Abstract
The concept of sovereignty is more important than ever in the cyber context, yet it is poorly understood. With this article, we are seeking to contribute towards a shared understanding of the concept of sovereignty by succinctly addressing the following six, interrelated, questions:
Who can claim to have sovereignty;
Over what can one have sovereignty;
What are the consequences of having sovereignty over something;
Who can violate sovereignty;
What is the threshold for violating sovereignty; and
What are the consequences of violating sovereignty?
However, this article is not limited to a descriptive account of the law as it stands today. A purely descriptive account would not provide a full picture of the complex concept of sovereignty, and we have felt it appropriate to enter the territory of law reform options in parts of the discussion.
While sovereignty is a technology-neutral concept and the article addresses it as such, particular attention is directed at sovereignty in the cyber context.
Who can claim to have sovereignty;
Over what can one have sovereignty;
What are the consequences of having sovereignty over something;
Who can violate sovereignty;
What is the threshold for violating sovereignty; and
What are the consequences of violating sovereignty?
However, this article is not limited to a descriptive account of the law as it stands today. A purely descriptive account would not provide a full picture of the complex concept of sovereignty, and we have felt it appropriate to enter the territory of law reform options in parts of the discussion.
While sovereignty is a technology-neutral concept and the article addresses it as such, particular attention is directed at sovereignty in the cyber context.
Original language | English |
---|---|
Pages (from-to) | 33-85 |
Number of pages | 53 |
Journal | Masaryk University Journal of Law and Technology |
Volume | 17 |
Issue number | 1 |
DOIs | |
Publication status | Published - Jun 2023 |