References
- Amoore, L. (2018). Cloud geographies. Progress in Human Geography, 42(1), 4–24. https://doi.org/10.1177/0309132516662147
- Amoore, L., & Hall, A. (2009). Taking people apart: Digitised dissection and the body at the border. Environment and Planning D: Society and Space, 27(3), 444–464. https://doi.org/10.1068/d1208
- Ankel, S. (2020). Russian agents went to Ireland to inspect undersea cables: report - Business Insider. Business Insider. https://www.businessinsider.com/russian-agents-went-to-ireland-to-inspect-undersea-cables-report-2020-2?utm_source=reddit.com&r=US&IR=T
- Atal, M. R. (2021). The Janus faces of Silicon Valley. Review of International Political Economy, 28(2), 336–350. https://doi.org/10.1080/09692290.2020.1830830
- Barabasi, A. L., & Albert, R. (1999). Emergence of scaling in random networks. Science (New York, NY), 286(5439), 509–512. https://doi.org/10.1126/science.286.5439.509
- Barnett, G. A., Ruiz, J. B., Xu, W. W., Park, J. Y., & Park, H. W. (2017). The world is not flat: Evaluating the inequality in global information gatekeeping through website co-mentions. Technological Forecasting and Social Change, 117, 38–45. https://doi.org/10.1016/j.techfore.2017.01.011
- Barnett, M., & Finnemore, M. (2004). Rules for the world: International organizations in global politics. Cornell University Press. http://doi.org/10.7591/j.ctt7z7mx
- Barry, A. (2006). Technological Zones. European Journal of Social Theory, 9(2), 239–253. https://doi.org/10.1177/1368431006063343
- Beetham, D. (1995). The legitimation of power (3rd print). Issues in political theory. Macmillan.
- Bernards, N., & Campbell-Verduyn, M. (2019). Understanding technological change in global finance through infrastructures. Review of International Political Economy, 26(5), 773–789. https://doi.org/10.1080/09692290.2019.1625420
- Blum, A. (2013). Tubes: A journey to the center of the Internet. (First Ecco paperback edition). Ecco an imprint of HarperCollins Publishers.
- Braun, B. (2020). Central banking and the infrastructural power of finance: the case of ECB support for repo and securitization markets. Socio-Economic Review, 18(2), 395–418. https://doi.org/10.1093/ser/mwy008
- Brier, T. F. Jr (2017). Defining the limits of governmental access to personal data stored in the cloud: An analysis and critique of Microsoft Ireland. Journal of Information Policy, 7, 327. https://doi.org/10.5325/jinfopoli.7.2017.0327
- Buchanan, B. (2020). The hacker and the state: Cyber attacks and the new normal of geopolitics. Harvard University Press.
- Bueger, C., & Liebetrau, T. (2021). Protecting hidden infrastructure: The security politics of the global submarine data cable network. Contemporary Security Policy, 42(3), 391–323. https://doi.org/10.1080/13523260.2021.1907129
- Bühlmann, F., David, T., & Mach, A. (2012). The Swiss business elite (1980–2000): how the changing composition of the elite explains the decline of the Swiss company network. Economy and Society, 41(2), 199–226. https://doi.org/10.1080/03085147.2011.602542
- Campbell-Verduyn, M., Goguen, M., & Porter, T. (2017). Big Data and algorithmic governance: the case of financial practices. New Political Economy, 22(2), 219–236. https://doi.org/10.1080/13563467.2016.1216533
- Campbell-Verduyn, M., Goguen, M., & Porter, T. (2019). Finding fault lines in long chains of financial information. Review of International Political Economy, 26(5), 911–937. https://doi.org/10.1080/09692290.2019.1616595
- Carter, L., Gavey, R., Talling, P., & Liu, J. (2014). Insights into submarine geohazards from breaks in subsea telecommunication cables. Oceanography, 27(2), 58–67. https://doi.org/10.5670/oceanog.2014.40
- Cartwright, M. (2020). Internationalising state power through the internet: Google, Huawei and geopolitical struggle. Internet Policy Review, 9(3). https://doi.org/10.14763/2020.3.1494
- Christensen, J. D., Therkelsen, J., Georgiev, I., & Sand, H. (2018). Data centre opportunities in the nordics: An analysis of the competitive advantages. Nordic Council of Ministers. https://web.archive.org/web/20210608092700/http://norden.diva-portal.org/smash/get/diva2:1263485/FULLTEXT02.pdf
- Clark, B. (2016). Undersea cables and the future of submarine competition. Advance online publication. Bulletin of the Atomic Scientists, 72(4), 234–237. https://doi.org/10.1080/00963402.2016.1195636
- Colgan, J. D. (2019). Three visions of international order. The Washington Quarterly, 42(2), 85–98. https://doi.org/10.1080/0163660X.2019.1621657
- Crichton, D. (2020). The US is formalizing Team Telecom rules to restrict foreign ownership of internet and telecom assets. TechCrunch. https://techcrunch.com/2020/04/06/the-u-s-is-formalizing-team-telecom-rules-to-restrict-foreign-ownership-of-internet-and-telecom-assets/
- Davenport, T. (2012). Submarine communications cables and law of the sea: Problems in law and practice. Ocean Development & International Law, 43(3), 201–242. https://doi.org/10.1080/00908320.2012.698922
- Deibert, R. (2010). Access controlled: The shaping of power, rights, and rule in cyberspace. Information revolution & global politics. MIT Press.
- Drezner, D. W. (2015). Targeted sanctions in a world of global finance. International Interactions, 41(4), 755–764. https://doi.org/10.1080/03050629.2015.1041297
- Drezner, D. W. (2020). The song remains the same: International relations after COVID-19. International Organization, 74(S1), E18–E35. https://doi.org/10.1017/S0020818320000351
- Drezner, D. W., Farrell, H., & Newman, A. (2021). The uses and abuses of weaponized interdependence. Brookings Institution Press.
- Dunn Cavelty, M. (2015). Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erklärungen. Journal of Self-Regulation and Regulation, 1(2015), 167–184. https://doi.org/10.11588/JOSAR.2015.0.23486
- Farrell, H., & Newman, A. L. (2019). Weaponized interdependence: How global economic networks shape state Coercion. International Security, 44(1), 42–79. https://doi.org/10.1162/isec_a_00351
- Feldman, S. (2019). The cloud market keeps moving upwards. https://www.statista.com/chart/19039/cloud-infrastructure-revenue/
- Fischer, C. (2018). The CLOUD Act: A dangerous expansion of police snooping on cross-border data. https://www.facebook.com/eff. https://www.eff.org/deeplinks/2018/02/cloud-act-dangerous-expansion-police-snooping-cross-border-data
- Flensburg, S., & Lai, S. S. (2021). Networks of power. Analysing the evolution of the Danish internet infrastructure. Internet Histories, 5(2), 79–22. https://doi.org/10.1080/24701475.2020.1759010
- Genito, L. (2019). Mandatory clearing: the infrastructural authority of central counterparty clearing houses in the OTC derivatives market. Review of International Political Economy, 26(5), 938–962. https://doi.org/10.1080/09692290.2019.1616596
- Gertz, G., & Evers, M. M. (2020). Geoeconomic competition: Will state capitalism win? The Washington Quarterly, 43(2), 117–136. https://doi.org/10.1080/0163660X.2020.1770962
- Gholz, E., & Hughes, L. (2021). Market structure and economic sanctions: the 2010 rare earth elements episode as a pathway case of market adjustment. Review of International Political Economy, 28(3), 611–624. https://doi.org/10.1080/09692290.2019.1693411
- Goede, M. de. (2020). Finance/security infrastructures. Review of International Political Economy, 28(2), 1–18. https://doi.org/10.1080/09692290.2020.1830832
- Goldsmith, J. L., & Wu, T. (2006). Who controls the Internet? Illusions of a borderless world. Oxford University Press. http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=169236
- Guest, G., Bunce, A., & Johnson, L. (2006). How many interviews are enough? Field Methods, 18(1), 59–82. https://doi.org/10.1177/1525822X05279903
- Gulati, R. (1999). Network location and learning: The influence of network resources and firm capabilities on alliance formation. Strategic Management Journal, 20(5), 397–420. http://www.jstor.org/stable/3094162 https://doi.org/10.1002/(SICI)1097-0266(199905)20:5<397::AID-SMJ35>3.0.CO;2-K
- Hameiri, S. (2020). Institutionalism beyond methodological nationalism? The new interdependence approach and the limits of historical institutionalism. Review of International Political Economy, 27(3), 637–657. https://doi.org/10.1080/09692290.2019.1675742
- Hardy, S. (2015). Hibernia Express transatlantic submarine cable network ready for service. Lightwave. https://www.lightwaveonline.com/network-design/high-speed-networks/article/16651312/hibernia-express-transatlantic-submarine-cable-network-ready-for-service
- Herr, T. (2020). Four myths about the cloud: The geopolitics of cloud computing. https://www.atlanticcouncil.org/in-depth-research-reports/report/four-myths-about-the-cloud-the-geopolitics-of-cloud-computing/#thereisnocloud
- Hurd, I. (1999). Legitimacy and authority in international politics. International Organization, 53(2), 379–408. https://doi.org/10.1162/002081899550913
- Huston, G. (2016). The death of transit? APNIC. https://blog.apnic.net/2016/10/28/the-death-of-transit/
- Infrastructure, B. (2021). Live Systems: Havfrue. https://web.archive.org/web/20201026163408/https://bulkinfrastructure.com/digital-infrastructure/fiber-networks/systems#havfrue
- Ireland Strategic Investment Fund. (2016). Ireland strategic investment fund announces €57 million of connectivity fund investments [Press release]. https://isif.ie/news/press-releases/ireland-strategic-investment-fund-announces-57-million-of-connectivity-fund-investments
- Irion, K. (2012). Government cloud computing and national data sovereignty. Policy & Internet, 4(3–4), 40–71. https://doi.org/10.1002/poi3.10
- Lairson, T. D. (2020). The international political economy of Huawei’s global and domestic environment. In W. Zhang, I. Alon, & C. Lattemann (Eds.), Huawei goes global: Volume I: Made in China for the world (pp. 13–40). Springer International Publishing. https://doi.org/10.1007/978-3-030-47564-2_2
- Lambach, D. (2019). The territorialization of cyberspace. International Studies Review, 22(3), 482–506. Article viz022, 19. https://doi.org/10.1093/isr/viz022
- Leonard, M., Pisani-Ferry, J., Ribakova, E., Shapiro, J., & Wolff, G. (2019). Securing Europe’s economic sovereignty. Survival, 61(5), 75–98. https://doi.org/10.1080/00396338.2019.1662148
- Liu, S., Bischof, Z. S., Madan, I., Chan, P., & Bustamante, F. E. (2020). Out of sight, not out of mind: A user-view on the criticality of the submarine cable network [Paper presentation]. Proceedings of the ACM Internet Measurement Conference.
- MacAskill, E., & Rushe, D. (2013). Snowden document reveals key role of companies in NSA data collection. The Guardian. https://www.theguardian.com/world/2013/nov/01/nsa-data-collection-tech-firms
- Malecki, E. J. (2002). The economic geography of the internet's infrastructure. Economic Geography, 78(4), 399–424. https://doi.org/10.1111/j.1944-8287.2002.tb00193.x
- Mann, M. (1984). The autonomous power of the state: its origins, mechanisms and results. European Journal of Sociology, 25(2), 185–213. http://www.jstor.org/stable/23999270 https://doi.org/10.1017/S0003975600004239
- Marguerite. (2018). Infrastructure investor Marguerite II joins the EllaLink submarine cable as financial sponsor [Press release]. https://www.marguerite.com/2018/05/infrastructure-investor-marguerite-ii-joins-the-ellalink-submarine-cable-as-financial-sponsor/
- Mathew, A. J. (2016). The myth of the decentralised internet. Internet Policy Review, 5(3). https://doi.org/10.14763/2016.3.425
- Mauldin, A. (2019). Telegeography goes back to the future. Pacific Telecommunications Council, Honolulu, Hawaii. https://blog.telegeography.com/2019-telecom-networks-update-summary-ptc-submarine-cables
- Mikler, J. (2011). Sharing sovereignty for policy outcomes. Policy and Society, 30(3), 151–160. https://doi.org/10.1016/j.polsoc.2011.07.007
- Mikler, J. (2018). The political power of global corporations. Polity.
- Moore, M., & Tambini, D. (Eds.). (2018). Digital dominance: The power of Google, Amazon, Facebook, and Apple. Oxford University Press.
- Mortensen, H. (2020). Spionernes guldaeg. Weekendavisen. https://www.weekendavisen.dk/2020-35/samfund/spionernes-guldaeg
- Mukerji, C. (2015). The material turn. In M. Buchmann, S. M. Kosslyn, & R. A. Scott (Eds.), Emerging trends in the social and behavioral sciences: An interdisciplinary, searchable, and linkable resource (pp. 1–13). John Wiley & Sons. https://doi.org/10.1002/9781118900772.etrds0109
- Munn, L. (2020). Red territory: forging infrastructural power. Territory, Politics, Governance, 37(1), 1–20. https://doi.org/10.1080/21622671.2020.1805353
- Newton, C. (2020). A sneaky attempt to end encryption is worming its way through Congress. The Verge. https://www.theverge.com/interface/2020/3/12/21174815/earn-it-act-encryption-killer-lindsay-graham-match-group
- Nye, J. S. (2020). Power and interdependence with China. The Washington Quarterly, 43(1), 7–21. https://doi.org/10.1080/0163660X.2020.1734303
- Nye, J. S., & Keohane, R. O. (1971). Transnational relations and world politics: An introduction. International Organization, 25(3), 329–349. http://www.jstor.org/stable/2706043 https://doi.org/10.1017/S0020818300026187
- Oatley, T. (2021). Regaining relevance: IPE and a changing global political economy. Cambridge Review of International Affairs, 1–10, 34(2), 318–327. https://doi.org/10.1080/09557571.2021.1888880
- PA Consulting. (2021). Data centre growth in the Nordics. https://www.paconsulting.com/insights/data-centre-growth-in-the-nordics/
- Paris, R. (2020). The right to dominate: How old ideas about sovereignty pose new challenges for world order. International Organization, 74(3), 453–489. https://doi.org/10.1017/S0020818320000077
- Parks, L. D., & Starosielski, N. (Eds.). (2015). The geopolitics of information. Signal traffic: Critical studies of media infrastructures. University of Illinois Press. http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=992537
- Perlroth, N. (2021). This is how they tell me the world ends: The cyber weapons arms race. Bloomsbury Publishing Plc.
- Petry, J., Fichtner, J., & Heemskerk, E. (2021). Steering capital: the growing private authority of index providers in the age of passive asset management. Review of International Political Economy, 28(1), 152–176. https://doi.org/10.1080/09692290.2019.1699147
- Rodine-Hardy, K. (2015). Globalization, international organizations, and telecommunications. Review of Policy Research, 32(5), 517–537. https://doi.org/10.1111/ropr.12137
- Rosemain, M. (2021). France embraces Google, Microsoft in quest to safeguard sensitive data. Reuters. https://www.reuters.com/technology/france-embraces-google-microsoft-quest-safeguard-sensitive-data-2021-05-17/
- Rosemain, M., & Satter, R. (2021). Millions of websites offline after fire at French cloud services firm. Reuters. https://www.reuters.com/article/us-france-ovh-fire-idUSKBN2B20NU
- Ruiz, J. B., & Barnett, G. A. (2015). Who owns the international Internet networks? The Journal of International Communication, 21(1), 38–57. https://doi.org/10.1080/13216597.2014.976583
- Sargsyan, T. (2016). Data localization and the role of infrastructure for surveillance, privacy, and security. International Journal of Communication, 10(2016), 17. https://ijoc.org/index.php/ijoc/article/view/3854
- Sassen, S. (2018). Embedded borderings: making new geographies of centrality. Territory, Politics, Governance, 6(1), 5–15. https://doi.org/10.1080/21622671.2017.1290546
- Schwartz, H. M. (2019). American hegemony: intellectual property rights, dollar centrality, and infrastructural power. Review of International Political Economy, 26(3), 490–519. https://doi.org/10.1080/09692290.2019.1597754
- Seabrooke, L., & Tsingou, E. (2021). Revolving doors in international financial governance. Global Networks, 21(2), 294–319. https://doi.org/10.1111/glob.12286
- Seabrooke, L., & Wigan, D. (2017). The governance of global wealth chains. Review of International Political Economy, 24(1), 1–29. https://doi.org/10.1080/09692290.2016.1268189
- Sherman, J. (2021). Cyber defense across the ocean floor: The geopolitics of submarine cable security. https://www.atlanticcouncil.org/in-depth-research-reports/report/cyber-defense-across-the-ocean-floor-the-geopolitics-of-submarine-cable-security/
- Smith, B., & Browne, C. A. (2019). Tools and weapons: The promise and the peril of the digital age. Hodder.
- Staff, S. (2014). Spying Together: Germany's Deep Cooperation with the NSA. DER SPIEGEL. https://www.spiegel.de/international/germany/the-german-bnd-and-american-nsa-cooperate-more-closely-than-thought-a-975445.html
- Starosielski, N. (2015). The undersea network". SST, Sign, storage, transmission. Duke University Press.
- Strange, S. (1989). States and markets (Reprinted.). Pinter.
- Strange, S. (1996). The Retreat of the state: The diffusion of power in the world economy. Cambridge studies in international relations (Vol. 49). Cambridge University Press. https://doi.org/10.1017/CBO9780511559143
- Svantesson, D., & Gerry, F. (2015). Access to extraterritorial evidence: The Microsoft cloud case and beyond. Computer Law & Security Review, 31(4), 478–489. https://doi.org/10.1016/j.clsr.2015.05.007
- TAT-14. (2001). General Committee. https://web.archive.org/web/20010221215619/http://www.tat-14.com/gclist.jsp.
- Telegeography. (2017). A complete list of content providers' submarine cable holdings. https://blog.telegeography.com/telegeographys-content-providers-submarine-cable-holdings-list
- Telegeography. (2020a). Submarine cable map. https://www.submarinecablemap.com/#/submarine-cable
- Telegeography. (2020b). Out with the old cables, in with the new. https://web.archive.org/save/https://blog.telegeography.com/out-with-the-old-cables-in-with-the-new
- Tibbles, J. (2017). Submarine cables, security and the state. Submarine Telecoms Forum, 94, 22–31.
- Uzzi, B. (1996). The sources and consequences of embeddedness for the economic performance of organizations: The network effect. American Sociological Review, 61(4), 674. https://doi.org/10.2307/2096399
- Weiss, L. (2000). Globalization and state power. Development and Society, 29(1), 1–15.
- Weiss, L., & Thurbon, E. (2018). Power paradox: how the extension of US infrastructural power abroad diminishes state capacity at home. Review of International Political Economy, 25(6), 779–810. https://doi.org/10.1080/09692290.2018.1486875
- Wilks, S. (2013). The political power of the business corporation. Edward Elgar Publishing. http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=551299
- Wimmer, A., & Glick Schiller, N. (2002). Methodological nationalism and beyond: nation-state building, migration and the social sciences. Global Networks, 2(4), 301–334. https://d1wqtxts1xzle7.cloudfront.net/2059675/Methodological_Nationalism_and_Beyond__Global_Networks_Wimmer_and_Glick_Schiller_2002_-with-cover-page-v2.pdf?Expires=1632732697&Signature=BrHBkqYwAvPwAwrN-JJqyHjxT1u6tNg994LYnzyK1J30gnKD2fQkCu9z5aR8yCd7IG75DLUV6wa4UnkSDGuQZ5VBBq4KZjqQ2CM1TBrw-EHxEjIePmKjWIKBatYujzSusNyknjf8W0KVQbNJDCnNWlscBZqWBg13i6deTRRTrNzW5eEQhKuXSOUlWDxn9∼zwqjvr4qLGlDivcPyswyc2ThS5PZqUvNqiH3aI71kyANVBGT7yoWFPgej∼Akn8zAM4CLhtbd1j78DfzkKdV6i8AiCOeVnuqHtCbcmLO2AQl53CWixj9dCLb60lAemOCW6OG8X9TDp2jQRtW3giuK6D7Q__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA https://doi.org/10.1111/1471-0374.00043
- Winecoff, W. K. (2020). The persistent myth of lost hegemony,” revisited: structural power as a complex network phenomenon. European Journal of International Relations, 26(1_suppl), 209–252. https://doi.org/10.1177/1354066120952876
- Winseck, D. (2017). The geopolitical economy of the global internet infrastructure- CRUCIAL TEXT. Journal of Information Policy, 7(1), 228–267. https://doi.org/10.5325/jinfopoli.7.2017.0228
- Wu, T. (2011). The master switch: The rise and fall of information empires (1. Vintage Books ed.). Vintage Books.
- Wyden, R. (2019). Can You Track Me Now? Why the phone companies are such a privacy disaster. DEFCON. https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20audio/DEF%20CON%2027%20conference%20audio%20flac/DEF%20CON%2027%20Conference%20-%20US%20Senator%20Ron%20Wyden%20-%20Can%20You%20Track%20Me%20Now%20Why%20The%20Phone%20Companies%20Are%20Such%20A%20Privacy%20Disaster.txt
- Zegart, A., & Childs, K. (2018). The divide between Silicon Valley and Washington is a national-security threat. The Atlantic. https://www.theatlantic.com/ideas/archive/2018/12/growing-gulf-between-silicon-valley-and-washington/577963/