Skip to main content Accessibility help
×
Hostname: page-component-745bb68f8f-v2bm5 Total loading time: 0 Render date: 2025-01-09T17:23:43.499Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  31 December 2024

Min Jiang
Affiliation:
University of North Carolina, Charlotte
Luca Belli
Affiliation:
Fundação Getulio Vargas Law School
Type
Chapter
Information
Digital Sovereignty in the BRICS Countries
How the Global South and Emerging Power Alliances Are Reshaping Digital Governance
, pp. 239 - 274
Publisher: Cambridge University Press
Print publication year: 2025
Creative Commons
Creative Common License - CCCreative Common License - BYCreative Common License - NC
This content is Open Access and distributed under the terms of the Creative Commons Attribution licence CC-BY-NC 4.0 https://creativecommons.org/cclicenses/

References

Accenture. (2020). Insight into the cyber threat landscape in South Africa. https://is.gd/f9xSSUGoogle Scholar
Acharya, A. (2014). The end of American world order. Cambridge, UK: Polity Press.Google Scholar
ACI Worldwide and Global Data. (2022, April). Prime time for real-time global payments report. https://is.gd/7cebv6Google Scholar
Agbebi, M. (2018). China in Africa’s telecom sector: Opportunities for human capital development? A case of Huawei in Nigeria. Human Resource Development International, 21(5), 532551.CrossRefGoogle Scholar
Aggad, F. (2021, February 8). Africa’s digital transformation risks becoming trapped in geopolitical competition. Mail & Guardian. https://is.gd/OKnSH3Google Scholar
Al Jazeera. (2021, January 26). India to impose permanent ban on dozens of Chinese apps: Reports. Al Jazeera. https://is.gd/KLFne3Google Scholar
Alekseeva, A., Zasurskij, I. et al., (Eds.) (2013). Transformacija avtorskogo prava v internete. zarubezhnye tendencii, biznes-modeli, rekomendacii dlja Rossii (Copyright transformation on the internet. Foreign trends, business models, recommendations for Russia). Moscow: Associacija Internet-izdatelej.Google Scholar
Allen, K. (2019). Does Africa risk being left behind in the digital security debate? Dakar International Forum on Peace and Security in Africa. https://is.gd/CjvJpOGoogle Scholar
Allison, G. (2017). Destined for war: Can America and China escape Thucydides’s Trap? New York: Houghton Mifflin Harcourt.Google Scholar
Amnesty International. (2019, December 11). Russian feminist activist fined for “gay propaganda” and facing criminal “pornography” charges. Amnesty International.Google Scholar
Amsden, A. (2001). The rise of “the rest”: Challenges to the west from late-industrializing economies. Oxford, UK: Oxford University Press.CrossRefGoogle Scholar
An, N. (2020). China’s responses to the US war on terror: A perspective and agenda of Internet geopolitics. Tijdschrift Voor Economische En Sociale Geografie, 111(5), 758770.CrossRefGoogle Scholar
Anđelković, L. (2017). The elements of proportionality as a principle of human rights limitations. Facta Universitatis, Series: Law and Politics, 15(3), 235244.CrossRefGoogle Scholar
Andreessen, M. (2011, August 20). Why software is eating the World. The Wall Street Journal. https://is.gd/UjaIldGoogle Scholar
Angelidou, M. (2017). The role of smart city characteristics in the plans of fifteen cities. Journal of Urban Technology, 24(4), 328.CrossRefGoogle Scholar
Anghie, A. (2007). Imperialism, sovereignty and the making of international law. Cambridge: Cambridge University Press.Google Scholar
Anshan, L. (2007). China and Africa: Policy and challenges. China Security, 3(3), 6993.Google Scholar
Aris, S. (2008). Russian–Chinese relations through the lens of the SCO. Russia/NIS center. https://is.gd/Kytr2yGoogle Scholar
Armijo, L. E., & Katada, S. N. (2014a). New kids on the block: Rising multipolarity, more financial statecraft. In Armijo, L. & Katada, S. (Eds.), The financial statecraft of emerging powers: Shield and sword in Asia and Latin America (International political economy series) (pp. 120). New York: Palgrave Macmillan.Google Scholar
Armijo, L. E., & Katada, S. N. (2014b). Theorizing the financial statecraft of emerging powers. New Political Economy, 20(1), 4262.CrossRefGoogle Scholar
Armijo, L. E., & Roberts, C. (2014). The emerging powers and global governance Why the BRICS matter. In Looney, R. (Ed.), Handbook of emerging economies (pp. 503524). New York: Routledge.CrossRefGoogle Scholar
Arsène, S. (2015). Internet domain names in China: Articulating local control with global connectivity. China Perspectives, 2015(4), 2534.CrossRefGoogle Scholar
Arsène, S. (2016). Global internet governance in Chinese academic literature: Rebalancing a hegemonic world order? China Perspectives, 2, 2535.CrossRefGoogle Scholar
Arsène, S. (2018). The Chinese ICT development strategy in Africa: Transparency, sovereignty and soft power. In Kalathil, S. (Ed.), Diplomacy, development and security in the information age (pp. 5161). https://is.gd/isgr4dGoogle Scholar
Arya, V. (2020, July 27). Securing India’s digital sovereignty. BW Businessworld. https://is.gd/Xq1wzxGoogle Scholar
ASEAN. (2012). ASEAN Telecommunications and Information Technology Ministers Meeting (TELMIN): Framework on personal data protection. ASEAN. https://is.gd/iGI052Google Scholar
ASEAN. (2022). ASEAN data management framework: Data governance and protection throughout the data lifecycle. ASEAN. https://is.gd/DWPKAcGoogle Scholar
Asmolov, G. (2020). Runet in crisis situations. In Davydov, S. (Ed.), Internet in Russia: A study of the Runet and its impact on social life (pp. 231250). Cham: Springer.CrossRefGoogle Scholar
Associated Press. (2005, November 18). Tech summit ends with Internet control in question despite agreement. VailDaily. https://is.gd/8d5CGjGoogle Scholar
Avila Pinto, R. (2018). Digital sovereignty or digital colonialism? New tensions of privacy, security and national policies. Sur: International Journal on Human Rights, 15(27), 1528.Google Scholar
Ayers, E. (2016). Rethinking sovereignty in the context of cyberspace: The cyber sovereignty workshop series. Carlisle Barracks, PA: U.S. Army War College.Google Scholar
Baasanjav, U. B. (2014). Linguistic diversity on the internet: Arabic, Chinese and Cyrillic script top-level domain names. Telecommunications Policy, 38(11), 961969.CrossRefGoogle Scholar
Babic, M., Fichtner, J., & Heemskerk, E. M. (2017). States versus corporations: Rethinking the power of business in international politics. The International Spectator, 52(4), 2043.CrossRefGoogle Scholar
Bai, C., & Lei, X. (2020). New trends in population aging and challenges for China’s sustainable development. China Economic Journal, 13(1), 323.CrossRefGoogle Scholar
Bailey, R., & Parsheera, S. (2018, September). Data localisation in India: Questioning the means and ends (Working Paper No. 242). National Institute of Public Finance and Policy.CrossRefGoogle Scholar
Bailey, R., & Parsheera, S. (2021). Data localization in India: Paradigms and processes. CSIT, 9(3), 137150.CrossRefGoogle Scholar
Banco Central do Brasil. (2020, June 23). Nova solução de pagamentos depende de prévia autorização do BC. https://is.gd/lYs73NGoogle Scholar
Barbrook, R., & Cameron, A. (1996). The Californian ideology. Science as Culture, 6(1), 4472.CrossRefGoogle Scholar
Bardhan, P. (2023). Unmasking India’s crony capitalist oligarchy. Project Syndicate. https://is.gd/e90v5sGoogle Scholar
Barlow, J. P. (1996). Declaration of the independence of cyberspace. Electronic frontier foundation. www.eff.org/cyberspaceindependenceCrossRefGoogle Scholar
Barma, N., Ratner, E., & Weber, S. (2014). Welcome to the world without the West. The National Interest. https://is.gd/WcyCdRGoogle Scholar
Baruah, P. (2016, November 16). How AP Hota created Amul of Indian finance. The Economic Times.Google Scholar
Basu, A. (2019, November 7). India’s role in global cyber policy formulation. Lawfare. https://is.gd/doLRXoGoogle Scholar
BBC. (2014, March 21). Visa and MasterCard block Russian bank customers. www.bbc.com/news/business-26678145Google Scholar
BBC. (2019, November 22). Chaayos cafe: Indian cafe’s facial recognition use sparks anger. BBC. www.bbc.com/news/world-asia-india-50499380Google Scholar
BBC. (2020, December 26). Chinese economy to overtake US “by 2028” due to Covid. BBC. www.bbc.com/news/world-asia-china-55454146Google Scholar
BBC. (2021a, February 28). Has China lifted 100 million people out of poverty? BBC. www.bbc.com/news/56213271Google Scholar
BBC. (2021b, January 30). India protests: Internet cut to hunger-striking farmers in Delhi. BBC. www.bbc.com/news/world-asia-india-55872480Google Scholar
Belli, L. (2011, November 7). Internet governance v. Internet government. MediaLAWS. www.medialaws.eu/internet-governance-v-internet-government/Google Scholar
Belli, L. (2015, April 20). From net neutrality to net feudality. MediaLAWS. www.medialaws.eu/from-net-neutrality-to-net-feudality/CrossRefGoogle Scholar
Belli, L. (2017). Network self-determination and the positive externalities of community networks. In Belli, L. (Ed.), Community networks: The internet by the people for the people: Official outcome of the UN IGF dynamic coalition on community connectivity. FGV. https://is.gd/SuKDFgGoogle Scholar
Belli, L. (2019). Network neutrality, zero-rating and the Marco Civil da Internet. In Belli, L. & Cavalli, O. (Eds.), Internet governance and regulations in Latin America (pp. 163190). Rio de Janeiro: FGV Direito Rio.Google Scholar
Belli, L. (2021a). BRICS countries to build digital sovereignty. In Belli, L. (Ed.), CyberBRICS: Cybersecurity regulations in the BRICS countries (pp. 282292). London: Springer-Nature.CrossRefGoogle Scholar
Belli, L. (Ed.) (2021b). CyberBRICS: Cybersecurity regulations in BRICS countries. Berlin, Germany: Springer.CrossRefGoogle Scholar
Belli, L. (2021c). Cybersecurity policymaking in the BRICS Countries: From addressing national priorities to seeking international cooperation. The African Journal of Information and Communication, 28, 114. https://is.gd/4lYPSTCrossRefGoogle Scholar
Belli, L. (2022). Structural power as a critical element of digital platforms’ private sovereignty. In Celeste, E., Heldt, A., & Iglesias Keller, C. (Eds.), Constitutionalising social media. Hart. https://is.gd/yb6tfhGoogle Scholar
Belli, L. (2023). Building good digital sovereignty through digital public infrastructures and digital commons in India and Brazil. G20’s Think20 (T20). https://is.gd/BDCXssGoogle Scholar
Belli, L., & Doneda, D. (2022). Data protection in the BRICS Countries: Legal interoperability through innovative practices and convergence. International Data Privacy Law, 13(1), 124.CrossRefGoogle Scholar
Belli, L., & Hadzic, S. (Eds.) (2022). Community networks as enablers of human rights. Official outcome of the UN IGF dynamic coalition on community connectivity. www.intgovforum.org/en/filedepot_download/45/24008Google Scholar
Belli, L., & Hadzic, S. (2023). Community networks: Building digital sovereignty and environmental sustainability. Official Outcome of the UN IGF Dynamic Coalition on Community Connectivity. https://is.gd/cB2VLmGoogle Scholar
Belli, L., & Zingales, N. (2023). Interoperability to foster open digital ecosystems in the BRICS countries. In Chinese Academy of Cyberspace Studies, Xinhua Institute, China Institute of International Studies (Eds.), Shared vision for the digital world: Insights from global think tanks on jointly building a community with a shared future in cyberspace. Beijing, China: The Commercial Press. [In Chinese].Google Scholar
Benhamou, B., & Sorbier, L. (2006). Souveraineté et réseaux numériques. Politique étrangère, Automne, 3. https://is.gd/QJRrGbGoogle Scholar
Benkler, Y. (2006). The wealth of networks: How social production transforms markets and freedom. New Haven, CT: Yale University Press.Google Scholar
Bennett, L. W., & Sederberg, A. (2013). The logic of connective action: Digital media and the personalization of contentious politics. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Benyera, E. (2021). The fourth industrial revolution and the recolonisation of Africa: The coloniality of data. New York: Routledge.CrossRefGoogle Scholar
Bhandari, V., Kak, A., Parsheera, S., & Rahman, F. (2017). An analysis of Puttaswamy: The supreme court’s privacy verdict. IndraStra Global, 11, 15.Google Scholar
Bhuiyan, A. (2014). Internet governance and the global south: Demand for a new framework. New York: Palgrave Macmillan.CrossRefGoogle Scholar
Bidwell, N., & Jensen, M. (2019). Bottom-up connectivity strategies: Community-led small-scale telecommunication infrastructure networks in the global South. Association for Progressive Communications.Google Scholar
Biju, P. R. (2019). Political internet: State and politics in the age of social media. Place of publication not identified: Routledge India.Google Scholar
Birch, K., Cochrane, D., & Ward, C. (2021). Data as asset? The measurement, governance, and valuation of digital personal data by Big Tech. Big Data & Society, 8(1), 115.CrossRefGoogle Scholar
Biswas, S. (2021, February 12). The Indian government’s war with Twitter – BBC News. BBC News. https://is.gd/9tRklLGoogle Scholar
Black, J. L. (2021). Russia after 2020: Looking ahead after two decades of Putin (1st ed.). Routledge.CrossRefGoogle Scholar
Boas, T. C. (2000). The dictator’s dilemma? The internet and U.S. policy toward Cuba. The Washington Quarterly, 23(3), 5767.CrossRefGoogle Scholar
Bodó, B., Brekke, J. K., & Hoepman, J.-H. (2021). Decentralisation: A multidisciplinary perspective. Internet Policy Review, 10(2). https://policyreview.info/concepts/decentralisationCrossRefGoogle Scholar
Bodomo, A. (2009). Africa-China relations: Symmetry, soft power and South Africa. The China Review: An Interdisciplinary Journal on Greater China, 9(2), 169178.Google Scholar
Bodoni, S., Colten, J., & Bloomberg. (2021, December 9). Amazon hit with a massive new antitrust fine – this time $1.2 billion for steering vendors to use its shipping service. Fortune. https://is.gd/qkzM6EGoogle Scholar
Bond, S. (2022, February 28). Facebook and Tiktok block Russian state media in Europe. NPR. https://is.gd/824rTzGoogle Scholar
Borger, J., Lewis, P., & Mason, R. (2014, July). EU and US impose sweeping economic sanctions on Russia. The Guardian. https://is.gd/Dh0tumGoogle Scholar
Borgonovi, F., Centurelli, R., Dernis, H., Grundke, R., Horvát, P., Jamet, S., … Squicciarini, M. (2018). Bridging the digital gender divide. https://is.gd/QbLkPpGoogle Scholar
Bradford, A. (2020). The Brussels effect: How the European Union rules the world. In The Brussels effect (pp. 235264). New York: Oxford University Press.CrossRefGoogle Scholar
Braithwaite, J., & Drahos, P. (2000). Global business regulation. Cambridge University Press.CrossRefGoogle Scholar
Brake, D. R. (2017). The invisible hand of the unaccountable algorithm: How Google, Facebook and other tech companies are changing journalism. In Tong, J. & Lo, S.-H. (Eds.), Digital technology and journalism: An international comparative perspective (pp. 2546). Berlin: Palgrave Macmillan.CrossRefGoogle Scholar
Bratton, B. (2016). The stack. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Bria, F. (2020, March 9). Putting tech and innovation at the service of people and the green transition. Medium. https://is.gd/qlDqpEGoogle Scholar
BRICS. (2013). eThekwini Declaration and Action Plan. https://is.gd/H3LS8zGoogle Scholar
BRICS. (2015). VII BRICS Summit – Ufa Declaration. https://is.gd/QEUJawGoogle Scholar
BRICS. (2021). XIII BRICS Summit-New Delhi Declaration. BRICS. https://is.gd/1LDrepGoogle Scholar
BRICS. (2023). XV BRICS Summit Johannesburg II Declaration. In Sandton, Gauteng, South Africa. https://is.gd/wbWiXAGoogle Scholar
Broeders, D., & van den Berg, B. (2020). Governing cyberspace: Behavior, power, and diplomacy. London: Rowman & Littlefield.Google Scholar
Brousseau, E., Marzouki, M., & Méadel, C. (2012). Governance, networks and information technologies: Societal, political, and organizational innovations. In Brousseau, Eric, Marzouki, Meryem & Méadel, Cécile (Eds.), Governance, regulations and powers on the Internet (pp. 336). Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Brown, I. (2020). Interoperability as a tool for competition regulation. OpenForum Academy. https://doi.org/10.31228/osf.io/fbvxdCrossRefGoogle Scholar
Bruner, C. M. (2008). States, markets, and gatekeepers: Public-private regulatory regimes in an area of economic globalization. Michigan Journal of International Law, 30(1), 125176.Google Scholar
Burke, J. (2023, October 16). China and Russia harden positions on Gaza as war stirs geopolitical tensions. The Guardian. https://is.gd/Cyn3kqGoogle Scholar
Burman, A., & Sharma, U. (2021, April). How would data localization benefit India? Carnegie Endowment for International Peace. https://is.gd/oUpf4vGoogle Scholar
Business Insider India. (2021, February 13). Twitter suspends 90–95% of accounts listed by Indian government. Business Insider India. https://is.gd/7gtdgzGoogle Scholar
Buzan, B., Wæver, O., & De Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner Publishers.Google Scholar
Calandro, E. (2015). Governing regional telecommunication networks in a developing region: The SADC case. Cape Town: University of Cape Town.Google Scholar
Calandro, E., & Berglund, N. (2021). Towards converging African positions on international cybersecurity? African participation in multilateral and multistakeholder processes. [Unpublished paper]Google Scholar
Calzada, I. (2017). The techno-politics of data and smart devolution in city-regions: Comparing Glasgow, Bristol, Barcelona, and Bilbao. Systems, 5(1), 118.CrossRefGoogle Scholar
Calzati, S. (2020a). Decolonising “data colonialism”: Propositions for investigating the realpolitik of today’s networked ecology. Television & New Media, 22(8). https://doi.org/10.1177/1527476420957Google Scholar
Calzati, S. (2020b). China, Africa, and the West: A geopolitical assessment of Huawei’s crisis communication on social network. International Journal of Communication, 14, 121.Google Scholar
Cao, B. (2018). 跨境数据传输的立法模式与完善路径 – 从《网络安全法》第37条切入 [Legislative models and perfection approaches of cross-border data transfer: From Article 37 of the cybersecurity law]. 西南民族大学学报(人文社科版)[Journal of Southwest Minzu University (Humanities and Social Sciences)], 39(9), 94100.Google Scholar
Cardullo, P., & Kitchin, R. (2019). Smart urbanism and smart citizenship: The neoliberal logic of “citizen-focused” smart cities in Europe. Environment and Planning C: Politics and Space, 37(5), 813830.Google Scholar
Carlsson, U. (2003). The rise and fall of NWICO: From a vision of international regulation to a reality of multilevel governance. Nordicom Review, 24(2), 3167.CrossRefGoogle Scholar
Carrai, M. A. (2021). The RCEP and a geopolitical pivot to the Asia-Pacific. AfronomicsLAW. https://is.gd/QISMqIGoogle Scholar
Cartwright, M. (2020). Internationalising state power through the internet: Google, Huawei and geopolitical struggle. Internet Policy Review, 9(3), DOI: 10.14763/2020.3.1494Google Scholar
Cascais, A. (2019). How China benefits from Africa’s smartphone boom. Deutsche Welle. https://is.gd/bfxzhpGoogle Scholar
Castillo-Montoya, M. (2016). Preparing for interview research: The interview protocol refinement framework. The Qualitative Report, 21(5), 811831.Google Scholar
Cerulus, L. (2019, February 4). Europe eyes privacy clampdown on China. Politico. https://is.gd/xYNFxdGoogle Scholar
CGI. (2023). 92 milhões de brasileiros acessam a Internet apenas pelo telefone celular, aponta TIC Domicílios 2022. https://is.gd/HwartRGoogle Scholar
CGTN. (2022a, May 20). Rediscover the value of BRICS under “three pillars.” CGTN America. https://is.gd/c4pqLyGoogle Scholar
CGTN. (2022b, May 21). The heat: BRICS meeting. CGTN America. https://is.gd/pJEszZGoogle Scholar
Chadwick, A. (2006). Internet politics: States, citizens, and new communication technologies. Oxford, UK: Oxford University Press.Google Scholar
Chakravarti, A. (2021, March 4). India saw highest number of internet shutdowns in the world in 2020. India Today. https://is.gd/S9pUu7Google Scholar
Chamber of Deputies. (2016). The Brazilian civil framework of the internet. Edições Câmara.Google Scholar
Chambers, T. (2022). A snapshot of the #TwitterMigration. Dewey Square Group.Google Scholar
Chander, A. (2020). Is data localization a solution for Schrems II? Journal of International Economic Law, 23(3), 771784.CrossRefGoogle Scholar
Chander, A., & Sun, H. (2022). Sovereignty 2.0. Vanderbilt Journal of Transnational Law, 53(4), 283324.Google Scholar
Chander, A., & Sun, H. (Eds.) (2023). Data sovereignty: From the Digital Silk Road to the return of the state. Oxford, UK: Oxford University Press.CrossRefGoogle Scholar
Chen, Y. C. (2017). Managing digital governance: Issues, challenges, solutions. New York: Routledge.CrossRefGoogle Scholar
Cheru, F., & Obi, C. (2010). The rise of China and India in Africa: Challenges, opportunities and critical interventions. https://is.gd/WOQK8KCrossRefGoogle Scholar
Cheung, A. (2023). From data subjects to data sovereigns: Addressing the limits of data privacy in the digital era. In Chander, A. & Sun, H. (Eds.), Data sovereignty: From the Digital Silk Road to the return of the state (pp. 89114). Oxford, UK: Oxford University Press.CrossRefGoogle Scholar
Chimni, B. S. (2017). International law and world order. Cambridge University Press.CrossRefGoogle Scholar
China. (2003, December 10). Strengthening cooperation, promoting development and moving towards the information society together (statement at the World Summit on the Information Society). https://is.gd/CDdYuqGoogle Scholar
China SCIO. (2023, February 3). China’s trade with RCEP members up 7.5% year on year. The State Council Information Office of the People’s Republic of China. https://is.gd/raEru3Google Scholar
Chinese Academy of Social Science, Qinghua University, Fudan University, Nanjing University, University of International Business and Economics, & Chinese Association of Cybersecurity. (2020). Sovereignty in cyberspace: Theory and practice (Version 2.0). World Internet Conference. https://is.gd/GtEXyHGoogle Scholar
Chung, J. H. (2002). Challenging the state: Falun Gong and regulatory dilemmas in China. In Sovereignty under challenge: How governments respond (pp. 83108). New Brunswick, NJ: Routledge.Google Scholar
Clinton, H. (2010a). Remarks on internet freedom. https://is.gd/GfGLM0Google Scholar
Clinton, H. (2010b). Internet freedom. Foreign Policy, 21. https://is.gd/XD3xGjGoogle Scholar
CNN. (2022). Putin is back on the world stage in BRICS, China-hosted summit. CNN. https://is.gd/NNr0NEGoogle Scholar
Cohen, B. J. (2000). The geography of money (1st ed.). Cornell University Press.CrossRefGoogle Scholar
Cohen, B. J. (2019a). Between truth and power: The legal constructions of informational capitalism. Oxford, UK: Oxford University Press.CrossRefGoogle Scholar
Cohen, B. J. (2019b). Currency statecraft: Monetary rivalry and geopolitical ambition (1st ed.). University of Chicago Press.Google Scholar
Cohen, T. (2021, May 3). Critics of SA government’s proposed digital grab idea express deep concerns. Daily Maverick. https://is.gd/4RoFagGoogle Scholar
Coleman, A., & Maogoto, J. N. (2013). “Westphalian” meets “Eastphalian” sovereignty: China in a Globalized World. Asian Journal of International Law, 3(2), 237269.CrossRefGoogle Scholar
Coleman, G. (2004). The political agnosticism of Free and Open Source Software and the inadvertent politics of contrast. Anthropological Quarterly, 77(3), 507519.CrossRefGoogle Scholar
Comninos, A. (2012). Intermediary liability in South Africa. Association for Progressive Communications. https://is.gd/Z7y3bwGoogle Scholar
Cong, W., & Thumfart, J. (2022). A Chinese precursor to the digital sovereignty debate: Digital anti-colonialism and authoritarianism from the post–Cold War era to the Tunis Agenda. Global Studies Quarterly, 2(4), 113.CrossRefGoogle Scholar
Cook, W. (2018). East African interoperability: Dispatches from the home of M-Pesa. Nairobi: CGAP.Google Scholar
Cook, W., & Raman, A. (2019). National payments corporation of India and the remaking of payments in India. In CGAP Working Paper. https://is.gd/d6McEyGoogle Scholar
Cooper, A., Nossal, K., & Higgott, R. (1993). Relocating middle powers: Australia and Canada in a changing world order. Vancouver: UBC Press.CrossRefGoogle Scholar
Cory, N. (2021). Before the United States-China economic and Security Review Commission’s panel on China’s cloud market as part of its hearing “A net assessment of the Chinese Communist Party’s economic ambitions, plans, and metrics of future success. Information Technology and Innovation Foundation.Google Scholar
Cory, N., & Dascoli, L. (2021). (rep.). How barriers to cross-border data flows are spreading globally, what they cost, and how to address them. https://is.gd/TqI4WaGoogle Scholar
Couldry, N., & Mejias, U. (2018). Data colonialism: Rethinking big data’s relation to the contemporary subject. Television and New Media, 20(4), 336349.CrossRefGoogle Scholar
Couldry, N., & Mejias, U. (2019). The costs of connection: How data is colonizing human life and appropriating it for capitalism. Stanford, CA: Stanford University Press.Google Scholar
Coulthard, S. G. (2014). Red skin, white masks: Rejecting the colonial politics of recognition. Minneapolis: University of Minnesota Press.CrossRefGoogle Scholar
Couture, S., & Toupin, S. (2019). What does the concept of “sovereignty” mean in digital, network and technological sovereignty? New Media & Society, 21(10), 23052322.CrossRefGoogle Scholar
Crawford, K. (2020). Atlas of AI: Power, politics, and the planetary costs of artificial intelligence. New Haven, CT: Yale University Press.Google Scholar
Creemers, R. J. E. H. (2020). China’s conception of cyber sovereignty: Rhetoric and realization. In Broeders, D. & van den Berg, B. (Eds.), Digital technologies and global politics (pp. 107142). Lanham, MD: Rowman & Littlefield.Google Scholar
CyberBRICS. (2020). The Brazilian General Data Protection Law – Unofficial English version. CyberBRICS Project. https://is.gd/IDs5UPGoogle Scholar
CyberBRICS. (2022, April 11). Conference – Central Bank Digital Currencies. [Video]. https://is.gd/D5X9BAGoogle Scholar
Cyberspace Administration of China. (2017). 《网络安全法》施行前夕国家互联网信息办公室网络安全协调局负责人答记者问 [Press conference of the cyberspace administration of China before the implementation of the cybersecurity law]. Cyberspace Administration of China. https://is.gd/pbIsG1Google Scholar
Dados, N., & Connell, R. (2012). The global south. Contexts, 11(1), 1213.CrossRefGoogle Scholar
Dattani, K. (2019). “Governtrepreneurism” for good governance: The case of Aadhaar and the India Stack. Area, 52(2), 411419.CrossRefGoogle Scholar
Daucé, F., & Loveluck, B. (2021). Codes of conduct for algorithmic news recommendation: The Yandex. News controversy in Russia. First Monday, 26(5).Google Scholar
Daucé, F., & Musiani, F. (2021). Infrastructure-embedded control, circumvention and sovereignty in the Russian Internet: An introduction. First Monday, 26(5). https://firstmonday.org/ojs/index.php/fm/article/view/11685/10122Google Scholar
de Goede, M. (2021). Finance/security infrastructures. Review of International Political Economy, 28(2), 351368.CrossRefGoogle Scholar
De Gregorio, G., & Stremlau, N. (2020). Internet shutdowns and the limits of law. International Journal of Communication, 14, 119.Google Scholar
Deibert, R., & Rohozinski, R. (2010). Control and subversion in Russian cyberspace. In Deibert, R. & Palfrey, J. (Eds.), Access controlled: The shaping of power, rights, and rule in cyberspace (pp. 1534). Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (2010). Access controlled: The shaping of power, rights, and rule in cyberspace. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Deleuze, G. (1992). Postscript on the societies of control. October, (Winter), 3–7.Google Scholar
Deloitte. (2020). Mediapotreblenie v Rossii – 2020 [Media consumption in Russia – 2020]. https://is.gd/uctobpGoogle Scholar
Demtschenko, M. B. (2020). Women and Tech: How 2020 spotlights the digital divide. ORF Expert Speak. https://is.gd/0qJ7n6Google Scholar
DeNardis, L. (2009). Protocol politics: The globalization of internet governance. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
DeNardis, L. (2012). Hidden levers of Internet control. Information, Communication & Society, 15(5), 720738.CrossRefGoogle Scholar
DeNardis, L. (2014). The global war for internet governance. New Haven, CT: Yale University Press.Google Scholar
DeNardis, L. (2020). The Internet in everything: Freedom and security in a world with no off switch. New Haven, CT: Yale University Press.Google Scholar
DeNardis, L., & Hackl, A. M. (2015). Internet governance by social media platforms. Telecommunications Policy, 39(9), 761770.CrossRefGoogle Scholar
Department of Communications & Digital Technologies. (2021). Draft national policy on Data and Cloud. https://is.gd/U1BM1fGoogle Scholar
Department Telecommunications and Postal Services (DTPS) (2016, September 28). National Integrated ICT Policy White Paper. Republic of South Africa. www.gov.za/sites/default/files/gcis_document/201610/40325gon1212.pdfGoogle Scholar
Desai, A., Manoharan, A., Jayanth, S., & Zack, S. (2023). Public value creation through combined consumption of multiple public services – case of India Stack. International Journal of Public Administration. https://doi.org/10.1080/01900692.2023.2243401Google Scholar
Dettmer, J. (2019, November 28). Russia’s alternative to western credit cards debuts in London. VOA News. https://is.gd/87pSCcGoogle Scholar
Deutsche Welle. (2013, October 21). Deutsche Telekom plans for a “national internet.” Deutsche Welle. http://is.gd/yLGeyFGoogle Scholar
Deutsche Welle. (2018, June 14). Social media fuels vigilantism and mob attacks in India. https://is.gd/ZWCYv5Google Scholar
Development Bank of Southern Africa (DBSA). (2023). Notification of security compromise. www.dbsa.org/press-releases/notification-security-compromiseGoogle Scholar
Digital Europe. (2017). DIGITALEUROPE position paper on vulnerability stockpiling. https://is.gd/QLvQ7kGoogle Scholar
Digital Public Goods Alliance. (2021). Financing the digital public goods ecosystem. https://is.gd/H8uHtDGoogle Scholar
DigWatch. (2019). 3rd Meeting of the first substantive session of the Open-Ended Working Group (OEWG). Event Report, 10 September 2019. DigWatch. https://is.gd/vDIxTQGoogle Scholar
DigWatch. (2021). 9th Meeting of the third session of the Open-Ended Working Group (OEWG). Event Report, 12 Mar 2021. DigWatch. https://is.gd/y8gKu8Google Scholar
Ding, J. (2018). Deciphering China’s AI dream. Future of Humanity Institute. www.fhi.ox.ac.uk/deciphering-chinas-ai-dream/Google Scholar
Dixit, P. (2019). Netflix agreed to self-regulate its content in India. Critics say it’s censorship. BuzzFeed News. https://is.gd/qSZqPpGoogle Scholar
Dlamini, S., & Mbambo, C. (2019). Understanding policing of cyber-crime in South Africa: The phenomena, challenges and effective responses. Cogent Social Sciences, 5(1), 113.CrossRefGoogle Scholar
Donnan, S., & Mitchell, T. (2016, August 11). Chinese laws prompt global business backlash. Financial Times. https://is.gd/1yMyCLGoogle Scholar
Douglas, B. (2013). Brazil debates internet law in wake of NSA scandal. www.bbc.com/news/technology-24899396Google Scholar
Draper, N. A., & Turow, J. (2019). The corporate cultivation of digital resignation. New Media & Society, 21(8), 18241839.CrossRefGoogle Scholar
Duarte, M. (2017). Network sovereignty: Building the Internet across Indian country. Seattle: University of Washington Press.CrossRefGoogle Scholar
Duncan, J. (2018). Stopping the spies: Constructing and resisting the surveillance state in South Africa. Wits University Press.CrossRefGoogle Scholar
Duncan, J. (2021). The global significance of South Africa’s mass surveillance ruling. About Intel. https://aboutintel.eu/south-africa-surveillance-ruling/Google Scholar
Dunn Cavelty, M., & Egloff, F. (2019). The politics of cybersecurity: Balancing different roles of the state. St Antony’s International Review, 5(1), 3757.Google Scholar
Dunn Cavelty, M., & Egloff, F. (2021). Hyper-securitization, everyday security practice and technification: Cyber-security Logics in Switzerland. Swiss Political Science Review, 27(1), 139149.CrossRefGoogle Scholar
Ebert, H., & Maurer, T. (2013). Contested cyberspace and rising powers. Third World Quarterly, 34(6), 10541074.CrossRefGoogle Scholar
Economic Times, The. (2015, July 9). Not here to compete with IMF, World Bank: NDB chief KV Kamath. https://tinyurl.com/4hkfx6m7Google Scholar
Economic Times, The. (2023, May 25). Flipkart, Amazon, Reliance to corner Indian ecommerce: Bernstein.Google Scholar
Economist, The. (2017, May 6). The world’s most valuable resource is no longer oil, but data. https://is.gd/WFMTk5Google Scholar
Economist, The. (2023, October 22). Why Saudi Arabia and the UAE want to keep links with Israel. https://is.gd/qgdaBaGoogle Scholar
Elder, M. (2013, June 19). Russia needs to reclaim its “digital sovereignty” from US, says MP. The Guardian. https://is.gd/Bq3YbIGoogle Scholar
eNCA. (2020). SA information regulator battling to cope. https://is.gd/BcCLEY3Google Scholar
Enriques, L., & Gatti, M. (2006). The uneasy case for top-down corporate law harmonization in the European Union. University of Pennsylvania Journal of International Economic Law, 27(4), 939998.Google Scholar
Epstein, C. (2016). Surveillance, privacy and the making of the modern subject: Habeas what kind of corpus? Surveillance and Embodiment, 22(2), 2857.Google Scholar
Eremenko, E., and Bryzgalova, E. (2019). “Durov sozdast agregator novostej” Vedomosti (June 7, 2019). https://is.gd/ffDieGGoogle Scholar
Erie, M. S., & Steinze, T. (2022). The Beijing effect: China’s “Digital Silk Road” as transnational data governance. New York University Journal of International Law and Politics, 54(1), 192.Google Scholar
Ermoshina, K., Loveluck, B., & Musiani, F. (2022). A market of black boxes: The political economy of Internet surveillance and censorship in Russia. Journal of Information Technology & Politics, 19(1), 1833.CrossRefGoogle Scholar
Escobar, P. (2019, August 19). BRICS was created as a tool of attack: Lula. Asia Times. https://is.gd/hkCkthGoogle Scholar
EU Cyber Direct. (2021). Cybercrime at the UN: A primer.Google Scholar
European Commission. (2021). The digital services act package. https://is.gd/StQqlfGoogle Scholar
European Commission. (n. d.). Shaping Europe’s digital future: Americas. https://is.gd/z5TopGGoogle Scholar
European Court of Justice. (2020, July 16). Case C-311/18, Data Protection Commissioner v Facebook Ireland Ltd, Maximilian Schrems and intervening parties. https://is.gd/rD8OSgGoogle Scholar
European Parliament. (2020). Digital sovereignty for Europe. European Parliamentary Research Service. European Parliament. www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2020)651992Google Scholar
European Union. (2019). Policy and investment recommendations for trustworthy AI. https://is.gd/mFsgj7Google Scholar
Evans, P. (1979). Dependent development: The alliance of multinational, state, and local capital in Brazil. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Evans, P. (1995). Embedded autonomy. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Eyal, N. (2014). Hooked: How to build habit-forming products. Penguin.Google Scholar
Fair Tax. (2019, December 2). Tax gap of Silicon Six over $100 billion so far this decade. https://is.gd/MgsODLGoogle Scholar
Fang, B. X. (2018). Cyberspace sovereignty: Reflections on building a community of common future in cyberspace. Singapore: Springer.CrossRefGoogle Scholar
Farrell, H., & Newman, A. L. (2019). Weaponized interdependence: How global economic networks shape state coercion. International Security, 44(1), 4279.CrossRefGoogle Scholar
Federal Law 19-FZ. (2021, February 24). On amendments to the code of administrative offences of the Russian federation. https://is.gd/PxTMQAGoogle Scholar
Federal Law 139-FZ. (2012, July 28). On amendments to the federal law on the protection of children from information harmful to their health and development and to certain legislative acts of the Russian federation. https://is.gd/2afOIeGoogle Scholar
Federal Law 242-FZ. (2014, July 21). Concerning the introduction of amendments to certain legislative acts of the Russian federation to clarify the procedure for processing personal data in information and telecommunication networks. https://is.gd/nrEre9Google Scholar
Federal Law 374-FZ. (2016, July 6). On amendments to the federal law “On Combating Terrorism” and to certain legislative acts of the Russian federation with regard to establishing additional measures to counter terrorism and ensure public safety. https://rg.ru/2016/07/08/antiterror-dok.htmlGoogle Scholar
Federal Law 398-FZ. (2013, December 28). On amendments to the federal law on information, information technology and information protection. https://rg.ru/2013/12/30/extrem-site-dok.htmlGoogle Scholar
Federal Law 531-FZ. (2014, December 31). On amendments to articles 13 and 14 of the federal law on information, information technologies and information protection and to the code of administrative offences of the Russian federation. https://rg.ru/2015/01/12/informacia-dok.htmlGoogle Scholar
Feldmann, M. (2019). Global varieties of capitalism. World Politics, 71(1), 162196.CrossRefGoogle Scholar
Fichtner, J. (2016). Perpetual decline or persistent dominance? Uncovering Anglo-America’s true structural power in global finance. Review of International Studies, 43(1), 328.CrossRefGoogle Scholar
Fichtner, J., & Heemskerk, E. M. (2020). The new permanent universal owners: Index funds, patient capital, and the distinction between feeble and forceful stewardship. Economy and Society, 49(4), 493515.CrossRefGoogle Scholar
Fijałkowski, L. (2011). China’s “soft power” in Africa? Journal of Contemporary African Studies, 29(2), 223232.CrossRefGoogle Scholar
FISA Amendments Act Reauthorization Act of 2012. (2012). https://is.gd/cHBlCAGoogle Scholar
Floridi, L. (2019). Marketing as Control of Human Interfaces and Its Political Exploitation. Available at SSRN: https://ssrn.com/abstract=3834989 or http://dx.doi.org/10.2139/ssrn.3834989CrossRefGoogle Scholar
Floridi, L. (2020). The fight for digital sovereignty: What it is, and why it matters, especially for the EU. Philosophy and Technology, 33(3), 369378.CrossRefGoogle ScholarPubMed
Fontaine, R., & Kliman, D. M. (2013). International order and global swing states. The Washington Quarterly, 36(1), 93109. https://doi.org/10.1080/0163660x.2013.751653CrossRefGoogle Scholar
Forbes. (2019). Top 100 digital companies. Forbes. https://is.gd/fcpFnpGoogle Scholar
Freedom House. (2020). Freedom on the net 2020: South Africa. https://is.gd/84iVKXGoogle Scholar
Freedombone.net. (n.d.). A people’s history of the Fediverse. Freedombone.Net. https://is.gd/8OL48hGoogle Scholar
Freiberg, P. (2014). “Putin’s Russia – On a path to cyber sovereignty?” capstone project for the Master of Arts in Media Communications Program for Webster University. https://is.gd/16nOgVGoogle Scholar
French, H. (2015). China’s second continent: How a million migrants are building a new empire in Africa. New York: Vintage Books.Google Scholar
French Ministry of European and Foreign Affairs. (2020, July 31). Barbed wire on the Internet prairie: Against new enclosures, digital commons as drivers of sovereignty. French Ministry of European and Foreign Affairs. https://is.gd/O1RRxyGoogle Scholar
Fuchs, C. (2015). The MacBride report in the twenty-first-century capitalism, the age of social media, and the BRICS countries. Javnost, 22(3), 226239.CrossRefGoogle Scholar
Fuchs, C., & Unterberger, K. (Eds.) (2021). The public service media and public service internet manifesto. University of Westminster Press.CrossRefGoogle Scholar
Gabowitsch, M. (2016). Protest in Putin’s Russia. John Wiley & Sons.Google Scholar
Gagliardone, I. (2019). China, Africa, and the future of the Internet. London: Zed Books.CrossRefGoogle Scholar
Gallagher, R., & Burkhardt, P. (2021, July 29). “Death kitty” ransomware linked to south African port attack. Bloomberg. https://is.gd/AGtphNGoogle Scholar
Galloway, A. R. (2004). Protocol: How control exists after decentralization. MIT Press.CrossRefGoogle Scholar
Gao, H. (2022). Across the Great Wall: E-commerce joint statement initiative negotiation and China. In Peng, S., Lin, C., & Streinz, T. (Eds.), Artificial intelligence and international economic law: Disruption, regulation, and reconfiguration (pp. 295318). Cambridge: Cambridge University Press.Google Scholar
Gao, H., & Shaffer, G. (2021). The RCEP – Great power competition and cooperation over trade. AfronomicsLAW. https://is.gd/NoSJnkGoogle Scholar
Garcia, E. V. (2022). The technological leap of AI and the Global South: Deepening asymmetries and the future of international security. https://is.gd/4LVX9eCrossRefGoogle Scholar
Gehl, R. W. (2015). The case for alternative social media. Social Media + Society, 1(2). https://doi.org/10.1177/2056305115604338CrossRefGoogle Scholar
Geiger, S., Harrison, D., Kjellberg, H., & Mallard, A. (Eds.) (2014). Concerned markets: Economic ordering for multiple values. Edward Elgar.CrossRefGoogle Scholar
German Federal Constitutional Court. (1983). Judgment of 15 December 1983, 1 BvR 209, 269, 362, 420, 440, 484/83 [CODICES]. https://is.gd/entUqgGoogle Scholar
Gershenzon, L. (2016, April 20). Nothing to aggregate. Republic. https://republic.ru/posts/66965Google Scholar
Gerth, H. H., & Mills, W. (2009). From Max Weber. Routledge.Google Scholar
Gillespie, T. (2018). Custodians of the internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press.Google Scholar
GISWatch. (2018). Global information society watch 2018: Community networks 2018. Association for Progressive Communications and International Development Research Centre. https://is.gd/6ZgTbGGoogle Scholar
Global Times. (2020, August 6). Most smartphones in China using Beidou system for location and navigation. Global Times. https://is.gd/V6neEXGoogle Scholar
Globerman, S. (1978). Canadian science policy and technological sovereignty. Canadian Public Policy/Analyse De Politiques, 4(1), 3445.CrossRefGoogle Scholar
GLONASS to Be Required for Phones Sold in Russia. (2013, November 12). GPS World. https://is.gd/NQKTw2Google Scholar
GNU. (2022). About the GNU Operating System. GNU. https://is.gd/yQWoEBGoogle Scholar
Goldsmith, J., & Wu, T. (2006). Who controls the Internet? Illusions of a borderless world. New York: Oxford University Press.CrossRefGoogle Scholar
Gómez, R. N. (2014). Cyber-geopolitics. Geopolitical rivalries behind the cyber-threat narratives in the United States. Herodote, 152–153(1), 98122.Google Scholar
Gong, W. (1998). 信息时代的国际传播:国际关系面临的新问题 [International communication in the information age: News problems faced by international relations]. 国际政治研究 [International Politics Studies], 2, 4146.Google Scholar
González, M. (2017). Subsea cable to connect Brazil and Spain, bypassing US surveillance. https://is.gd/GFvD5WGoogle Scholar
Gopakumar, G. (2021). BackRBI puts new payment network plan on hold. Mint. https://is.gd/Y586ImGoogle Scholar
Gosh, D., & Couldry, N. (2020). Digital realignment: Rebalancing platform economies from corporation to consumer. M-RCBG Associate Working Paper Series, 155. https://is.gd/VYgNpFGoogle Scholar
Government of New Zealand. (2016). Text of the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP). https://is.gd/wC6sb6Google Scholar
Grabel, I. (2017). When things don’t fall apart: Global financial governance and developmental finance in an age of productive incoherence. MIT Press.Google Scholar
Grimm, D. (2015). Sovereignty: The origin and future of a political and legal concept (B. Cooper, Trans.). New York: Columbia University Press.Google Scholar
Gritsenko, D., Wijermars, M., & Kopotev, M. (2021). The Palgrave handbook of digital Russia studies. Springer Nature.CrossRefGoogle Scholar
Gross, A., & Murgia, M. (2020). China and Huawei propose reinvention of the Internet. Financial Times.Google Scholar
Grover, G., & Thomas, A. (2021, February 22). Notes from a foreign field: The European court of human rights on Russia’s website blocking. CyberBRICS. https://is.gd/7v9fr3Google Scholar
Gu, J., Chuanhong, Z., Vaz, A., & Mukwereza, L. (2016). Chinese state capitalism? Rethinking the role of the state and business in Chinese development cooperation in Africa. World Development, 81(May), 2434.CrossRefGoogle Scholar
Guan, S. (1997). 美国“全球信息高速公路”的实施战略 – 剖析美国学者向美国政府提出的战略性建议 [The implementation strategy of the US global information superhighway – Analyzing US scholars’ strategic recommendations to the US government]. 国际政治研究 [International Politics Studies], 4, 8291.Google Scholar
Gueham, F. (2017). Digital sovereignty. Paris: The Fondation pour l’innovation politique.Google Scholar
Guo, H., Bandyopadhyay, S., Cheng, H., & Yang, Y. (2010). Net neutrality and vertical integration of content and broadband services. Journal of Management Information Systems, 27(2), 243276.CrossRefGoogle Scholar
Haché, A. (2017). Technological sovereignty Vol. 2. Barcelona, Spain: Descontrol. https://is.gd/Ntk8b0Google Scholar
Haggard, S. (2018). Developmental states. Cambridge University Press.CrossRefGoogle Scholar
Han, P. (2000). 网络时代的哲学问题 [Philosophical questions in the internet age]. 现代哲学 [Modern Philosophy], 4, 5055.Google Scholar
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53(4), 11551175.CrossRefGoogle Scholar
Hariharan, V. (2021). New umbrella entity: Masterstroke or disaster? https://is.gd/fNdIuMGoogle Scholar
Harper, J. (2017, July 23). Russians protest state censorship of the internet. Deutsche Welle. https://is.gd/gmwmEmGoogle Scholar
Havercroft, J. (2011). Captives of sovereignty. Cambridge, MA: Cambridge University Press.CrossRefGoogle Scholar
Hayden, M. V. (2006). Testimony to the judiciary committee of the US Senate. https://is.gd/mQF2aWGoogle Scholar
He, B. (2019). 欧盟阻断法令情况对中国的启示 [Lessons of the EU’s blocking statute for China]. 国际贸易 [International Trade], 2019(10), 9096.Google Scholar
Helberger, N. (2020). The political power of platforms: How current attempts to regulate misinformation amplify opinion power. Digital Journalism, 8(6), 842854.CrossRefGoogle Scholar
Helleiner, E. (2019). Still an extraordinary power after all these years: The US and the global financial crisis of 2008. In Germain, R. (Ed.), Susan strange and the future of global political economy: Power, control and transformation (Ripe series in global political economy) (1st ed., pp. 93108). Routledge.Google Scholar
Herlo, B., Irrgang, D., Joost, G., & Unteidig, A. (Eds.) (2022). Practicing sovereignty: Digital involvement in times of crisis. Bielefeld, Germany: Transcript Verlag.Google Scholar
Hicks, J. (2019, September 29). “Digital colonialism”: Why countries like India want to take control of data from big tech. The Print. https://is.gd/ZQDDjUGoogle Scholar
Hildebrandt, M. (2013). Extraterritorial jurisdiction to enforce in cyberspace? Bodin, Schmitt, Grotius in cyberspace. The University of Toronto Law Journal, 63(2), 196224.CrossRefGoogle Scholar
Hildebrandt, M. (2018). Primitives of legal protection in the era of data-driven platforms. Georgetown Law Technology Review, 2(2), 252273.Google Scholar
Hinck, R., Cooley, S., & Kluver, R. (2019). Global media and strategic narratives of contested democracy: Chinese, Russian, and Arabic media narratives of the US presidential election. New York: Routledge.CrossRefGoogle Scholar
Hirschman, A. (1980). National power and the structure of foreign trade: Expanded edition. Berkeley: University of California Press.Google Scholar
Hlase, E. P. (2018). The securitisation of cyberspace in South Africa: The tension between national security and civil liberties. A mini-dissertation submitted in partial fulfilment of the requirements for the degree Master of Security Studies (MSS), Department of Political Sciences, Faculty of Humanities, University of Pretoria.Google Scholar
Hoffman, J. (2016). Multi-stakeholderism in Internet governance: Putting a fiction into practice. Journal of Cyber Policy, 1(1), 2949.CrossRefGoogle Scholar
Holbraad, C. (1986). Middle powers in international politics. London: Macmillan.Google Scholar
Hong, Y. (2017). 在发展与安全的平衡中构建数据跨境流动安全评估框架 [Building a framework for security review of cross-border data flows while balancing development and security]. 信息安全与通信保密 [Information Security and Communications Privacy], 2017(2), 3662.Google Scholar
Hong, Y., & Goodnight, T. (2019). How to think about cyber sovereignty: The case of China. Chinese Journal of Communication, 13(4), 119.CrossRefGoogle Scholar
Hoofnagle, C. J., & Garfinkel, S. (2021). Law and policy for the quantum age. Cambridge: Cambridge University Press.Google Scholar
Huang, D., Yuan, H., & Hu, W. (2020). 《数据安全法(草案)》的立法背景、立法定位与制度设计 [The legislative background, legislative positioning and institutional design of the data security law (Draft)]. 信息安全与通信保密 [Information Security and Communications Privacy], 2020(8), 915.Google Scholar
Huang, R. (2020, May 25). China will use its digital currency to compete with The USD.Google Scholar
Huawei. (2017). Huawei launches OpenLab in South Africa. https://is.gd/fFpdDYGoogle Scholar
Huawei. (2018). Sustainable report. https://is.gd/V7vCcIGoogle Scholar
Huawei. (2019). Huawei smart city white paper. https://is.gd/6NbsJAGoogle Scholar
Hummel, P., Braun, M., Tretter, M., & Dabrock, P. (2021). Data sovereignty: A review. Big Data & Society, 8(1), 117.CrossRefGoogle Scholar
India Stack. (n.d.). India Stack. www.indiastack.org/Google Scholar
Indian Ministry of Electronics & IT. (2023, August 9). Salient features of the digital personal data protection bill, 2023. https://is.gd/tGNijsGoogle Scholar
Indian Ministry of External Affairs. (2015, July 9). 7th BRICS summit – Ufa declaration. https://is.gd/GBKi1MGoogle Scholar
Indian Ministry of External Affairs. (2021, September 9). XIII BRICS Summit – New Delhi declaration. https://is.gd/ib4OcyGoogle Scholar
Indian Ministry of External Affairs. (2023, 9–10 September). G20 New Delhi Leaders’ declaration. https://is.gd/uRO5W1Google Scholar
Instituto Brasileiro de Defesa do Consumidor [IDEC] & Instituto Locomotiva. (2021). Barreiras e limitações no acesso à internet e hábitos de uso e navegação na rede nas classes C, D e E. https://is.gd/zhkWVJGoogle Scholar
International Association of Privacy Professionals (IAPP). (2020). Brazilian General Data Protection Law (LGPD, English translation). https://is.gd/a6BNg7Google Scholar
International Federation for Human Rights. (2012). Shanghai cooperation organization: A vehicle for human rights violations. www.fidh.org/IMG/pdf/sco_report.pdfGoogle Scholar
International Federation of Human Rights. (2018). Russia 2012–2018: 50 anti-democracy laws entered into force within last presidential mandate. https://is.gd/8QwwfwGoogle Scholar
International Institute for Sustainable Development (IISD). (2020). WTO members highlight benefits and drawbacks of c-commerce moratorium. https://is.gd/a1zmlYGoogle Scholar
Internet Freedom Foundation. (2019). Bihar’s internet shutdown orders reveal vague but relatively narrow suspension of mass messaging platforms. https://is.gd/RswTFJGoogle Scholar
Internet Shutdowns in India. (n.d.). https://internetshutdowns.inGoogle Scholar
Israel, E., & Soto, A. (2013). Brazil’s anti-spying Internet push could backfire, industry says. Reuters. https://is.gd/wvt6n0Google Scholar
ITU-T FG-SSC. (2016). Shaping smarter and more sustainable cities: Striving for sustainable development goals. International Telecommunication Union (ITU-T), Focus Group on Smart Sustainable Cities (FG-SSC). New York: United Nations.Google Scholar
ITweb. (2017, November 24). “Internet Censorship Bill” heading to parliament. ITweb. https://is.gd/GeKr8YGoogle Scholar
Jakubowicz, K. (2015). New media ecology: Reconceptualizing media pluralism. In Valcke, P., Sükösd, M., & Picard, R. G. (Eds.), Media pluralism and diversity (pp. 2353). London: Palgrave Macmillan UK.CrossRefGoogle Scholar
Jasanoff, S. (2015). Future imperfect: Science, technology, and the imaginations of modernity. In Kim, S. H. & Jasanoff, S. (Eds.), Dreamscapes of modernity: Sociotechnical imaginaries and the fabrication of power (pp. 133). Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
Jawaid, D. (2023). 100 biggest technology companies in the world. Yahoo! Finance. https://is.gd/vpbpskGoogle Scholar
Jewler, S. (2015, August 25). Mission creep-y: Google is quietly becoming one of the nation’s most powerful political forces while expanding its information-collection empire. Public Citizen. https://is.gd/QewMpmGoogle Scholar
Jia, L., & Winseck, D. (2018). The political economy of Chinese internet companies: Financialization, concentration, and capitalization. International Communication Gazette, 80(1), 3059.CrossRefGoogle Scholar
Jiang, M. (2010). Aythoritarian informationalism: China’s approach to internet sovereignty. SAIS Review of International Affairs, 30(2), 7189.CrossRefGoogle Scholar
Jiang, M. (2014). The business and politics of search engines: A comparative study of Baidu and Google’s search results of Internet events from China. New Media & Society, 16(2), 212233.CrossRefGoogle Scholar
Jiang, M. (2019, June 3). U.S. Ban on Huawei: Superpowers’ insecurities and nightmares. CyberBRICS. https://is.gd/r2inhfCrossRefGoogle Scholar
Jiang, M. (2021). Cybersecurity policies in China. In Belli, L. (Ed.), CyberBRICS: Cybersecurity regulations in the BRICS countries (pp. 183226). Cham, Switzerland: Springer.CrossRefGoogle Scholar
Jiang, M., & Fu, K. W. (2018). Chinese social media and big data: Big data, big brother, big profit? Policy & Internet, 10(4), 372392.CrossRefGoogle Scholar
Johnson, D., & Post, D. (1996). Law and borders: The rise of law in cyberspace. Stanford Law Review, 48(5), 13671402.CrossRefGoogle Scholar
Jones, C. I., & Tonetti, C. (2020). Nonrivalry and the economics of data. American Economic Review, 110(9), 28192858.CrossRefGoogle Scholar
Jordaan, E. (2003). The concept of a middle power in international relations: Distinguishing between emerging and traditional middle powers. Politikon, 30(1), 165181.CrossRefGoogle Scholar
Kalra, A., & Bhattacharjee, N. (2020). Google defers Indian in-app fees after angry startups complain. https://is.gd/RUEeolGoogle Scholar
Kanth, D. R. (2020). South Africa, India call for development-oriented approach to e-com. SUNS, 9250. www.twn.my/title2/wto.info/2020/ti201209.htmGoogle Scholar
Kaspersky. (2023a). In Q2 2023 ransomware attacks in South Africa increased by 10% compared to Q1. July 26, 2023. https://is.gd/f2UPd0Google Scholar
Kaspersky. (2023b). Scams with HR credentials spread in recent months. July 25, 2023. https://is.gd/iFAdjhGoogle Scholar
Kazeem, Y. (2020). With over 250,000 cases, misinformation is compromising Africa’s Covid-19 response. Quartz Africa. https://is.gd/QurUpwGoogle Scholar
Kelkar, V., & Shah, A. (2019). In service of the republic (1st ed.). New Delhi: Penguin Allen Lane.Google Scholar
Kelty, C. M. (2008). Two bits: The cultural significance of free software. Duke University Press.Google Scholar
Kettemann, M. C. (2020). The normative order of the internet: A theory of rule and regulation online. In The normative order of the internet (pp. 131181). Oxford: Oxford University Press.CrossRefGoogle Scholar
Khan, L. (2017). Amazon’s antitrust paradox. The Yale Law Journal, 126(3), 564907.Google Scholar
Khera, R. (Ed.) (2019). Dissent on Aadhaar: Big data meets big brother. Hyderabad, Telangana: Orient BlackSwan.Google Scholar
Kim, E. (2005). F/OSS adoption in Brazil: The growth of a national strategy. In Karaganis, J. & Latham, R. (Eds.), The politics of open source adoption (pp. 5360). New York: Social Science Research Council.Google Scholar
King, K. (2010). China’s cooperation in education and training with Kenya: A different model? International Journal of Educational Development, 30(5), 488496.CrossRefGoogle Scholar
King, K. (2013). China’s aid and soft power in Africa: The case of education and training. Cambridge: Boydell & Brewer.CrossRefGoogle Scholar
Kirya, I. (2011). Le piratage audiovisuel en Russie post-soviétique, entre logiques économiques et culturelles. In Mattelart, T. (Ed.), Piratages audiovisuels (pp. 239255). Paris and Louvain-la-Neuve: De Boeck Supérieur.CrossRefGoogle Scholar
Kleman, K., Miryasova, O., & Demidov, A. (2010). Ot obyvateley k aktivistam: zarozhdayushchiyesya sotsial’nyye dvizheniya v sovremennoy Rossii [From the philistines to the activists: The emerging social movements in modern Russia]. Moscow: Tri kvadrata.Google Scholar
Knowledge at Whalton. (2018, January 17). The mobile payments race: Why China is leading the pack – for now. https://is.gd/SYTSTXGoogle Scholar
Knox, R. (2016). Marxist approaches to international law. In Orford, A. & Hoffmann, F. (Eds.), The Oxford handbook of the theory of international law (pp. 306326). Oxford: Oxford University Press.CrossRefGoogle Scholar
Kodačigov, V. (2021, March 15). V Iphone ustanovât rossijskij soft. Vedomosti. https://is.gd/CzbU8jGoogle Scholar
Koh, H. H. (2008). Transnational litigation in United States courts. Foundation Press.Google Scholar
Kokas, A. (2022). Trafficking data: How China is winning the battle for digital sovereignty. Oxford, UK: Oxford University Press.CrossRefGoogle Scholar
Koopman, C. (2019). How we became our data: A genealogy of the informational person. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
Kovacs, A. (2021). Cybersecurity and data protection regulation in India: An uneven patchwork. In Belli, L. (Ed.), CyberBRICS: Cybersecurity regulations in the BRICS countries (pp. 133182). Cham, Switzerland: Springer.CrossRefGoogle Scholar
Kovacs, A., & Ranganathan, N. (2019). Data sovereignty, of whom? Limits and suitability of sovereignty frameworks for data in India (Working Paper No. 3). Data Governance Network. https://datagovernance.org/report/data-sovereigntyGoogle Scholar
Kovalev, M. (2016). Law and (verbal) order: The politics of Russian obscene language from Soviet Russia to the present day. Zeitschrift Für Slavische Philologie, 72(2), 323347.Google Scholar
Krasner, S. (1999). Sovereignty: Organized hypocrisy. New Haven, NJ: Princeton University Press.CrossRefGoogle Scholar
Krastev, I., & Holmes, S. (2019). The light that failed: A reckoning. Penguin Books.Google Scholar
Krishnan, M. (2018, June 27). Fake social media messages fuel latest mob lynchings in India. National Herald. https://is.gd/XQKIzxGoogle Scholar
Kuehn, K. M. (2018). Surveillance and South Africa. [Review of the book Stopping the spies: Constructing and resisting the surveillance state in South Africa, by J. Duncan.] The Political Economy of Communication, 6(2), 94100.Google Scholar
Kukutai, T., & Taylor, J. (2016). Indigenous data sovereignty: Toward an agenda (CAEPR). Canberra, Australia: ANU Press.CrossRefGoogle Scholar
Kupchan, C. (2023, November 8). 6 Swing states in the global South will decide geopolitics. Foreign Policy. https://foreignpolicy.com/2023/06/06/geopolitics-global-south-middle-powers-swing-states-india-brazil-turkey-indonesia-saudi-arabia-south-africa/Google Scholar
Kurbalija, J. (2016). An introduction to Internet governance (7th edition). Geneva, Switzerland: DiploFoundation. https://is.gd/2zZ1TEGoogle Scholar
Kushwaha, N., Watson, B, & Roguski, P. (2020). Up in the air: Ensuring government data sovereignty in the cloud. 2020 12th International Conference on Cyber Conflict, Tallinn.CrossRefGoogle Scholar
Kwet, M. (2019, November 22). Smart CCTV networks are driving an AI-powered apartheid in South Africa. VICE. https://is.gd/jpapxFGoogle Scholar
Lake, D. A. (2007). Escape from the state of nature: Authority and hierarchy in world politics. International Security, 32(1), 4779.CrossRefGoogle Scholar
Lake, D. A. (2011). Hierarchy in international relations. Cornell University Press.Google Scholar
Lambach, D. (2019). The Internet is already fragmented. Digital Society Blog, The Alexander von Humboldt Institute for Internet and Society (HIIG). https://is.gd/X31jN9Google Scholar
Lambach, D. (2020). The territorialization of cyberspace*. International Studies Review, 22(3), 482506.CrossRefGoogle Scholar
Laruelle, M. (2015). The “Russian world.” Russia’s soft power and geopolitical imagination. Center for Global Interests Papers.Google Scholar
Laskai, L., & Segal, A. (2021). The encryption debate in China: 2021 update. Carnegie Endowment for World Peace. https://is.gd/PoLV3qGoogle Scholar
Lawder, D. (2022). Yellen: Not legal for U.S. to seize Russian official assets. Reuters. https://is.gd/9qHaGXGoogle Scholar
Lazer, D. (2006). Global and domestic governance: Modes of interdependence in regulatory policymaking. European Law Journal, 12(4), 455468.CrossRefGoogle Scholar
Lee, K.-F. (2018). AI superpowers: China, Silicon Valley, and the new world order. Houghton Mifflin Harcourt Company.Google Scholar
Leister, V., & Frazier, M. (2014). Brazil’s role in emerging global open-source initiatives. 12th Congress of the Brazilian Studies Association (BRASA XII).Google Scholar
Leonard, M., & Shapiro, J. (2020). Sovereign Europe, dangerous world: Five agendas to protect Europe’s capacity to act. European Council on Foreign Relations. https://is.gd/Cwwos8Google Scholar
Lessig, L. (1999a). Code: And other laws of cyberspace. New York: Basic Books.Google Scholar
Lessig, L. (1999b). The law of the horse: What cyberlaw might teach. Harvard Law Review, 113, 501546.CrossRefGoogle Scholar
Lessig, L. (2006). Code: Version 2.0. New York: Basic Books.Google Scholar
Levada Center. (2020, February 27). Istochniki novostej i doverie SMI [Sources of information and trust in the media]. https://is.gd/UlX4IwGoogle Scholar
Lewis, J. A. (2020, October 26). Digital sovereignty in the Time of Conflict. ORF. https://is.gd/JA7L1WGoogle Scholar
Li, A. (2008). China’s new policy towards Africa. In Rotberg, R. I. (Ed.), China into Africa: Trade, aid and influence. Washington, DC: Brookings Institution Press.Google Scholar
Li, H. (2016). 数据本地化立法与数字贸易的国际规则 [The legislation of data localization and the international rules of digital trade]. 信息安全研究 [Journal of Information Security Research], 2(9), 781786.Google Scholar
Litterick, D. (2005, August 31). Chirac Backs Eurocentric Search Engine. The Telegraph. http://is.gd/se2dRaGoogle Scholar
Liu, J., & Cui, B. (2020). 数据本地化和数据防御主义的合理性与趋势 [Data localization and the legitimacy and trend of data defensivism]. 国际展望 [Global Review], 12(6), 89107.Google Scholar
Lobo, A. P. (2022, January 12). Câmara quer proibir vendas do Serpro e da Dataprev. Convergência Digital. https://is.gd/l8kt27Google Scholar
Lopez, A. (2007). Introduction: The (Post)global South. The Global South, 1(1), 111.CrossRefGoogle Scholar
Lowe, V. (1997). US extraterritorial jurisdiction: The Helms-burton and D’Amato Acts. International and Comparative Law Quarterly, 46(2), 378390.CrossRefGoogle Scholar
Lukings, M., & Lashkari, A. H. (2022). Understanding cybersecurity law in data sovereignty and digital governance: An overview from a legal perspective. Cham, Switzerland: Springer.CrossRefGoogle Scholar
Lumumba-Kasongo, T. (2015). Brazil, Russia, India, China, and South Africa (BRICS) and Africa: New projected developmental paradigms. Africa Development, 40(3), 7795.Google Scholar
Lund, A., & Zukerfeld, M. (2020). Corporate capitalism’s use of openness: Profit for free? Springer International Publishing.CrossRefGoogle Scholar
Lyon, D. (2007). Surveillance studies: An overview. Cambridge: Polity Press.Google Scholar
MacAskill, E., & Dance, G. (2013, November 1). NSA files: Decoded. The Guardian. https://is.gd/gW7sUFGoogle Scholar
MacBride, S., & Commissioners. (1980). Communication and society today and tomorrow: Many voices, one world: Towards a new, more just, and more efficient world information and communication order. Kogan Page, Unipub, UNESCO. (Reprinted by Kogan Page, 1981 and Rowman & Littlefield Publishers, 2004).Google Scholar
MacKinnon, R. (2012). Consent of the networked: The worldwide struggle for internet freedom. New York: Basic Books.Google Scholar
MacManus, R. (2023, July 12). Threads adopting ActivityPub makes sense, but won’t be easy. The New Stack. https://is.gd/hHIfGrGoogle Scholar
Mahler, A. G. (2018). From the Tricontinental to the Global South: Race, radicalism, and transnational solidarity. Duke University Press.CrossRefGoogle Scholar
Maizland, L. (2022, June 14). China and Russia: Exploring ties between two authoritarian powers. Council on Foreign Relations. https://is.gd/EhHFQ3Google Scholar
Makundi, H., Huyse, H., & Develtere, P. (2016). Cooperation between China and Tanzania on ICT: Fish, fishing tackle or fishing skills? Journal of Chinese Economic and Business Studies, 14(2), 129149.CrossRefGoogle Scholar
Malanczuk, P. (1997). Akehurst’s modern introduction to international law (7th ed.). London and New York: Routledge.Google Scholar
Mandl, C., & Versiani, I. (2020, June 23). Brazil suspends WhatsApp’s new payments system. Reuters. https://is.gd/KchWc8Google Scholar
Mann, M., Mitchell, P., Foth, M., & Anastasiu Cioaca, I. (2020). #BlockSidewalk to Barcelona: Technological sovereignty and the social license to operate smart cities. Journal of the Association for Information Science and Technology, 71(9), 11031115.CrossRefGoogle Scholar
Mansoux, A., & Abbing, R. R. (2020). Seven theses on Fediverse and the becoming of FLOSS. In Gansing, K. & Luchs, I. (Eds.), The eternal network: The ends and becomings of network culture (pp. 124140). Institute of Network Cultures. https://is.gd/9s4xdpGoogle Scholar
Maréchal, N. (2018). From Russia with crypto: A political history of Telegram. Eighth USENIX Workshop on Free and Open Communications on the Internet. https://is.gd/mbxBRFGoogle Scholar
Mason, J. (2019, March 14). U.S. considers sanctions to restrict Visa, Mastercard in Venezuela: Official. Yahoo! Finance. https://is.gd/lspf4PGoogle Scholar
Mattioli, D. (2020). Amazon scooped up data from its own sellers to launch competing products. https://is.gd/jZX8bkGoogle Scholar
Maxigas, P., & Latzko-Toth, G. (2020). Trusted commons: Why “old” social media matter. Internet Policy Review, 9(4). https://is.gd/wvosA7CrossRefGoogle Scholar
Mazzucato, M. (2013). The entrepreneurial state. London: Anthem Press.Google Scholar
Mazzucato, M. (2018). The entrepreneurial state. Penguin Books.Google Scholar
Mburu, J. (2018). The rise of a new dawn in Kenya’s payments system. Nairobi: FSG Kenya.Google Scholar
McCarthy, D. R. (2015). Power, information technology, and international relations theory: The power and politics of US foreign policy and the internet. New York: Palgrave Macmillan.CrossRefGoogle Scholar
McKenzie, B. (2022, June 1). How the European Union’s General Data Protection Regulations influenced data privacy law in Africa. Baker McKenzie. https://is.gd/RoTfT7Google Scholar
McKune, S. (2011, 2015). An analysis of the international code of conduct for information security. https://openeffect.ca/code-conduct/Google Scholar
McKune, S., & Ahmed, S. (2018). Authoritarian practices in the digital age: The contestation and shaping of cyber norms through China’s internet sovereignty agenda. International Journal of Communication, 12, 38353855.Google Scholar
Meagher, D. (2020). Caught in the economic crosshairs: Secondary sanctions, blocking regulations, and the American sanctions regime. Fordham Law Review, 89(3), 9991030.Google Scholar
Mehta, A. (2020, August 24). Delhi riots: The link between misinformation and radicalisation. The Wire. https://is.gd/LfwgzeGoogle Scholar
Mekouar, D. (2020). Here’s where the internet actually lives. https://is.gd/OFBejhGoogle Scholar
Meyer, J. A. (2008). Second thoughts on secondary sanctions symposium article. University of Pennsylvania Journal of International Law, 30(3), 905968.Google Scholar
Miao, S. (2021). 《阻断外国法律与措施不当域外适用办法》的属事适用范围 [On the subject matter of Chinese blocking rules]. 国际法研究 [Chinese Review of International Law], 2021(2), 4462.Google Scholar
Miao, W., Jiang, M., & Pang, Y. (2021). Historicizing Internet regulation in China: A meta-analysis of Chinese Internet policies (1994–2017). International Journal of Communication, 15, 20032026.Google Scholar
Michel, C. (2021, February 3). Digital sovereignty is central to European strategic autonomy – Speech by President Charles Michel at “Masters of digital 2021” online event. European Council. https://is.gd/mm4ysKGoogle Scholar
Micheli, M., Ponti, M., Craglia, M., & Berti Suman, A. (2020). Emerging models of data governance in the age of datafication. Big Data & Society, 7(2), 115.CrossRefGoogle Scholar
Miéville, C. (2006). Between equal rights: A Marxist theory of international law. Haymarket Books.Google Scholar
Milakovich, M. (2012). Digital governance: New technologies for improving public service and participation. New York: Routledge.CrossRefGoogle Scholar
Ministry of Digital Development, Communications and Mass Media of the Russian Federation. (2015, May 15). International consortium for development of new mobile operating system is being formed now. https://digital.gov.ru/en/events/33225/Google Scholar
Ministry of Foreign Affairs of India. (2021, December 6). India-Russia joint statement following the visit of the President of the Russian Federation. https://is.gd/oOL5e1Google Scholar
Mohammad-Arif, A., Naudet, J., & Jaoul, N. (2020). The Hindutva turn: Authoritarianism and resistance in India. South Asia Multidisciplinary Academic Journal, 24/25. http://journals.openedition.org/samaj/6632Google Scholar
Mohan, G., & Lampert, B. (2013). Negotiating China: Reinserting African agency into China-Africa relations. African Affairs, 112(446), 92110.CrossRefGoogle Scholar
Morozov, E. V. (2011). The net delusion: The dark side of internet freedom (1st ed.). New York: Public Affairs.Google Scholar
Morozov, E. V. (2019). Digital socialism? The calculation debate in the age of big data. New Left Review, 116/117, 3367.Google Scholar
Mortensen, S. A. (2016). Discursive propagation in Putin’s Russia: Prohibiting “propaganda of non-traditional sexual relations.Zeitschrift Für Slavische Philologie, 72(2), 349381.Google Scholar
Mouffe, C. (2013). Agonistics: Thinking the world politically. Verso.Google Scholar
Mueller, M. (2004). Ruling the root: Internet governance and the taming of cyberspace. Cambridge, MA: MIT Press.Google Scholar
Mueller, M. (2010). Networks and states: The global politics of Internet governance. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Mueller, M. (2017). Will the internet fragment? Sovereignty, globalization and cyberspace. Cambridge, UK: Polity Press.Google Scholar
Mueller, M. (2019). Against Sovereignty in Cyberspace. International Studies Review, 22(4), 123.Google Scholar
Mueller, M. (2020). Sovereignty and cyberspace: Institutions and internet governance. https://is.gd/ePcCOHGoogle Scholar
Mukerjee, S. (2016). Net neutrality, Facebook, and India’s battle to #SaveTheInternet. Communication & The Public, 1(3), 356361.CrossRefGoogle Scholar
Mungadze, S. (2019, October 3). Controversial Internet censorship Bill now law. ITWeb. Johannesburg. https://is.gd/VKQqNuGoogle Scholar
Murau, S., Pape, F., & Pforr, T. (2021, February). The hierarchy of the offshore US-dollar system: On swap lines, the FIMA repo facility and special drawing rights. Boston University Global Development Policy Center. https://is.gd/WLgJ8pCrossRefGoogle Scholar
Musiani, F. (2013/5). Nains sans géants. Architecture décentralisée et services Internet. Presses des Mines.Google Scholar
Musiani, F. (2018). L’invisible qui façonne. Études d’infrastructure et gouvernance d’Internet. Tracés. Revue de Sciences humaines, 35, 161176.Google Scholar
Musiani, F., Cogburn, D. L., DeNardis, L., & Levinson, N. S. (Eds.) (2016). The turn to infrastructure in Internet governance. New York: Palgrave Macmillan.CrossRefGoogle Scholar
Musiani, F., Loveluck, B., Daucé, F., & Ermoshina, K. (2019). “Digital sovereignty”: Can Russia cut off its Internet from the rest of the world? The Conversation France.Google Scholar
Musyimi, C., Malechwanzi, J., & Luo, H. (2018). The Belt and Road Initiative and technical and vocational education and training (TVET) in Kenya: The Kenya-China TVET project. Frontiers of Education in China, 13(September), 346374.CrossRefGoogle Scholar
Mutsvairo, B., & Ragnedda, M. (Eds.) (2019). Mapping the digital divide in Africa: A mediated analysis. Amsterdam: Amsterdam University Press.Google Scholar
Napoli, P., & Caplan, R. (2017). Why media companies insist they’re not media companies, why they’re wrong, and why it matters. First Monday, 22(5).CrossRefGoogle Scholar
Narlikar, A. (2021). Must the weak suffer what they must? In Drezner, D., Farrell, H., & Newman, A. (Eds.), The uses and abuses of weaponized interdependence (pp. 289304). Washington, DC: Brookings Institution Press.Google Scholar
National Archives. (n.d.) Maps in time from 1900 to 2000. https://is.gd/SC3As0Google Scholar
National Archives. (2021, January 5). “Executive order addressing the threat posed by applications and other software developed or controlled by Chinese companies.” Trump White House, National Archives. https://is.gd/IR2hYuGoogle Scholar
Ndzendze, B. (2021, January 26). Beyond the digital cold war: Technology and the future of US-African engagement under Biden. Mail & Guardian. https://is.gd/2Mr7TMGoogle Scholar
Nechushtai, E., & Lewis, S. C. (2019). What kind of news gatekeepers do we want machines to be? Filter bubbles, fragmentation, and the normative dimensions of algorithmic recommendations. Computers in Human Behavior, 90, 298307.CrossRefGoogle Scholar
Negro, G. (2020). A history of Chinese global Internet governance and its relations with ITU and ICANN. Chinese Journal of Communication, 13(1), 104121.CrossRefGoogle Scholar
Nemroff, C. (2018). Explanation of vote on a third committee resolution on countering the use of information and communication technologies for criminal purposes. United States Mission to the United Nations. https://is.gd/UmmIdlGoogle Scholar
New Development Bank (NDB). (2022). NDB’S member countries. www.ndb.int/about-us/organization/members/Google Scholar
Newman, N., Fletcher, R., Eddy, K., Robertson, C. T., & Nielsen, R. K. (2023). Digital News Report 2023. Reuters Institute for the Study of Journalism. https://is.gd/x7JFiWGoogle Scholar
Ngqakamba, S. (2021, September 9). Justice department’s IT system brought down in ransomware attack. News24. https://is.gd/9q5MrjGoogle Scholar
Nocetii, J. (2015). Contest and conquest: Russia and global internet governance. International Affairs, 91(1), 111130.CrossRefGoogle Scholar
Nocetti, J. (2017, July 17). Securitising Putin IV: The rationale behind Russia’s new “digital laws.” https://is.gd/wcjChhGoogle Scholar
Nonnecke, B. (2016). The transformative effects of multistakeholderism in Internet governance: A case study of the East Africa Internet governance forum. Telecommunications Policy, 40(4), 343352.CrossRefGoogle Scholar
Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar
NPC & Central Committee of the CPC. (2016). Outline of the 13th five-year plan for national economic and social development of the People’s Republic of China (2016–2020). https://is.gd/2eZ7aTGoogle Scholar
NPCI. (2021). Standard operating procedure (SOP) – Market share cap for third party application providers (TPAP). NPCI. https://is.gd/QqJsEIGoogle Scholar
NPCI. (n.d. -a). An introduction to NPCI and its various products. NPCI. www.npci.org.in/who-we-are/about-usGoogle Scholar
NPCI. (n.d. -b). UPI product statistics. NPCI. www.npci.org.in/what-we-do/upi/product-statisticsGoogle Scholar
NPCI. (n.d. -c). UPI live members. NPCI. www.npci.org.in/what-we-do/upi/live-membersGoogle Scholar
NPCI. (n.d. -d). UPI 3rd party apps. NPCI. www.npci.org.in/what-we-do/upi/3rd-party-appsGoogle Scholar
NPCI. (n.d. -e). UPI Ecosystem Statistics. NPCI. www.npci.org.in/what-we-do/upi/upi-ecosystem-statisticsGoogle Scholar
NPCI. (n.d. -f). Committees. NPCI. www.npci.org.in/who-we-are/committeeGoogle Scholar
Nye, J. S., & Owens, W. A. (1996). America’s information edge. Foreign Affairs, 75(2), 2036.CrossRefGoogle Scholar
O’Donnell, F., & Papa, M. (2021). India’s multi-alignment management and the Russia–India–China (RIC) triangle. International Affairs, 97(3), 801822.CrossRefGoogle Scholar
O’Neill, J. (2001). Building better global economic BRICs. Goldman Sachs. https://is.gd/IOgg7xGoogle Scholar
Oates, S. (2013). Revolution stalled: The political limits of the Internet in the post-Soviet sphere. Oxford, UK: Oxford University Press.CrossRefGoogle Scholar
Oatley, T., Winecoff, W. K., Pennock, A., & Danzman, S. B. (2013). The political economy of global finance: A network model. Perspectives on Politics, 11(1), 133153.CrossRefGoogle Scholar
Obendiek, A. (2021, May 12). Take back control? Digital sovereignty and a vision for Europe (Policy Paper). Hertie School Jacques Delors Centre. https://is.gd/un3sl2Google Scholar
Observer Research Foundation (ORF). (2021, August 1). Digital BRICS: A new framework for cooperation on technology and innovation. https://is.gd/USfmdVGoogle Scholar
OECD. (2022). Personal data protection at the OECD. https://is.gd/gngiuLGoogle Scholar
Oreglia, E. (2012). Africa’s many Chinas. Report on the Chinese presence in Africa for Intel.Google Scholar
Organization for Economic Cooperation [OECD] and Development and Inter-American Development Bank [IDB]. (2017). Broadband policies for Latin America and the Caribbean: A digital economy toolkit. https://is.gd/4sTxPbGoogle Scholar
Ossewaarde, M., & Reijers, W. (2017). The illusion of the digital commons: “False consciousness” in online alternative economies. Organization, 24(5), 609628.CrossRefGoogle Scholar
Palladino, N., & Santaniello, M. (2021). Legitimacy, power, and inequalities in the multi-stakeholder Internet governance: Analyzing IANA transition. Cham, Switzerland: Palgrave Macmillan.Google Scholar
Parfitt, R. (2019). The process of international legal reproduction: Inequality, historiography, resistance. Cambridge University Press.CrossRefGoogle Scholar
Parliament of the Republic of South Africa. (2022, July 31). Electronic Communications and Transactions Act, No. 25 of 2002. www.gov.za/documents/electronic-communications-and-transactions-actGoogle Scholar
Pâtin, A. (2021, January 26). Učeniâ po rabote suverennogo Interneta otložili do konca pandemii. https://is.gd/thdisuGoogle Scholar
Peškova, T. (2020). Radi celej Putina vlasti pritormoziat zakon Yarovoj. Cnews. https://is.gd/ASRosAGoogle Scholar
Petry, J., Fichtner, J., & Heemskerk, E. (2019). Steering capital: The growing private authority of index providers in the age of passive asset management. Review of International Political Economy, 28(1), 152176.CrossRefGoogle Scholar
Philpott, D. (2003). Sovereignty. Stanford Encyclopedia of Philosophy Archive. https://plato.stanford.edu/archives/sum2016/entries/sovereignty/Google Scholar
Philpott, D. (2020). Sovereignty. In Zalta, E. N. (Ed.), The Stanford encyclopedia of philosophy (Fall). https://is.gd/ccZzpgGoogle Scholar
Plantin, J.-C., Lagoze, C., Edwards, P. N., & Sandvig, C. (2018). Infrastructure studies meet platform studies in the age of Google and Facebook. New Media & Society, 20(1), 293310.CrossRefGoogle Scholar
PMJDY (Pradhan Mantri Jan Dhan Yojana). (2023). Pradhan Mantri Jan – Dhan Yojana. https://pmjdy.gov.in/accountGoogle Scholar
Poder360. (2021, August 13). Irmão do ajudante de ordens de Bolsonaro vazou inquérito da PF, diz jornal. https://is.gd/tB0cReGoogle Scholar
Poe, M. (2001). Moscow, the third Rome: The origins and transformations of a “pivotal moment.” Jahrbücher Für Geschichte Osteuropas, 49(3), 412429.Google Scholar
Poell, T., Nieborg, D., & van Dijck, J. (2019). Platformisation. Internet Policy Review, 8(4), 113.CrossRefGoogle Scholar
Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4), 119.CrossRefGoogle Scholar
Polanyi, K. (1980/1944). The great transformation. New York: Beacon Publisher Group.Google Scholar
Polatin-Reuben, D., & Wright, J. (2014). An internet with BRICS characteristics: Data sovereignty and the balkanisation of the internet. 4th USENIX Workshop on Free and Open Communications on the Internet.Google Scholar
Polyakova, A., & Meserole, C. (2019). Exporting digital authoritarianism. Foreign Policy at Brookings. https://is.gd/qe2Se9Google Scholar
Prabhu, J. A. (2012). Strands of anti-Westernism in Indian politics. Swarajyamag. https://is.gd/tLOdgIGoogle Scholar
Prashad, V. (2012). Poorer nations: A possible history of the Global South. Verso.Google Scholar
PRC Ministry of Commerce. (2020). 商务部令2020年第4号 不可靠实体清单规定 [Order No.4 (2020) of the Ministry of Commerce: Regulations on the unreliable entities list]. PRC Ministry of Commerce. https://is.gd/ZkMmvuGoogle Scholar
PRC Ministry of Commerce, & PRC Ministry of Science and Technology. (2020). 《中国禁止出口限制出口技术目录》调整内容 [Revision of the catalogue of technologies prohibited or restricted from export]. The State Council, The People’s Republic of China. https://is.gd/Vi8hMzGoogle Scholar
Presidência da República. (2023, January 2). Despacho do Presidente da República. Brazilian Government Official Gazette [Diário Oficial da União], Ed. 1-A, Section 1-Extra A, p. 7. https://is.gd/W9fRpZGoogle Scholar
Presidency of the Russian Federation. (2016). Information Security Doctrine of the Russian Federation. https://is.gd/uBFMJDGoogle Scholar
Presidential Commission on the Fourth Industrial Revolution. (2020). Summary report & recommendations presented by the commission on the fourth industrial revolution.Google Scholar
Pretorius, L. (2021, February 9). Anatomy of a disinformation campaign: The who, what and why of deliberate falsehoods on Twitter. Daily Maverick. https://is.gd/eaTglAGoogle Scholar
Purnell, N. (2018). Two years ago, India lacked fast, cheap Internet – one billionaire changed all that. Wall Street Journal. https://is.gd/VHOLe3Google Scholar
Putnam, T. L. (2016). Courts without borders: Law, politics, and US extraterritoriality. Cambridge University Press.CrossRefGoogle Scholar
Pytlak, A. (2020a, November 13). Cyber peace and security. Reaching Critical Will, 18(5). https://is.gd/cOtJnFGoogle Scholar
Pytlak, A. (2020b, May 28). UN security council meeting highlights the cyber peace and security challenges wrought by the COVID-19 pandemic. Reaching Critical Will. https://is.gd/SGLtWVGoogle Scholar
Quinn, B. (2019, May 20). Huawei cut off from Android and US chips amid US ban. France24. https://is.gd/qQ7dxdGoogle Scholar
Radio Liberty Staff. (2010, May 13). Cyrillic domain names become operational on the internet. https://is.gd/i93ZUkGoogle Scholar
Radu, R. (2019). Negotiating internet governance. Oxford, UK: Oxford University Press.CrossRefGoogle Scholar
Raghavan, V., Jain, S., & Varma, P. (2019). India stack – digital infrastructure as public good. Communications of the ACM, 62(11), 7681.CrossRefGoogle Scholar
Rainsford, S. (2015, January 16). #JeSuisCharlie gets little sympathy in Russia. BBC News. www.bbc.com/news/world-europe-30847694Google Scholar
Raman, A., Joglekar, S., Cristofaro, E. D., Sastry, N., & Tyson, G. (2019). Challenges in the decentralised web: The Mastodon case. Proceedings of the Internet Measurement Conference, 217–229.CrossRefGoogle Scholar
Ramesh, G., Jangid, A., Sivamalai, L., & Rebelly, A. B. (2020). NPCI: Chartering a payment freeway. In IIM Bangalore Research Paper (No. 626). Bangalore.CrossRefGoogle Scholar
Rappaport, J. (2018). Is proprietary software unjust? Examining the ethical foundations of free software. Philosophy & Technology, 31(3), 437453.CrossRefGoogle Scholar
Ravi, S. (2018, August 27). Is India ready to JAM? Brookings. https://is.gd/5kxfp5Google Scholar
Raymond, M., & DeNardis, L. (2015). Multistakeholderism: Anatomy of an inchoate global institution. International Theory, 7(3), 572616.CrossRefGoogle Scholar
Razumovsky, D. (2022, July 14) BRICS: How will the organization get a “Second Wind”? Valdai Club. https://is.gd/wd0E54Google Scholar
Razzano, G., Gillwald, A., Aguera, P., Ahmed, S., Calandro, E., Matanga, C., Rens, A., & van Der Spuy, A. (2020). SADC PF discussion paper. The digital economy and society. https://is.gd/tnlBvIGoogle Scholar
Reda, F. (2020, October 12). Edit policy: Wo bleibt Europas Open Technology Fund? [Edit policy: Where is Europe’s open technology fund?]. Heise Online. https://is.gd/uq4tu4Google Scholar
Regional Comprehensive Economic Partnership Agreement. (2020). Legal text of the RCEP agreement, Chapter 12. https://is.gd/BHPoWyGoogle Scholar
Renz, B., & Smith, H. (2016). Russia and Hybrid warfare – Going beyond the label. https://is.gd/RIOqQKGoogle Scholar
Research ICT Africa. (2015). Submission on the cybercrime and cybersecurity bill. https://is.gd/UaBwhQGoogle Scholar
Research ICT Africa. (2020). Digital futures: South Africa’s digital readiness for the “fourth industrial revolution. https://is.gd/6solEGGoogle Scholar
Research ICT Africa. (2021). Written submission in response to the: PROPOSED NATIONAL DATA AND CLOUD POLICY. https://researchictafrica.net/wp/wp-content/uploads/2021/06/RIA_Submission_DATA_and_Cloud_Policy.pdfGoogle Scholar
Reserve Bank of India. (2005). Payment systems in India – Vision 2005–08. Reserve Bank of India. https://is.gd/tWSuv4Google Scholar
Reserve Bank of India. (2012). Merchant discount rates structure for debit card transactions. Reserve Bank of India. https://is.gd/nrJqF9Google Scholar
Reserve Bank of India. (2017). Draft circular – Rationalisation of merchant discount rate (MDR) for debit card transactions. Reserve Bank of India. https://is.gd/JQkwSnGoogle Scholar
Reserve Bank of India. (2019). Policy paper on authorisation of new retail payment systems. Reserve Bank of India. https://is.gd/WcVzFYGoogle Scholar
Resprepo, R. (2013). Democratic freedom of expression. Open Journal of Philosophy, 3(3), 380390.CrossRefGoogle Scholar
Reuters. (2021a, May 13). South African regulator seeking legal advice on WhatsApp’s new privacy policy. Reuters: Africa. https://is.gd/cqXAtBGoogle Scholar
Reuters. (2021b, May 26). Facebook, Twitter told to open databases in Russia by July 1. https://is.gd/WnOxk2Google Scholar
Reuters. (2022, February 15). India adds 54 more Chinese apps to ban list; Sea says it complies with laws. Reuters. https://is.gd/nlXQCUGoogle Scholar
Reviglio, U., & Agosti, C. (2020). Thinking outside the black-box: The case for “algorithmic sovereignty” in social media. Social Media + Society, 6(2), 112.CrossRefGoogle Scholar
Rinehart, W. (2020, September 14). Is data nonrivalrous? The Benchmark. https://is.gd/SPbYQzGoogle Scholar
Rizzi, A. (2023, September 20). China, Russia, India and the Global South: The era of revenge. El País. https://is.gd/EVmqGhGoogle Scholar
Roberts, S. (2020). Policy brief 1: Note on WTO moratorium on electronic transmissions. Industrial Development Think Tank. https://is.gd/bzle4NGoogle Scholar
Roberts, T. (Ed.) (2021). Digital rights in closing civic space: Lessons from ten African countries. Institute of Development Studies. https://is.gd/EH9G33CrossRefGoogle Scholar
Robertson, G. (2013). Protesting Putinism: The election protests of 2011–2012 in broader perspective. Problems of Post-Communism, 60(2), 1123.CrossRefGoogle Scholar
Robinson, E. et al. (2017). Telling stories about post-war Britain: Popular individualism and the “crisis” of the 1970s. Twentieth Century British History, 28(2), 268304.CrossRefGoogle ScholarPubMed
Robson, D. (2017, March 9). Why China’s internet use has overtaken the West. BBC. https://is.gd/iVpiJhGoogle Scholar
Roio, D. (2018). Algorithmic sovereignty. [Doctoral dissertation, University of Plymouth]. https://pearl.plymouth.ac.uk/handle/10026.1/11101Google Scholar
Rolf, S., & Schindler, S. (2023). The US–China rivalry and the emergence of state platform capitalism. Environment and Planning A: Economy and Space, 55(5), 12551280.CrossRefGoogle Scholar
Roskomnadzor. (2021, May 17). On partial removal of measures to slow down Twitter traffic. https://rkn.gov.ru/news/rsoc/news73632.htmGoogle Scholar
Rosnay, M. D. de, & Musiani, F. (2020). Alternatives for the Internet: A journey into decentralised network architectures and information commons. TripleC: Communication, Capitalism & Critique, 18(2), 622629.CrossRefGoogle Scholar
Rousseff, D. (2013, September 24). Statement by H.E. Dilma Rousseff, President of the Federative Republic of Brazil, at the opening of the general debate of the 68th session of the United Nations General Assembly. Voltaire Network. www.voltairenet.org/article180382.htmlGoogle Scholar
Routley, N. (2019). Ranking the top 100 websites in the world. Visual Capitalist. https://is.gd/Sz97XHGoogle Scholar
Ruijgrok, K. (2021). Understanding India’s troubling rise in internet shutdowns. A qualitative and quantitative analysis. Open Tech Fund. https://is.gd/N0R5jrGoogle Scholar
Ruohonen, J. (2020). The treachery of images in the digital sovereignty debate. 1–21. http://arxiv.org/abs/2012.02724Google Scholar
SA News. (2019, February 24). South Africa to develop Africa’s largest tech hub. Business Tech. https://is.gd/31q9lFGoogle Scholar
Salmon, F. (2020, November 4). When an ant is too big to fail. Axios. https://is.gd/HU0zqJGoogle Scholar
Samuels, E. (2020, February 21). How misinformation on WhatsApp led to a mob killing in India. Washington Post.Google Scholar
Sanger, D. E., & Perlroth, N. (2019, June 15) U.S. escalates online attacks on Russia’s power grid. The New York Times.Google Scholar
Sanzgiri, V. (2023, February 28). Exam excuses and preventive measures fuel internet shutdowns in India. MediaNama. https://is.gd/bRmUAqGoogle Scholar
Sarkar, T., Matam, M., & Grover, G. (2020). Internet Shutdowns: Threats to Digital Access. The Centre for Internet and Society. https://cis-india.org/internet-governance/blog/india-digital-freedoms-2-internet-shutdownsGoogle Scholar
Savelyev, A. (2016). Russia’s new personal data localization regulations: A step forward or a self-imposed sanction? Computer Law & Security Review, 32(1), 128145.CrossRefGoogle Scholar
Savin, L. (2019a, December 30). Номос Киберпространства и суверенный Интернет. https://is.gd/0LycKpGoogle Scholar
Savin, L. (2019b, December 30). Суверенный Интернет – дело принципиальной важности для национальной безопасности. News Front. https://news-front.info/2019/12/30/suverennyj-internet-delo-princzipialnoj-vazhnosti-dlya-naczionalnoj-bezopasnosti/Google Scholar
Schiller, H. I. (1975). Genesis of the free flow of information principles. The imposition of communications domination. Instant Research on Peace and Violence, 5(2), 7586.Google Scholar
Schmitt, C. (1985). Political theology: Four chapters on the concept of sovereignty. Cambridge, MA: MIT Press.Google Scholar
Schneider, F. (2018). China’s digital nationalism. New York: Oxford University Press.CrossRefGoogle Scholar
Schoonmaker, S. (2018). Free software, the internet, and global communities of resistance. Routledge.CrossRefGoogle Scholar
Schwartz, H. M. (2019). Strange power over credit; or the enduring strength of US structural power. In Germain, R. (Ed.), Susan strange and the future of global political economy: Power, control and transformation (Ripe series in global political economy) (1st ed., pp. 6972). Routledge.Google Scholar
SCO. (2005, July 5). Declaration by the heads of the member states of the Shanghai cooperation organization in Astana. http://eng.sectsco.org/load/197543/Google Scholar
SCO. (2006, June 15). Statement on international information security. http://eng.sectsco.org/load/197770/Google Scholar
SCO. (2007, August 16). Bishkek declaration. http://eng.sectsco.org/load/197905/Google Scholar
SCO. (2009, June 16). Agreement of SCO on cooperation in the field of ensuring the international information security. https://is.gd/u62bkgGoogle Scholar
SCO. (2010, June 10). Tashkent declaration. http://eng.sectsco.org/load/199082/Google Scholar
Scott, M., & Birnbaum, E. (2021, June 30). How Washington and Big Tech won the global tax fight. Politico. https://is.gd/9wMsq7Google Scholar
SEACOM. (2023). SA has highest number of ransomware and email attacks in Africa. January 20, 2023. https://is.gd/ILQpApGoogle Scholar
Segal, A. (2017). The hacked world order: How nations fight, trade, maneuver, and manipulate in the digital age (2nd ed.). New York: PublicAffairs.Google Scholar
Sengupta, D. (2011, June 7). ICANN allows India to register website addresses in seven regional languages. The Economic Times.Google Scholar
Shah, N. (2021). Digital infrastructure, liminality, and world-making via Asia: (Dis)information blackouts: Politics and practices of internet shutdowns. International Journal of Communication, 15, 26932709.Google Scholar
Shahbaz, A. (2018). Freedom of the net 2018: The rise of digital authoritarianism. Freedom House. https://is.gd/QGR0hqGoogle Scholar
Shang, S. (2021). 中国域外规制体系的建构挑战与架构重点 – 兼论《阻断外国法律与措施不当域外适用办法》[Challenges and keys to China’s extraterritorial regulatory system: Also a commentary on rules on counteracting unjustified extraterritorial application of foreign legislation and other measures]. 国际法研究 [Chinese Review of International Law], 2021(2), 6380.Google Scholar
Shapshak, T. (2021, May 12). Facebook to be summonsed before South Africa’s parliament over “harmful misinformation.” Forbes. https://is.gd/w4bjbFGoogle Scholar
Sharma, L., & Natarajan, S. (2020). Restoring agency: Modified choice approach. Bangalore.Google Scholar
Sharma, L., Natarajan, S., & Udhayakumar, K. (2020). Last mile access: Building offline Architectures for better reach to the state. https://is.gd/06hXiDGoogle Scholar
Shcherbovich, A. (2021). Data protection and cybersecurity legislation of the Russian federation in the context of the “sovereignization” of the internet in Russia. In Belli, L. (Ed.), CyberBRICS: Cybersecurity regulations in the BRICS countries (pp. 67131). Cham: Springer.CrossRefGoogle Scholar
Sheehan, M., & Du, S. (2022, December 9). What China’s algorithm registry reveals about AI governance. Carnegie Endowment. https://is.gd/kcimIHGoogle Scholar
Sheik, S. (2021, December 1). Alert | The Cybercrimes Act has finally commenced. Michalsons. https://is.gd/DLxAqsGoogle Scholar
Shen, X. (2013). Private Chinese investment in Africa: Myths and realities. World Bank. http://dx.doi.org/10.1596/1813-9450-6311CrossRefGoogle Scholar
Sherman, J. (2019, February 4). India’s digital path: Leaning democratic or authoritarian? https://is.gd/AWWuYNGoogle Scholar
Sherman, J. (2021). Reassessing RuNet: Russian Internet isolation and implications for Russian cyber behavior. Atlantic Council. https://is.gd/rcJ0bJGoogle Scholar
Sherman, J., & Morgus, R. (2018, November 19). Breaking down the vote on Russia’s new cybercrime resolution at the UN. https://is.gd/Ke77nAGoogle Scholar
Shi, Y. (2018). 主权的网络边界 – 以规制数据跨境传输的视角 [Network borders of sovereignty: From the perspective of regulating cross-border data transmission]. 情报杂志 [Journal of Intelligence], 37(9), 160166.Google Scholar
Siebert, Z. (2021). Digital sovereignty – The EU in a contest for influence and leadership. Heinrich Böll Stiftung Brussels. https://is.gd/2FbcLbGoogle Scholar
Sinclair, T. J. (2008). The new masters of capital: American bond rating agencies and the politics of creditworthiness. Cornell University Press.Google Scholar
Singh, S. (2013). India and the SCO. Better late than never. In Fredholm, M. (Ed.), The Shanghai cooperation organization and Eurasian geopolitics: New directions, perspectives, and challenges (pp. 162175). Copenhagen: NIAS Press.Google Scholar
Sivetc, L. (2021). Controlling free expression “by infrastructure” in the Russian Internet: The consequences of RuNet sovereignization. First Monday, 26(5).Google Scholar
Slobodian, Q. (2020). Globalists: The end of empire and the birth of neoliberalism. Harvard University Press.Google Scholar
Sly, L. (1997, June 26). Reliving the opium war. https://is.gd/Jr5Zf6Google Scholar
Smit, H., Johnson, C., Hunter, R., Dunn, M., & van Vuuren, P. F. J. (2019). Africa’s digital platforms and financial services. An eight-country overview. Insight2inpact. https://is.gd/La5uDnGoogle Scholar
Smith, C. (2023). RSAWEB victim of cyberattack as wave of ransomware attempts hits SA in past week. https://is.gd/hwrQmxGoogle Scholar
Smith, M. L. (2018). Putting critical realism to use in ICT4D research: Reflections on practice. The Electronic Journal of Information Systems in Developing Countries. 84(6), e12052. https://doi.org/10.1002/isd2.12052CrossRefGoogle Scholar
Smith, M. L., Zidar, O., & Zwick, E. (2023). Top wealth in America: New estimates under heterogeneous returns. The Quarterly Journal of Economics, 138(1), 515573.CrossRefGoogle Scholar
Smuha, N. A. (2021). From a “race to AI” to a “race to AI regulation”: Regulatory competition for artificial intelligence. Law, Innovation and Technology, 13(1), 5784.CrossRefGoogle Scholar
Snyder, T. (2018a). The road to unfreedom: Russia, Europe. New York: Tim Duggan Books.Google Scholar
Snyder, T. (2018b, March 16). Vladimir Putin’s politics of eternity. The Guardian. https://is.gd/6EzzRTGoogle Scholar
Soldatov, A., & Borogan, I. (2015). The red web: The struggle between Russia’s digital dictators and the new online revolutionaries. PublicAffairs.Google Scholar
Soldatov, A., & Borogan, I. (2016, November 29). Putin brings China’s Great Firewall to Russia in cybersecurity pact. The Guardian. https://is.gd/8TG9qXGoogle Scholar
Soldatov, A., & Borogan, I. (2018). Russia’s approach to cyber: The best defence is a good offence. In Popescu, N. & Secrieru, S. (Eds.), Hacks, leaks and disruptions. Russian cyber strategies (pp. 1524). EU Institute for Security Studies. https://is.gd/jp80U0Google Scholar
Souleimanov, E., & Horák, S. (2006). Islam, Islamism, and terrorism in the Northern Caucasus and Central Asia: A critical assessment. In Schlichting, U. (Ed.), OSCE yearbook: Yearbook on the organization for security and co-operation in Europe (pp. 271287). Hamburg: Nomos Verlaggesellschaft.Google Scholar
South African Banking Risk Information Centre (SABRIC). (2020). SABRIC annual crime stats 2019. https://is.gd/fBEVJOGoogle Scholar
South African Banking Risk Information Centre (SABRIC). (2021). SABRIC annual crime states 2020. https://is.gd/6KBi3ZGoogle Scholar
South African Government. (n.d.). Fake news – Coronavirus COVID-19. https://is.gd/2nCMQcGoogle Scholar
South Commission, The. (1990). The challenge to the South: The report of the South Commission. Oxford, UK: Oxford University Press.Google Scholar
Sparks, C. (2014). Deconstructing the BRICS. International Journal of Communication, 8, 392418.Google Scholar
Srivastava, S. (2022). Hybrid sovereignty in world politics. Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar
Srnicek, N. (2016). Platform capitalism. London: Polity Press.Google Scholar
Stadnik, I. (2021). Control by infrastructure: Political ambitions meet technical implementations in RuNet. First Monday, 26(5).Google Scholar
Stallman, R. M. (2002). Free software, free society: Selected essays of Richard M. Stallman. Free Software Foundation. https://is.gd/R67I8YGoogle Scholar
Standnik, I. (2019). Sovereign Runet: What does it mean? (White paper). Internet Governance Project of Georgia Tech School of Public Policy. https://is.gd/VHA2hNGoogle Scholar
Stanford PACS. (2020). Reclaiming digital infrastructure for the public interest. Stanford, CA: Stanford PACS.Google Scholar
Starrs, S. (2013). American economic power hasn’t declined-it globalized! Summoning the data and taking globalization seriously. International Studies Quarterly, 57(4), 817830.CrossRefGoogle Scholar
Statista. (2021). Market share of mobile device vendors in South Africa from January 2019 to June 2021. https://is.gd/NwxWryGoogle Scholar
Statista. (2024, February 13). BRICS and G7 countries’ share of the world’s total gross domestic product (GDP) in purchasing power parity (PPP) from 2000 to 2023. Statista. https://is.gd/a3LGbgGoogle Scholar
Stoll, C. (1989). The cuckoo’s egg: Tracking a spy through the maze of computer espionage. New York: Doubleday.Google Scholar
Stored Wire and Electronic Communications and Transactional Records Access, 18 U.S.C. § 2701 (1986). https://is.gd/c4O1OwGoogle Scholar
Strange, S. (1988). States and markets. Continuum International Publishing Group.Google Scholar
Stuenkel, O. (2014). Can the BRICS avoid the “Power South vs. Poor South” dynamic? https://is.gd/HBWldRGoogle Scholar
Stuenkel, O. (2016). Post-Western world: How emerging powers are remaking global order. London, UK: Polity Press.Google Scholar
Stuenkel, O. (2020). The BRICS and the future of global order (2nd ed.). London, UK: Lexington Books.Google Scholar
Subramanian, A., & Felman, J. (2022). Why India can’t replace China. Foreign Affairs. https://is.gd/noJwQPGoogle Scholar
Sukumar, A. M. (2021, February 5). Designing digital public goods and playgrounds in India: The need for theoretical and contextual analysis. Isprit. https://is.gd/uCykysGoogle Scholar
Svenonius, O., & Björklund, F. (2018). Explaining attitudes to secret surveillance in post- communist societies. East European Politics, 34(2), 123151.CrossRefGoogle Scholar
Swart, K. (1962). “Individualism” in the mid-nineteenth century (1826–1860). Journal of the History of Ideas, 23(1), 7790.CrossRefGoogle Scholar
Szonyi, M. (2009). Secularization theories and the study of Chinese religions. Social Compass, 56(3), 312327.CrossRefGoogle Scholar
Szyszczak, E. (2006). Experimental governance: The open method of coordination. European Law Journal, 12(4), 486502.CrossRefGoogle Scholar
Tan, H. (2023). Russia says its economy did better than expected, one year into the Ukraine war. But experts say there’s a red flag behind the announcement. Business Insider. https://is.gd/JUuJD4Google Scholar
Tang, X. (1998). 当今世界的信息控制权 [The right to control information in contemporary world]. 探索与争鸣 [Exploration and Free Views], 9, 1618.Google Scholar
Taylor, I. (2006). China’s oil diplomacy in Africa. International Affairs, 82(5), 937959.CrossRefGoogle Scholar
Taylor, L. (2013). The scramble for Africa’s data: Resource grab or development opportunity? https://is.gd/vfD2jzGoogle Scholar
Taylor, L. (2021). Public actors without public values: Legitimacy, domination and the regulation of the technology sector. Philosophy & Technology, 34, 897922.CrossRefGoogle ScholarPubMed
Taylor, L., & Broeders, D. (2015). In the name of development: Power, profit and the datafication of the global south. Geoforum, 64(August), 229237.CrossRefGoogle Scholar
Telecommunications and Postal Services. (2016). National integrated ICT policy white paper. https://is.gd/94XZaXGoogle Scholar
Tellis, A. J. (2018, November 1). Narendra Modi and U.S.–India relations. Carnegie Endowment for International Peace. https://is.gd/pKh8whGoogle Scholar
Thumfart, J. (2022). The norm development of digital sovereignty between China, Russia, the EU and the US: From the late 1990s to the Covid-crisis 2020/21 as catalytic event. In Hallinan, D., Leenes, R., & de Hert, P. (Eds.), Data protection and privacy: Enforcing rights in a changing world (pp. 144). Oxford: Hart Publishing.Google Scholar
Thumfart, J. (2024a). Digital rights and the state of exception. Internet shutdowns from the perspective of just securitization theory. Journal of Global Security Studies, 9(1), ogad024. https://doi.org/10.1093/jogss/ogad024CrossRefGoogle Scholar
Thumfart, J. (2024b). The liberal internet in the postliberal era: Digital sovereignty, private government, and practices of neutralization. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
Thussu, D. K. (2015). Digital BRICS: Building a NWICO 2.0? In Nordenstreng, K. & Thussu, D. K. (Eds.), Mapping BRICS media (pp. 242263). Cham: Routledge, Taylor & Francis Group.CrossRefGoogle Scholar
Tiezzi, S. (2020, September 10). China’s bid to write the global rules on data security. The Diplomat. https://is.gd/mmhYlVGoogle Scholar
Tillin, L. (2013). National and subnational comparative politics: Why, what and how. Studies in Indian Politics, 1(2), 235240.CrossRefGoogle Scholar
Tilly, C. (1975). The formation of national states in Western Europe. Princeton, NJ: Princeton University Press.Google Scholar
Tilly, C. (2002). Stories, identities, and political change. Rowman & Littlefield.Google Scholar
Timmers, P. (2020). When sovereignty leads and cyber law follows. Directions Cyber Digital Europe. https://is.gd/rZ0p6PGoogle Scholar
Timoteo, M., Verri, B., & Nanni, R. (Eds.) (2023). Quo vadis, sovereignty? New conceptual and regulatory boundaries in the age of digital China. Berlin, Germany: Springer.CrossRefGoogle Scholar
Tocci, N. (2023, September 20). War in Ukraine is revealing a new global order – and the “power south” is the winner. The Guardian. https://is.gd/bX3ciaGoogle Scholar
Tomaz, T. (2023). Brazilian fake news bill: Strong content moderation accountability but limited hold on platform market power. Javnost – The Public, 30(2), 253267.CrossRefGoogle Scholar
Tsourapas, G. (2020). Global autocracies: Strategies of transnational repression, legitimation, and co-optation in world politics. International Studies Review, 23(3), 616644.CrossRefGoogle Scholar
Turner, F. (2006). From counterculture to cyberculture: Stewart brand, the whole Earth network, and the rise of digital utopianism. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
Tzouvala, N. (2020). The ordo-liberal origins of modern international investment law: Constructing competition on a global scale. In Haskell, J. D. & Rasulov, A. (Eds.), New voices and new perspectives in international economic law (pp. 3754). Cham: Springer International Publishing.CrossRefGoogle Scholar
UN Finance Center for South-South Cooperation. (2023). Global South Countries (Group of 77 and China). Finance Center for South-South Cooperation. https://is.gd/AuVGMOGoogle Scholar
UNCTAD. (2019, September). Digital economy report 2019. United Nations Publications. https://is.gd/tdMtOpGoogle Scholar
UNESCO. (1945). UNESCO Constitution. https://is.gd/tjXRI7Google Scholar
United Nations Conference on Trade and Development (UNCTAD). (2019). UNCTAD research paper No. 29. https://is.gd/38PealGoogle Scholar
United Nations Development Programme (UNDP). (1994). Human development report 1994.Google Scholar
United Nations Development Programme (UNDP). (2015). The 2030 agenda for sustainable development. New York: United Nations Development Programme.Google Scholar
United Nations General Assembly. (2020). Developments in the field of information and telecommunications in the context of international security. Seventy-fifth session. First Committee. A/C.1/75/L.8/Rev.1Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2020). Report on the meeting of the expert group to conduct a comprehensive study on cybercrime held in Vienna from 27 to 29 July 2020. UNODC/CCPCJ/EG.4/2020/2Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2021). Report on the meeting of the expert group to conduct a comprehensive study on cybercrime held in Vienna from 6 to 8 April 2021. UNODC/CCPCJ/EG.4/2021/2Google Scholar
USCC (U.S.-China Economic and Security Review Commission). (2022). Key events and statements summarizing China’s position on Russia’s invasion of Ukraine. USCC. https://is.gd/lQ8FULGoogle Scholar
Valens, A. (2019, January 18). Mastodon is crumbling – And many blame its creator. The Daily Dot. https://is.gd/7NumhAGoogle Scholar
van der Ploeg, I. (2012). The body as data in the age of information. In Ball, K., Haggerty, K., & Lyon, D. (Eds.), Routledge handbook of surveillance studies (pp. 176183). New York: Routledge.Google Scholar
van Dijck, J. (2020). Governing digital societies: Private platforms, public values. Computer Law and Security Review, 36, 14.CrossRefGoogle Scholar
Vermeulen, J. (2022, March 1). Ramaphosa puts Internet censorship law into operation. My Broadband. https://is.gd/nHvoHbGoogle Scholar
Viitanen, J., & Kingston, R. (2014). Smart cities and green growth: Outsourcing democratic and environmental resilience to the global technology sector. Environment and Planning A, 46, 803819.CrossRefGoogle Scholar
Vipin, V. N. (2011, July 6). India calls for mechanism to promote IT adoption. https://is.gd/zgRecFGoogle Scholar
Vogel, D. (1995). Trading up: Consumer and environmental regulation in a global economy. Harvard University Press.Google Scholar
von der Leyen, U. (2020). A Union that strives for more my agenda for Europe: Political guidelines for the next European Commission 2019–2024. https://is.gd/eVZnccGoogle Scholar
W3techs.com. (2022, March 1). Usage statistics and market share of web servers, March 2022. W3techs.Com. https://is.gd/jGHWv1Google Scholar
Wade, S. (2018). Privacy concerns focus on tech firms, not government. China Digital Times. https://is.gd/CeKiLcGoogle Scholar
Wakefield, J. (2019, December 24). Russia “successfully tests” its unplugged internet. BBC News. www.bbc.com/news/technology-50902496Google Scholar
Wall Street Journal, The (WSJ). (2020). China Launches initiative to set global data-security rules. https://is.gd/ixy2avGoogle Scholar
Wallerstein, I. (1976). Semi-peripheral countries and the contemporary world crisis. Theory and Society, 3(4), 461483.CrossRefGoogle Scholar
Wang, K. (2023, June 18). China pushes for Asia-pacific trade agreement membership promises to “actively attract” foreign investment. South Morning China Post. https://is.gd/PvAu6qGoogle Scholar
Wang, M. (2021, April 8). China’s techno-authoritarianism has gone global. Washington needs to offer an alternative. Foreign Affairs. https://is.gd/86PYUSGoogle Scholar
Wang, S. (2017). 全国人民代表大会常务委员会执法检查组关于检查《中华人民共和国网络安全法》、《全国人民代表大会常务委员会关于加强网络信息保护的决定》实施情况的报告 [Report by the law enforcement inspection group on the implementation of the PRC cybersecurity law and the decision of the standing committee of the National People’s Congress on strengthening information protection on networks]. National People’s Congress Standing Committee. https://is.gd/0yTlXnGoogle Scholar
Wang, Y. (2016). 试论网络数据本地化立法的正当性 [Analysis on the justification of cyber data localization legislation]. 西安交通大学学报(社会科学版) [Journal of Xi’an Jiaotong University(Social Sciences)], 36(1), 5461.Google Scholar
Wang, Y. (2020). Upholding multilateralism, fairness and justice and promoting mutually beneficial cooperation. Keynote Speech by State Councilor and Foreign Minister Wang Yi at the International Seminar on Global Digital Governance. Beijing, September 8, 2020.Google Scholar
Wasserman, H. (2018). Power, meaning and geopolitics: Ethics as an entry point for global communication studies. Journal of Communication, 68, 441451.CrossRefGoogle Scholar
Watson, J. K. (2021). Cold war reckonings: Authoritarianism and the genres of decolonization (1st ed.). New York: Fordham University Press.Google Scholar
We Are Social. (2019). Digital in 2019. https://is.gd/mGDOo0Google Scholar
Weber, R. H., & Staiger, D. (2017). Transatlantic data protection in practice. Cham, Switzerland: Springer.CrossRefGoogle Scholar
Weber, M., Gerth, C., & Mills, W. (1948). From Max Weber: Essays in sociology. New York: Oxford University Press.Google Scholar
Webster, G. (2023). Latest publications by Graham Webster. DigiChina. https://digichina.stanford.edu/people/graham-webster/Google Scholar
Weiss, D. (2016). The new Russian legislation on blasphemy and swearing: The parliamentary debates. Zeitschrift Für Slavische Philologie, 72(2), 289321.Google Scholar
Wen, Y. (2021). The Huawei model: The rise of China’s technology giant. Urbana: University of Illinois Press.Google Scholar
Werner, W. G., & De Wilde, J. H. (2001). The endurance of sovereignty. European Journal of International Relations, 7(3), 283313.CrossRefGoogle Scholar
Weymouth, S. (2023). India’s personal data protection act and the politics of digital governance. Atlantic Council. https://is.gd/3Xb0rJGoogle Scholar
White House. (2022, May 24). Quad Joint Leaders’ Statement. The White House. https://is.gd/GsKROMGoogle Scholar
Wild, S. (2020). Citing virus misinformation, South Africa tests speech limits. Undark. https://is.gd/Uw0BwZRGoogle Scholar
Wilson, T. (2019). Huawei and African union boost relationship with deal. Financial Times. https://is.gd/PoFPy5Google Scholar
Winecoff, W. K. (2015). Structural power and the global financial crisis: A network analytical approach. Business and Politics, 17(3), 495525.CrossRefGoogle Scholar
Winseck, D. (2017). The geopolitical economy of the global Internet infrastructure. Journal of Information Policy, 7, 228267.CrossRefGoogle Scholar
Winter, B. (2013, September 12). Dilma mira empresas de Internet após espionagem dos EUA. Reuters. https://is.gd/1FESs8Google Scholar
World Bank. (2016). World development report 2016: Digital dividends. World Bank. Washington DC: World Bank.Google Scholar
World Bank. (2022a). GDP and GDP per capita. https://data.worldbank.org/Google Scholar
World Bank. (2022b). Poverty and shared prosperity 2022: Correcting course. World Bank. https://is.gd/wSuj47Google Scholar
World Economic Forum. (2019). Federated data systems: Balancing innovation and trust in the use of sensitive data. https://is.gd/2KPbttGoogle Scholar
World Health Organization. (2021). Infodemic. https://is.gd/jPvkhqGoogle Scholar
WorldoMeter. (2023). World population. www.worldometers.info/population/world/Google Scholar
World Population Review. (2023). Global North countries 2023. World Population Review. https://is.gd/wGN4ApGoogle Scholar
World Summit on the Information Society (WSIS). (2005, November 18). Tunis Agenda for the Information Society. https://is.gd/GpPpGDGoogle Scholar
World Summit on the Information Society (WSIS). (2018). Leveraging ICTs to build information and knowledge societies for achieving the sustainable development goals (SDGs). World Summit on the Information Society (WSIS) Forum 2018 Outcome Document, Geneva: International Telecommunication Union.Google Scholar
Wu, E. (2021). Sovereignty and data localization. Belfer Center. https://is.gd/XezLEmGoogle Scholar
Wu, L. (2021, April 21). China’s first lawsuit on facial recognition made verdict. CGTN. https://is.gd/UJ94MpGoogle Scholar
Xi, J. (2014, April 15). A holistic view of national security. Qiushi. https://is.gd/fB5QJRGoogle Scholar
Xi, J. (2015, December 16). Speech at the 2nd World Internet Conference Opening Ceremony. https://is.gd/7hvvTxGoogle Scholar
Xi, J. (2019, October 21). Xi: Internet a joint global responsibility. World Internet Conference. https://is.gd/J6Rr1TGoogle Scholar
Xinhua Net. (2015). 学习有方:5个词读懂习近平的网络安全新主张 [Study strategies: 5 keywords to understand President Xi’s new proposal on cyber security]. Xinhua Net. https://is.gd/w8wK0jGoogle Scholar
Xinhua News Agency. (2019, February 25). 习近平主持召开中央全面依法治国委员会第二次会议并发表重要讲话 [Xin Jinping chaired the 2nd meeting of the committee of comprehensively promoting the rule of law and gave an important address]. The State Council, The People’s Republic of China. https://is.gd/XGnmpAGoogle Scholar
Xinhua News Agency. (2020, November 17). 习近平在中央全面依法治国工作会议上强调 坚定不移走中国特色社会主义法治道路 为全面建设社会主义现代化国家提供有力法治保障 [Xi Jinping stresses the adherence to the path of the socialist rule of law with Chinese characteristics to support the comprehensive construction of socialist modernization in the meeting on comprehensively promoting the rule of law]. Xinhua News. https://is.gd/SuLDkRGoogle Scholar
Xinhua News Agency. (2021, September 17). China officially applies to join CPTPP. The State Council, The People’s Republic of China. https://is.gd/Vd4AWtGoogle Scholar
Xu, K. (2019). 数据安全法:定位、立场与制度构造 [Data security law: Location, position and institution construction]. 经贸法律评论 [Business and Economic Law Review], 2019(3), 5266.Google ScholarPubMed
Xu, W. (2021). 论次级经济制裁之阻断立法 [On blocking statutes for secondary economic sanctions]. 法商研究 [Studies in Law and Business], 38(2), 187200.Google Scholar
Xu, Y. C. (2014). Chinese state-owned enterprises in Africa: Ambassadors or freebooters? Journal of Contemporary China, 23(89), 822840.Google Scholar
Yahoo! News. (2022, March 9). Now interconnecting Brazil and Southern Europe: EllaLink and DE-CIX announce strategic partnership. Yahoo! News. https://is.gd/cPO9lYGoogle Scholar
Ye, Y. (2020). 欧盟《阻断法案》述评与启示 [Commentary on the EU blocking statutes]. 太平洋学报 [Pacific Journal], 28(3), 5066.Google Scholar
Yeung, J., Gupta, S., & Jha, M. (2021, September 28). Internet goes dark for millions in Indian state’s bid to stop exam cheats. CNN. https://is.gd/hHZ0j2Google Scholar
Yu, H. & Goodnight, T. (2020). How to think about cybersovereignty: The case of China, Chinese Journal of Communication, 13(1), 826.Google Scholar
Yurchak, A. (2013). Everything was forever, until it was no more: The last Soviet generation. Princeton University Press.CrossRefGoogle Scholar
Zakharova, L. (2020). De Moscou aux terres les plus lointaines. Communications, politique et société en URSS. EHESS.Google Scholar
Zanolli, B. (2021). Reflections on sustainability from a Quilombola women led community networks. In Belli, L. & Hadzic, S. (Eds.), Community networks: Towards sustainable funding models. Official Outcome of the IGF Dynamic Coalition on Community Connectivity. Editora FGV. www.intgovforum.org/en/filedepot_download/92/20438Google Scholar
Zasurskij, I. (2016). Novaja model’ regulirovanija avtorskih prav. Obshhestvennoe dostojanie i koncepcija obshhego blaga (A new model of copyright regulation. The public domain and the concept of the commons). Associacija Internet-izdatelej.Google Scholar
Zeng, V. (2015, December 18). Albaba’s Jack Ma sings praises of Xi’s global vision of “internet management.” Hong Kong Free Press HKFP. https://is.gd/IINJw5Google Scholar
Zhao, T. (2019). Redefining a philosophy for world governance. Singapore: Springer Singapore. https://doi.org/10.1007/978-981-13-5971-2CrossRefGoogle Scholar
Zhu, N. (2020, October 20). 我们需要一部什么样的个人信息保护法 [What kind of Personal Information Protection Law do we need?]. 法制网 [Legal Daily]. www.legaldaily.com.cn/index/content/2020-10/20/content_8332111.htmGoogle Scholar
Zhu, X., & Dai, Z. (2020). 总体国家安全观视域下《数据安全法》的价值与体系定位 [Value and the systemic positioning of the data security law from the perspective of holistic national security]. 电子政务 [E-Government], 2020(8), 8292.Google Scholar
Zittrain, J. (2003). Internet points of control. Boston College Law Review, 44, 653688.Google Scholar
Zittrain, J. (2019). Three eras of digital governance. SSRN. https://is.gd/ogO9M2CrossRefGoogle Scholar
Zondi, S. (2022). The political economy of intra-BRICS cooperation: Challenges and prospects. Palgrave Macmillan.CrossRefGoogle Scholar
Zou, S. (2020, December 16). Coding to be included in curricula. The State Council of the People’s Republic of China. https://is.gd/VTz3LDGoogle Scholar
Zuboff, S. (2019a). Surveillance capitalism and the challenge of collective action. New Labor Forum, 28(1). https://doi.org/10.1177/1095796018819461CrossRefGoogle Scholar
Zuboff, S. (2019b). The age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs.Google Scholar
Zulli, D., Liu, M., & Gehl, R. W. (2020). Rethinking the “social” in “social media”: Insights into topology, abstraction, and scale on the Mastodon social network. New Media & Society, 22(7), 11881205. https://doi.org/10.1177/1461444820912533kaCrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Edited by Min Jiang, University of North Carolina, Charlotte, Luca Belli, Fundação Getulio Vargas Law School
  • Book: Digital Sovereignty in the BRICS Countries
  • Online publication: 31 December 2024
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Edited by Min Jiang, University of North Carolina, Charlotte, Luca Belli, Fundação Getulio Vargas Law School
  • Book: Digital Sovereignty in the BRICS Countries
  • Online publication: 31 December 2024
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Edited by Min Jiang, University of North Carolina, Charlotte, Luca Belli, Fundação Getulio Vargas Law School
  • Book: Digital Sovereignty in the BRICS Countries
  • Online publication: 31 December 2024
Available formats
×