Introduction

Digital technology is having a great impact in the continued evolution of a digital economy around the world. The growth of digital technologies is resulting in the digitalisation of processes and systems by governments to provide efficient and fast delivery of services to citizens and people around the world (Hulko et al., 2025). As digital infrastructures become increasingly embedded across sectors of the economy, they are no longer merely tools but rather socio-technical systems that shape practices and innovation (Tilson, Lyytinen & Sørensen, 2010; Star and Ruhleder, 1996). They are integral to the way companies, governments and societies function and access information, underpinning platforms and institutions alike (Plantin et al., 2018; Edwards et al., 2009).

This transformation alludes to the growing need for digital autonomy, whereby nations seek to assert control, ownership over digital tools, data and storage (Castells, 2010). This has contributed to the emergence of digital sovereignty which has been defined as “the ability of a state or region to manage and regulate its own digital infrastructure, data management and technological development, while protecting the rights and interests of its citizens in the global digital ecosystem” (Hulko et al., 2025). This is not a neutral concept but has been contested by competing political agendas; for example, the Snowden revelations in June 2013 where the Guardian disclosed thousands of classified documents, which uncovered several mass surveillance programmes run by the National Security Agency (NSA) in the United States (Von Solms et al., 2015). This indicated the breach of citizen privacy and misuse of data however, with a political agenda that the government justified as security reasons. This paper is a comparative study of the U.S. and China perspectives on digital sovereignty and how it has contributed to severing political and international relations between the two nations. The discussion will focus on security, data localisation, technological advancement, rights and freedoms of citizens and global governance as depicted within the two countries. 

Literature Review

This literature review explores the different ways that countries navigate digital sovereignty with a focus on the U.S. and China. The literature will highlight each country’s dynamics, their strategies politically and technologically, and how they compare and or contrast. In this paper, we cover: firstly, technological advancements and sovereignty between the U.S. and China; secondly, the unique approaches of each country; and finally, human rights, and digital citizenship.

Technological Advancements and Sovereignty Dynamics in the U.S. and China

In the United States, digital sovereignty is mainly viewed as protecting American technology and ensuring the country stays a global leader (Roberts et al., 2023). The U.S. policy tools are used to express digital sovereignty such as cybersecurity statutes, export controls on technology and regulatory scrutiny of major tech firms. A prominent example is the CHIPS and Science Act of 2022, which appropriates around US$52.7 billion to bolster domestic semiconductor research and manufacturing (Ezell & Bean, 2024; Wikipedia, 2025). Semiconductors – tiny chips powering everything from smartphones to aeroplanes – are central to leading technological advancement (Ezell & Bean, 2024). This shows that U.S. digital sovereignty is predominantly about staying competitive and safe, while keeping the internet mostly open for trade and communication (O’Neil, 2023). 

While the United States takes on a market-driven and security-focused path to digital sovereignty, China’s strong government controls shape its digital future. China has a stricter view of digital sovereignty, often called cyber sovereignty (Zeng, 2018; Creemers, 2020). For example, the Cybersecurity Law of 2017 requires important data to stay inside China and not be stored in other countries (Creemers, 2017). China also has plans like Made in China 2025, which focuses on building its own advanced technology such as robots, artificial intelligence (AI) and semiconductors (Hong, 2017). Beyond its borders, China promotes the Digital Silk Road, part of its Belt and Road Initiative, by selling Chinese-built internet and communication systems to other countries (Shen, 2018). 

Comparing the U.S. and China shows two different approaches to technology and sovereignty. Around the world, technology has been advancing quickly, reshaping societies, economies and politics on a global scale, with the International Telecommunication Union (ITU) reporting that about two-thirds of people on Earth had access to the internet, though poorer countries are still behind (ITU, 2023). The rise of mobile broadband (fast internet on phones) and cloud computing (storing and using data online instead of only on personal devices) has made communication and work easier for billions of people (International Telecommunication Union, 2022; Marston et al., 2011). Artificial intelligence is also transforming sectors like healthcare, finance and education (OECD, 2020). Studies show that the need for data is just as important as shipping goods like oil or cars for trade (Manyika et al., 2016). However, the benefits are not equal everywhere: some countries have fast digital progress, while others are slowed down by weak internet and high costs (OECD, 2020). Researchers argue that most new technology is centred in North America, Europe and East Asia, leaving other regions behind (Qureshi, 2022).

Due to this, “digital sovereignty” has become important, and countries want to decide how their data is accessed, stored and used to protect citizens, innovations and their industries (Milan & Treré, 2019). These strategies reflect concerns of privacy, national security and economic competitiveness (Bradford, 2020). Looking at these global trends, it becomes clear that the U.S. has played a major role in pushing technological progress forward. The United States has been a leader in technology for decades; in the 1960s, the government created DARPA (Defense Advanced Research Projects Agency), which helped fund the early internet (Mowery, 2010). Today, American universities, research centres and private companies drive progress in artificial intelligence, cloud services and semiconductors (O’Neil, 2023). The U.S. has also built exascale supercomputers – machines so powerful they can do more than a billion calculations each second (Shalf, 2020). These computers help with research in science, weather prediction and national security. At the same time, the U.S. faces debates about the power of its biggest tech companies, such as Google, Microsoft and Amazon (O’Neil, 2023). Other scholars warn that if too few companies control most digital services, it could harm competition and give them too much influence (Stucke, 2021). Overall, the U.S. approach to technology combines government support, private business innovation and new laws to secure supply chains. This balance allows the U.S. to keep its leadership role, but it also creates challenges about how to regulate companies and protect national security.

China has rapidly caught up and, in some areas, even pulled ahead. Its rise as a global tech powerhouse shows how state planning and massive investment can reshape the global balance of innovation (Zenglein & Holzmann, 2019). China has developed its technology over the last two decades, mostly through government planning and strong domestic companies (Lee, 2018). The Made in China 2025 programme aims to upgrade industries like robotics, semiconductors and electric vehicles so China does not depend on foreign technology (Zenglein & Holzmann, 2019). Research shows this plan has also encouraged “green technology”, meaning more energy-efficient and environmentally-friendly industries (Li, 2020). China also promotes its influence abroad through the Digital Silk Road, which builds internet infrastructure, fibre-optic cables and 5G networks in partner countries (Shen, 2018). This helps spread Chinese technology and strengthens global trade connections. Another major achievement is the BeiDou Navigation Satellite System, which became fully operational in 2020. BeiDou is China’s own version of GPS which gives China independence in global navigation and security (Yang et al., 2021).

Within China, the government enforces its idea of cyber sovereignty through the Great Firewall. This system blocks foreign websites such as Google and Twitter, while supporting the use and adoption of Chinese platforms like WeChat and Baidu (Creemers, 2017). While this gives the government control and stability, it also limits free access to information outside China (Hong, 2017). In short, China’s advances are not only about building new products but also about creating a full digital system that is self-reliant and extends its power and autonomy beyond its borders (Zenglein & Holzmann, 2019).

Different countries handle digital technology in very different ways, often depending on whether their government is more democratic or authoritarian. In democratic countries like the United States, the focus tends to be on protecting citizens’ digital rights, such as privacy and freedom of expression, even though governments still monitor some online activity for security reasons (Abbas et al., 2025). On the other hand, authoritarian countries like China often prioritise control and surveillance over individual digital rights (Chin & Li, 2021). The government closely monitors internet use, filters content and enforces strict rules on online speech to maintain social stability and political control (Chin & Li, 2021). For example, platforms like TikTok and WeChat must comply with government regulations that allow authorities to track data and manage information flows (Su & Tang, 2023).

Data Localisation as a Dimension of Digital Sovereignty

THE CHINA STRATEGY

Data localisation is defined as “a policy implemented by a state that requires entities to store data within its sovereign territory” (Cambridge University Press, 2024). For data localisation to work, technological companies must comply with local data collection laws by ensuring the personal data of its users or customers is stored within a country’s borders (Cambridge University Press, 2024). In China, the country has several localisation laws, including the Cybersecurity Law which dictates how enterprises manoeuvre networks and control data usage (Hong, 2017), and the Data Security Law and Personal Information Protection Law, which regulate how data is classified, processed and protected both within and beyond China’s borders (Roper, 2025). It is a strategy implemented with national security in mind as localising data can alleviate the risk of “foreign surveillance, cyber-attacks and unauthorised data access, safeguarding national sovereignty and sensitive information” (El Kadi, 2025).  This strategy may be counter intuitive as Wayan Vota (2024), in his article on digital localisation and politics, argues that data would be infinitely safer in international centres, protected by thorough physical and digital security measures, than in unsecure physical government locations.

An economic dimension also plays an important role in driving data localisation efforts. Many countries view the restriction of cross-border data flows as a strategic tool that “reduces dependency on foreign providers” and limits international competition (El Kadi, 2025). By keeping data within national borders, governments aim to foster the growth of local businesses and service providers, create high-skilled jobs and stimulate innovation within domestic technology industries (Zenglein & Holzmann, 2019). These policies are framed as part of economic development strategies intended to build competitive, self-sustaining digital economies (Vota, 2024). When it comes to cross-country negotiations, data localisation can also serve as a significant asset for countries that have implemented it. Vota continues to assert that by controlling and housing their own data, these nations gain leverage in international discussions on trade, privacy standards and digital governance. The ability to manage and secure domestic data infrastructure not only enhances national security but also strengthens a country’s bargaining position in shaping the global digital economy (Segal, 2021). However, many developing countries may face significant barriers when it comes to hosting their own data due to factors such as unreliable power supply, limited digital infrastructure and the cost of setting up a data centre (Folashadé, 2024); for example, Africa “accounts for less than 1% of the world’s data centre capacity” (Goko, 2025). Despite the struggles, countries have started drafting data protection laws and relying on external help, like the World Bank Organization in its aid to the continent of Africa through financial interventions (Goko, 2025) and the United Nations in its guidance on handling data responsibly (World Privacy Forum, 2020).

Keeping abreast of China’s approach to digital sovereignty, one would argue that it is grounded in the principle of digital authoritarianism – “the use of technology by authoritarian governments not only to control, but to shape, the behaviour of its citizens through surveillance of usage and censorship” (Khalil, 2020). The result of digital authoritarianism can be widespread misinformation, the violation of human rights such as freedom of expression and privacy, and consolidation of political control (Feldstein, 2019; Diamond, 2021). It creates a climate of fear and a significant reduction in the civic space for open debate and participatory decision-making (Repnikova, 2017). 

In China, digital authoritarianism is exercised through strict regulation and data localisation, with the goal of prioritising political stability and regime security (Creemers, 2020; Segal, 2020). An example of the China strategy is the “Social Credit System”, a complicated and evolving initiative aiming to monitor and gauge the trustworthiness of mostly businesses and government entities, but occasionally individuals (Dai, 2018; Liang et al., 2018). The initiative was formed in 2002 under President Jiang Zemin, but traces back to the 1990s originally meant as a “self-enforcing mechanism to discipline market behaviour in the absence of a functional legal system” but evolving to include broader social and moral dimensions (Cambridge University Press, 2023). According to the Cambridge University Press (2023), the system is undergoing modifications and aims to enhance trust within society and companies, by discouraging corruption, scams and tax evasion, and to promote responsible decision-making in accordance with the Chinese Communist Party values.

The social credit system is not a widespread digital framework; different cities, local governments and companies have their own policies, all under different names (Kobie, 2019). The system, “still a work in progress and far from [a] nationwide implementation”, works by collecting data from diverse platforms, including online banking apps, financial records and government records, and accumulating them for analysis (Feng, 2022). A score is then created for individuals and entities, either in a letter grade or numerical score, who then receive rewards like loan waivers or punishments like limited transportation access (Kobie, 2019). Local governments have been more ambitious in their efforts and have piloted more advanced versions, meshing financial credit scoring with social and moral evaluation to regulate behaviour and promote government objectives (Yu, 2023). 

Outside of the country, China holds a significant influence over international digital spaces. A prominent example is TikTok, the viral video-sharing app owned by Chinese tech company ByteDance, which has rapidly become one of the most downloaded apps globally and has raised concerns and debates over data governance, security and cultural influence (Kaye, 2022; Chen et al., 2022). Although TikTok operates internationally and has made efforts to present itself as a global platform with localised operations, concerns persist about the Chinese government’s indirect influence over the app (Scharre, 2023). 

There have been numerous instances of political censoring, including posts under #GeorgeFloyd and #BlackLivesMatter, a viral video criticising Chinese treatment of Muslims, clips of “tank man” (the anonymous protester who stood in front of a column of tanks during the 1989 Tiananmen Square massacre in Beijing) and content relating to the Houston Rockets basketball team, whose general manager has publicly sided with Hong Kong protestors (Scharre, 2023). It is important to note that TikTok is not available in mainland China. Instead, Chinese users have access to Douyin, its counterpart that is regulated separately and is also developed by ByteDance (Associated Press, 2023). These incidents point to a broader concern that China’s influence can shape or censor political narratives even on platforms used predominantly outside of China (Chen et al., 2022). 

In the United States, there have been fears over data privacy following arguments that TikTok could be used as a tool of surveillance by the Chinese government and the possibility that data of American users could be accessed (New York Times, 2025). The New York Times reported that American officials insist that the app “poses a threat to national security” and as a result, there have been efforts by the U.S. to buy the app or to ban it completely (New York Times, 2025).

SECURITY THROUGH ACCESS: THE U.S. STRATEGY

The United States takes a different approach to digital governance and sovereignty compared to China, advancing what can be described as the “security through access” model (Delev, 2025). The U.S. relies on openness in cyberspace, underpinned by its tech institutions and what scholars have termed “digital solidarity.” This practice reflects a strategy of soft sovereignty in which influence is exerted through global market leadership and technological integration, rather than strict state control. 

In effect, the U.S. promotes and operationalises an open digital order through its policy orientations and the global reach of its corporate actors – for example, the CLOUD Act of 2018, a document that shapes the premise of U.S. cross-border data sharing and collection. The Act was updated to reflect on the U.S. data sovereignty stance (Floridi, 2020): a call for “access to data held by U.S.-based technology companies, regardless of where that data is physically stored in the world” (Ortiz, 2025). 

Since the early 2000s, U.S. tech companies such as Meta, Amazon, Microsoft and Alphabet have undergone exponential growth, cementing their role as architects of the digital ecosystem. For example, Microsoft achieved a market valuation exceeding US$2.5 trillion within just 15 years (Armstrong, 2021). As of January 2025, numerous U.S.-based tech corporations have become some of the “most valuable internet company by market capitalisation worldwide” (Petrosyan, 2025).

DIGITAL PUBLIC INFRASTRUCTURE AND ITS IMPACT IN PROMOTING A DIGITAL ECONOMY

Digital public infrastructures (DPIs) are foundational digital systems like digital IDs, payment platforms, data exchange layers and authentication systems that enable participation in the digital economy and governance, fostering the need for digital sovereignty (UNDP, 2023). In the case of the U.S., there has not been a fully integrated DPI system or model like India’s India Stack or Estonia’s X-Road. This is mainly due to privacy and federalism concerns (Khera, 2022; Cummings, 2021). Instead, the U.S. relies on a fragmented market-driven model with a stronghold in the digital space run through the private actors like Apple Pay, Paypal, Mastercard, Visa and Google Cloud (Aaronson, 2021). Instead of the typical DPI, government infrastructures like Social Security Numbers are more favourable (Paul, 2020). This indicates how the U.S. leverages its tech firms to exercise digital power in the geopolitical space by shaping standards through infrastructure (Farrell & Newman, 2019). 

It is important to note that, as a market leader, the United States positions digital solidarity as a central component of its digital strategy (U.S. Department of State, 2024). Far from being a rhetorical device, digital solidarity operates as a geopolitical instrument that reinforces U.S. market dominance in cyberspace while shaping the terms of global digital competition (Nye, 2010; Farrell & Newman, 2019). The U.S. and other countries like those in the European Union rely heavily on technological giants to shape the national and international cyberspace (Pohle & Thiel, 2020).

Contesting Sovereignty: Digital Technologies and Shifts in Global Political Dynamics

The United States and China’s approach to digital sovereignty through governance models, regulations and data localisation strategies are clearly diametrically opposed. China mainly prioritises state control over utilising free-flowing digital infrastructures through their use of strict censorship, regulations and policies that maintain the government’s prominent digital authority within China. In contrast, the United States has a primarily opposite strategy, embodying an open digital market approach, encouraging international data flow and technological innovation. 

Nonetheless, both states deem national security to be of equal importance and consider it a key aspect to take into consideration when creating legal frameworks to regulate their digital sovereignty. It is evident that digital sovereignty stretches beyond internal domestic policies and legislation and farther into the international realm (Jansen, 2023). Global disputes often arise due to emerging technologies as they serve as an instrument of influence on geopolitical power (Friis & Lysne, 2021). An example is 5G, which is not only about faster internet – it also underpins emerging technologies like AI, IoT, autonomous vehicles, smart cities and digital finance (GSMA, 2023). Whoever leads in 5G has geopolitical leverage, as countries supplying the technology may shape global standards and dependencies (Jansen, 2023).

The U.S.-China dominance in digital sovereignty is an indication of the influence of technology. In the case of China, Huawei and Zhongxing Telecommunication Equipment Corporation (ZTE) became major global suppliers of 5G infrastructure which raised security, surveillance and dependency concerns in Europe and the U.S. (Hung, 2025). As a result, the U.S. restricted Chinese firms from accessing its markets and tried to exert pressure on their allies to limit Huawei’s involvement in framing 5G. In response to this, China found a way out by exporting tech products and solutions to Africa and now has a huge market base in the continent, increasing the continent’s dependency on China (Cambridge University Press, 2025).

The 5G rivalry is an example that demonstrates how control of digital infrastructures can reshape international power dynamics and grant countries significant advantages over the other (Musoni et al., 2023). For these reasons, nations devote extraordinary amounts of time, money and resources into advancing their own hardware technologies, particularly semiconductors which are the backbone of digital infrastructures (Roberts, 2023).

Human Rights, Digital Citizenship and Inclusion 

SOVEREIGNTY FOR EMPOWERMENT OR EXCLUSION

In China, the understanding of “cyber sovereignty” positions the state as the primary rights-bearing actor in cyberspace, prioritising territorial control, information security and regime stability over individual liberties (Gao, 2022; Hulvey, 2022). This agenda legitimises extensive infrastructural and discursive controls, from content moderation and real-name registration to data localisation and platform responsibility for “harmful” speech that condition digital citizenship on alignment with state priorities (Moynihan & Patel, 2021). Cases like the Digital Silk Road and multilateral venues show China reframing sovereignty as a universal value to attract support for rules that normalise tighter content and data controls (Hulvey, 2022; Moynihan & Patel, 2021). Emerging research in global internet governance similarly observes China’s boundary-work in International Telecommunication Union (ITU) processes and related forums that centre state competencies over multistakeholder approaches (Guangyu Qiao-Franco, 2024). In this context, we can see how China is consolidating authority by legitimising and broadening power on digital governance. 

In contrast, the United States’ liberal approach, historically anchored in the First Amendment and the platform-liability shield of Section 230, creates private ordering of online speech (Goldman, 2022; Dickinson, 2025). Yet this empowerment is uneven with the corporate “platform rule” marginalising users through opaque content governance and data extraction. The absence of a comprehensive federal privacy statute weakens user control over personal data (Kohl, 2025). Moreover, extraterritorial surveillance and evidence-gathering powers under the CLOUD Act reassert state prerogatives in ways that could conflict with foreign privacy laws and digital rights aspirations, raising inclusion and reciprocity concerns for users outside the U.S. (Bilgiç, 2018; Cochrane, 2022). In short, both models mobilise sovereignty to structure the citizen-state-platform triangle, but with different default beneficiaries. China’s configuration privileges state cohesion over dissenting user agency, while the U.S. configuration privileges private intermediaries and freedom of speech, sometimes at the expense of privacy, transparency and equitable participation.

IMPACTS ON PRIVACY, FREEDOM OF EXPRESSION AND ACCESS TO INFORMATION

The political agendas of China and the U.S. translate into distinct digital rights outcomes for their citizens. In China, restrictions on online expression, supported by pervasive automated and human moderation, systematically narrow the space for contestation and collective organisation, with negative effects on minorities and dissidents (Moynihan & Patel, 2021). Access to information is curated through a complex regime of filtering, licencing and intermediary liability (Gao, 2022). In the case of the U.S. model, it protects expression against state interference, and Section 230 of the Communications Decency Act of 1996 historically insulated platforms from most publisher liability, facilitating pluralism and user-generated production of knowledge (Dickinson, 2025). In reference to digital citizenship, the Chinese approach conditions rights on civic conformity within a securitised information order, while the U.S. approach presumes liberty of speech but delivers uneven privacy and due-process protections in predominantly private spaces. From a wider viewpoint, both systems risk reproducing inequality: through political conformity in China and through market-driven, data-extractive infrastructures and uneven redress in the U.S. (Musoni, 2023).

INTERNATIONAL BODIES: RULE SHAPING AND VENUE SHOPPING

International bodies like the UN and ITU play a pivotal role in shaping digital sovereignty by setting global standards that facilitate and advocate for democratic and inclusive governance, hence the involvement of China and the U.S. in different capacities in these agencies (Rikap, 2024). It is therefore important to consider China and the U.S.’s influence on these institutions. At the ITU, China has advanced proposals aligning technical standards with sovereign control and state oversight, sometimes drawing votes from states favouring order and development narratives over openness (Hulvey, 2022). Within the UN system more broadly, Chinese diplomacy has promoted expansive “cyber sovereignty” framings that soften commitments to freedom of expression in digital contexts (Moynihan & Patel, 2021). Such initiatives recalibrate the baseline against which human rights are weighed, especially in international organisations that are prominent in setting international laws where private and civil-society voices are weaker.

Both the U.S. and China have different levels and ways in which they could influence digital sovereignty within international agencies like the UN and ITU. For instance, the U.S. government influences UN agencies primarily through their substantial financial contributions and participation in governance and policy activities (CFR, 2025), which makes it the single largest donor and a powerful stakeholder across the UN system with more than a quarter of funding donated for UN programmes. This is evident in the recent reduction of funding by the U.S. government in the sector of international development which has affected humanitarian projects across the globe. This financial influence allows the U.S. to drive priorities and shape digital policies that allow their dominance on digital sovereignty through big tech companies.

Conclusion

From digital authoritarianism with a goal of expanding its reach to a digital democracy trying to foster connections while dominating the market, the Chinese and U.S. approaches to digital sovereignty and governance seem as if they could not be further apart. After both countries faced a surge in their digital structure quality and internet market value, their differing political agendas and visions for the future began to clash with one another even more. On one hand, the PRC opts for a strict and unyielding approach to their digital sovereignty, compromising individual privacy rights for the sake of high cybersecurity on a national level. On the other hand, the United States remains far more liberal in their approach, relying almost exclusively on their big tech corporations to not only monitor the cyberspace, but also capitalise the global market. These two polarised systems have largely impacted not only politics but also human rights in the cyberspace, leading global institutions and regulatory bodies to have to pick one side or the other. With both parties finding it increasingly challenging to not only align their digital policies but also engage in diplomatic dialogue on digital sovereignty, questions regarding a deeper, larger scale conflict between the two parties arise.  

Bibliography

    Aaronson, S.A. (2021) ‘The digital trade debate: From trade regulation to data governance’, Journal of International Economic Law, 24(2), pp. 199–222.

    Ahn, J., Khandelwal, A. & Wei, S.-J. (2010) ‘The role of intermediaries in facilitating trade’, RePEc: Research Papers in Economics. <https://doi.org/10.3386/w15706>

    AmCham EU (2025) The critical role of US cloud services providers in the EU. American Chamber of Commerce to the European Union, p. 2 <https://www.amchameu.eu/system/files/position_papers/20250515_the_critical_role_of_us_cloud_technology_providers_in_the_eu.pdf>

    Armstrong, M. (2021) The age of the tech giants. Statista Infographics. <https://www.statista.com/chart/22677/the-age-of-the-tech-giants/>

    ASTERES Group (n.d.) Technological dependence on American software and cloud services: An assessment of the economic consequences in Europe. <https://www.cigref.fr/wp/wp-content/uploads/2025/05/TECHNOLOGICAL-DEPENDENCE-ON-AMERICAN-SOFTWARE-AND-CLOUD-SERVICES-AN-ASSESSMENT-OF-THE-ECONOMIC-CONSEQUENCES.pdf>

    Bilgic, S. (2018) ‘Something old, something new, and something moot: The privacy crisis under the CLOUD Act’, Harvard Journal of Law & Technology, 32(1). <https://jolt.law.harvard.edu/assets/articlePDFs/v32/32HarvJLTech321.pdf>

    Bradford, A. (2020) The Brussels effect: How the European Union rules the world. Oxford: Oxford University Press.

    Brussee, V. (2022) ‘China’s social credit score – Untangling myth from reality’, Merics. <https://merics.org/en/comment/chinas-social-credit-score-untangling-myth-reality>

    Cambridge University Press (2025) ‘The spatial expansion of China’s digital sovereignty’, Digital sovereignty in the BRICS countries.

    Chan, K. (2024) ‘These are the countries where TikTok is already banned’, AP News. <https://apnews.com/article/tiktok-bytedance-ban-china-india-376f32d78861e14e65ec4bc78e808a0d>

    Chen, C., Widjaja, M.A. & Xu, W.W. (2022) ‘TikTok and the politics of Chinese soft power’, International Journal of Communication, 16, pp. 4512–4532. <https://ijoc.org/index.php/ijoc/article/view/19048>

    Chin, Y.C. & Li, K. (2021) ‘A comparative analysis of cyber sovereignty policies in China and the EU’, SSRN Electronic Journal. <https://doi.org/10.2139/ssrn.3900752>

    Cochrane, T. (2021) ‘Hiding in the eye of the storm cloud: How CLOUD Act agreements expand’, Duke Journal of Comparative & International Law. <https://scholarship.law.duke.edu/djcil/vol32/iss1/4/>

    Creemers, R. (2020) ‘China’s conception of cyber sovereignty: Rhetoric and reality’, Journal of Cyber Policy, 5(1), pp. 94–113. <https://doi.org/10.1080/23738871.2020.1728358>

    Cummings, C. (2021) Digital federalism and the limits of U.S. data infrastructure. Brookings Institution Report.

    Dai, X. (2018) ‘Toward a reputation state: The social credit system project of China’, SSRN Electronic Journal. <https://doi.org/10.2139/ssrn.3193577>

    Dickinson, G.M. (2025) ‘Section 230: a juridical history’, SSRN Electronic Journal. <https://doi.org/10.2139/ssrn.5164697>

    Dzigal, N., Safarpour, D., Godolja, D. & Süsslin, L.E. (2024) ‘Digital sovereignty and geopolitics in the field of data protection: A comparison of the EU, China, and the USA’, ResearchGate. <https://www.researchgate.net/publication/389356939_Digital_Sovereignty_and_Geopolitics_in_the_Field_of_Data_Protection_A_Comparison_of_the_EU_China_and_the_USA#pf1c>

    Edwards, P.N., Bowker, G.C., Jackson, S.J. & Williams, R. (2009) ‘Introduction: An agenda for infrastructure studies’, Journal of the Association for Information Systems, 10(5), pp. 364–374.

    Farrell, H. & Newman, A. (2019) Of privacy and power: The transatlantic struggle over freedom and security. Princeton: Princeton University Press.

    Fleming, S. (2025) ‘What is digital sovereignty and how are countries approaching it?’, World Economic Forum. <https://www.weforum.org/stories/2025/01/europe-digital-sovereignty/>

    Fratini, S., Hine, E., Novelli, C., Roberts, H. & Floridi, L. (2024) ‘Digital sovereignty: A descriptive analysis and a critical evaluation of existing models’, Deleted Journal, 3(3). <https://doi.org/10.1007/s44206-024-00146-7>

    Friis, K. & Lysne, O. (2021) ‘Huawei, 5G and security: Technological limitations and political responses’, Development.

    Gábor Hulkó, J., Kálmán, J. and Lapsánszky, A. (2025) ‘The politics of digital sovereignty and the European Union’s legislation: Navigating crises’, Frontiers in Political Science, 7. doi: https://doi.org/10.3389/fpos.2025.1548562.

    Gao, H. (2018) ‘Digital or trade? The contrasting approaches of China and US to digital trade’, Journal of International Economic Law, 21(2), pp. 297–321. <https://doi.org/10.1093/jiel/jgy015>

    Gao, X. (2022) ‘An attractive alternative? China’s approach to cyber governance and its implications for the Western model’, The International Spectator, 57(3), pp. 15–30. <https://doi.org/10.1080/03932729.2022.2074710>

    Goh, B. (2025) ‘China proposes new global AI cooperation organisation’, Reuters. <https://www.reuters.com/world/china/china-proposes-new-global-ai-cooperation-organisation-2025-07-26/>

    Goko, C. (2025) ‘World Bank backs Africa digital data push with $100 million Raxio deal’, Reuters. <https://www.reuters.com/world/africa/world-bank-backs-africa-digital-data-push-with-100-million-raxio-deal-2025-04-03/>

    Goldman, E. (2023) ‘The United States’ approach to “platform” regulation’, SSRN Electronic Journal. <https://doi.org/10.2139/ssrn.4404374>

    Guangyu, Q.-F. (2024) ‘An emergent community of cyber sovereignty: The reproduction of boundaries?’, Global Studies Quarterly, 4(1). <https://doi.org/10.1093/isagsq/ksad077>

    GSMA (2023) The mobile economy 2023.

    Han, S. (2024) ‘Data and statecraft: Why and how states localize data’, Business and Politics, pp. 1–26. <https://doi.org/10.1017/bap.2023.41>

    Hatch, O.G. (2018) Text – S.2383 – 115th Congress (2017–2018): CLOUD Act. <https://www.congress.gov/bill/115th-congress/senate-bill/2383/text>

    Hulvey, R. (n.d.) Cyber sovereignty: How China is changing the rules of internet freedom. <https://ucigcc.org/wp-content/uploads/2022/06/2022_wp2_hulvey-FINAL.pdf>

    Hung, H.T. (2025) ‘Exploring China’s cyber sovereignty concept and artificial intelligence governance model: A machine learning approach’, Journal of Computational Social Science, 8, p. 24. <https://doi.org/10.1007/s42001-024-00346-8>

    Jansen, B. (2023) ‘An empirical view on the digital sovereignty of six countries’, Government Information Quarterly.

    Kaye, D. (2022) ‘TikTok: Technology, geopolitics and global governance’, Surveillance & Society, 20(1), pp. 83–89. <https://doi.org/10.24908/ss.v20i1.15140>

    Khan, M. & Jha, G. (2025) ‘AWS accelerates digital public infrastructure adoption with automation’, Amazon Web Services. <https://aws.amazon.com/blogs/publicsector/aws-accelerates-dpi-adoption-for-citizen-services-through-automation/>

    Khalil, L. (2025) Digital authoritarianism, China and COVID. Lowy Institute. <https://www.lowyinstitute.org/publications/digital-authoritarianism-china-covid>

    Khera, R. (2022) ‘India’s digital public infrastructure: Between inclusion and surveillance’, Economic and Political Weekly, 57(34).

    Kobie, N. (2019) ‘The complicated truth about China’s social credit system’, WIRED. <https://www.wired.com/story/china-social-credit-system-explained/>

    Kohl, U. (2024) ‘Towards a regulatory theory of platform rule: Corporate “sovereignty” through immunities’, SSRN Electronic Journal. <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4764035>

    Lee, K.F. (2018) AI superpowers: China, Silicon Valley, and the new world order. Boston: Houghton Mifflin Harcourt.

    Levy, D. (2024) ‘Digital public infrastructure is high priority for governments worldwide’, Amazon Web Services. <https://aws.amazon.com/blogs/publicsector/digital-public-infrastructure-high-priority-governments-worldwide/>

    Liang, F., Das, V., Kostyuk, N. & Hussain, M.M. (2018) ‘Constructing a data-driven society: China’s social credit system as a state surveillance infrastructure’, Policy & Internet, 10(4), pp. 415–453. <https://doi.org/10.1002/poi3.183>

    Li, L., Abbas, S.T., Khan, G.R. & Ali, S. (2025) ‘Competing narratives of technological sovereignty: A constructivist analysis of U.S.-China AI diplomacy’, Contemporary Journal of Social Science Review, 3(2), pp. 538–554. <https://www.researchgate.net/publication/391672415_COMPETING_NARRATIVES_OF_TECHNOLOGICAL_SOVEREIGNTY_A_CONSTRUCTIVIST_ANALYSIS_OF_US-CHINA_AI_DIPLOMACY>

    Lin, L. Y.-H., & Milhaupt, C.J. (2023) ‘China’s corporate social credit system: The dawn of surveillance state capitalism?’, The China Quarterly, 256, pp. 1–19. <https://doi.org/10.1017/s030574102300067x>

    M.E., S. (2021) ‘Should we be concerned about data-opolies?’, SSRN Electronic Journal. <https://doi.org/10.2139/ssrn.2903619>

    Maheshwari, S. & Holpuch, A. (2025) ‘Why TikTok is facing a U.S. ban, and what could happen next’, The New York Times. <https://www.nytimes.com/article/tiktok-ban.html>

    Milan, S. & Treré, E. (2019) ‘Big data from the South(s): Beyond data universalism’, Television & New Media, 20(4), pp. 319–335. <https://doi.org/10.1177/1527476419837739>

    Moynihan, H. & Patel, C. (2021) Restrictions on online freedom of expression in China: The domestic, regional and international implications of China’s policies and practices. Chatham House. <https://www.chathamhouse.org/sites/default/files/2021-03/2021-03-17-restrictions-online-freedom-expression-china-moynihan-patel.pdf>

    Musoni, M., Karkare, P., Teevan, C. & Domingo, E. (2023) ‘Global approaches to digital sovereignty: Competing definitions and contrasting policy’, ECDPM Discussion Paper No. 344.

    Nordås, H. (2021) Services trade governance in the digital economy. <https://www.cepweb.org/wp-content/uploads/2021/03/Kyvik-Nordas-2021.-Services-Trade-Governance-in-the-Digital-Economy.pdf>

    OECD (2020) Digital economy outlook 2020. Paris: OECD Publishing. <https://doi.org/10.1787/bb167041-en>

    OECD (2025) The partnership of international organisations for effective rulemaking. <https://www.oecd.org/en/networks/the-partnership-of-international-organisations-for-effective-rulemaking.html>

    Ortiz, G. (2025) ‘U.S. laws reshape digital sovereignty for IAM’, Thales Cloud Security Products. <https://cpl.thalesgroup.com/blog/access-management/digital-sovereignty-iam-us-laws>

    Paul, K.T. (2020) ‘The role of social security numbers in U.S. governance’, Government Information Quarterly, 37(4), 101491.

    Plantin, J.C., Lagoze, C., Edwards, P.N. & Sandvig, C. (2018) ‘Infrastructure studies meet platform studies in the age of Google and Facebook’, New Media & Society, 20(1), pp. 293–310. <https://doi.org/10.1177/1461444816661553>

    Roberts, H. (2023) ‘Digital sovereignty, digital expansionism, and the prospects for digital autonomy’, SSRN Electronic Journal.

    Roberts, H., Cowls, J., Casolari, F., Morley, J., Taddeo, M. & Floridi, L. (2021) ‘Safeguarding European values with digital sovereignty: An analysis of statements and policies’, Internet Policy Review, 10(3). <https://policyreview.info/articles/analysis/safeguarding-european-values-digital-sovereignty-analysis-statements-and-policies>

    S, E. (2022) ‘The CHIPS and Science Act: A new dawn for U.S. semiconductor leadership’, Information Technology & Innovation Foundation (ITIF). <https://itif.org/publications/2022/08/09/chips-and-science-act-new-dawn-us-semiconductor-leadership>

    Scharre, P. (2023) The dangers of the global spread of China’s digital authoritarianism. Center for a New American Security (CNAS). <https://www.cnas.org/publications/congressional-testimony/the-dangers-of-the-global-spread-of-chinas-digital-authoritarianism>

    Shen, H. (2018) ‘Building a digital silk road? Situating the internet in China’s Belt and Road Initiative’, International Journal of Communication, 12, pp. 2683–2701.

    Soulé, F. (2024) Digital sovereignty in Africa: Moving beyond local data ownership. Centre for International Governance Innovation, Policy Brief.

    Star, S.L. & Ruhleder, K. (1996) ‘Steps toward an ecology of infrastructure: Design and access for large information spaces’, Information Systems Research, 7(1), pp. 111–134. <https://doi.org/10.1287/isre.7.1.111>

    Su, C. & Tang, W. (2023) ‘Data sovereignty and platform neutrality – A comparative study on TikTok’s data policy’, Global Media and China, 8(1), pp. 57–71. <https://doi.org/10.1177/20594364231154340>

    TechObserver India (2024) ‘AWS to invest $12.7 billion in India’s digital infrastructure by 2030’, TechObserver India. <https://techobserver.in/news/egov/aws-to-invest-12-7-billion-in-indias-digital-infrastructure-by-2030-287765/>

    Tilson, D., Lyytinen, K. & Sørensen, C. (2010) ‘Digital infrastructures: The missing IS research agenda’, Information Systems Research, 21(4), pp. 748–759. <https://doi.org/10.1287/isre.1100.0318>

    United Nations Development Programme (UNDP) (2023) Inclusive digital public infrastructure for people with disabilities. New York: UNDP.

    United States Department of State (2025) Digital freedom. <https://www.state.gov/digital-freedom/>

    Von Solms, R. & Von Solms, S. (2018) Cybersecurity and cyber sovereignty. Springer.

    Vota, W. (2023) The case against digital public infrastructure. ICTworks. <https://www.ictworks.org/case-against-digital-public-infrastructure/>

    World Trade Organization (WTO) (2021) E-commerce, trade and the digital economy. Geneva: WTO.

    Zeng, J., Stevens, T. & Chen, Y. (2017) ‘China’s solution to global cyber governance: Unpacking the domestic discourse of “internet sovereignty”’, Politics & Policy, 45(3), pp. 432–464. <https://doi.org/10.1111/polp.12206>

    Zhao, X. (2023) Digital sovereignty in China: Achieving cyber superpower status. Routledge.