Affiliation:
1. Resilient Computing and Cybersecurity Center (RC3), Computer, Electrical and Mathematical Sciences and Engineering Division (CEMSE), King Abdullah University of Science and Technology (KAUST), Saudi Arabia
Abstract
Digital Sovereignty must be on the agenda of every modern nation. Digital technology is becoming part of our life details, from the vital essentials, like food and water management, to transcendence in the Metaverse and Space. Protecting these digital assets will, therefore, be inevitable for a modern country to live, excel and lead. Digital Sovereignty is a strategic necessity to protect these digital assets from the monopoly of friendly rational states, and the threats of unfriendly Malicious states and behaviors. In this work, we revisit the definition and scope of digital sovereignty through extending it to cover the entire value chain of using, owning, and producing digital assets. We emphasize the importance of protecting the operational resources, both raw materials and human expertise, in addition to research and innovation necessary to achieve sustainable sovereignty. We also show that digital sovereignty by autonomy is often impossible, and by mutual cooperation is not always sustainable. To this end, we propose implementing digital sovereignty using Nash Equilibrium, often studied in Game Theory, to govern the relation with Rational states. Finally, we propose a digital sovereignty agenda for different country’s digital profiles, based on their status quo, priorities, and capabilities. We survey state-of-the-art digital technology that is useful to make the current digital assets sovereign. Additionally, we propose a roadmap that aims to develop a sovereign digital nation, as close as possible to autonomy. Finally, we draw attention to the need of more research to better understand and implement digital sovereignty from different perspectives: technological, economic, and geopolitical.
Publisher
NASK National Research Institute
Reference88 articles.
1. P. Bellanger, La souveraineté numérique, Paris, France: Institut Diderot, 2016.
2. V. d. Leyen. (2021, Sep. 15). State of the Union Address by President von der Leyen, European Commission.[Online]. Available: https://ec.europa.eu/commission/presscorner/detail/en/SPEECH_21_4701. [Accessed: Oct.24, 2022].
3. S. Couture, S. Toupin, “What Does the Concept of ‘Sovereignty’ Mean in Digital, Network and TechnologicalSovereignty?,” SSRN Journal, vol. 21, no. 10, pp. 2305–2322, 2018, doi: 10.2139/ssrn.3107272.
4. A. Holpuch. (2013, Sep. 20). Brazil’s controversial plan to extricate the internet from US control, TheGuardian. [Online]. Available: https://www.theguardian.com/world/2013/sep/20/brazil-dilma-rousseffinternet-us-control. [Accessed: Oct. 19, 2022].
5. J. A. Obar, A. Clement, “Internet Surveillance and Boomerang Routing: A Call for Canadian NetworkSovereignty,” TEM 2013: Proceedings of the Technology & Emerging Media Track - Annual Conference of theCanadian Communication Association, 2013, doi: 10.2139/ssrn.2311792.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Technological sovereignty of Russia: theoretical and legal frameworks, mechanisms of achievement;National Security and Strategic Planning;2024-03-18
2. The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip;2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S);2023-06