Hostname: page-component-78c5997874-4rdpn Total loading time: 0 Render date: 2024-11-13T07:49:04.480Z Has data issue: false hasContentIssue false

What Are We Talking about When We Talk about Digital Protectionism?

Published online by Cambridge University Press:  06 August 2018

SUSAN ARIEL AARONSON*
Affiliation:
Elliott School of International Affairs, George Washington University, USA
*

Abstract

For almost a decade, executives, scholars, and trade diplomats have argued that filtering, censorship, localization requirements, and domestic regulations are distorting the cross-border information flows that underpin the internet. Herein I use process tracing to examine the state and implications of digital protectionism. I make five points: First, I note that digital protectionism differs from protectionism of goods and other services. Information is intangible, highly tradable, and some information is a public good. Secondly, I argue that it will not be easy to set international rules to limit digital protectionism without shared norms and definitions. Thirdly, the US, EU, and Canada have labeled other countries policies’ protectionist, yet their arguments and actions sometimes appear hypocritical. Fourth, I discuss the challenge of Chinese failure to follow key internet governance norms. China allegedly has used a wide range of cyber strategies, including distributed denial of service (DDoS) attacks (bombarding a web site with service requests) to censor information flows and impede online market access beyond its borders. WTO members have yet to discuss this issue and the threat it poses to trade norms and rules. Finally, I note that digital protectionism may be self-defeating. I then draw conclusions and make policy recommendations.

Type
Research Article
Copyright
Copyright © Susan Ariel Aaronson 2018 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Footnotes

The project benefited from funding from the Economic Research Institute of Asia.

References

Aaronson, S. A. (2001), Taking Trade to the Streets: The Lost History of Public Efforts to Shape Globalization, Ann Arbor, MI: University of Michigan Press.Google Scholar
Aaronson, S. A. (2016a), ‘The Digital Trade Imbalance and Its Implications for Internet Governance’, Centre for International Governance Innovation, February, www.cigionline.org/sites/default/files/gcig_no25_web_0.pdf.Google Scholar
Aaronson, S. A. (2016b), ‘Digital Protectionism? Or Label the US Government Uses to Criticize Policy It Doesn't Like?’, Council on Foreign Relations, March 3, www.cfr.org/blog-post/digital-protectionism-or-label-us-government-uses-criticize-policy-it-doesnt.Google Scholar
Aaronson, S. A. (2017a), ‘What Might Have Been and Could Still Be: The Trans-Pacific Partnership's Potential to Encourage an Open Internet and Digital Rights’, Journal of Cyber Policy, 2(2): 232254.Google Scholar
Aaronson, S. A. (2017b), ‘Information Please: A Comprehensive Approach to Digital Trade Provisions in NAFTA 2.0’, Centre for International Governance Innovation, 13 November, www.cigionline.org/sites/default/files/documents/Paper%20no.154web.pdf.Google Scholar
Aaronson, S. A. (2018), ‘Artificial Intelligence Is Trade Policy's New Frontier’, Centre for International Governance Innovation, 11 January, www.cigionline.org/articles/artificial-intelligence-trade-policys-new-frontier.Google Scholar
Aaronson, S. A. and Townes, M. D. (2012), ‘Can Trade Policy Set Information Free?’, Institute for International Economic Policy, www2.gwu.edu/~iiep/signatureinitiatives/governance/taig/CanTradePolicySetInformationFreeFINAL.pdf.Google Scholar
Aaronson, S. A. and LeBlond, P. (2018), ‘Another Digital Divide: The Rise of Data Realms and Its Implications for the WTO’, Journal of International Economic Law, forthcoming.Google Scholar
Ariu, A. (2012), Services v. Goods Trade: Are They the Same? Brussels: National Bank of Belgium, www.nbb.be/doc/ts/publications/wp/wp237en.pdf.Google Scholar
Associated Press (2017), ‘China Clamping Down on Use of VPNs to Evade Great Firewall’, Business Insider, 20 July, www.businessinsider.com/ap-china-clamping-down-on-use-of-vpns-to-evade-great-firewall-2017-7.Google Scholar
Atkinson, R. D. (2017), ‘Can Nations Actually Collaborate for Growth in the Digital Economy?’, Connect-World, https://drive.google.com/file/d/1LYFZ2agJWaqwnhCoRPaJ02G8nz3GJfOm/view.Google Scholar
Baker, P. (2017), ‘Trump Abandons Trans-Pacific Partnership: Obama's Signature Trade Deal’, New York Times, 23 January, www.nytimes.com/2017/01/23/us/politics/tpp-trump-trade-nafta.html?_r=0.Google Scholar
Barefoot, K., Curtis, D., Joliff, W., Nicholson, J. R., and Omohundro, R. (2018), ‘Defining and Measuring the Digital Economy’, US Department of Commerce Bureau of Economic Analysis, Washington, DC, 15 March, www.bea.gov/digital-economy/_pdf/defining-and-measuring-the-digital-economy.pdf.Google Scholar
Bauer, M., Lee-Makiyama, H., van der Marel, E., and Verschelde, B. (2014), ‘The Costs of Data Localization: Friendly Fire on Economic Recovery’, European Centre for International Political Economy (ECIPE), http://www.ecipe.org/app/uploads/2014/12/OCC32014__1.pdf.Google Scholar
Bauer, M., Ferracane, M. F., and van der Marel, E. (2016), ‘Tracing the Economic Impact of Regulations on the Free Flow of Data and Data Localization’, Centre for International Governance Innovation, www.cigionline.org/sites/default/files/gcig_no30web_2.pdf.Google Scholar
Beach, D. and Pedersen, R. B. (2013), Process-Tracing Methods: Foundations and Guidelines, Ann Arbor, MI: University of Michigan Press.Google Scholar
Beaumont, C. (2010), ‘Foursquare Blocked in China’, The Telegraph, 4 June, www.telegraph.co.uk/technology/social-media/7802992/Foursquare-blocked-in-China.html.Google Scholar
Berry, R. and Reisman, M. (2012), Policy Challenges of Cross Border Cloud Computing, US International Trade Commission, www.usitc.gov/research_and_analysis/documents/Final_Cloud_Computing_Seminar_61912_0.pdf.Google Scholar
Biggs, J. (2007), ‘China Declares War on Western Search Sites’, TechCrunch, 18 October, https://techcrunch.com/2007/10/18/cyberwar-china-declares-war-on-western-search-sites/.Google Scholar
Bildt, C. (2012), ‘A Victory for the Internet’, New York Times, 5 July, www.nytimes.com/2012/07/06/opinion/carl-bildt-a-victory-for-the-Internet.html.Google Scholar
Blaney, M. (2015), ‘MEPS Make Recommendations on Digital Single Market Strategy’, 23 November, www.screendaily.com/news/meps-make-recommendations-on-dsm-strategy/5097228.article.Google Scholar
Borchers, C. (2017), ‘Trump's FCC Chairman Is Pitching Internet Deregulation as a Return to Bill Clinton's Policy’, Washington Post, 27 November, www.washingtonpost.com/news/thefix/wp/2017/11/27/trumps-fcc-chairman-is-pitching-internet-deregulation-as-a-return-to-bill-clintons-policy/?utm_term=.9983da130554.Google Scholar
Box, S. (2016), ‘Internet Openness and Fragmentation: Toward Measuring the Economic Effects’, Centre for International Governance Innovation, May.Google Scholar
Burgman, P. R. Jr. (2016), ‘Securing Cyberspace: China Leading the Way in Cyber Sovereignty’, The Diplomat, 18 May, http://thediplomat.com/2016/05/securing-cyberspace-china-leading-the-way-in-cyber-sovereignty/.Google Scholar
Burri, M. (2013), Should There be New Multilateral Rules for Digital Trade? Think Piece for the E15 Expert Group on Trade and Innovation, Geneva: International Centre for Trade and Sustainable Development (ICTSD) and World Economic Forum, December, http://e15initiative.org/wp-content/uploads/2015/09/E15-Innovation-Burri-FINAL.pdf.Google Scholar
Calinoff, J. ‘Beijing's Foreign Internet Purge’, Foreign Policy, 15 January 2010, http://foreignpolicy.com/2010/01/15/beijings-foreign-internet-purge/.Google Scholar
Chan, C., Dao, A., Hou, J., Jin, T., and Tuong, C. (2011), ‘US Censorship’, Free Speech vs. Maintaining Social Cohesion, https://cs.stanford.edu/people/eroberts/cs181/projects/2010-11/FreeExpressionVsSocialCohesion/us_policy.html.Google Scholar
Chander, A. and Le, Uyen P. (2014), ‘Breaking the Web: Data Localization vs. the Global Internet’, Emory Law Journal, https://ssrn.com/abstract=2407858orhttp://dx.doi.org/10.2139/ssrn.2407858.Google Scholar
Chander, A. (2015), ‘Data Nationalism’, Emory Law Journal, 64(3), https://ssrn.com/abstract=2577947.Google Scholar
Chu, Cho-Wen (2017), ‘Censorship or Protectionism? Reassessing China's Regulation of Internet Industry’, International Journal of Social Sciences and Humanity, 7(1).Google Scholar
Ciuriak, D. and Ptashkina, M. (2018), The Digital Transformation and the Transformation of International Trade, Geneva: International Centre for Trade and Sustainable Development and Inter-American Development Bank, http://e15initiative.org/wp-content/uploads/2015/09/RTA-Exchange-Digital-Trade-Ciuriak-and-Ptashkina-Final.pdf.Google Scholar
Clark, J., Faris, R., Morrison-Westphal, R., Noman, H., Tilton, C., and Zittrain, J. (2017), ‘The Shifting Landscape of Global Internet Censorship’, Berkman Klein Center for Internet & Society Research Publication, June, http://nrs.harvard.edu/urn-3:HUL.InstRepos:33084425.Google Scholar
Computer and Communications Industry Association (2008), Internet Censorship and Online Freedom.Google Scholar
Cory, N. (2017), ‘Cross-Border Data Flows: Where Are the Barriers, and What Do They Cost? Information Technology and Innovation Foundation’, May, https://itif.org/publications/2017/05/01/cross-border-data-flows-where-are-barriers-and-what-do-they-cost.Google Scholar
Cory, N. (2018), ‘The Global Rise of “Data Localism”’. BRINK, 31 January, www.brinknews.com/the-global-rise-of-data-localism/.Google Scholar
Daigle, L. (2015), ‘On the Nature of the Internet’, Centre for International Governance Innovation.Google Scholar
Davidow, B. (2012), ‘The Tragedy of the Internet Commons’, The Atlantic, 18 May, www.theatlantic.com/technology/archive/2012/05/the-tragedy-of-the-internet-commons/257290/.Google Scholar
Defense Science Board (2013), ‘Task Force Report: Resilient Military Systems and the Advanced Cyber Threat”’. United States Department of Defense, January, www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf.Google Scholar
de la Chapelle, B. and Fehlinger, P. (2016), ‘Jurisdiction on the Internet: From Legal Arms Race to Transnational Cooperation’, Centre for International Governance Innovation, 1 April.Google Scholar
Drake, W., Cerf, V., and Kleinwächter, W. (2016), ‘Internet Fragmentation: An Overview’, World Economic Forum, www3.weforum.org/docs/WEF_FII_Internet_Fragmentation_An_Overview_2016.pdf.Google Scholar
Elms, D. (2017), ‘Moving Ahead with the TPP 11’, Asian Trade Centre, 11 January, www.asiantradecentre.org/talkingtrade//moving-ahead-with-the-tpp11.Google Scholar
Erixon, F. and Lee-Makiyama, H. (2010), ‘Chinese Censorship Equals Protectionism’, The Wall Street Journal, 6 January, www.wsj.com/articles/SB10001424052748704842604574641620942668590.Google Scholar
Erixon, F., Hindley, B., and Lee-Makiyama, H. (2009), ‘Protectionism Online: Internet Censorship and International Trade Law’, European Centre for Political Economy (ECIPE), http://ecipe.org/app/uploads/2014/12/protectionism-online-internet-censorship-and-international-trade-law.pdf.Google Scholar
European Commission (2015a), Trade and Investment Barriers Report 2015, COM(2015) 127, http://trade.ec.europa.eu/doclib/docs/2015/march/tradoc_153259.pdf.Google Scholar
European Commission (2016), Report from the Commission to the Council and the European Parliament on Trade and Investment Barriers and Protectionist Trends 1 July 201431 December 2015, SWD (2016) 204, http://trade.ec.europa.eu/doclib/docs/2016/june/tradoc_154665.pdf.Google Scholar
European Commission (2017a), Report from the Commission to the European Parliament and the Council on Trade and Investment Barriers 1 January–31 December 2016, http://trade.ec.europa.eu/doclib/docs/2017/june/tradoc_155642.pdf.Google Scholar
European Commission (2017b), Proposal for a Regulation of the European Parliament and of the Council Concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and Repealing Directive 2002/58/EC (Regulation on Privacy and Electronic Communications), COM 2017/0003, https://goo.gl/Saevs4.Google Scholar
European Commission (2017c), ‘EU–Mexico Free Trade Agreement: EU Textual Proposal on Digital Trade’, April, https://ec.europa.eu/digital-single-market/en/proposal-eprivacy-regulation.Google Scholar
European Commission (2018a), ‘Horizontal Provisions for Cross-border Data Flows and for Personal Data Protection (in EU trade and Investment Agreements)’, www.politico.eu/wp-content/uploads/2018/02/Data-flow-provisions-POLITICO.pdf.Google Scholar
European Commission (2018b), EU-DG Trade, Modernization of EU GA, Digital Trade, http://trade.ec.europa.eu/doclib/docs/2018/april/tradoc_156811.pdf.Google Scholar
Fefer, R., Akhtar, S. I., and Morrison, W. M. (2017), ‘Digital Trade and US Trade Policy’, CRS Report No. R44565), Congressional Research Service, Washington, DC.Google Scholar
Federal Ministry for Economic Affairs and Energy (2017), G20 Digital Economy Ministerial Declaration, www.g20.utoronto.ca/2017/g20-digital-economy-ministerial-declaration-english-version.pdf.Google Scholar
Financial Times. ‘Digital Protectionism and National Security: Where Are the Limits of Government Interference in the Tech Industry? 26 March 2018, www.ft.com/content/112e233c-2912-11e8-b27e-cc62a39d57a0.Google Scholar
Fleischer, P. (2016), ‘Adapting Our Approach to the European Right to Be Forgotten’, Google, 4 March, www.blog.google/topics/google-europe/adapting-our-approach-to-european-rig/.Google Scholar
Fortnam, B. (2017a), ‘Canada Expected to Stand Firm on Maintaining “Cultural Carveout” in NAFTA’, Inside US Trade, 3 August, https://insidetrade.com/daily-news/canada-expected-stand-firm-maintaining-cultural-carveout-nafta.Google Scholar
Fortnam, B. (2017b), ‘EU Punts on Data Flow Language in Japan Deal, Leaving Position Unresolved’, Inside US Trade, 6 July, https://insidetrade.com/inside-us-trade/eu-punts-data-flow-language-japan-deal-leaving-position-unresolved.Google Scholar
Fortnam, B. (2017c), ‘Japan Urges EU to Develop Data Flow Provisions Despite Political Agreement on FTA’, Inside US Trade, 7 July, https://insidetrade.com/daily-news/japan-urges-eu-develop-data-flow-provisions-despite-political-agreement-fta.Google Scholar
Froman, M. United States Trade Representative (2017), Trade, Growth, and Jobs: US Trade Policy in the Obama Administration, Washington, DC: Executive Office of the President.Google Scholar
Gao, H. S. (2011), ‘Google's China Problem: A Case Study on Trade, Technology and Human Rights under the GATS’, Asian Journal of WTO & International Health Law and Policy, 6: 347385.Google Scholar
Geist, M. (2017), ‘Global Internet Takedown Orders Come to Canada as the Supreme Court Upholds International Removal of Google's Search Results’, 28 June, www.michaelgeist.ca/2017/06/global-internet-takedown-orders-come-canada-supreme-court-upholds-international-removal-google-search-results/.Google Scholar
Goldfarb, D. (2011), ‘Canada's Trade in a Digital World’, The Conference Board of Canada, April, www.conferenceboard.ca/reports/briefings/tradingdigitally/default.aspx.Google Scholar
Goldman, E. (2011), ‘The OPEN Act: Significantly Flawed, but More Salvageable than SOPA/PROTECT-IP’, Ars Technica, 12 December, https://arstechnica.com/tech-policy/2011/12/the-open-act-significantly-flawed-but-more-salvageable-than-sopaprotect-ip/.Google Scholar
Goldsmith, J. and Wu, T. (2006), Who Controls the Internet? Illusions of a Borderless World, New York: Oxford University Press.Google Scholar
Google (2010), ‘Enabling Trade in the Era of Information Technologies: Breaking Down Barriers to the Free Flow of Information’, https://static.googleusercontent.com/media/www.google.com/en//googleblogs/pdfs/trade_free_flow_of_information.pdf.Google Scholar
Graham, R. (2015), ‘Pin-Pointing China's Attack against GitHub’, Errata Security, 1 April, http://blog.erratasec.com/2015/04/pin-pointing-chinas-attack-against.html?m=1.Google Scholar
Haas, B. (2017), ‘Chinese Official Calls for Easing of Internet Censorship’, The Guardian, 3 March, www.theguardian.com/world/2017/mar/04/chinese-official-slams-internet-censorship.Google Scholar
Hamilton, D. S. and Quinlan, J. P. (2016), ‘The Transatlantic Economy 2016: Annual Survey of Jobs, Trade and Investment between the United States and Europe’, Center for Transatlantic Relations, Washington, DC, www.transatlanticbusiness.org/wp-content/uploads/2014/05/160301-TAE-FULL-BOOK.pdf.Google Scholar
Hill, J. F. (2014), ‘The Growth of Data Localization Post Snowden: Analysis and Recommendations for US Policymakers and Industry Leaders’, Lawfare Research Paper Series, 2(3), https://lawfare.s3-us-west-2.amazonaws.com/staging/Lawfare-Research-Paper-Series-Vol2No3.pdf.Google Scholar
Hill, J. F. and Noyes, M. (2018), ‘Rethinking Data Geography and Jurisdiction: Towards a Common Framework for Harmonizing Global Data Flow Controls’, New America, 22 February, https://goo.gl/BHbg38.Google Scholar
Hjelmvik, E. (2015), ‘China's Man-on-the-Side Attack on GitHub’, Netresec.com, 31 March, www.netresec.com/?page=Blog&month=2015-03&post=China%27s-Man-on-the-Side-Attack-on-GitHub.Google Scholar
Hern, A. (2014), ‘Wikipedia Swears to Fight “Censorship” of “Right to Be Forgotten” Ruling’, The Guardian, August, wwwkipedia-censorship-right-to-be-forgotten-ruling.Google Scholar
Hindley, B. (1988), ‘Service Sector Protection: Considerations for Developing Countries’, The World Bank Economic Review, 3(2): 205224, http://documents.worldbank.org/curated/en/504431468739778099/pdf/multi-page.pdf.Google Scholar
Hoagland, I. and Caporal, J. (2017), ‘Lawmakers, Analysts Underwhelmed by USTR's NAFTA Digital Trade Objectives’, Inside US Trade, 20 July, https://insidetrade.com/inside-us-trade/lawmakers-analysts-underwhelmed-ustrs-nafta-digital-trade-objectives.Google Scholar
Hulcoop, A., Scott-Railton, J., Tanchak, P., Brooks, M., and Deibert, R. (2017), ‘Tainted Leaks: Disinformation and Phishing with a Russian Nexus’, The Citizen Lab, 25 May, https://citizenlab.org/2017/05/tainted-leaks-disinformation-phish/.Google Scholar
Ikenson, D. J. (2017), ‘Cybersecurity or Protectionism? Defusing the Most Volatile Issue in the US–China Relationship’, CATO Institute, 13 July, www.cato.org/publications/policy-analysis/cybersecurity-or-protectionism-defusing-most-volatile-issue-us-china.Google Scholar
Institute for Government (UK) (2017), Data Adequacy, 24 August, www.instituteforgovernment.org.uk/explainers/data-adequacy.Google Scholar
Internet and Jurisdiction (2017), ‘Cross-Border Content Takedowns Across Jurisdiction’, www.internetjurisdiction.net/uploads/pdfs/Papers/Content-Jurisdiction-Program-Paper.pdf.Google Scholar
Irwin, D. (1996), Against the Tide: An Intellectual history of Free Trade, Princeton, NJ: Princeton University Press.Google Scholar
Jiang, S. (2017), ‘China Holds Drill to Shut Down “Harmful” Websites’, Reuters, 3 August, www.reuters.com/article/us-china-internet-idUSKBN1AJ1XL.Google Scholar
Kawanmoto, D. (2017), ‘Chinese Telecom DDoS Attack Breaks Record’, Dark Reading, 2 August, www.darkreading.com/attacks-breaches/chinese-telecom-ddos-attack-breaks-record-/d/d- id/1329518?Google Scholar
Khan, A. W. (2009), ‘Universal Access to Knowledge as a Global Public Good’, Global Policy Forum, June, www.globalpolicy.org/social-and-economic-policy/global-public-goods-1-101/50437-universal-access-to-knowledge-as-a-global-public-good.html.Google Scholar
Kravets, D. (2017), ‘Facebook, Google, Twitter Tell Congress Their Platforms Spread Russian-Backed Propaganda’, Arstechnica.com, 31 October, https://arstechnica.com/tech- policy/2017/10/facebook-google-and-twitter-tell-congress-they-spread-russian-propaganda/.Google Scholar
Krebs, B. (2016), ‘The Democratization of Censorship’, Krebs on Security, 16 September, krebsonsecurity.com/2016/09/the-democratization-of-censorship/.Google Scholar
Lee-Makiyama, H. (2011), ‘Future-Proofing World Trade in Technology: Turning the WTO IT Agreement (ITA) into the International Digital Economy Agreement (IDEA)’, Aussenwirtschaft, 3.Google Scholar
Lopez Gonzalez, J., Messent, J., Rentzhog, M., Flaig, D., Jouanjean, M.-A., and Walkenhorst, P. (2016), ‘Localising Data in a Globalised World’, Organisation for Economic Co-operation and Development, http://unctad.org/meetings/es/Presentation/dtl_eweek2016_JLopez-Gonzalez.pdf.Google Scholar
Mackey, A., McSherry, C., and Ranieri, V. (2017), ‘Top Canadian Court Permits Worldwide Internet Censorship’, Electronic Frontier Foundation, 28 June, www.eff.org/deeplinks/2017/06/top-canadian-court-permits-worldwide-internet-censorship.Google Scholar
Malmström, C. (2016), ‘Trade in a Digital World’, Speech, Conference on Digital Trade, European Parliament. European Commission, Brussels, Belgium, 17 November 2016, http://trade.ec.europa.eu/doclib/docs/2016/november/tradoc_155094.pdf.Google Scholar
Manjoo, F. (2015), ‘The Right to be Forgotten Online is Poised to Spread’, New York Times, 5 August, www.nytimes.com/2015/08/06/technology/personaltech/right-to-be-forgotten-online-is-poised-to-spread.html?_r=0.Google Scholar
Manyika, J., Lund, S., Bughin, J., Woetzel, J., Stamenov, K., and Dhingra, D. (2016), ‘Digital Globalization: The New Era of Global Flows’, McKinsey Global Institute, www.mckinsey.com/business-functions/digital-mckinsey/our-insights/digitalglobalization-the-new-era-of-global-flows.Google Scholar
Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, D., McKune, S., Rey, A., Scott-Railton, J., Deibert, R., and Paxxson, V. (2015), ‘An Analysis of China's “Great Cannon”’, Foci 15 Conference, www.usenix.org/system/files/conference/foci15/foci15- paper-marczak.pdf.Google Scholar
Maskus, K. E. and Reichman, J. H. (2004), ‘The Globalization of Public Knowledge Goods and the Privatization of Global Public Goods’, Journal of International Economic Law, 7(2): 279320.Google Scholar
Mattoo, A. and Schuknecht, L. (2000), ‘Trade Policies for Electronic Commerce’, World Bank Group, http://elibrary.worldbank.org/doi/pdf/10.1596/1813-9450-2380.Google Scholar
McAuley, J. (2018), ‘France Weighs a Law to Rein in “Fake News”, Raising Fears for Freedom of Speech’, The Washington Post, 10 January, www.washingtonpost.com/world/europe/france-weighs-a-law-to-rein-in-fake-news-raising-fears-for-freedom-of-speech/2018/01/10/78256962-f558-11e7-9af7a50bc3300042_story.html?utm_term=.40f0ac086662.Google Scholar
McGee, R. W. (1996), ‘The Philosophy of Trade Protectionism, Its Costs and Its Implications’, SSRN Policy Analysis,10 (July), http://dx.doi.org/10.2139/ssrn.91369.Google Scholar
McKenna, B. (2013), ‘Businesses Push for Freedom to Share Personal Data Across Borders’, The Globe and Mail, 7 July, www.theglobeandmail.com/report-on-business/economy/businesses-push-for-freedom-to-share-personal-data-across-borders/article13054771/.Google Scholar
McLaughlin, A. (2007), ‘Censorship as Trade Barrier’, Google Public Policy Blog, 22 June, https://publicpolicy.googleblog.com/2007/06/censorship-as-trade-barrier.html.Google Scholar
Mozur, P. and Scott, M. (2016), ‘Fake News in US Election? Elsewhere, That's Nothing New’, New York Times, 16 November, https://goo.gl/ZHn3q7.Google Scholar
Mozur, P. (2017), ‘Apple Removes Apps from China Store that Help Internet Users Evade Censorship’, New York Times, 30 July, www.nytimes.com/2017/07/30/technology/china-apple-censorhip.html?action=click&contentCollection=Business%20Day&module=RelatedCoverage&region=Marginalia&pgtype=article.Google Scholar
Myers, S. L. and Wee, S.-L. (2017), ‘As US Confronts Internet's Disruptions, China Feels Vindicated’, New York Times, 16 October 16, www.nytimes.com/2017/10/16/world/asia/china-internet-cyber-control.html.Google Scholar
National Foreign Trade Council (NFTC) (2010), ‘Promoting Cross-Border Data Flows: Priorities for the Business Community’, www.nftc.org/default/Innovation/PromotingCrossBorderDataFlowsNFTC.pdf.Google Scholar
Nicholson, J. R. and Noonan, R. (2014), Digital Economy and Cross-Border Trade: The Value of Digitally Deliverable Services, Washington, DC: US Department of Commerce, http://esa.doc.gov/sites/default/files/digitaleconomyandcross-bordertrade.pdf.Google Scholar
Obama, Barack (2015), ‘Fact Sheet: How the Trans-Pacific Partnership (TPP) Boosts Made in America Exports, Supports Higher-Paying American Jobs, and Protects American Workers’, White House, 5 October, https://obamawhitehouse.archives.gov/the-press-office/2015/10/05/fact-sheet-how-trans-pacific-partnership-tpp-boosts-made-america-exports.Google Scholar
Office of the Special Trade Representative (now USTR) (1982), A Preface to Trade, Washington, DC: US Government Printing Office.Google Scholar
Organisation for Economic Co-operation and Development (OECD) (2011), ‘The Economic Impact of Shutting Down Internet and Mobile Phone Services in Egypt’, 4 February, www.oecd.org/countries/egypt/theeconomicimpactofshuttingdownInternetandmobilephoneservicesinegypt.htm.Google Scholar
Organisation for Economic Co-operation and Development (OECD) (2015), ‘Emerging Policy Issues: Localisation Barriers to Trade’, TAD/TC/WP(2014)17/FINAL, http://www.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=TAD/TC/WP(2014)17/FINAL&docLanguage=En.Google Scholar
Organisation for Economic Co-operation and Development (OECD) (2016), ‘Economic and Social Benefits of Internet Openness’, OECD Digital Economy Papers 257, http://www.oecd-ilibrary.org/docserver/download/5jlwqf2r97g5-en.pdf?expires=1522148375&id=id&accname=guest&checksum=8CEF222DA9DD2CE7019A22B17B95BD56.Google Scholar
Organisation for Economic Co-operation and Development (OECD) (2017), Measuring Digital Trade: Towards a Conceptual Framework, OECD/CSSP/WPTGS(2017)3, https://goo.gl/VwRv5L.Google Scholar
Organisation for Economic Co-operation and Development (OECD) and International Monetary Fund (IMF) (2017), Measuring Digital Trade: Results of OECD/IMF Stocktaking Survey, BOPCLOm-17/07, Paris, France: International Monetary Fund, www.imf.org/external/pubs/ft/bop/2017/pdf/17-07.pdf.Google Scholar
Owen, T. (2018), ‘Ungoverned Space: How Surveillance Capitalism and AI Undermine Democracy’, Centre for International Governance Innovation, March 20, www.cigionline.org/articles/ungoverned-space.Google Scholar
Perlroth, N. (2015), ‘China Is Said to Use Powerful New Weapon to Censor Internet’, New York Times, 10 April, www.nytimes.com/2015/04/11/technology/china-is-said-to-use-powerful-new-weapon-to-censor-internet.html.Google Scholar
Perlroth, N. (2016), ‘Hackers Used New Weapons to Disrupt Major Websites Across US’, New York Times, 21 October, www.nytimes.com/2016/10/22/business/internet-problems-attack.html.Google Scholar
Pickrell, E. (2017), ‘Renegotiated NAFTA Might Help Bridge Mexico–US Privacy Issues’, Bloomberg Law, 4 May, www.bna.com/renegotiated-nafta-help-n57982087521/.Google Scholar
Poulsen, K. (2017), ‘Russia Turns WikilLeaks CIA Dump Into Disinformation’, Daily Beast, 8 March, www.thedailybeast.com/articles/2017/03/08/who-s-behind-the-massive-cia-leak.Google Scholar
Reventlow, N. J. (2017), ‘The French Court Case that Threatens to Bring the “Right to be Forgotten’”, NetPolitics, 19 April, www.cfr.org/blog/french-court-case-threatens-bring-right-be-forgotten-everywherere.Google Scholar
Riley, D. (2007), ‘Baidu Hijacking Google Traffic In China’, TechCrunch, 18 October, https://techcrunch.com/2007/10/18/baidu-hijacking-google-traffic-in-china/.Google Scholar
Rugaber, C. S. (2007), ‘Google Asks Gov't to Fight Censorship’, USA Today, 22 June, https://usatoday30.usatoday.com/tech/products/2007-06-22-2859711256_x.htm.Google Scholar
Schaake, M. (2015), ‘MEPs Statement on Digital Protectionism’, 22 September, www.marietjeschaake.eu/wp-content/uploads/2015/09/2015-09-22-MEPs-Statement-on-Digital-Protectionism.pdf.Google Scholar
Schaake, M. (2017), ‘Working Document, Towards a Digital Trade Strategy’, 20 June, https://marietjeschaake.eu/en/towards-a-digital-trade-strategy.Google Scholar
Schneier, B. (2016), ‘Someone Is Learning How to Take Down the Internet’, The Lawfare Institute, 13 September, www.lawfareblog.com/someone-learning-how-take-down-internet.Google Scholar
Schia, N. N. and Gjesvik, L. (2017), ‘China's Cyber Sovereignty’, Norwegian Institute of International Affairs, www.jstor.org/stable/resrep07952?seq=1#page_scan_tab_contents.Google Scholar
Schruers, M. (2015), Commercial Espionage and Barriers to Digital Trade in China: Testimony before the USChina Economic and Security Review Commission, 114th Cong. 15 June 2015, www.ccianet.org/wp-content/uploads/2015/06/Barriers-to-Digital-Trade-in-China-Testimony-6.15.15.pdf.Google Scholar
Scott, M. (2017), ‘Facebook's Role in European Elections Under Scrutiny’, New York Times, 7 June, https://goo.gl/XTVTTr.Google Scholar
Sen, N. (2017), ‘Trade in the Digital Economy: Understanding the role of WTO in international data flows’, Paper presented at the WTO MC11 Think Conference, Buenos Aires, 13 December 2017.Google Scholar
Solon, O. (2014), ‘EU “Right to be Forgotten” Ruling Paves Way For Censorship’, Wired, 13 May 13, www.wired.co.uk/article/right-to-be-forgotten-blog.Google Scholar
South China Morning Post (2015), ‘China's “Great Cannon” Programme Has Been in Development for about a Year, Sources Say’, South China Morning Post, 12 April, www.scmp.com/news/china/article/1764378/chinas-great-cannon-programme-has-been-development-about-year-sources-say.Google Scholar
Statista, (2017), ‘Market Capitalization of the Largest Internet Companies Worldwide as of May 2017 (in billion US dollars)’, www.statista.com/statistics/277483/market-value-of-the-largest-internet-companies-worldwide/.Google Scholar
Stewart, N. (2017), ‘We Need a Grown-Up Debate on Data Localisation Rules without Self-Interest on Show’, Diginomica, 8 May, http://diginomica.com/2017/05/08/need-grown-debate-data- localisation-rules-without-self-interest-show/.Google Scholar
Tietje, C. (2011), Global Information LawSome Systemic Thoughts, Halle and Wittenberg, Saxony-Anhalt, Germany: Martin Luther University Halle-Wittenberg, http://telc.jura.uni-halle.de/sites/default/files/BeitraegeTWR/Heft%20107.pdf.Google Scholar
Toobin, J. (2014), ‘The Solace of Oblivion – In Europe, the Right to be Forgotten Trumps the Internet’, Annals of Law, The New Yorker, 29 September 29, www.newyorker.com/magazine/2014/09/29/solace-oblivion.Google Scholar
Tufekci, Z. (2018), ‘Facebook's Surveillance Machine’, New York Times, 18 March, www.nytimes.com/2018/03/19/opinion/facebook-cambridge-analytica.html.Google Scholar
Turton, W. (2016), ‘This Is Why Half the Internet Shut Down Today’, Gizmodo, 21 October, http://gizmodo.com/this-is-probably-why-half-the-internet-shut-down-today-1788062835.Google Scholar
UNCTAD (2015), ‘Cyberlaws and Regulations for Enhancing E-Commerce: Case Studies and Lessons Learned’, TD/B/C.II/EM.5/2, 14 January,htt p://unctad.org/meetings/en/SessionalDocuments/ciiem5d2_en.pdf.Google Scholar
UNESCO (2016), ‘China, India Now World's Largest Internet Markets’, 15 September 15, http://www.unesco.org/new/en/media-services/single view/news/china_india_now_worlds_largest_internet_markets/.Google Scholar
US–China Economic and Security Review Commission (USCC) (2015), Commercial Cyber Espionage and Barriers to Digital Trade.Google Scholar
US–China Economic and Security Review Commission (USCC) (2008a), ‘Hearing: Access to Information and Media Control in the People's Republic of China’, 110th Cong. 2 (2008) (statement of Ronald J. Deibert, Citizen Lab Director), www.uscc.gov/sites/default/files/6.18.08%20Deibert.pdf.Google Scholar
US–China Economic and Security Review Commission (USCC) (2008b), ‘Hearing: Access to Information and Media Control in the People's Republic of China, 110th Cong. 2 (2008) (statement of Gilbert Kaplan, King & Spalding LLP), www.uscc.gov/sites/default/files/6.18.08Kaplan.pdf.Google Scholar
US International Trade Commission (USITC) (2013), Digital Trade in the US and Global Economies, Part 1, Investigation No. 332-532, www.usitc.gov/publications/332/pub4415.pdf.Google Scholar
US International Trade Commission (USITC) (2014), Digital Trade in the US and Global Economies, Part 2, Investigation No. 332-540, Publication 4485, September, www.usitc.gov/publications/332/pub4485.pdf.Google Scholar
United States Trade Representative (USTR) (2011), ‘United States Seeks Detailed Information on China's Internet Restrictions’, https://ustr.gov/about-us/policy-offices/press-office/press-releases/2011/october/united-states-seeks-detailed-information-china%E2%80%99s-i.Google Scholar
United States Trade Representative (USTR) (2014) 2014 National Trade Estimate Report on Trade Barriers, Washington, DC: United States Trade Representative, https://ustr.gov/about-us/policy-offices/press-office/reports-and-publications/2014-NTE-Report.Google Scholar
United States Trade Representative (USTR) (2015), 2015 National Trade Estimate Report on Trade Barriers, Washington, DC: United States Trade Representative, https://ustr.gov/about-us/policy-offices/press-office/reports-and-publications/2015/2015-national-trade-estimate.Google Scholar
United States Trade Representative (USTR) (2016a), ‘The Trans-Pacific Partnership’, https://ustr.gov/sites/default/files/TPP-Promoting-Digital-Trade-Fact-Sheet.pdf.Google Scholar
United States Trade Representative (USTR) (2016b), 2016 National Trade Estimate Report on Trade Barriers, Washington, DC: United States Trade Representative, https://ustr.gov/about-us/policy-offices/press-office/reports-and-publications/2016/2016-national-trade-estimate.Google Scholar
United States Trade Representative (USTR) (2017a), 2017 National Trade Estimate Report on Trade Barriers, Washington, DC: Office of the United States Trade Representative, https://ustr.gov/about-us/policy-offices/press-office/reports-and-publications/2017/2017-national-trade-estimate.Google Scholar
United States Trade Representative (USTR) (2017b), ‘Summary of Objectives for the NAFTA Renegotiations’, United States Trade Representative, Washington, DC, https://ustr.gov/sites/default/files/files/Press/Releases/Nov%20Objectives%20Update.pdf.Google Scholar
Valeriano, B. (2016), ‘The Rise of Cyber Repression’, Defense One, 13 January, www.defenseone.com/ideas/2016/01/rise-cyber-repression/125095/.Google Scholar
West, D. M. (2016), ‘Internet Shutdowns Cost Countries $2.4 billion Last Year’, Brookings Institution, October, www.brookings.edu/wp-content/uploads/2016/10/intenet-shutdowns-v-3.pdf.Google Scholar
West, D. M. (2017), ‘How to Combat Fake News and Disinformation’, Brookings Institution, 18 December, www.brookings.edu/research/how-to-combat-fake-news-and-disinformation/.Google Scholar
World Bank (2016), ‘World Development Report 2016: Digital Dividends’, http://www.worldbank.org/en/publication/wdr2016.Google Scholar
World Trade Organization (WTO) (2011), ‘Communication from the United States – Work Program on Electronic Commerce: Ensuring that Trade Rules Support Innovative Advances in Computer Applications and Platforms such as Mobile applications and the Provision of Cloud Computing Services’, S/C/W/339, Council for Trade in Services, 20 September.Google Scholar
World Trade Organization (WTO) (2016), World Trade Statistical Review 2016, www.wto.org/english/res_e/statis_e/wts2016_e/wts2016_e.pdf.Google Scholar
World Trade Organization (WTO) (2017a), ‘Members Debate Cyber Security and Chemicals at Technical Barriers to Trade Committee’, 14–15 June, www.wto.org/english/news_e/news17_e/tbt_20jun17_e.htm.Google Scholar
World Trade Organization (WTO) (2017b), Work Programme on Electronic Commerce, Mininstrial Decision of 13 DECEMBER 2017, WT/MIN(17)/65 WT/L/1032, 18 December 2017, www.wto.org/english/tratop_e/ecom_e/ecom_e.htm.Google Scholar
World Trade Organization (WTO) (2018), WTO Council for Trade in Services, Report of the Meeting Held on 2 March 2018, Note by the Secretariat, S/C/M/134, 5 April 2018.Google Scholar
Wu, T. (2006), ‘The World Trade Law of Censorship and Internet Filtering’, Chicago Journal of International Law, 7(1), http://chicagounbound.uchicago.edu/cjil/vol7/iss1/12.Google Scholar
Wunsch-Vincent, S. (2006), ‘The Internet, Cross-Border Trade in Services and the GATS: Lessons from US Gambling’, World Trade Review, 5(3): 319355.Google Scholar
Xu, B. and Albert, E. (2017), ‘Media Censorship in China: Council on Foreign Relations’, 17 February, www.cfr.org/backgrounder/media-censorship-china.Google Scholar
Yaxley, L. (2018), ‘TPP Resurrected: Here's What's in the Latest Trans-Pacific Partnership Trade Deal and What It Means for You’, ABC News, 25 January, www.abc.net.au/news/2018-01-24/what-is-the-new-tpp-and-what-does-it-mean-for-australia/9357020.Google Scholar
Zetter, K. (2016), ‘The Biggest Security Threats We'll Face in 2016’, Wired, 1 January, www.wired.com/2016/01/the-biggest-security-threats-well-face-in-2016/.Google Scholar