|
|
1 | (38) |
|
|
2 | (1) |
|
1.2 Defining Data in Context |
|
|
2 | (15) |
|
|
3 | (1) |
|
|
4 | (2) |
|
1.2.3 Ownership and Interest |
|
|
6 | (3) |
|
|
9 | (2) |
|
|
11 | (2) |
|
1.2.6 Corporate Data/Media Content |
|
|
13 | (4) |
|
|
17 | (7) |
|
1.3.1 Physical Storage Devices |
|
|
19 | (1) |
|
|
20 | (1) |
|
1.3.3 Cloud Infrastructure: Benefits and Challenges |
|
|
20 | (4) |
|
|
24 | (6) |
|
1.4.1 Sovereignty for Data |
|
|
27 | (1) |
|
|
28 | (1) |
|
1.4.3 Risk Mitigation Strategies |
|
|
29 | (1) |
|
1.5 Residency and Localisation |
|
|
30 | (5) |
|
|
31 | (1) |
|
|
31 | (2) |
|
1.5.3 Localisation Models |
|
|
33 | (2) |
|
|
35 | (2) |
|
|
37 | (2) |
|
|
39 | (46) |
|
|
40 | (1) |
|
|
40 | (6) |
|
2.2.1 Types of Governance |
|
|
40 | (6) |
|
2.3 Social Responsibility in Governance |
|
|
46 | (15) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (1) |
|
2.3.4 The Social Contract |
|
|
51 | (6) |
|
2.3.5 Comparative Provisions |
|
|
57 | (4) |
|
|
61 | (4) |
|
|
61 | (2) |
|
2.4.2 Types of Electronic Governance |
|
|
63 | (2) |
|
|
65 | (16) |
|
2.5.1 Corporate Social Responsibility |
|
|
67 | (1) |
|
|
68 | (3) |
|
2.5.3 User-Generated/Earned Content |
|
|
71 | (6) |
|
2.5.4 Legal Considerations |
|
|
77 | (2) |
|
2.5.5 Digital UCG Stakeholders |
|
|
79 | (2) |
|
|
81 | (4) |
|
|
85 | (32) |
|
|
85 | (1) |
|
|
86 | (14) |
|
3.2.1 Jurisdictional Authority |
|
|
86 | (1) |
|
3.2.2 Determining Jurisdictional Authority |
|
|
87 | (2) |
|
3.2.3 Personal Connecting Factors |
|
|
89 | (6) |
|
3.2.4 Subtypes of Jurisdiction |
|
|
95 | (5) |
|
|
100 | (6) |
|
3.3.1 Sources of International Law |
|
|
100 | (3) |
|
3.3.2 Key Determinants in International Law |
|
|
103 | (1) |
|
3.3.3 International Human Rights Laws |
|
|
104 | (2) |
|
3.4 International Legal Strategies |
|
|
106 | (3) |
|
|
107 | (1) |
|
3.4.2 Existential Disagreements |
|
|
108 | (1) |
|
3.4.3 Interpretive Questions |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
3.5 Interjurisdictional Sovereignty and Governance |
|
|
109 | (6) |
|
3.5.1 Internet Jurisdiction |
|
|
110 | (2) |
|
3.5.2 Global Costs and Fatal Consequences |
|
|
112 | (2) |
|
3.5.3 Common Law Evolution of International Online Defamation |
|
|
114 | (1) |
|
|
115 | (2) |
|
|
117 | (64) |
|
|
117 | (1) |
|
|
118 | (10) |
|
4.2.1 Increased Legislation |
|
|
118 | (2) |
|
4.2.2 Increased Data Awareness |
|
|
120 | (2) |
|
4.2.3 Larger Data Vaults and Data Location |
|
|
122 | (1) |
|
|
123 | (2) |
|
4.2.5 Data Ownership and Control |
|
|
125 | (1) |
|
|
126 | (1) |
|
4.2.7 Cyber Exceptionalism |
|
|
127 | (1) |
|
|
128 | (35) |
|
|
129 | (1) |
|
|
130 | (13) |
|
|
143 | (1) |
|
|
144 | (3) |
|
4.3.5 Freedom of Information |
|
|
147 | (4) |
|
4.3.6 Net Neutrality and the Open Internet |
|
|
151 | (6) |
|
|
157 | (6) |
|
4.4 Resurgence of Sovereignty |
|
|
163 | (6) |
|
4.4.1 Encryption and the Hybrid Cloud |
|
|
163 | (3) |
|
|
166 | (1) |
|
4.4.3 Breach Prevention, Remediation, and Planning |
|
|
167 | (2) |
|
|
169 | (10) |
|
4.5.1 Global Internet Standards |
|
|
170 | (3) |
|
4.5.2 Network Latency for Data Transmission |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (2) |
|
4.5.6 Privacy and Encryption |
|
|
178 | (1) |
|
|
179 | (2) |
|
5 Comparative Legal Strategies |
|
|
181 | (24) |
|
|
181 | (1) |
|
5.2 National Data Strategies |
|
|
182 | (18) |
|
|
182 | (2) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (2) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
5.2.16 United Arab Emirates (UAE) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (2) |
|
5.3 Data Residency Comparative |
|
|
200 | (4) |
|
|
204 | (1) |
|
6 Emerging Topics in Data Sovereignty and Digital Governance |
|
|
205 | (74) |
|
|
205 | (1) |
|
|
206 | (27) |
|
|
207 | (16) |
|
|
223 | (7) |
|
|
230 | (3) |
|
6.3 Indigenous Data Sovereignty |
|
|
233 | (8) |
|
|
234 | (1) |
|
6.3.2 Example: Indigenous Sovereignty in Canada |
|
|
235 | (6) |
|
6.4 Data Centres and Data Mines |
|
|
241 | (7) |
|
|
241 | (2) |
|
|
243 | (1) |
|
6.4.3 Environmental Impacts |
|
|
244 | (2) |
|
|
246 | (2) |
|
6.5 Digital Self-Determination |
|
|
248 | (6) |
|
6.5.1 Theories of Self-Determination |
|
|
249 | (2) |
|
6.5.2 Elements of Digital Self-Determination |
|
|
251 | (3) |
|
6.6 Artificial Intelligence |
|
|
254 | (13) |
|
6.6.1 Artificial Intelligence and Intellectual Property |
|
|
255 | (7) |
|
6.6.2 Artificial Intelligence and Contract Law |
|
|
262 | (1) |
|
6.6.3 Data Protection, Privacy, and Equality |
|
|
262 | (3) |
|
6.6.4 Human Rights, Violence, and Legal Ethics |
|
|
265 | (2) |
|
6.7 Social Responsibility |
|
|
267 | (9) |
|
6.7.1 Digital Colonialism |
|
|
267 | (3) |
|
|
270 | (3) |
|
|
273 | (1) |
|
6.7.4 Censorship, Shutdowns, and Blackouts |
|
|
274 | (2) |
|
6.8 Relevance to our Collective Future |
|
|
276 | (1) |
|
|
277 | (2) |
Conclusion |
|
279 | (2) |
References |
|
281 | |