A Using the sovereignty in Cyberspace

Main Article Content

Natthamon Petchkla
Sumonthip Chitsawang

Abstract

This article aimed to analyze the cyber sovereignty by explaining the basics of understanding sovereignty and its application in a borderless world. In addition, in the article, lessons learned from the cyber threat response policies of the countries are listed for problems to eliminate, such as poaching the cyber sovereignty that will happen in Thailand. The conclusion will be proposed with policy recommendations for the benefit of the government sector. This article came from a study of theoretical concepts, a literature review, and interviews with relevant stakeholders. These issues may not be new, but they are becoming more serious troubles in cyberspace. When state power and technology are combined, a new dimension of the battlefield emerges that cannot be anticipated. The parallel between the cyber world and the real world has made governments unable to respond to threats effectively. Using domestic laws to arrest cyber criminals, demanding fairness from the United Nations, or applying international law may not be the best answer for dealing with cyber threats. In order to prevent the interference of state power in the cyber world, this article provides answers for further study and research.

Article Details

How to Cite
Petchkla, N., & Chitsawang, S. (2023). A Using the sovereignty in Cyberspace. Journal of Multidisciplinary in Humanities and Social Sciences, 6(2), 899–914. Retrieved from https://so04.tci-thaijo.org/index.php/jmhs1_s/article/view/263241
Section
Academic Articles
Author Biographies

Natthamon Petchkla, Criminology and Justice Studies, Political Sciences, Chulalongkorn University

 

 

Sumonthip Chitsawang, Criminology and Justice Studies, Political Sciences, Chulalongkorn University

 

 

References

เดชชาติ วงศ์โกมลเชษฐ์. (2515). หลักรัฐศาสตร์. (พิมพ์ครั้งที่ 8). กรุงเทพฯ: โรงพิมพ์สมาคมสังคหศาสตร์แห่งประเทศไทย.

Betts, A. (2009). Sovereignty and the State System. Forced Migration and Global Politics, 2(3), 43-45.

Brown, G.D. (2013). The Wrong Questions About Cyberspace. The Newly Formed United States Cyber Command, 1(217), 214-233.

Chachavalpongpun, P. (2022). Nationhood in the Cloud: Cyber Sovereignty in Thailand, Retrieved October 31, 2022, from https://doi.org/10.1080/10357823.2022.2109591

Corn, G., & Taylor, R. (2017). Sovereignty in the Age of Cyber. AJIL Unbound, 1(111), 207-212.

Egan, B. (2016). Legal Adviser, U.S. Dep’t of State. International Law and Stability in Cyberspace, 1(35), 169-180.

Encyclopedia Britannica. (2019). Britannica. Retrieved September 24, 2022, from https://web.archive.org/web/20061020084752//corporate.britannica.com/company_info.html

Electronic Transactions Development Agency [ETDA]. (2018). การรักษาความมั่นคงปลอดภัยของโครงสร้างพื้นฐานสำคัญ. Retrieved December 24, 2022, from https://www.etda.or.th/th/Useful-Resource/documents-for-download/ETDA-Annual-Report-2018.aspx

Hare, F. (2009). Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?. Retrieved October 22, 2022, from https://ccdcoe.org/uploads/2018/10/06_HARE_Borders-in-Cyberspace.pdf

Humber, K. (2019). Crimean Tatars and the Politics of Sovereignty: Small State Instrumentalization of Ethnic Minority Sovereignty Claims in Geopolitically Disputed Territory(Doctoral dissertation). University of British Columbia.

Irshaid, F. (2016). How ISIS Is Spreading Its Message Online. Retrieved September 15, 2022, from https://www.bbc.com/news/world-middle-east-27912569

ITU. (2020). Organizations and Institutions that Address International Cybersecurity. Retrieved October 22, 2022, from https://www.itic.org/dotAsset/c/c/cc91d83a-e8a9-40ac-8d75-0f544ba41a71.pdf

Jamnejad, M., & Wood, M. (2009). The Principle of Non-intervention. Leiden Journal of International Law, 22(2), 345-381.

Joel, R. (1996). “Governing Networks and Rule-Making in Cyberspace”. Emory Law Journal, 45(2), 928-950.

Johnson, D.R., & Post, D. (1996). Law and Borders: The Rise of Law in Cyberspace. Stanford Law Review, 48(5), 1367–1402.

Liaropoulos, A. (2013). Exercising State Sovereignty in Cyberspace: An International Cyber-Order under Construction?. Retrieved September 20, 2022, from https://www.researchgate.net/publication/287453182_Exercising_state_sovereignty_in_cyberspace_An_international_cyber-order_under_construction

Lindsay, J. (2015). Engagement Without Recognition: The Limits of Diplomatic Interaction with Contested States. International Affairs, 91(2), 267-285.

Petchkla, N. (2022). Government Sector’s Response in Counter-Cyberterrorism in Thailand. International Journal of Crime, Law and Social Issues, 9(2), 1-14.

Roscini, M. (2015). Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations. Texas International Law Journal, 50(2-3), 233-274.

Schmitt, M. (2016). US Transparency Regarding International Law in Cyberspace, JUST SECURITY. Retrieved November 25, 2022, from https://www.justsecurity.org/34465/transparency-international-law-cyberspace/

Segal, A. (2020). China’s Vision for Cyber Sovereignty and the Global Governance of Cyberspace. Retrieved September 14, 2022, from https://www.nbr.org/publication/chinasvision-for-cyber-sovereignty-and-the-global-governance-of-cyberspace/

Sherman, J. (2019). How Much Cyber Sovereignty is Too Much Cyber Sovereignty?. Retrieved November 5, 2022, from https://www.cfr.org/blog/how-much-cyber-sovereignty-too-much-cyber-sovereignty

Tavenner, E. (2022). Russian Cyber Sovereignty: Global Implications of an Authoritarian RuNet. Retrieved November 25, 2022, from https://www.american.edu/sis/centers/security-technology/russian-cyber-sovereignty.cfm

The Cabinet Office. (2020). The UK Cyber Security Strategy Protecting and Promoting the UK in a Digital World. Retrieved October 16, 2022, from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-

security-strategy-final.pdf

Weber, V. (2020). The Sinicization of Russia’s Cyber Sovereignty Model. Retrieved May 31, 2022, from https://www.cfr.org/blog/sinicization-russias-cyber-sovereignty-model