{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:02:19Z","timestamp":1776103339297,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2024,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Digital sovereignty is a term increasingly used by academics and policymakers to describe efforts by states, private companies, and citizen groups to assert <jats:italic>control<\/jats:italic> over digital technologies. This descriptive conception of digital sovereignty is normatively deficient as it centres discussion on how power is being asserted rather than evaluating whether actions are legitimate. In this article, I argue that digital sovereignty should be understood as a normative concept that centres on <jats:italic>authority<\/jats:italic> (i.e., legitimate control). A normative approach to digital sovereignty is beneficial as it supports critical discourse about the desirability of actors\u2019 assertions of control. It is also more closely aligned with traditional definitions of sovereignty that are grounded in ideas of sovereign authority. To operationalise this normative approach to digital sovereignty and demonstrate the deficiencies of a descriptive approach, the role that \u201cBig Tech\u201d companies are playing in controlling artificial intelligence is considered from both perspectives. Through this case study, it is highlighted that Big Tech companies assert a high degree of control (i.e., descriptive digital sovereignty), but that they lack strong input legitimacy and have a questionable amount of output legitimacy. For this reason, it is argued that Big Tech companies should only be considered quasi-sovereigns over AI.<\/jats:p>","DOI":"10.1007\/s10676-024-09810-5","type":"journal-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T05:02:07Z","timestamp":1729227727000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Digital sovereignty and artificial intelligence: a normative approach"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9610-7245","authenticated-orcid":false,"given":"Huw","family":"Roberts","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"9810_CR1","first-page":"937","volume":"54","author":"UD Acharya","year":"2013","unstructured":"Acharya, U. D. (2013). Globalization and Hegemony Shift: Are States Merely agents of corporate capitalism. Boston College Law Review, 54, 937.","journal-title":"Boston College Law Review"},{"issue":"2","key":"9810_CR2","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1111\/j.1467-8306.2005.00468.x","volume":"95","author":"J Agnew","year":"2005","unstructured":"Agnew, J. (2005). Sovereignty regimes: Territoriality and State Authority in Contemporary World politics. Annals of the Association of American Geographers, 95(2), 437\u2013461. https:\/\/doi.org\/10.1111\/j.1467-8306.2005.00468.x","journal-title":"Annals of the Association of American Geographers"},{"key":"9810_CR3","doi-asserted-by":"publisher","unstructured":"Aitken, M., Leslie, D., Ostmann, F., Pratt, J., Margetts, H., & Dorobantu, C. (2022). Common Regulatory Capacity for AI. The Alan Turing Institute. https:\/\/doi.org\/10.5281\/zenodo.6838946","DOI":"10.5281\/zenodo.6838946"},{"key":"9810_CR4","doi-asserted-by":"crossref","unstructured":"Angle, S. (2002). Human rights in Chinese Thought: A Cross-cultural Inquiry. Cambridge University Press.","DOI":"10.1017\/CBO9780511499227"},{"key":"9810_CR5","unstructured":"Angwin, J., Larson, J., Mattu, S., & Kirchner, L. (2016). Machine bias. ProPublica, May, 23."},{"issue":"1","key":"9810_CR6","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1111\/1467-9760.00170","volume":"11","author":"RJ Arneson","year":"2003","unstructured":"Arneson, R. J. (2003). Defending the purely instrumental account of democratic legitimacy. Journal of Political Philosophy, 11(1), 122\u2013132. https:\/\/doi.org\/10.1111\/1467-9760.00170","journal-title":"Journal of Political Philosophy"},{"key":"9810_CR7","unstructured":"Baezner, M., & Robin, P. (2018). Trend Analysis: Cyber Sovereignty and Data Sovereignty. Center for Security Studies (CSS), ETH Z\u00fcrich. \/en\/services\/digital-library\/publications\/publication.html."},{"key":"9810_CR8","doi-asserted-by":"crossref","unstructured":"Barlow, J. P. (1996). A declaration of the independence of Cyberspace. Electronic Frontier Foundation. https:\/\/www.eff.org\/cyberspace-independence","DOI":"10.37514\/RNT-J.1996.3.6.21"},{"key":"9810_CR9","unstructured":"Barocas, S., Hardt, M., & Narayanan, A. (2023). Fairness and Machine Learning: Limitations and opportunities. MIT Press."},{"key":"9810_CR10","unstructured":"Basu, A., Hickok, E., & Singh Chawla, A. (2019). The Localisation Gambit: Unpacking policy moves for the sovereign control of data in India\u2014The Centre for Internet and Society. The Centre for Internet and Society. https:\/\/cis-india.org\/internet-governance\/blog\/the-localisation-gambit-unpacking-policy-moves-for-the-sovereign-control-of-data-in-india"},{"issue":"4","key":"9810_CR11","first-page":"383","volume":"9","author":"H Beblawi","year":"1987","unstructured":"Beblawi, H. (1987). The Rentier State in the Arab World. Arab Studies Quarterly, 9(4), 383\u2013398.","journal-title":"Arab Studies Quarterly"},{"key":"9810_CR12","doi-asserted-by":"publisher","unstructured":"Beetham, D. (1991). Dimensions of State Legitimacy. In D. Beetham (Ed.), The Legitimation of Power (pp. 117\u2013160). Macmillan Education UK. https:\/\/doi.org\/10.1007\/978-1-349-21599-7_5","DOI":"10.1007\/978-1-349-21599-7_5"},{"key":"9810_CR13","doi-asserted-by":"publisher","unstructured":"Bietti, E. (2020). From ethics washing to ethics bashing: A view on tech ethics from within moral philosophy. Proceedings of the 2020 Conference on Fairness Accountability and Transparency, 210\u2013219. https:\/\/doi.org\/10.1145\/3351095.3372860","DOI":"10.1145\/3351095.3372860"},{"key":"9810_CR14","unstructured":"Bommasani, R., Hudson, D. A., Adeli, E., Altman, R., Arora, S., von Arx, S., Bernstein, M. S., Bohg, J., Bosselut, A., Brunskill, E., Brynjolfsson, E., Buch, S., Card, D., Castellon, R., Chatterji, N., Chen, A., Creel, K., Davis, J. Q., Demszky, D., & Liang, P. (2022). On the Opportunities and Risks of Foundation Models (arXiv:2108.07258). arXiv. http:\/\/arxiv.org\/abs\/2108.07258."},{"key":"9810_CR15","doi-asserted-by":"crossref","unstructured":"Bradford, A. (2023). Digital empires: The Global Battle to Regulate Technology. Oxford University Press.","DOI":"10.1093\/oso\/9780197649268.001.0001"},{"key":"9810_CR16","unstructured":"Brandom, R. (2021, August 13). Facebook shut down German research on Instagram algorithm, researchers say. The Verge. https:\/\/www.theverge.com\/2021\/8\/13\/22623354\/facebook-instagram-algorithm-watch-research-legal-threat"},{"issue":"1","key":"9810_CR24","first-page":"49","volume":"1","author":"C C Demchak","year":"2016","unstructured":"C Demchak, C. (2016). Uncivil and Post-western Cyber Westphalia: Changing interstate power relations of the cybered age. The Cyber Defense Review, 1(1), 49\u201374. JSTOR.","journal-title":"The Cyber Defense Review"},{"issue":"2","key":"9810_CR17","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s11023-021-09562-x","volume":"31","author":"B Chomanski","year":"2021","unstructured":"Chomanski, B. (2021). The missing ingredient in the case for regulating big tech. Minds and Machines, 31(2), 257\u2013275. https:\/\/doi.org\/10.1007\/s11023-021-09562-x","journal-title":"Minds and Machines"},{"key":"9810_CR18","unstructured":"Christiano, T. (1996). The Rule Of The Many: Fundamental Issues In Democratic Theory. Routledge & CRC Press. https:\/\/www.routledge.com\/The-Rule-Of-The-Many-Fundamental-Issues-In-Democratic-Theory\/Christiano-Christiano\/p\/book\/9780813314556"},{"key":"9810_CR19","unstructured":"Connolly, W. E. (2004). The complexity of Sovereignty. Sovereign lives. Routledge."},{"issue":"4","key":"9810_CR20","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1177\/1527476418796632","volume":"20","author":"N Couldry","year":"2019","unstructured":"Couldry, N., & Mejias, U. A. (2019). Data colonialism: Rethinking Big Data\u2019s relation to the contemporary subject. Television & New Media, 20(4), 336\u2013349. https:\/\/doi.org\/10.1177\/1527476418796632","journal-title":"Television & New Media"},{"issue":"10","key":"9810_CR21","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1177\/1461444819865984","volume":"21","author":"S Couture","year":"2019","unstructured":"Couture, S., & Toupin, S. (2019). What does the notion of sovereignty mean when referring to the digital? New Media & Society, 21(10), 2305\u20132322. https:\/\/doi.org\/10.1177\/1461444819865984","journal-title":"New Media & Society"},{"issue":"2","key":"9810_CR22","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1177\/0010414019852687","volume":"53","author":"PD Culpepper","year":"2020","unstructured":"Culpepper, P. D., & Thelen, K. (2020). Are we all Amazon Primed? Consumers and the politics of platform power. Comparative Political Studies, 53(2), 288\u2013318. https:\/\/doi.org\/10.1177\/0010414019852687","journal-title":"Comparative Political Studies"},{"key":"9810_CR23","doi-asserted-by":"crossref","unstructured":"Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (2008). Access denied: The practice and policy of global internet filtering. MIT Press.","DOI":"10.21428\/cb6ab371.9034e9f7"},{"key":"9810_CR25","doi-asserted-by":"publisher","unstructured":"Demchak, C. C., & Dombrowski, P. J. (2014). Rise of a Cybered Westphalian Age: The Coming Decades. In M. Mayer, M. Carpes, & R. Knoblich (Eds.), The Global Politics of Science and Technology\u2014Vol. 1: Concepts from International Relations and Other Disciplines (pp. 91\u2013113). Springer. https:\/\/doi.org\/10.1007\/978-3-642-55007-2_5","DOI":"10.1007\/978-3-642-55007-2_5"},{"key":"9810_CR26","unstructured":"Eisenmann, T., Parker, G., & Alstyne, M. W. V. (2006). Strategies for two- Sided markets. Harvard Business Review, 12."},{"key":"9810_CR27","unstructured":"Falkner, G., Heidebrecht, S., Obendiek, A., & Seidl, T. (2022). Digital Sovereignty\u2014Rhetoric and Reality. Framework Paper for the Online Conference 28\u201329 April 2022."},{"issue":"3","key":"9810_CR28","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s13347-020-00423-6","volume":"33","author":"L Floridi","year":"2020","unstructured":"Floridi, L. (2020). The fight for Digital Sovereignty: What it is, and why it matters, especially for the EU. Philosophy & Technology, 33(3), 369\u2013378. https:\/\/doi.org\/10.1007\/s13347-020-00423-6","journal-title":"Philosophy & Technology"},{"key":"9810_CR29","unstructured":"Foundation Model Transparency Index. (n.d.). CRFM Stanford. Retrieved 13 September 2024, from https:\/\/crfm.stanford.edu\/fmti\/May-2024\/index.html"},{"issue":"1","key":"9810_CR30","first-page":"1","volume":"64","author":"PW Franzese","year":"2009","unstructured":"Franzese, P. W. (2009). Sovereignty in Cyberspace: Can it exist Cyberlaw Edition. Air Force Law Review, 64(1), 1\u201342.","journal-title":"Air Force Law Review"},{"issue":"3","key":"9810_CR31","doi-asserted-by":"publisher","first-page":"359","DOI":"10.2966\/scrip.130316.359","volume":"13","author":"E Fraser","year":"2016","unstructured":"Fraser, E. (2016). Data localisation and the balkanisation of the internet. SCRIPTed, 13(3), 359\u2013373. https:\/\/doi.org\/10.2966\/scrip.130316.359","journal-title":"SCRIPTed"},{"key":"9810_CR32","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4693206","author":"A Ganz","year":"2024","unstructured":"Ganz, A., Camellini, M., Hine, E., Novelli, C., Roberts, H., & Floridi, L. (2024). Submarine Cables and the risks to Digital Sovereignty. SSRN Scholarly Paper 4693206. https:\/\/doi.org\/10.2139\/ssrn.4693206","journal-title":"SSRN Scholarly Paper 4693206"},{"issue":"3","key":"9810_CR33","doi-asserted-by":"publisher","first-page":"38","DOI":"10.3917\/mouv.079.0038","volume":"79","author":"A Hach\u00e9","year":"2014","unstructured":"Hach\u00e9, A. (2014). Technological Sovereignty. Mouvements, 79(3), 38\u201348.","journal-title":"Mouvements"},{"key":"9810_CR34","unstructured":"Harrison, S. (2019, October). Five Years of Tech Diversity Reports\u2014And Little Progress. Wired. https:\/\/www.wired.com\/story\/five-years-tech-diversity-reports-little-progress\/"},{"key":"9810_CR35","doi-asserted-by":"publisher","unstructured":"Henriksen, A. (2019). The end of the road for the UN GGE process: The future regulation of cyberspace. Journal of Cybersecurity, 5(1). https:\/\/doi.org\/10.1093\/cybsec\/tyy009","DOI":"10.1093\/cybsec\/tyy009"},{"issue":"4","key":"9810_CR36","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1007\/s00146-021-01357-z","volume":"38","author":"J Himmelreich","year":"2023","unstructured":"Himmelreich, J. (2023). Against democratizing AI. AI & SOCIETY, 38(4), 1333\u20131346. https:\/\/doi.org\/10.1007\/s00146-021-01357-z","journal-title":"AI & SOCIETY"},{"key":"9810_CR38","unstructured":"Hummel, P., Braun, M., Augsberg, S., Dabrock, P., Erlangen-N\u00fcrnberg, F. A. U., & Gie\u00dfen, J. L. U. (2018). Sovereignty and data sharing. 2, 10."},{"issue":"1","key":"9810_CR39","doi-asserted-by":"publisher","first-page":"205395172098201","DOI":"10.1177\/2053951720982012","volume":"8","author":"P Hummel","year":"2021","unstructured":"Hummel, P., Braun, M., Tretter, M., & Dabrock, P. (2021). Data sovereignty: A review. Big Data & Society, 8(1), 2053951720982012. https:\/\/doi.org\/10.1177\/2053951720982012","journal-title":"Big Data & Society"},{"issue":"3","key":"9810_CR40","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1111\/1467-9248.00212","volume":"47","author":"A James","year":"1999","unstructured":"James, A. (1999). The Practice of Sovereign Statehood in Contemporary International Society. Political Studies, 47(3), 457\u2013473. https:\/\/doi.org\/10.1111\/1467-9248.00212","journal-title":"Political Studies"},{"key":"9810_CR41","unstructured":"Jones, M. G. (2023, September 11). Tech companies spend more than \u20ac100 million a year on EU lobbying. Euronews. https:\/\/www.euronews.com\/my-europe\/2023\/09\/11\/tech-companies-spend-more-than-100-million-a-year-on-eu-digital-lobbying"},{"issue":"3","key":"9810_CR42","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1177\/0192512101223002","volume":"22","author":"SD Krasner","year":"2001","unstructured":"Krasner, S. D. (2001). Abiding Sovereignty. International Political Science Review, 22(3), 229\u2013251. https:\/\/doi.org\/10.1177\/0192512101223002","journal-title":"International Political Science Review"},{"key":"9810_CR43","doi-asserted-by":"publisher","DOI":"10.1002\/9781405165518.wbeoss213","author":"SD Krasner","year":"2007","unstructured":"Krasner, S. D. (2007). Sovereignty. In the Blackwell Encyclopedia of Sociology. American Cancer Society. https:\/\/doi.org\/10.1002\/9781405165518.wbeoss213","journal-title":"American Cancer Society"},{"key":"9810_CR44","doi-asserted-by":"publisher","unstructured":"Kukutai, T., & Taylor, J. (2016). Indigenous Data Sovereignty: Toward an agenda. ANU. https:\/\/doi.org\/10.22459\/CAEPR38.11.2016","DOI":"10.22459\/CAEPR38.11.2016"},{"key":"9810_CR45","doi-asserted-by":"publisher","unstructured":"Lazar, S. (2024). Legitimacy, Authority, and Democratic Duties of Explanation. In D. Sobel & S. Wall (Eds.), Oxford Studies in Political Philosophy Volume 10 (p. 0). Oxford University Press. https:\/\/doi.org\/10.1093\/oso\/9780198909460.003.0002","DOI":"10.1093\/oso\/9780198909460.003.0002"},{"key":"9810_CR46","doi-asserted-by":"crossref","unstructured":"Lehdonvirta, V. (2022). Cloud empires: How digital platforms are overtaking the state and how we can regain control. MIT Press.","DOI":"10.7551\/mitpress\/14219.001.0001"},{"issue":"1","key":"9810_CR47","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1093\/joclec\/nht026","volume":"10","author":"G Luchetta","year":"2014","unstructured":"Luchetta, G. (2014). Is Google a two-sided market? Journal of Competition Law & Economics, 10(1), 185\u2013207. https:\/\/doi.org\/10.1093\/joclec\/nht026","journal-title":"Journal of Competition Law & Economics"},{"key":"9810_CR48","first-page":"343","volume":"15","author":"JV Magalh\u00e3es","year":"2021","unstructured":"Magalh\u00e3es, J. V., & Couldry, N. (2021). Giving by taking away: Big tech, data colonialism and the reconfiguration of social good. International Journal of Communication, 15, 343\u2013362.","journal-title":"International Journal of Communication"},{"key":"9810_CR49","doi-asserted-by":"publisher","unstructured":"Meyer, P. (2020). Norms of Responsible State Behaviour in Cyberspace. In M. Christen, B. Gordijn, & M. Loi (Eds.), The Ethics of Cybersecurity (pp. 347\u2013360). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-29053-5_18","DOI":"10.1007\/978-3-030-29053-5_18"},{"issue":"3","key":"9810_CR50","doi-asserted-by":"publisher","first-page":"341","DOI":"10.2307\/1118308","volume":"48","author":"HJ Morgenthau","year":"1948","unstructured":"Morgenthau, H. J. (1948). The Problem of Sovereignty reconsidered. Columbia Law Review, 48(3), 341\u2013365. https:\/\/doi.org\/10.2307\/1118308. JSTOR.","journal-title":"Columbia Law Review"},{"key":"9810_CR51","doi-asserted-by":"publisher","DOI":"10.1093\/isr\/viz044","author":"ML Mueller","year":"2019","unstructured":"Mueller, M. L. (2019). Against Sovereignty in Cyberspace. International Studies Review. https:\/\/doi.org\/10.1093\/isr\/viz044","journal-title":"International Studies Review"},{"key":"9810_CR52","unstructured":"Murgia, M., & Hammond, G. (2024, February 15). Can OpenAI create superintelligence before it runs out of cash?https:\/\/www.ft.com\/content\/6314d78d-81f3-43f5-9daf-b10f3ff9e24f"},{"key":"9810_CR53","doi-asserted-by":"publisher","unstructured":"OECD (2024). Explanatory memorandum on the updated OECD definition of an AI system (OECD Artificial Intelligence Papers 8; OECD Artificial Intelligence Papers, Vol. 8). https:\/\/doi.org\/10.1787\/623da898-en","DOI":"10.1787\/623da898-en"},{"key":"9810_CR54","unstructured":"OpenAI. (2024, January 16). Democratic inputs to AI grant program: Lessons learned and implementation plans. https:\/\/openai.com\/index\/democratic-inputs-to-ai-grant-program-update\/"},{"issue":"1998)","key":"9810_CR55","first-page":"52","volume":"423","author":"H Perritt","year":"1998","unstructured":"Perritt, H. (1998). The internet as a threat to Sovereignty? Thoughts on the internet\u2019s role in strengthening National and Global Governance. 5 Indiana Journal of Global Legal Studies, 423(1998)), 52. https:\/\/www.repository.law.indiana.edu\/ijgls\/vol5\/iss2\/4","journal-title":"5 Indiana Journal of Global Legal Studies"},{"key":"9810_CR56","unstructured":"Philpott, D. (2016). Sovereignty. In E. N. Zalta (Ed.), The Stanford Encyclopedia of Philosophy (Summer 2016). Metaphysics Research Lab, Stanford University. https:\/\/plato.stanford.edu\/archives\/sum2016\/entries\/sovereignty\/"},{"key":"9810_CR57","doi-asserted-by":"publisher","unstructured":"Piattoni, S. (2010). Output Legitimacy. In S. Piattoni (Ed.), The Theory of Multi-level Governance: Conceptual, Empirical, and Normative Challenges (p. 0). Oxford University Press. https:\/\/doi.org\/10.1093\/acprof:oso\/9780199562923.003.0012","DOI":"10.1093\/acprof:oso\/9780199562923.003.0012"},{"issue":"0","key":"9810_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/1369118X.2023.2232840","volume":"0","author":"D Pizzul","year":"2023","unstructured":"Pizzul, D., & Veneziano, M. (2023). Digital sovereignty or sovereignism? Investigating the political discourse on digital contact tracing apps in France. Information Communication & Society, 0(0), 1\u201317. https:\/\/doi.org\/10.1080\/1369118X.2023.2232840","journal-title":"Information Communication & Society"},{"key":"9810_CR59","doi-asserted-by":"crossref","unstructured":"Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4). https:\/\/policyreview.info\/concepts\/digital-sovereignty","DOI":"10.14763\/2020.4.1532"},{"key":"9810_CR60","unstructured":"Rahman, K. S. (2018). Regulating Informational Infrastructure: Internet Platforms as the New Public Utilities (SSRN Scholarly Paper 3220737). https:\/\/papers.ssrn.com\/abstract=3220737"},{"issue":"1","key":"9810_CR61","first-page":"27","volume":"71","author":"J Raz","year":"1995","unstructured":"Raz, J. (1995). Rights and politics. Indiana Law Journal, 71(1), 27\u201344.","journal-title":"Indiana Law Journal"},{"key":"9810_CR62","doi-asserted-by":"crossref","unstructured":"Roberts, H., Cowls, J., Casolari, F., Morley, J., Taddeo, M., & Floridi, L. (2021). Safeguarding European values with digital sovereignty: An analysis of statements and policies. Internet Policy Review, 10(3). https:\/\/policyreview.info\/articles\/analysis\/safeguarding-european-values-digital-sovereignty-analysis-statements-and-policies","DOI":"10.14763\/2021.3.1575"},{"issue":"0","key":"9810_CR63","first-page":"Article0","volume":"10","author":"T Sargsyan","year":"2016","unstructured":"Sargsyan, T. (2016). Data localization and the Role of Infrastructure for Surveillance, privacy, and security. International Journal of Communication, 10(0), Article0.","journal-title":"International Journal of Communication"},{"issue":"1","key":"9810_CR64","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.clsr.2015.12.003","volume":"32","author":"A Savelyev","year":"2016","unstructured":"Savelyev, A. (2016). Russia\u2019s new personal data localization regulations: A step forward or a self-imposed sanction? Computer Law & Security Review, 32(1), 128\u2013145. https:\/\/doi.org\/10.1016\/j.clsr.2015.12.003","journal-title":"Computer Law & Security Review"},{"key":"9810_CR65","doi-asserted-by":"publisher","unstructured":"Schmidt, V. A. (2020). Conceptualizing legitimacy: Input, output, and Throughput. In V. A. Schmidt (Ed.), Europe\u2019s Crisis of Legitimacy: Governing by rules and ruling by numbers in the Eurozone (p. 0). Oxford University Press. https:\/\/doi.org\/10.1093\/oso\/9780198797050.003.0002","DOI":"10.1093\/oso\/9780198797050.003.0002"},{"key":"9810_CR100","doi-asserted-by":"publisher","unstructured":"Schmitt, M. N. (Ed.). (2017). Tallinn manual 2.0 on the international law applicable to cyber operations (2nd ed.). Cambridge University Press. https:\/\/doi.org\/10.1017\/9781316822524","DOI":"10.1017\/9781316822524"},{"key":"9810_CR66","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-020-09547-x","author":"T Sharon","year":"2020","unstructured":"Sharon, T. (2020). Blind-sided by privacy? Digital contact tracing, the Apple\/Google API and big tech\u2019s newfound role as global health policy makers. Ethics and Information Technology. https:\/\/doi.org\/10.1007\/s10676-020-09547-x","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9810_CR67","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s44206-022-00025-z","volume":"1","author":"H Sheikh","year":"2022","unstructured":"Sheikh, H. (2022). European Digital Sovereignty: A Layered Approach. Digital Society, 1(3), 25. https:\/\/doi.org\/10.1007\/s44206-022-00025-z","journal-title":"Digital Society"},{"issue":"4","key":"9810_CR68","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1086\/233944","volume":"109","author":"AJ Simmons","year":"1999","unstructured":"Simmons, A. J. (1999). Justification and legitimacy. Ethics, 109(4), 739\u2013771. https:\/\/doi.org\/10.1086\/233944","journal-title":"Ethics"},{"issue":"155","key":"9810_CR69","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1111\/1468-2451.00106","volume":"50","author":"G Stoker","year":"1998","unstructured":"Stoker, G. (1998). Governance as theory: Five propositions. International Social Science Journal, 50(155), 17\u201328.","journal-title":"International Social Science Journal"},{"key":"9810_CR70","unstructured":"Stone, J., & Mittelstadt, B. (2024). Legitimate Power, Illegitimate Automation: The problem of ignoring legitimacy in automated decision systems (arXiv:2404.15680). arXiv. http:\/\/arxiv.org\/abs\/2404.15680"},{"issue":"3","key":"9810_CR71","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1080\/00167487.2017.12094021","volume":"102","author":"D Storey","year":"2017","unstructured":"Storey, D. (2017). States, territory and sovereignty. Geography, 102(3), 116\u2013121.","journal-title":"Geography"},{"issue":"2","key":"9810_CR72","first-page":"55","volume":"124","author":"S Strange","year":"1995","unstructured":"Strange, S. (1995). The defective state. Daedalus, 124(2), 55\u201374. JSTOR.","journal-title":"Daedalus"},{"key":"9810_CR73","doi-asserted-by":"crossref","unstructured":"Strange, S. (1996). The retreat of the state: The Diffusion of Power in the World Economy. Cambridge University Press.","DOI":"10.1017\/CBO9780511559143"},{"issue":"2","key":"9810_CR74","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s11023-017-9436-3","volume":"27","author":"M Taddeo","year":"2017","unstructured":"Taddeo, M. (2017). Cyber conflicts and Political Power in Information Societies. Minds and Machines, 27(2), 265\u2013268. https:\/\/doi.org\/10.1007\/s11023-017-9436-3","journal-title":"Minds and Machines"},{"key":"9810_CR75","doi-asserted-by":"publisher","unstructured":"Taylor, C. (Ed.). (1985). Legitimation crisis? Philosophical papers: Volume 2: Philosophy and the Human sciences (Vol. 2, pp. 248\u2013288). Cambridge University Press. https:\/\/doi.org\/10.1017\/CBO9781139173490.011","DOI":"10.1017\/CBO9781139173490.011"},{"issue":"4","key":"9810_CR76","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1007\/s13347-020-00441-4","volume":"34","author":"L Taylor","year":"2021","unstructured":"Taylor, L. (2021). Public actors without public values: Legitimacy, domination and the regulation of the Technology Sector. Philosophy & Technology, 34(4), 897\u2013922. https:\/\/doi.org\/10.1007\/s13347-020-00441-4","journal-title":"Philosophy & Technology"},{"issue":"4","key":"9810_CR77","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11023-019-09508-4","volume":"29","author":"P Timmers","year":"2019","unstructured":"Timmers, P. (2019). Ethics of AI and Cybersecurity when Sovereignty is at Stake. Minds and Machines, 29(4), 635\u2013645. https:\/\/doi.org\/10.1007\/s11023-019-09508-4","journal-title":"Minds and Machines"},{"key":"9810_CR78","doi-asserted-by":"publisher","unstructured":"Tretter, M. (2022). Sovereignty in the Digital and contact tracing apps. Digital Society, 2(1). https:\/\/doi.org\/10.1007\/s44206-022-00030-2","DOI":"10.1007\/s44206-022-00030-2"},{"key":"9810_CR79","unstructured":"Walzer, M. (2008). Spheres of justice: A defense of pluralism and Equality. Basic Books."},{"issue":"3","key":"9810_CR80","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1111\/j.1088-4963.1996.tb00040.x","volume":"25","author":"CH Wellman","year":"1996","unstructured":"Wellman, C. H. (1996). Liberalism, Samaritanism, and political legitimacy. Philosophy & Public Affairs, 25(3), 211\u2013237. https:\/\/doi.org\/10.1111\/j.1088-4963.1996.tb00040.x","journal-title":"Philosophy & Public Affairs"},{"key":"9810_CR81","unstructured":"Zuboff, S. (2019). The age of surveillance capitalism: The fight for the future at the new frontier of power. Profile Books."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-024-09810-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-024-09810-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-024-09810-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T04:52:37Z","timestamp":1731559957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-024-09810-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"references-count":81,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["9810"],"URL":"https:\/\/doi.org\/10.1007\/s10676-024-09810-5","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"70"}}