Network sovereignty (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Network sovereignty" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
1,624th place
1,592nd place
1,462nd place
1,223rd place
7th place
7th place
3rd place
3rd place
699th place
479th place
11th place
8th place
low place
low place
low place
low place
99th place
77th place
102nd place
76th place
28th place
26th place
712th place
526th place
3,285th place
2,156th place
703rd place
501st place
26th place
20th place
low place
low place
1,367th place
1,176th place
34th place
27th place
114th place
90th place
1,746th place
1,165th place
12th place
11th place
1,382nd place
876th place
low place
low place
928th place
651st place
3,829th place
2,507th place
low place
low place
low place
low place
low place
low place
220th place
155th place
729th place
650th place
low place
low place
20th place
30th place
low place
low place
4,063rd place
low place

amnesty.org

bbc.com

bloomberg.com

books.google.com

businessweek.com

cnbc.com

cnn.com

edition.cnn.com

collaboraoffice.com

council.gov.ru

dgap.org

doi.org

  • Li, Hui; Yang, Xin (2021). "Sovereignty and Network Sovereignty". Co-governed Sovereignty Network: Legal Basis and Its Prototype & Applications with MIN Architecture. Singapore: Springer. pp. 1–28. doi:10.1007/978-981-16-2670-8_1. ISBN 978-981-16-2670-8.
  • Topor, Lev (2024). Cyber Sovereignty: International Security, Mass Communication, and the Future of the Internet. Cham: Springer. doi:10.1007/978-3-031-58199-1. ISBN 978-3-031-58199-1.
  • Japaridze, Tinatin (2023). "Cyber Sovereignty: Should Cyber Borders Replicate Territorial Borders?". In Berghofer, Julia; Futter, Andrew; Häusler, Clemens; Hoell, Maximilian; Nosál, Juraj (eds.). The Implications of Emerging Technologies in the Euro-Atlantic Space: Views from the Younger Generation Leaders Network. Cham: Palgrave Macmillan. pp. 209–225. doi:10.1007/978-3-031-24673-9_13. ISBN 978-3-031-24673-9.
  • Vardanyan, Lusine, and Hovsep Kocharyan. "Critical views on the phenomenon of EU digital sovereignty through the prism of global data governance reality: main obstacles and challenges" European Studies, vol. 9, no. 2, Sciendo, 2022, pp. 110-132. https://doi.org/10.2478/eustu-2022-0016
  • Vardanyan, Lusine, Kocharyan, Hovsep, Hamuľák, Ondrej, Kerikmäe, Tanel. (2023). Digital Sovereignty in the EU: Searching for Legal Mechanisms for Marking the Borders. In: Ramiro Troitiño, D., Kerikmäe, T., Hamuľák, O. (eds) Digital Development of the European Union. Springer, Cham. https://doi.org/10.1007/978-3-031-27312-4_14
  • Jiang, Min (2010). "Authoritarian Informationalism: China's Approach to Internet Sovereignty". SAIS Review of International Affairs. 30 (2): 71–89. doi:10.1353/sais.2010.0006. S2CID 154005295. Retrieved 23 January 2014.
  • Tai, Katharin; Zhu, Yuan Yi (September 2022). "A historical explanation of Chinese cybersovereignty". International Relations of the Asia-Pacific. 22 (3): 469–499. doi:10.1093/irap/lcab009. hdl:1887/3765699.
  • Davis, J.C. (Summer 1998). "Protecting intellectual property in cyberspace". IEEE Technology and Society Magazine. 17 (2): 12–25. doi:10.1109/44.682891.
  • Zekos, Georgios I. (2006). "State Cyberspace Jurisdiction and Personal Cyberspace Jurisdiction". International Journal of Law and Information Technology. 15 (1): 1–37. doi:10.1093/ijlit/eai029.
  • Zekos, Georgios I. (2002). "Legal problems in cyberspace". Managerial Law. 44 (5): 45–102. doi:10.1108/03090550210770614.
  • Post, David G. (1 May 2000). "What Larry Doesn't Get: Code, Law, and Liberty in Cyberspace". Stanford Law Review. 52 (5): 1439–1459. doi:10.2307/1229518. JSTOR 1229518.
  • Zhang, Angela Huyue (2024). High Wire: How China Regulates Big Tech and Governs Its Economy. Oxford University Press. doi:10.1093/oso/9780197682258.001.0001. ISBN 9780197682258.

duma.gov.ru

eff.org

projects.eff.org

fsfe.org

gigaom.com

greatfire.org

en.greatfire.org

handle.net

hdl.handle.net

hrw.org

ibtimes.co.uk

jhu.edu

muse.jhu.edu

jstor.org

  • Post, David G. (1 May 2000). "What Larry Doesn't Get: Code, Law, and Liberty in Cyberspace". Stanford Law Review. 52 (5): 1439–1459. doi:10.2307/1229518. JSTOR 1229518.

lemondeinformatique.fr

mpg.de

coll.mpg.de

noerr.com

nytimes.com

rkn.gov.ru

rudebaguette.com

semanticscholar.org

api.semanticscholar.org

ssrn.com

papers.ssrn.com

  • Obar, Jonathan; Clement (1 July 2013). "Internet Surveillance and Boomerang Routing: A Call for Canadian Network Sovereignty". Social Science Research Network: 1–12. SSRN 2311792.

theconversation.com

thediplomat.com

theguardian.com

theverge.com

washingtonpost.com

web.archive.org

wipo.int

  • "PCT FAQs" (PDF). World Intellectual Property Organization. Archived from the original (PDF) on 25 June 2008. Retrieved 20 March 2014.
  • World Intellectual Property Organization. "Building Respect for IP". World Intellectual Property Organization. Retrieved 20 March 2014.