Abstract

The concept of sovereignty is more important than ever in the Cyber context, yet it is poorly understood. With this article, we are seeking to contribute towards a shared understanding of the concept of sovereignty by succinctly addressing the following six, interrelated, questions: Who can claim to have sovereignty; Over what can one have sovereignty; What are the consequences of having sovereignty over something; Who can violate sovereignty; What is the threshold for violating sovereignty; and What are the consequences of violating sovereignty? However, this article is not limited to a descriptive account of the law as it stands today. A purely descriptive account would not provide a full picture of the complex concept of sovereignty, and we have felt it appropriate to enter the territory of law reform options in parts of the discussion. While sovereignty is a technology-neutral concept and the article addresses it as such, particular attention is directed at sovereignty in the cyber context.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call