Skip to main content

Towards a Layer Model for Digital Sovereignty: A Holistic Approach

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2022)

Abstract

Digital sovereignty has gained interest in the political field and in the public discourse. This discussion paper addresses “digital sovereignty” from various academic disciplines in a holistic analysis approach: In the discussion of digital sovereignty, the question arises whose digital sovereignty is being addressed, what digital sovereignty means for the respective entities, how to increase digital sovereignty and how to build a digital sovereign civil society and its critical infrastructures. We present a layered model to conceptualize the meaning of digital sovereignty on three layers: (1) state or supranational institution, (2) organization, (3) individual as well as the relationships between the three layers. This model provides guidance for research and practice - including policy and decision making - on the complex subject of digital sovereignty. It is a living model and can also be expanded and adapted as more insight is added to this relatively new field. With this article, we share the model with the community and open it up for discussion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In the General Motors film The Safest Place by Jam Handy.

  2. 2.

    Search performed on Google Scholar - “digital sovereignty” (title only) from 2015 to 2022. Only four out of two hundred fifty seven results could fall into the category organizational digital sovereignty.

  3. 3.

    Examples are the Minimum Cyber Security Standards (MCSS) in the United Kingdom or the BSI IT-Grundschutz in Germany.

  4. 4.

    A specific term used to describe the benefits resulting from public sector funding.

  5. 5.

    e.g. Check24 for financial offers, clevertanken.de for gas prices, Expedia for travel offers.

  6. 6.

    For instance consumer protection agencies.

References

  1. Gaia-X European Association for Data and Cloud AISBL: Gaia-X Dataspaces (2021). https://gaia-x.eu/what-is-gaia-x/deliverables/data-spaces/. Accessed 20 Apr 2022

  2. Alam, K., Erdiaw-Kwasie, M.O., Shahiduzzaman, M., Ryan, B.: Assessing regional digital competence: digital futures and strategic planning implications. J. Rural. Stud. 60, 60–69 (2018)

    Article  Google Scholar 

  3. Baischew, D., Kroon, P., Lucidi, S., Märkel, C., Sörries, B.: Digital sovereignty in Europe: a first benchmark. Wik-consult report, Bad Honnef (2020). http://hdl.handle.net/10419/251539

  4. Barabási, A.L., Albert, R.: Emergence of scaling in random networks. science 286(5439), 509–512 (1999)

    Google Scholar 

  5. Benedek, W.: International organizations and digital human rights. In: Wagner, B., Kettemann, M.C., Vieth, K. (eds.) Research Handbook in Human Rights and Digital Technology. Global Politics, Law and International Relations, pp. 364–375. Edward Elgar Publishing (2019)

    Google Scholar 

  6. Beyerer, J., Müller-Quade, J., Reussner, R.: Karlsruher Thesen zur Digitalen Souveränität Europas. Datenschutz und Datensicherheit - DuD 42(5), 277–280 (2018). https://doi.org/10.1007/s11623-018-0940-2

    Article  Google Scholar 

  7. BITKOM: Digitale Souveränität. Datenschutz und Datensicherheit - DuD 42(5), 294–300 (2018). https://doi.org/10.1007/s11623-018-0944-y

  8. Blossfeld, H.P., et al.: vbw – Vereinigung der Bayerischen Wirtschaft e.V. [Hrsg.]: Digitale Souveränität und Bildung. Gutachten (2019). https://doi.org/10.25656/01:16569

  9. Bogenstahl, C., Zinke, G.: Digitale Souveränität - ein mehrdimensionales Handlungskonzept für die deutsche Wirtschaft. Digitale Souveränität, p. 65 (2017)

    Google Scholar 

  10. Braa, J., Hanseth, O., Heywood, A., Mohammed, W., Shaw, V.: Developing health information systems in developing countries: the flexible standards strategy. Mis Quarterly, pp. 381–402 (2007)

    Google Scholar 

  11. Bundesamt für Sicherheit und Informationstechnik: BSI warnt vor dem Einsatz von Kaspersky-Virenschutzprodukten (2022). https://bit.ly/3w6Zllo. Accessed 04 May 2022

  12. Casalino, N., Saso, T., Borin, B., Massella, E., Lancioni, F.: Digital competences for civil servants and digital ecosystems for more effective working processes in public organizations. In: Agrifoglio, R., Lamboglia, R., Mancini, D., Ricciardi, F. (eds.) Digital Business Transformation. LNISO, vol. 38, pp. 315–326. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-47355-6_21

    Chapter  Google Scholar 

  13. CDU, CSU, SPD: Deutschlands Zukunft gestalten: Koaltionsvertrag zwischen CDU, CSU und SPD (2013)

    Google Scholar 

  14. Chin, Y.C., Li, K.: A comparative analysis of cyber sovereignty policies in China and the EU (2021). https://doi.org/10.2139/ssrn.3900752

  15. Couture, S.: The diverse meanings of digital sovereignty (2020). https://bit.ly/3kCDVYa. Accessed 13 Apr 2022

  16. Eichensehr, K.: Ukraine, cyberattacks, and the lessons for international law (2022)

    Google Scholar 

  17. European Political Strategy Centre (European Commission): Rethinking strategic autonomy in the digital age (2019). https://bit.ly/3MSarkW. Accessed 23 Apr 2022

  18. Fang, B.: Cyberspace Sovereignty. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-0320-3

    Book  Google Scholar 

  19. Fantino, D., Cannone, G.: Evaluating the efficacy of European regional funds for R &D. Evaluating the efficacy of European regional funds for R &D, pp. 165–196 (2014)

    Google Scholar 

  20. Frederking, V., Krommer, A.: Digitale Textkompetenz: Ein theoretisches wie empirisches Forschungsdesiderat im deutschdidaktischen Fokus (2019). https://bit.ly/38fJoRU

  21. Friedrichsen, M., Bisa, P.J.: Digitale Souveränität. Vertrauen in der Netzwerkgesellschaft (2016)

    Google Scholar 

  22. Fries, I.: “In Code We Trust”? Zur Vertrauens-Verheißung der Blockchain-Technologie. Zeitschrift für Evangelische Ethik (2022)

    Google Scholar 

  23. Gegenfurtner, A., Schmidt-Hertha, B., Lewis, P.: Digital technologies in training and adult education. Int. J. Train. Dev. 24, 1–4 (2020). https://doi.org/10.1111/ijtd.12172

    Article  Google Scholar 

  24. Hartmann, E.A.: Digitale souveränität in der wirtschaft – gegenstandsbereiche, konzepte und merkmale. In: Hartmann, E.A. (ed.) Digitalisierung souverän gestalten, pp. 1–16. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-662-62377-0_1

    Chapter  Google Scholar 

  25. Hartmann, E.A.: Digitale souveränität: soziotechnische bewertung und gestaltung von anwendungen algorithmischer systeme. In: Hartmann, E.A. (ed.) Digitalisierung souverän gestalten II, pp. 1–13. Springer, Heidelberg (2022). https://doi.org/10.1007/978-3-662-64408-9_1

    Chapter  Google Scholar 

  26. Hummel, P., Braun, M., Dabrock, P.: Own data? Ethical reflections on data ownership. Philos. Technol. 34(3), 545–572 (2020). https://doi.org/10.1007/s13347-020-00404-9

    Article  Google Scholar 

  27. Wittpahl, V. (ed.): Digitale Souveränität. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-55796-9

    Book  Google Scholar 

  28. Knopp, A.: Satellitenkommunikations-System: Vermutlicher Cyberangriff (2022). https://bit.ly/3w3I24S. Accessed 04 May 2022

  29. Lee, C.W.: Participatory practices in organizations. Sociol. Compass 9(4), 272–288 (2015)

    Google Scholar 

  30. Lehmann, C., Dörr, L.: Digital souveräne gestaltung von services – ein marktfähiger mehrwert? In: Hartmann, E.A. (ed.) Digitalisierung souverän gestalten II, pp. 14–24. Springer, Heidelberg (2022). https://doi.org/10.1007/978-3-662-64408-9_2

    Chapter  Google Scholar 

  31. Merkel, A., Frederiksen, M., Marin, S., Kallas, K.: DE-DK-FI-EE: Letter to COM President on Digital Sovereignty (2021). https://politi.co/3FfWdrs

  32. Moerel, L., Timmers, P.: Reflections on digital sovereignty. SSRN Scholarly Paper ID 3772777, Social Science Research Network, Rochester, NY (2021). https://papers.ssrn.com/abstract=3772777

  33. Oberländer, M., Bipp, T.: Do digital competencies and social support boost work engagement during the COVID-19 pandemic? Comput. Hum. Behav. 130, 107172 (2022)

    Article  Google Scholar 

  34. OECD: PISA 2009 results: students on line (2011). https://doi.org/10.1787/9789264112995-en

  35. OECD: Skills for a digital world. Tech. rep., OECD (2016)

    Google Scholar 

  36. Panusch, T., Büscher, J., Wöstmann, R., Deuse, J.: Konzept zur zielgerichteten kompetenzentwicklung für initiativen des maschinellen lernens. In: Hartmann, E.A. (ed.) Digitalisierung souverän gestalten II, pp. 93–109. Springer, Heidelberg (2022). https://doi.org/10.1007/978-3-662-64408-9_8

    Chapter  Google Scholar 

  37. Pentenrieder, A., Bertini, A., Künzel, M.: Digitale Souveränität als Trend? Digitalisierung souverän gestalten (2021). https://doi.org/10.1007/978-3-662-62377-0_2. Accessed 24 Mar 2022

  38. Pohle, J.: Digitale Souveränität. Handbuch Digitalisierung in Staat und Verwaltung (2020). https://doi.org/10.1007/978-3-658-23669-4_21-1

    Article  Google Scholar 

  39. Pohle, J., Thiel, T., et al.: Digital sovereignty. In: Practicing Sovereignty: Digital Involvement in Times of Crises, pp. 47–67. Bielefeld: transcript Verlag (2021)

    Google Scholar 

  40. Ranchordas, S.: Innovation-friendly regulation: the sunset of regulation, the sunrise of innovation. Jurimetrics 55, 201 (2014)

    Google Scholar 

  41. Regulation, G.D.P.: General data protection regulation (gdpr). Intersoft Consulting. Accessed 24 Jan 2018

    Google Scholar 

  42. Schieffer, A., Isaacs, D., Gyllenpalm, B.: The world café: Part pne. World Business Acad. 18(8), 1–9 (2004)

    Google Scholar 

  43. Scholz, O.: Koalitionsvertrag 2021–2025: Mehr Fortschritt Wagen (2021). https://bit.ly/3seGljP. Accessed 09 Apr 2022

  44. Seidel, I., Bös, P.K.: Grundlagen, Inhalte und Implikationen 18(November) (2009)

    Google Scholar 

  45. Amedzro St-Hilaire, W.: Digital Risk Governance. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61386-0

    Book  Google Scholar 

  46. Steinbach, J.: Souveränitätsfragmente. Ein Beitrag zur Literaturgeschichte der Souveränität und gegenwärtigen Herausforderungen der Rechtswissenschaften im Spiegel der Digitalisierung. Mohr Siebeck (2019)

    Google Scholar 

  47. Universität der Bundeswehr München: Störquellen: Setzt Russland Störangriffe gegen das GPS ein? (2022). https://bit.ly/3LKeLTt. Accessed 04 May 2022

  48. Weber, H.: Digitale Souveränität. Informatik Spektrum 45, 62–69 (2022). https://doi.org/10.1007/s00287-022-01439-2

    Article  Google Scholar 

Download references

Acknowledgements and Contributions

The Project LIONS is funded by dtec.bw - Digitalization and Technology Research Center of the Bundeswehr which we gratefully acknowledge. We also thank the LIONS consortium and our research partners for their contributions to this research activity.

Authors have been listed in alphabetical order. The contributions can be attributed to the coauthors as described below:

– Isabelle Fries contributed additions from a philosophical point of view, as well as for general coherence, and mainly wrote the introduction.

– Maximilian Greiner moderated world café tables and contributed mainly the relationship between state and organization and the state layer.

– Manfred Hofmeier prepared and conducted the world café and contributed research design, discussion and limitations to this article.

– Razvan Hrestic co-organized the world café, and wrote mainly organization layer and relationship between the organization and the individual.

– Ulrike Lechner contributed to the research design, to data collection, data interpretation and the revisions of the article.

– Thomas Wendeborn contributed the individual layer and state of the art on digital sovereignty and definitions of digital sovereignty.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Razvan Hrestic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fries, I., Greiner, M., Hofmeier, M., Hrestic, R., Lechner, U., Wendeborn, T. (2023). Towards a Layer Model for Digital Sovereignty: A Holistic Approach. In: Hämmerli, B., Helmbrecht, U., Hommel, W., Kunczik, L., Pickl, S. (eds) Critical Information Infrastructures Security. CRITIS 2022. Lecture Notes in Computer Science, vol 13723. Springer, Cham. https://doi.org/10.1007/978-3-031-35190-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35190-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35189-1

  • Online ISBN: 978-3-031-35190-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics