Cybersovereignty: The Example of China
Keywords:
cybersovereignty, sovereignty, cyberspace, Great Firewall, internet policy, VPN services, Golden Shield, anonymity in web space, digital economy, cybercrime, web securityAbstract
This article explores the concept of understanding of countries’ sovereignty on the web space, based on the example of the People’s Republic of China and influence of globalization process to comprehension of sovereignity. Territorial sovereignty can be easily recognised by territorial borders, however a country's cyber sovereignty involves a more complex approach to limiting it. In addition, there is currently no exact binding law regulating and defining the scope of cybersovereignty. From a historical perspective, China, as a developed country, was one of the first countries, which introduced the Internet into its states And therefore, s strict system of control and restriction of Internet use, called the Golden Shield, was introduced to regulate legal relations in the Internet sphere. This system imposes censorship, restrictions of anonymity, and practice of banning unnecessary web domains and VPN services. Whether such a system is effective in terms of reducing crime on the one hand or on the other hand making the political environment in the country more fragile. The purpose of this article is to reveal the essence of the concept of cyberspace, the extent to which it is developed, what restrictions states are entitled to impose on Internet space and to examine China's practices and their consequences.
References
Political Theory, R.C Agarwal, S.Chand & Company LTD, 2004, p. 576
United Nations, Secretary-General, Kofi Annan, 1999
Department of Defense Dictionary of Military and Associated Terms, 2010
Sovereignty in Cyberspace: Theory and Practice (Version 2.0), Jointly Launched by Wuhan University China Institute of Contemporary International Relations Shanghai Academy of Social Sciences, p. 14
The great transformer: The impact of the Internet on economic growth and prosperity, McKinsey Global Institute, James Manyika and Charles Roxburgh October 2011, p. 10
2017 Foreign Policy White Paper, Australian Government, p. 85
UNIDIR (United Nations Institute for Disarmament Research), Palais des Nations, CH 1211 Geneva 10 Switzerland p. 2
Lu Wei, Director of the Cyberspace Administration of China
A Declaration of the Independence of Cyberspace, Davos, Switzerland, February 8, 1996
https://www.tadviser.ru/index.php/Статья:Цензура_(контроль)_в_интернете._Опыт_Китая
Office of the Chairman of the Joint Chiefs of Staff, Joint Publication 3-28: Defense Support of Civil Authorities, 31 July, 2013, pp. 1-4.
Lindsay, Jon R. 2015. ‘The Impact of China on Cybersecurity, Fiction and Friction’, http://belfercenter.ksg.harvard.edu/files/ IS3903_pp007-047.pdf Accessed 13.01.2017
Charles Doyle, Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Criminal Laws, Congressional Research Service, October 15, 2014
The Internet in China: Cyberspace and Civil Society, by Zixue Tai. New York: Routledge, 2006, 365 pages.
Goldsmith, Jack and Wu, Tim, "Who Controls the Internet?: Illusions of a Borderless World" (2006). Faculty Books. 175.
How Great is the Great Firewall? Measuring China's DNS Censorship Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis
Рустамбеков И., Гулямов С. Международное частное право в киберпространстве (коллизионное кибер право) //Гулямов Саид Саидахрарович. – 2020. – №. 1.
Inamdjanova, E. (2021). INVESTMENT AND INVESTMENT ACTIVITY IN THE DIGITAL ECONOMY. Збірник наукових праць SCIENTIA.
Imamalieva , D. . (2022). Recent Challenges of Big Data Application in Healthcare System. International Conference on Multidimensional Research and Innovative Technological Analyses, 121–124. Retrieved from http://conferenceseries.info/index.php/ICMRITA/article/view/198
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
User Rights
Under the Creative Commons Attribution-NonCommercial 4.0 International (CC-BY-NC), the author (s) and users are free to share (copy, distribute and transmit the contribution).
Rights of Authors
Authors retain the following rights:
1. Copyright and other proprietary rights relating to the article, such as patent rights,
2. the right to use the substance of the article in future works, including lectures and books,
3. the right to reproduce the article for own purposes, provided the copies are not offered for sale,
4. the right to self-archive the article.