Digital sovereignty in an era of cyber threats and global connectivity
University of Edinburgh MA Social Policy and Economics, United Kingdom.
Research Article
International Journal of Multidisciplinary Research Updates, 2025, 09(02), 012-023.
Article DOI: 10.53430/ijmru.2025.9.2.0023
Publication history:
Received on 14 March 2025; revised on 22 April 2025; accepted on 25 April 2025
Abstract:
Digital sovereignty is significant in the 21st century because of increased threats to cyber security and increased level of connectivity. This research investigates the dilemma of the states and their quest for mastering information technologies, and creating and maintaining their sovereign digital space while being a part of the digital global network. These aspects of the interactions between international law and cyberspace are explored through doctrinal assessment of legal instruments and case-study approaches to issues touching on data localization laws, cybersecurity threats and the roles of non-state actors – such as multinational corporations and international organizations. It analyses and assesses the legal measures that states use in exercising digital control, regulate cross border data flows for security reasons, and in the international agreements and national laws’ application. The research reveals the conflict between state-centered and global collaborations approaches and provides ideas for the coordination of the cybersecurity regulations around the world, to enhance communication between states and the non-state players, and to maintain the stability of good governance. Specifically, this work advances important knowledge regarding the state of digital governance and presents approaches to safeguard digital sovereignty together with envisioning a new age of innovation and collaboration in cyberspace.
Keywords:
Digital Sovereignty; Cybersecurity; Data Localization; Global Connectivity; International Governance; And Non-State Actors
Full text article in PDF:
Copyright information:
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0