description: the concept that data is subject to the laws and governance structures within a nation's borders
11 results
by Jacob Silverman · 9 Oct 2025 · 312pp · 103,645 words
. Amidst America’s crude sound-bite-driven politics, the battle around TikTok was reduced to a Sinophobic moral panic, rather than a complex debate about data sovereignty, free speech, the contested definition of “disinformation,” and big tech’s pioneering use of surveillance as a business model. Banning TikTok seemed like a crude
by David G. W. Birch and Victoria Richardson · 28 Apr 2024 · 249pp · 74,201 words
of customers, and strategic alliances are well understood), there must be trusted data networks (that is, data exchange mechanisms and contracts) provided under well-defined data sovereignty principles (Scerri et al. 2022). Data is not the new oil The idea that with these trusted networks in place data economies can grow in
by Benjamin H. Bratton · 19 Feb 2016 · 903pp · 235,753 words
designed? Could this composite city-machine, based on the terms of mobility and immobility, a public ethics of energy and electrons, and unforeseeable manifestations of data sovereignty (various parts looking like chora, demos, agora, polis, dromos, and technics) provide for some kind of ambient homeland? If so, for whom and for what
by Anu Bradford · 25 Sep 2023 · 898pp · 236,779 words
most affordable path toward digital development, which is key to their economic growth. Some of these governments are also likely drawn to the promise of “data sovereignty,” which gives them greater control of data flows. However, no doubt, some governments also share the ideological underpinnings of the Chinese regulatory model. They cherish
…
technology order, pulling more countries closer into its orbit both technologically and geopolitically.161 If this occurs, the Chinese government’s much-touted idea of data sovereignty will be illusory as these DSR recipients will ultimately be subject to the control of the CCP.162 To date, there is limited evidence on
…
–23 Virginia Consumer Data Protection Act, 336 Data Retention Directive (EU), 227–28 Data Security Law (DSL) (China), 79–80, 94–95, 175, 201–2 data sovereignty, 297 data transfers Safe Harbor agreement, 111, 229–30 transatlantic, 222–23, 226–36 decisional privacy, 4, 66, 368–69 “Declaration for the Future of
by Annalee Newitz · 3 Jun 2024 · 251pp · 68,713 words
Research Journal 29, no. 2 (2005): 1. 5. See the map in the National Archives digital catalog: https://catalog.archives.gov/id/50926100. 6. “Indigenous Data Sovereignty,” “Research Guides: Indigenous Studies,” University of Toronto Libraries, accessed September 1, 2023. https://guides.library.utoronto.ca/indigenousstudies/datasovereignty. 7. O’Neal, J. R., “The
by Tim Berners-Lee · 8 Sep 2025 · 347pp · 100,038 words
them all over the web with ads. I felt this was a privacy violation, and in talks, I began to speak of the concept of ‘data sovereignty’ – the idea that you, not Facebook, should own your profile and your history of interactions. • The first large-scale demonstration that social media was going
…
talk more about this switch from the attention economy to the intention economy in the next chapter. To get to that point, the problem of data sovereignty is one of many looming issues with AI that we’ll have to get right. Many of the most powerful new AI models are Retrieval
…
-looking panel of leading scientists and industrialists. I was used to giving acceptance speeches, but this felt different. This time, the award was for ‘promoting data sovereignty’, and it specifically gave credit and honour to the open-source Solid protocol I was trying to get the world to adopt. I was deeply
…
my Design Issues map of the internet, our aim should be not just to identify and fight bad things online, but to build better ones. Data sovereignty is a term most people associate with nations, but in my speech, I suggested what it really meant was that individuals should have control over
…
their own data. And not only control: personal data sovereignty should also allow individuals to be empowered by their own digital footprint. Going back to the example from years before, when I went skiing with
…
data, but for all sorts of data – when you link your health data with your financial data, and gain new insights, you are exercising your data sovereignty. Receiving the peace prize brought home that people across the world were seeing the power of data – if only it could be ethically harnessed in
…
I went, people agreed that our relationship with online technology had to change. Receiving the Seoul Peace Prize in 2022 – my first prize that recognized data sovereignty. • The idea of the ‘intention economy’ had been circulating in my mind long before I first discussed it with my co-founder John Bruce on
…
was the product of centuries of negotiation for the special, sovereign rights of the individual. That’s why being awarded the Seoul Peace Prize for data sovereignty was significant to me, because it recognized the importance of this concept. That’s my goal now, that’s my passion. We have to feel
…
it might repurpose the information pathways of the web entirely, just as new activities repurposed the waterway at Regent’s Canal. As this happens, establishing data sovereignty becomes even more important. A sufficiently powerful AI might exploit you in subtle ways you can’t even detect. Imagine if the same incentives for
…
world today. • As I look towards the future, I see a new web taking shape. It will be decentralized, it will realize the ideal of data sovereignty, and it will put AI to good and not ill use. Remember my thought experiment, back in Chapter 12, about an AI that works for
…
around. There’s still time to forge connections between people and use technology to fight for our rights. There’s still time to recapture our data sovereignty. There’s still time to build community. There’s still time for the individual, for the child, for the parent, for the elder, for the
…
data ref1 PODS (Personal Online Data Stores) ref1 read–write web ref1 silos ref1 structures ref1, ref2, ref3, ref4 data packets ref1 data sheets ref1 data sovereignty ref1, ref2, ref3, ref4, ref5, ref6, ref7, ref8 data wallets ref1 see also PODS data.gov.uk ref1 Datasolids ref1 Davies, Roger ref1 Dawkins, Richard
…
Postel, Jon ref1 Postscript language ref1 Priceline ref1 printers, dot-matrix ref1 printing presses ref1, ref2 privacy apps ref1 Contract for the Web ref1, ref2 data sovereignty ref1, ref2, ref3, ref4, ref5, ref6, ref7, ref8 location data ref1 MyData ref1 principle ref1, ref2 regulations ref1 RSA system ref1 Solid ref1, ref2 Prodigy
by Shoshana Zuboff · 15 Jan 2019 · 918pp · 257,605 words
.… Cisco Kinetic gets the right data to the right applications at the right time… while executing policies to enforce data ownership, privacy, security and even data sovereignty laws.”73 But, as is so often the case, the most audacious effort to transform the urban commons into the surveillance capitalist’s equivalent of
by Douglas B. Laney · 4 Sep 2017 · 374pp · 94,508 words
with me how McDonald’s pan-geographic franchise model can make it difficult to get access to some data. He referred to this as a data sovereignty challenge in which getting corporate access to customer, supplier and employee information in various parts of the world requires an approval process and adherence to
by Sonja Thiel and Johannes C. Bernhardt · 31 Dec 2023 · 321pp · 113,564 words
, are paramount for a responsible curation practice. Furthermore, cultural heritage institutions tend to show greater sensitivity and are more rigorous with regard to sensitivity to data sovereignty and to adhering to laws regulating privacy and personal data protection. Last but not least, research data repositories in cultural heritage institutions have typically been
by Jason Torchinsky · 6 May 2019 · 175pp · 54,755 words
are generated by automated and connected driving and that are significant or insignificant to vehicle control come up against their limitations in the autonomy and data sovereignty of road users. It is the vehicle keepers and vehicle users who decide whether their vehicle data that are generated are to be forwarded and
by Brittany Kaiser · 21 Oct 2019 · 391pp · 123,597 words