Hostname: page-component-745bb68f8f-lrblm Total loading time: 0 Render date: 2025-01-23T12:18:20.272Z Has data issue: false hasContentIssue false

The Transmutation of Sovereignty: Digital “World of Warcraft” and Innovation in the Chinese Legal Order

Published online by Cambridge University Press:  22 January 2025

Weidong Ji*
Affiliation:
China Institute for Socio-Legal Studies, Shanghai Jiao Tong University, China

Abstract

This article analyses the paradoxical relationship between the relative decline and resurgence of national sovereignty in the context of economic and informational globalisation, the rise of mega-platforms, the sovereign individuals hidden within blockchains, and large model behemoths free from the feature design of programming. It highlights how the decline of sovereignty has given rise to concepts such as “the digital sovereignty” in Europe and “the sovereign blockchain” in China, while the resurgence of sovereignty has led to theories like the “surveillance society” in North America and the “electronic forbidding leave” metaphor in China. In any case, with the AI-driven era, “the Algorithmic Leviathan” is becoming an extremely powerful dominating force that countries and laws must confront. To prevent its runaway abuse, it is necessary to consolidate a basic consensus through global digital compacts and institutionalise it through legal and technical due process—this is the essence of the digital rule of law.

Type
Research Article
Copyright
© The Author(s), 2025. Published by Cambridge University Press on behalf of Asian Journal of Law and Society

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Bodin, J. (2008). Zhuquan Lun [The theory of sovereignty], in Franklin, J. H. (ed.), Translated by Li, W. H. and Qian, J. W. Beijing: Peking University Press.Google Scholar
Brynjolfsson, E. and McAfee, A. (2017). The business of artificial intelligence. Available at: https://hbr.org/2017/07/the-business-of-artificial-intelligence (Accessed: 9 October 2024).Google Scholar
Burwell, F. G. and Propp, K. (2022). Digital sovereignty in practice: The EU’s push to shape the new global economy. Available at: https://www.atlanticcouncil.org/wp-content/uploads/2022/11/Digital-sovereignty-in-practice-The-EUs-push-to-shape-the-new-global-economy_.pdf (Accessed: 15 August 2024).Google Scholar
China Society for Human Rights Studies. (2001). Lun renquan yu zhuquan: Jianbo “renquan gaoyu zhuquan” lun [On human rights and sovereignty: Refuting the theory of human rights above sovereignty]. Beijing: Contemporary World Press.Google Scholar
Citron, D, K. (2008). ‘Technological due process’, Washington University Law Review, 85(6), pp. 12491313.Google Scholar
Davidson, J. D. and Rees-Mogg, W. (1997). The sovereign individual: Mastering the transition to the information age. New York: Touchstone Books.Google Scholar
Donews. (2023). Damoxing guojiadui laile! 360, Baidu, Huawei, Ali deng ruju [The large model national team is coming! 360, Baidu, Huawei, Alibaba and others enter the game]. Available at: https://www.donews.com/news/detail/4/3584866.html (Accessed: 15 August 2024).Google Scholar
EPRS. (2020). Digital sovereignty for Europe. Available at: https://www.europarl.europa.eu/RegData/etudes/BRIE/2020/651992/EPRS_BRI(2020)651992_EN.pdf (Accessed: 15 August 2024).Google Scholar
Fan, J. and Li, T. (2023). Quanju diwei, dayou kewei! Zongli zhaokai de zhechang zuotanhui, zaixiang pingtai qiye shifang jiji xinhao [This symposium convened by the Premier releases positive signals to platform enterprises again]. Available at: https://www.thepaper.cn/newsDetail_forward_23827347 (Accessed: 15 August 2024).Google Scholar
Foucault, M. (1999). Guixun yu chengfa: Jianyu de dansheng [Discipline and punish: The birth of the prison]. Translated by Liu, B. and Yang, Y. Shanghai: SDX Joint Punishing Company.Google Scholar
Foucault, M. (2011). Linchuang yixue de dansheng [The Birth of the clinic]. Translated by Liu, B. Nanjing: Yilin Press.Google Scholar
Fukuyama, F. (2014). Zhengzhi zhixu de qiyuan: cong qianrenlei shidai dao faguo dageming [The origins of political order: From prehuman times to the French Revolution]. Translated by Mao, J. Guilin: Guangxi Normal University Press.Google Scholar
Gao, Q. (2018). Rengong zhineng: Xunfu saiweitan [Artificial Intelligence: Taming Seviathan]. Shanghai: Shanghai Jiao Tong University Press.Google Scholar
Geertz, C. (2014). Wenhua de jieshi [The interpretation of cultures]. Translated by Han, L. Nanjing: Yilin Press.Google Scholar
Geertz, C. (2018). Nijiala: 19 shiji bali juchang guojia [Negara: the theatre state in nineteenth century Bali]. Translated by Zhao, B. Shanghai: Shanghai Renming Chubanshe.Google Scholar
Harari, Y. (2023). Rengong zhineng dui women de caozong, keneng bi ni xiangde yanzhong [Artificial intelligence manipulation of us may be worse than you think]. Available at: https://www.thepaper.cn/newsDetail_forward_23297386 (Accessed: 15 August 2024).Google Scholar
He, X. and Zhang, H. (2023). Yingzao rengong zhineng damoxing chanye shengtai [Creating an industrial ecology of artificial intelligence big models]. Available at: http://www.news.cn/tech/20230614/f23c07c4516a41e8aa8e58b9fe695381/c.html (Accessed: 15 August 2024).Google Scholar
Hobbes, T. (2013). Liweitan [Leviathan]. Translated by Li, S. and Li, T. Beijing: Commercial Press.Google Scholar
Huang, Y. (2021). ‘Meiguo wangluo zhili zhuizong: Tongxin guifan fa di 230 tiao de lishi, xianzhuang yu weilai [Past, present and future of Section 230]’, Journal of Cyber and Information Law, 1, pp. 203218.Google Scholar
Huntington, S. (2018). Wenming de chongtu yu shijie zhixu de chongjian [The clash of civilisations and the remaking of world order] (revised edition). Translated by Zhou, Q., Liu, F., Zhang, L., Wang, Y. et al. Beijing: Xinhua Publishing House.Google Scholar
Institute for AI International Governance of Tsinghua University (2023). Rengong zhineng guoji zhili guancha No. 127[Observations on international governance of artificial intelligence No. 127]. Available at: http://aiig.tsinghua.edu.cn/info/1442/1815.htm (Accessed: 15 August 2024).Google Scholar
Institute of Scientific and Technical Information of China (2023). Zhongguo rengong zhineng damoxing ditu yanjiu baogao [Report on China’s artificial intelligence large model map]. Available at: https://k.sina.com.cn/article_6380588872_17c500f4801902pmz9.html (Accessed: 15 August 2024).Google Scholar
Ji, W. (2000). ‘Cong zhuquan de shuangchong jiegou kan zhongguo yu shijie de hudong guanxi [China’s interaction with the world from the dual structure of sovereignty]’, Twenty-First Century, 57, pp. 8796.Google Scholar
Ji, W. (2020). ‘Yiqing jiankong: Yige bijiaofa shehuixue de fenxi [Epidemic surveillance: A comparative legal sociology analysis]’, Peking University Law Journal, 3, pp. 565589.Google Scholar
Ji, W. (2021). ‘Jisuan faxue de jiangyu [The frontiers of computational jurisprudence]’, Social Science Journal, 3, pp. 113126.Google Scholar
Ji, W. (2023a). Yuanyuzhou de zhixu: Xuniren, jiami zichan yiji fazhi chuangxin [Order in the metaverse: Avatars, crypto-assets, and innovations in the rule of law]. Shanghai: Shanghai Renmin Chubanshe.Google Scholar
Ji, W. (2023b). Qiang rengong zhineng de zhili yu falv tiaozhan [Governance and legal challenges of strong artificial intelligence]. Available at: http://www.ifengweekly.com/detil.php?id=19376 (Accessed: 15 August 2024).Google Scholar
Ji, W. (2023c). ‘Tantao shuzi shidai falv chengxu de yiyi – jujiao fengxian fangkong xingzheng de suanfa ducai yu gongzheng [Exploring the significance of legal procedures in the digital age–Focusing on algorithmic dictatorship and procedural fairness in risk prevention and control administration]’, Journal of China University of Political Science and Law, 1, pp. 8399.Google Scholar
Lan, J. (2020). ‘Jibing, shengming zhengzhi yu xiandai zhuti de dansheng – cong Huobusi dao Fuke de zhili tixi [Epidemics, biopolitics and the birth of the modern subject – the system of governance from Hobbes to Foucault]’, Seeking Truth, 3, pp. 110.Google Scholar
Lessig, L. (2018). Daima 2.0: Wangluo kongjian zhong de falv [Code: And other laws of cyberspace version 2.0 (revised edition)]. Translated by Li, X. and Shen, W. Beijing: Tsinghua University Press.Google Scholar
Li, B. (2010). Lun renquan [On human rights]. Beijing: Social Sciences Academic Press.Google Scholar
Li, B. (2019). ‘Shenme shi renquan – genju Li Buyun jiaoshou jiangzuo luyin zhengli [What are human rights – Based on the recorded lectures of Professor Li Buyun]’, Southeast Law Review, 1, pp. 37.Google Scholar
Lian, Y., ed. (2020). Zhuquan qukuailian 1.0: Zhixu hulianwang yu renlei mingyun gongtongti [Sovereignty blockchain 1.0: Orderly Internet and community with a shared future for humanity]. Hangzhou: Zhejiang University Press.Google Scholar
Lian, Y., ed. (2022). Zhuquan qukuailian 2.0: Gaibian weilai shijie de xinliliang [Sovereignty blockchain 2.0: New forces changing the world of future]. Hangzhou: Zhejiang University Press.Google Scholar
Lian, Y., ed. (2023). Zhuquan qukuailian 3.0: Gongxiang zhixu xia de quanqiu zhili chongou [Sovereignty blockchain 3.0: The reconstruction of global governance under the shared order of sharing]. Hangzhou: Zhejiang University Press.Google Scholar
Liu, D. (2020). ‘Jishuxing zhengdang chengxu: Rengong zhineng shidai chengxufa he suanfa de shuangchong bianzou [Technological due process: The double variation of procedural law and programming algorithms in the age of AI]’, Journal of Comparative Law, 5, pp. 6479.Google Scholar
Liu, Y. (2022). ‘Liangzhong quanliguan yu meifa geming daolu – jiyu meifa quanli xuanyan de wenben fenxi [Two perspectives on rights and the according revolutionary paths in America and France: A textual analysis of the Bill of Rights and the Declarations of Rights]’, Journal of the Renmin University of China, 1, pp. 8294.Google Scholar
Lyon, D. (1994). The electronic eye: The rise of surveillance society. Minneapolis: University of Minnesota Press.Google Scholar
Lyon, D. (2001). Surveillance society: Monitoring everyday life. Buckingham and Philadelphia: Open University Press.Google Scholar
Lyon, D. (2018). The culture of surveillance: Watching as a way of life. Cambridge: Polity Press.Google Scholar
Maitland, F. W. (2008). Guojia, xintuo yu faren [State, trust and corporation]. Runciman, D. and Ryan, M. (eds). Translated by Fan, A. Beijing: Peking University Press.Google Scholar
Makihara, N. (1998). Kyakuubun to kokumin no aida: kindai minshu no seiji yisiki [Between “object” and nation – Political consciousness of the modern populace]. Tokyo: Yoshikawa Kobunkan.Google Scholar
Ministry of Foreign Affairs of the People’s Republic of China (2024). Zhongguo guanyu quanqiu shuzi zhili youguan wenti de lichang [China’s positions on global digital governance]. Available at: https://www.fmprc.gov.cn/web/wjb_673085/zzjg_673183/jks_674633/zclc_674645/qt_674659/202305/t20230525_11083602.shtml (Accessed: 15 August 2024).Google Scholar
Nakamoto, S. (no date). Bitcoin: A peer-to-peer electronic cash system. Available at: https://bitcoin.org/bitcoin.pdf (Accessed: 15 August 2024).Google Scholar
Pan, B. (2020). ‘Chongsi rengong zhineng de bianzhengfa: Cong rengong zhineng dao renlei weilai [Rethinking the dialectic of artificial intelligence: From artificial intelligence to the future of humanity]’, Tianjin Social Sciences, 3, pp. 2329.Google Scholar
Shen, W. (2023). ‘Jishu bifenggang de shijian ji fali fansi [The practice of technology safe harbor and jurisprudential reflection]’, Peking University Law Journal, 4, pp. 906922.Google Scholar
Sun, S. (2023). Kejibu qidong guojia chaosuan hulianwang bushu gongzuo [Ministry of Science and Technology launches deployment of national supercomputing Internet]. Available at: https://insights.zhiding.cn/2023/0420/3148891.shtml (Accessed: 15 August 2024).Google Scholar
Tapscott, D. and Tapscott, A. (2016). Burokkuche-n reboryu-shon: bittokoin wo sasaerugijutsuwa donoyoni bijinesutokeizai, sosite sekai wo kaerunoka [Blockchain revolution: How the technology behind Bitcoin is changing money, business and the world]. Translated by Takahashi, R. Tokyo: Daiyamondosha.Google Scholar
The Supreme People’s Court of the People’s Republic of China (2015). Supreme Court joins forces with Sesame Credit Network to punish breaches of trust to see results. Available at: https://www.court.gov.cn/zixun/xiangqing/16351.html (Accessed: 9 October 2024).Google Scholar
United Nations (2023). A Global Digital Compact: An open, free and secure digital future for all (Our Common Agenda Policy Brief 5). Available at: https://indonesia.un.org/sites/default/files/2023-07/our-common-agenda-policy-brief-gobal-digi-compact-en.pdf (Accessed: 15 August 2024).Google Scholar
Wan, Y. (2021). ‘Zhuzuoquanfa qiangzhixing guolv jizhi de zhongguo xuanze [China’s choice of compulsory filtering mechanism in copyright law]’, Studies in Law and Business, 6, pp. 184196.Google Scholar
Wang, Z. (2015). ‘Juedui zhuquan de luoji he liefeng – lun Huobusi de guojia xueshuo [The logic and cracks of absolute sovereignty – On the state theory of Hobbes]’, Academic Monthly, 12, pp. 109119.Google Scholar
Wood, G. (2014). DApps: What Web 3.0 looks like. Available at: https://gavwood.com/dappsweb3.html (Accessed: 15 August 2024).Google Scholar
Wu, T. (2023). Mei zuigao fayuan kaishen da keji gongsi mingyun: Shifou quxiao 27nian hulianwang baohusan? [The U.S. Supreme Court begins a trial on the fate of Big technology companies: Does it cancel 27-year-old Internet ‘protective umbrella’?]. Available at: https://www.thepaper.cn/newsDetail_forward_22061908 (Accessed: 15 August 2024).Google Scholar
Xiang, Y. (2010). Yingguo yihui zhuquan yanjiu [A study of British Parliamentary Sovereignty]. Beijing: China Social Science Press.Google Scholar
Xiong, G. (2014). ‘Xianzhi zhanzheng: Gelaoxiusi zhuquan lilun xinjie [Restricting war: The new explanation of Grotius’s Sovereignty Theory]’, Pacific Journal, 9, pp. 2027.Google Scholar
Xu, C. (1992). ‘Renquan yu zhuquan [Human rights and sovereignty]’, Journal of University of Chinese Academy of Social Sciences, 6, pp. 4052.Google Scholar
Yao, Q. (2022). ‘Web 3.0: jianxingjianjin de xinyidai hulianwang [Web 3.0: The approaching new generation of the Internet]’, China Finance, 6, pp. 1417.Google Scholar
Yuan, H. (2023). Zhuquan qukuailian chengwei quanqiu zhili chonggou de qianyan liliang [Sovereign blockchain becomes a frontier force for global governance reconstruction]. Available at: http://www.ddcpc.cn/detail/d_guizhou/11515116165400.html (Accessed: 15 August 2024).Google Scholar
Zhang, H. (2013). ‘You geren yizhi ziyou dao gonggong yizhi ziyou – Kangde de quanli xueshuo [From individual freedom of will to public freedom of will – Kant’s Doctrine of Rights]’, Global Law Review, 3, pp. 517.Google Scholar