W. B. (1956). Essentially contested concepts. Proceedings of the Aristotelian Society, 56,
167–198.
General Secretariat. (2021). Strategic-autonomy, strategic choices - issues paper. Council of the
European Union.
Kello, L. (2017). The virtual weapon and international order.
Keohane, R., & Nye, J., Jr. (2011). Power & interdependence (4th ed.). Pearson.
Klabbers, J. (2021). International law (3rd ed.). Cambridge University Press.
Lessig, L. (1999). Code: And other laws of cyberspace. Basic Books.
Mearsheimer, J. J. (1994). The false promise of international institutions. International Security, 19,
5–49.
Nowotny, H. (2021). In AI we trust: Power, illusion and control of predictive algorithms.
O’Hara, K., Hall, W., & Cerf, V. (2021). Four Internets. Four Internets. https://doi.org/10.1093/
OSO/9780197523681.001.0001.
Stanford University. (n.d.). Stanford encyclopedia of philosophy [WWW Document]. Accessed
3.27.23, from https://plato.stanford.edu/index.html
Timmers, P. (2019). Ethics of AI and cybersecurity when sovereignty is at stake. Minds Mach, 29,
635–645. https://doi.org/10.1007/S11023-019-09508-4/FIGURES/3
Timmers, P. (2020). There will be no global 6G unless we resolve sovereignty concerns in 5G
governance. Nature Electronics, 31(3), 10–12. https://doi.org/10.1038/s41928-020-0366-3
Timmers, P. (2022a). The technological construction of sovereignty. In Perspectives on digital
humanism (pp. 213–218). Springer. https://doi.org/10.1007/978-3-030-86144-5_28
Timmers, P. (2022b). Digital Industrial Policy for Europe | CERRE report. CERRE.
Waller, P., & Timmers, P. (2022). Controversial classifiers — The perils of prediction algorithms in
public administration. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4246955
Waltz, K. N. (2010). Theory of international politics (1st ed.). Waveland Press.
Wolf, M., 2019. The Brexit delusion of taking back control | Financial Times. Financial Times.
World Bank. (2021). Trade (% of GDP) | Data [WWW Document]. Accessed 3.25.23, from https://
data.worldbank.org/indicator/NE.TRD.GNFS.ZS
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter's Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.