We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Digital sovereignty is a fluid and complex concept. This chapter highlights the necessity to consider digital sovereignty strategies, policies, and governance mechanisms from a holistic and long-term perspective. Digital sovereignty plays a pivotal role in fostering self-determination, while remaining critical to cybersecurity and the control capabilities of the “digital sovereign.” The “sovereign” can be an individual, a community, a corporation, a state, or a group of states. Taking an agnostic approach to digital sovereignty, the authors explore diverse practices and provide insight into what this concept means in practical terms. Digital technologies can facilitate enormous advancements to be put at the service of people, but can also be weaponized against individuals, corporations, and nation-states. BRICS countries’ approaches offer telling examples of not only how and why the need for digital sovereignty can emerge but also how dysfunctional the implementation of digital sovereignty policies may become without a coherent and long-term vision. Ultimately BRICS experiences illustrate that enhancing a digital sovereign’s self-determination, cybersecurity, and control is likely to reduce the undue influence of other digital actors. However, the success of a digital sovereignty strategy largely depends on the understanding, consistency, resourcefulness, and, ultimately, organizational capabilities of aspiring digital sovereigns.
Recommend this
Email your librarian or administrator to recommend adding this to your organisation's collection.