Sovereignty in the digital era: the quest for continuous access to dependable technological capabilities
- URL: http://arxiv.org/abs/2503.10140v1
- Date: Thu, 13 Mar 2025 07:58:08 GMT
- Title: Sovereignty in the digital era: the quest for continuous access to dependable technological capabilities
- Authors: Roberto Baldoni, Giuseppe Di Luna,
- Abstract summary: Digital sovereignty is a multifaceted pursuit that relies on a nation's ability to have continuous access to dependable technological capabilities.<n>This paper identifies how access continuity or technological dependability could be threatened by several malicious actions from cyberattacks, supply chain tamperings, political or economic actions.<n>By examining different approaches adopted by countries like the United States, China, and the European Union, we highlight different strategies to get access to CTCs depending on their political, economic and institutional nature.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: In an era where economies and societies are deeply integrated into cyberspace, achieving a robust level of digital sovereignty has become an essential goal for nations aiming to preserve their security and strategic political autonomy, particularly during turbulent geopolitical times marked by complex global supply chains of critical technologies that ties systemic rivals. Digital sovereignty is a multifaceted, interdisciplinary, and dynamic pursuit that fundamentally relies on a nation's ability to have continuous access to dependable technological capabilities (CTCs) for storing, transferring, and processing domestically produced data. This paper identifies how access continuity or technological dependability could be threatened by several malicious actions from cyberattacks, supply chain tamperings, political or economic actions. By examining different approaches adopted by countries like the United States, China, and the European Union, we highlight different strategies to get access to CTCs depending on their political, economic and institutional nature.
Related papers
- Redefining Hybrid Blockchains: A Balanced Architecture [0.0]
This paper introduces a novel hybrid blockchain architecture that balances scalability, governance, and decentralization.
The findings highlight the system's scalability, security, and economic viability, offering a robust framework for enterprise and government adoption.
arXiv Detail & Related papers (2025-04-26T16:25:24Z) - Trustworthy Decentralized Autonomous Machines: A New Paradigm in Automation Economy [45.55770948876387]
Decentralized Autonomous Machines (DAMs) are capable of managing both digital and physical assets.
We argue that DAMs are pivotal in transitioning from trust-based to trustless economic models.
The integration of AI-driven decision-making, IoT-enabled operational autonomy, and blockchain-based governance allows DAMs to decentralize ownership, optimize resource allocation, and democratize access to economic opportunities.
arXiv Detail & Related papers (2025-04-22T07:59:46Z) - A Blockchain-Enabled Approach to Cross-Border Compliance and Trust [0.0]
This paper proposes a novel approach to AI governance, utilizing blockchain and distributed ledger technologies (DLT)<n>By synthesizing advancements in blockchain, AI ethics, and cybersecurity, this paper offers a comprehensive roadmap for a decentralized AI governance framework.
arXiv Detail & Related papers (2025-01-15T22:19:34Z) - Artificial Intelligence in Cybersecurity: Building Resilient Cyber Diplomacy Frameworks [0.0]
This paper explores how automation and artificial intelligence (AI) are transforming U.S. cyber diplomacy.
Leveraging these technologies helps the U.S. manage the complexity and urgency of cyber diplomacy.
arXiv Detail & Related papers (2024-11-17T17:57:17Z) - Computing Power and the Governance of Artificial Intelligence [51.967584623262674]
Governments and companies have started to leverage compute as a means to govern AI.
compute-based policies and technologies have the potential to assist in these areas, but there is significant variation in their readiness for implementation.
naive or poorly scoped approaches to compute governance carry significant risks in areas like privacy, economic impacts, and centralization of power.
arXiv Detail & Related papers (2024-02-13T21:10:21Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Internet of Federated Digital Twins (IoFDT): Connecting Twins Beyond Borders for Society 5.0 [47.60424943340677]
The concept of digital twin (DT) is expected to revolutionize future industries and will lie at the heart of the vision of a future smart society, namely, Society 5.0.
This paper envisions a novel concept of an Internet of Federated Digital Twins (IoFDT) that holistically integrates DTs representing different Society 5.0 services.
arXiv Detail & Related papers (2023-12-11T14:56:27Z) - Securing the Digital World: Protecting smart infrastructures and digital
industries with Artificial Intelligence (AI)-enabled malware and intrusion
detection [0.0]
cybercrime has emerged as a global threat to governments, businesses, and civil societies.
This paper investigates AI-based cyber threat detection to protect our modern digital ecosystems.
arXiv Detail & Related papers (2023-10-15T09:35:56Z) - Navigating the complex nexus: cybersecurity in political landscapes [0.0]
This study explores the evolving landscape of cyberattacks, their impact on political stability, and strategies for bolstering digital resilience.
The research illuminates the intricate network of technological vulnerabilities, geopolitical dynamics, and ethical concerns that shape the dynamic evolution of cybersecurity in politics.
arXiv Detail & Related papers (2023-08-15T19:37:37Z) - Digital Sovereignty Strategies for Every Nation [1.1421942894219896]
We revisit the definition and scope of digital sovereignty through extending it to cover the entire value chain of using, owning, and producing digital assets.
We show that digital sovereignty by autonomy is often impossible, and by mutual cooperation is not always sustainable.
We propose a digital sovereignty agenda for different country's digital profiles, based on their status quo, priorities, and capabilities.
arXiv Detail & Related papers (2023-07-04T16:00:47Z) - Demonstration of quantum-digital payments [36.136619420474766]
We show how quantum light can secure daily digital payments by generating inherently unforgeable quantum cryptograms.
Unlike previously proposed protocols, our solution does not depend on long-term quantum storage or trusted agents and authenticated channels.
It is practical with near-term technology and may herald an era of quantum-enabled security.
arXiv Detail & Related papers (2023-05-23T20:20:14Z) - Future Computer Systems and Networking Research in the Netherlands: A
Manifesto [137.47124933818066]
We draw attention to CompSys as a vital part of ICT.
Each of the Top Sectors of the Dutch Economy, each route in the National Research Agenda, and each of the UN Sustainable Development Goals pose challenges that cannot be addressed without CompSys advances.
arXiv Detail & Related papers (2022-05-26T11:02:29Z) - Beyond Robustness: A Taxonomy of Approaches towards Resilient
Multi-Robot Systems [41.71459547415086]
We analyze how resilience is achieved in networks of agents and multi-robot systems.
We argue that resilience must become a central engineering design consideration.
arXiv Detail & Related papers (2021-09-25T11:25:02Z) - Will bots take over the supply chain? Revisiting Agent-based supply
chain automation [71.77396882936951]
Agent-based supply chains have been proposed since early 2000; industrial uptake has been lagging.
We find that agent-based technology has matured, and other supporting technologies that are penetrating supply chains are filling in gaps.
For example, the ubiquity of IoT technology helps agents "sense" the state of affairs in a supply chain and opens up new possibilities for automation.
arXiv Detail & Related papers (2021-09-03T18:44:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.