76
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

“Cyber as sovereignty space: state transformation in the periphery of Europe”

References

  • Adams, J., and M. Albakajai. 2016. “Cyberspace: A New Threat to the Sovereignty of the State.” Management Studies 4 (6). https://doi.org/10.17265/2328-2185/2016.06.003.
  • Alves, S. 2014. The Internet Balkanization Discourse Backfires. Berkeley: University of California, Berkeley - School of Law.
  • Arka Telecom. 2018. “Armenia is Fourth in the World for Frequency of Harmful Software Attacks.” Accessed April 14, 2022 http://telecom.arka.am/en/news/internet/armenia_is_fourth_in_the_world_for_frequency_of_harmful_software_attacks_/.
  • Bennett, A., and J. T. Checkel, eds. 2014. Process Tracing: From Metaphor to Analytic Tool. Cambridge: Cambridge University Press.
  • Bessant, J. 2012. “Human Rights, the Law, Cyber-Security and Democracy: After the European Convention.” Australian Journal of Human Rights 18 (1): 1–26. https://doi.org/10.1080/1323-238X.2012.11882096.
  • Betz, D. J., and T. Stevens. 2011. “Chapter Two: Cyberspace and Sovereignty.” Adelphi Series 51 (424): 55–74. https://doi.org/10.1080/19445571.2011.636955.
  • Bleich, E. 2018. “Historical Institutionalism and Judicial Decision-Making: Ideas, Institutions, and Actors in French High Court Hate Speech Rulings.” World Politics 70 (1): 53–85. https://doi.org/10.1017/S0043887117000272.
  • BNE IntelliNews. 2018. “Slovakia Tops Cybersecurity Index.” Accessed April 2, 2022. http://www.intellinews.com/slovakia-tops-cyber-security-index-139307/.
  • Bogdani, A. 2022. “Pasiguria e të dhënave personale rrezikon ‘qeverisjen dixhitale’ të Shqipërisë.” Reporter Al, February 21.
  • Bogdani, N. 2021. “Qytetarët akoma skeptikë për shërbimet online në Shqipëri.“ Reporter Al, January 22.
  • Brechbühl, H., R. Bruce, S. Dynes, and M. E. Johnson. 2010. “Protecting Critical Information Infrastructure: Developing Cybersecurity Policy.” Information Technology for Development 16 (1): 83–91. https://doi.org/10.1002/itdj.20096.
  • Broeders, D. 2017. “Aligning the International Protection of ‘The Public Core of the Internet’with State Sovereignty and National Security.” Journal of Cyber Policy 2 (3): 366–376. https://doi.org/10.1080/23738871.2017.1403640.
  • Burton, J. 2013. “Small States and Cybersecurity: The Case of New Zealand.” Political Science 65 (2): 216–238. https://doi.org/10.1177/0032318713508491.
  • Choucri, N., and D. Clark. 2013. “Who Controls Cyberspace?” Bulletin of the Atomic Scientists 69 (5): 21–31. https://doi.org/10.1177/0096340213501370.
  • Cornish, P. 2015. “Governing Cyberspace Through Constructive Ambiguity.” Survival 57 (3): 153–176. https://doi.org/10.1080/00396338.2015.1046230.
  • Council of Europe. 2001. “Convention on Cybercrime.” Accessed April 2, 2022. http://conventions.coe.int/Treaty/EN/Treaties/html/185.htm.
  • Cruquenaire, A., and C. Lazaro 2013. “The Law Applicable to International Contracts Concluded via Internet: The Rome Convention.” Accessed April 17, 2022. http://www.crid.be/pdf/public/4049.pdf.
  • De Witte, B. 2006. “Sovereignty and European Integration: The Weight of Legal Tradition.” Relocating Sovereignty, edited by 293–301. London: Routledge.
  • Dunn Cavelty, M., and A. Wenger. 2022. Cyber Security: Socio-Technological Uncertainty and Political Fragmentation. London: Routledge.
  • Erebara, G. 2021, April 16. “Prokurorët hetojnë Lapsi.al për “Vëllain e Madh” socialist.” Reporter.al.
  • Gazeta, S.2021. ““Bashkëqeverisja”, çfarë parashikon ligji për ndëshkimin e zyrtarëve që injorojnë qytetarët”.
  • Giles, K., and W. Hagestad. 2013. “Divided by a Common Language: Cyber Definitions in Chinese, Russian and English.” In Proceedings of the 5th international conference on cyber conflict edited by K. Podins, J. Stinissen, and M. Maybaum, 1–17. Tallinn: CCD COE Publications.
  • Jensen, E. T. 2015. “Cyber Sovereignty: The Way Ahead.” Texas International Law Journal 50 (2): 275–304.
  • Jusufi, I. 2022. “Uncertainty, Fragmentation, and International Obligations as Shaping Influences: Cyber Security Policy Development in Albania.” In Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, edited by M. D. Cavelty and A. Wenger, 172–185. London: Routledge.
  • Kanuck, S. 2009. “Sovereign Discourse on Cyber Conflict Under International Law.” Texas Law Review 88: 1571–1597.
  • Kivelä, S., and S. Moisio. 2016. “The State as a Space of Health: On the Geopolitics and Biopolitics of Health-Care Systems.” Territory, Politics, Governance 5 (1): 28–46. https://doi.org/10.1080/21622671.2016.1158122.
  • Krasner, S. D. 1999. Sovereignty: Organized Hypocrisy. Princeton, NJ: Princeton University Press.
  • Kucklich, J. 2009. “Virtual Worlds and Their Discontents Precarious Sovereignty, Governmentality, and the Ideology of Play.” Games and Culture 4 (4): 340–352. https://doi.org/10.1177/1555412009343571.
  • Lakhani, K. R., and R. G. Wolf. 2005. “Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Projects.” In Perspectives on Free and Open Source Software, edited by J. Feller, B. Fitzgerald, S. Hissam, and K. R. Lakhani, 3–22. Cambridge, MA: MIT Press .
  • Lapsi.al. 2018, September 28. “KLSH: E-Albania, probleme me ruajtjen e të dhënave personale, janë të ekspozuara.”
  • Lewis, J. 2010. “Sovereignty and the Role of Government in Cyberspace.” The Brown Journal of World Affairs 16 (2): 55–65.
  • Matusitz, J. 2014. “Intercultural Perspectives on Cyberspace: An Updated Examination.” Journal of Human Behaviour in the Social Environment 24 (7): 713–724. https://doi.org/10.1080/10911359.2013.849223.
  • McGuffin, C., and A. Mitchell. 2014. “On Domains: Cyber and the Practice of Warfare.” International Journal 69 (3): 394–412. https://doi.org/10.1177/0020702014540618.
  • Ministry of Innovation and Public Administration. 2015. Digital Agenda of Albania 2015-2020. Tirana: Ministry of Innovation and Public Administration.
  • Philpott, D. 2016. “Sovereignty.” The Stanford Encyclopedia of Philosophy. Accessed April 10, 2022 https://plato.stanford.edu/archives/sum2016/entries/sovereignty/.
  • PWC. 2022. Cybersecurity Ecosystem Report. Western Balkans: Emerging Cyber threats.
  • Schmitt, M. N., ed. 2013. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press.
  • Schou, J., and M. Hjelholt. 2018. “Digital State Spaces: State Rescaling and Advanced Digitalization.” Territory, Politics, Governance 7 (4): 438–454. https://doi.org/10.1080/21622671.2018.1532809.
  • United Nations. 2015. “Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security.” UN document A/70/174.
  • Volk, C. 2019. “The Problem of Sovereignty in Globalized Times.” Law, Culture and the Humanities 18 (3): 716–738. https://doi.org/10.1177/1743872119828010.
  • Von Heinegg, W. H. 2013. “Territorial Sovereignty and Neutrality in Cyberspace.” International L Studies Series US Naval War Colonel 89:123–156.
  • Weber, A. M. 2003. “The Council of Europe’s Convention on Cybercrime.” Berkeley Technology Law Journal 18 (1): 425–446.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.