Abstract
In recent years, both authoritarian and democratic states have started using the term digital sovereignty as a basis for their digital policies. Although the interpretations and resulting policies may differ, the autonomy and sovereignty of individuals and their communities are at stake. Current political discourses mainly focus on governmental and corporate actors and their aspirations to control the digital sphere. Given the importance of this term, scholars in our community have begun to engage with the discourse. However, there is still a lack of dissemination, coming with a lack of conceptual models to explain, explore, and research human-centred digital sovereignty. Inspired by claims for human-centred digital sovereignty, this paper takes up the discourse and creates an explorative conceptual model that aims to guide early research within HCI, support an understanding of the field, and helps to identify relevant cases. Moreover, we discuss key challenges and potential ways forward.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahmadian, A.S., Jürjens, J., Strüber, D.: Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, pp. 1142–1149. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3167132.3167256
Appenzeller, A., Rode, E., Krempel, E., Beyerer, J.: Enabling data sovereignty for patients through digital consent enforcement. In: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2020. Association for Computing Machinery, New York, NY, USA (2020). https://doi.org/10.1145/3389189.3393745
Avila Pinto, R.: Digital sovereignty or digital colonialism. SUR-Int. J. Human Rights 27, 15 (2018)
Bardzell, S.: Feminist HCI: taking stock and outlining an agenda for design. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1301–1310 (2010)
Barker, T.: Europe can’t win the tech war it just started: The European union is running in circles in pursuit of “digital sovereignty” (2020). https://foreignpolicy.com/2020/01/16/europetechnology-sovereignty-von-der-leyen/
Baums, A.: Digitale Standortpolitik in der Post-Snowden-Welt. In: Digitale Souveränität, pp. 223–235. Springer, Wiesbaden (2016). https://doi.org/10.1007/978-3-658-07349-7_20
Bernardes, M.B., de Andrade, F.P., Novais, P.: Smart cities, data and right to privacy: a look from the Portuguese and Brazilian experience. In: Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2018, pp. 328–337. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3209415.3209451
Bernardes, M.B., de Andrade, F.P., Novais, P., Lopes, N.V.: Participatory governance of smart cities: a study upon Portuguese and Brazilian government portals. In: Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2018, pp. 526–536. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3209415.3209464
Birnstill, P., Beyerer, J.: Building blocks for identity management and protection for smart environments and interactive assistance systems. In: Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA 2018, pp. 292–296. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3197768.3201563
Bolis, I., Morioka, S.N., Sznelwar, L.I.: When sustainable development risks losing its meaning. Delimiting the concept with a comprehensive literature review and a conceptual model. J. Cleaner Prod. 83, 7–20 (2014)
Bradbury, D.: Routing around censorship. Netw. Secur. 2011(5), 5–8 (2011)
Büchi, M., Just, N., Latzer, M.: Caring is not enough: the importance of internet skills for online privacy protection. Inf. Commun. Soc. 20(8), 1261–1278 (2017)
Calacci, D., Shen, J.J., Pentland, A.: The cop in your neighbor’s doorbell: Amazon ring and the spread of participatory mass surveillance. Proc. ACM Hum.-Comput. Interact. 6(CSCW2), 1–47 (2022)
Chander, A., Lê, U.P.: Data nationalism. Emory LJ 64, 677 (2014)
Che, X., Metaxa-Kakavouli, D., Hancock, J.T.: Fake news in the news: an analysis of partisan coverage of the fake news phenomenon. In: Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2018, pp. 289–292. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3272973.3274079
Chenou, J.M.: From cyber-libertarianism to neoliberalism: Internet exceptionalism, multi-stakeholderism, and the institutionalisation of internet governance in the 1990s. Globalizations 11(2), 205–223 (2014)
Christakis, T.: ‘European digital sovereignty’: successfully navigating between the ‘brussels effect’ and Europe’s quest for strategic autonomy. Available at SSRN 3748098 (2020)
Conradie, N.H., Nagel, S.K.: Digital sovereignty and smart wearables: three moral calculi for the distribution of legitimate control over the digital. J. Responsible Technol. 12, 100053 (2022)
Creemers, R.: The Chinese cyber-sovereignty agenda. In: Connectivity Wars: Why Migration, Finance and Trade are the Geo-Economic Battlegrounds of the Future. JSTOR (2019)
Crespi, F., Caravella, S., Menghini, M., Salvatori, C.: European technological sovereignty: an emerging framework for policy strategy. Intereconomics 56(6), 348–354 (2021)
Entwistle, J.M., Rasmussen, M.K., Verdezoto, N., Brewer, R.S., Andersen, M.S.: Beyond the individual: the contextual wheel of practice as a research framework for sustainable HCI. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 1125–1134 (2015)
Erenli, K., Geminn, C., Pfeiffer, L.: Legal challenges of an open web index. Int. Cybersecur. Law Rev. 2, 183–194 (2021)
Ertl, T., et al.: Ethical future environments: smart thinking about smart cities means engaging with its most vulnerable. In: C &T 2021: Proceedings of the 10th International Conference on Communities & Technologies - Wicked Problems in the Age of Tech, C &T 2021, pp. 340–345. Association for Computing Machinery, New York, NY, USA (2021). https://doi.org/10.1145/3461564.3468165
Feingold, S.: Why the european union is opening a silicon valley ‘embassy’ (2022). https://www.weforum.org/agenda/2022/08/why-the-european-union-is-opening-a-silicon-valley-embassy/
Fiebig, T., Aschenbrenner, D.: 13 propositions on an Internet for a “burning world”. In: Proceedings of the ACM SIGCOMM Joint Workshops on Technologies, Applications, and Uses of a Responsible Internet and Building Greener Internet, TAURIN+BGI 2022, pp. 1–5. Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3538395.3545312
Floridi, L.: The fight for digital sovereignty: what it is, and why it matters, especially for the EU. Philos. Technol. 33(3), 369–378 (2020)
Franquesa, D., Navarro, L.: Devices as a commons: limits to premature recycling. In: Proceedings of the 2018 Workshop on Computing within Limits, LIMITS 2018. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3232617.3232624
von Grafenstein, M., Jakobi, T., Stevens, G.: Effective data protection by design through interdisciplinary research methods: the example of effective purpose specification by applying user-centred UX-design methods. Comput. Law Secur. Rev. 46, 105722 (2022)
Grimm, D.: Sovereignty: The Origin and Future of a Political and Legal Concept. Columbia University Press, Columbia (2015)
Grinko, M., Qalandar, S., Randall, D., Wulf, V.: Nationalizing the Internet to break a protest movement: Internet shutdown and counter-appropriation in Iran of late 2019. Proc. ACM Hum.-Comput. Interact. 6(CSCW2), 1–21 (2022)
Grohmann, R.: Beyond platform cooperativism: worker-owned platforms in Brazil. Interactions 29(4), 87–89 (2022). https://doi.org/10.1145/3540251
Heitlinger, S., Bryan-Kinns, N., Comber, R.: The right to the sustainable smart city. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, pp. 1–13. Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3290605.3300517
Hill, J.: The growth of data localization post-snowden: analysis and recommendations for US policymakers and business leaders. In: The Hague Institute for Global Justice, Conference on the Future of Cyber Governance (2014)
Hochheiser, H., Lazar, J.: HCI and societal issues: a framework for engagement. Int. J. Hum.-Comput. Interact. 23(3), 339–374 (2007)
Jackson, S.J., Gillespie, T., Payette, S.: The policy knot: re-integrating policy, practice and design in CSCW studies of social computing. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, pp. 588–602 (2014)
Jakobi, T., et al.: The role of is in the conflicting interests regarding GDPR. Bus. Inf. Syst. Eng. 62(3), 261–272 (2020)
Jarvis, J.: A society relearning how to talk with itself. Digit. Gov. Res. Pract. 1(1), 1–10 (2020)
Jonker, M., et al.: Where.ru? Assessing the impact of conflict on Russian domain infrastructure. In: Proceedings of the 22nd ACM Internet Measurement Conference, IMC 2022, pp. 159–165. Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3517745.3561423
Keller, D., Iglesias, C.: Exception and harmonization: three theoretical debates on internet regulation (2019)
Klein, H.: ICANN and Internet governance: leveraging technical coordination to realize global public policy. Inf. Soc. 18(3), 193–207 (2002)
Lambach, D., Oppermann, K.: Narratives of digital sovereignty in German political discourse. Governance (2022)
Landwehr, M., Borning, A., Wulf, V.: Problems with surveillance capitalism and possible alternatives for it infrastructure. Inf. Commun. Soc. 26, 70–85 (2021)
Lauf, F., Zum Felde, H.M., Klötgen, M., Brandstädter, R., Schönborn, R.: Sovereignly donating medical data as a patient: a technical approach. In: HEALTHINF, pp. 623–630 (2022)
Lawo, D., Neifer, T., Esau, M., Stevens, G.: Buying the ‘right’ thing: designing food recommender systems with critical consumers. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1–13 (2021)
Lawo, D., Neifer, T., Esau-Held, M., Stevens, G.: Digital sovereignty: what it is and why it matters for HCI. In: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, pp. 1–7 (2023)
Lazar, J., et al.: Human-computer interaction and international public policymaking: a framework for understanding and taking future actions. Found. Trends® Hum.-Comput. Interact. 9(2), 69–149 (2016)
Lips, S., Ahmed, R.K., Zulfigarzada, K., Krimmer, R., Draheim, D.: Digital sovereignty and participation in an autocratic state: designing an e-petition system for developing countries. In: DG.O 2021: The 22nd Annual International Conference on Digital Government Research, DG.O 2021, pp. 123–131. Association for Computing Machinery, New York, NY, USA (2021). https://doi.org/10.1145/3463677.3463706
Luzsa, R., Mayr, S., Syrmoudis, E., Grossklags, J., Kübler-Wachendorff, S., Kranz, J.: Online service switching intentions and attitudes towards data portability - the role of technology-related attitudes and privacy. In: Proceedings of Mensch Und Computer 2022, MuC 2022, pp. 1–13. Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3543758.3543762
Mac Síthigh, D., Siems, M.: The Chinese social credit system: a model for other countries? Mod. Law Rev. 82(6), 1034–1071 (2019)
Marichal, S., et al.: CETA: open, affordable and portable mixed-reality environment for low-cost tablets. In: Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2017. Association for Computing Machinery, New York, NY, USA (2017). https://doi.org/10.1145/3098279.3125435
Maurer, T., Skierka, I., Morgus, R., Hohmann, M.: Technological sovereignty: missing the point? In: 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace, pp. 53–68. IEEE (2015)
Molyneaux, H., O’Donnell, S., Kakekaspan, C., Walmark, B., Budka, P., Gibson, K.: Social media in remote first nation communities (2014)
Musiani, F.: Infrastructuring digital sovereignty: a research agenda for an infrastructure-based sociology of digital self-determination practices. Inf. Commun. Soc. 1–16 (2022)
Neifer, T., Lawo, D., Bossauer, P., Gadatsch, A., et al.: Decoding IPaaS: investigation of user requirements for integration platforms as a service. In: ICE-B, pp. 47–55 (2021)
Nielsen, M.M.: Digitising a small island state: a lesson in Faroese. In: Proceedings of the 9th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2015–2016, pp. 54–59. Association for Computing Machinery, New York, NY, USA (2016). https://doi.org/10.1145/2910019.2910042
Nordhaug, L.M., Harris, L.: Digital public goods: enablers of digital sovereignty (2021)
Nouwens, M., Klokmose, C.N.: A survey of digital working conditions of Danish knowledge workers. In: Proceedings of 19th European Conference on Computer-Supported Cooperative Work. European Society for Socially Embedded Technologies (EUSSET) (2021). https://doi.org/10.18420/ecscw2021_. No. 24
Pavlyutenkova, M., Ksenz, P.: New conditions of electronic government in Russia. In: Proceedings of the 2015 2nd International Conference on Electronic Governance and Open Society: Challenges in Eurasia, EGOSE 2015, pp. 77–81. Association for Computing Machinery, New York, NY, USA (2015). https://doi.org/10.1145/2846012.2846027
Pins, D., Jakobi, T., Stevens, G., Alizadeh, F., Krüger, J.: Finding, getting and understanding: the user journey for the GDPR’s right to access. Behav. Inf. Technol. 41, 1–27 (2022)
Pistor, K.: Statehood in the digital age 1. Constellations 27(1), 3–18 (2020)
Png, M.T.: At the tensions of south and north: critical roles of global south stakeholders in AI governance. In: 2022 ACM Conference on Fairness, Accountability, and Transparency, FAccT 2022, pp. 1434–1445. Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3531146.3533200
Pohle, J.: Digital sovereignty. A new key concept of digital policy in Germany and Europe (2020)
Pohle, J.: Digitale souveränität. Handbuch Digitalisierung in Staat und Verwaltung, pp. 1–13 (2020)
Pohle, J., Thiel, T., et al.: Digital sovereignty. In: Practicing Sovereignty: Digital Involvement in Times of Crises, pp. 47–67 (2021)
Rosengrün, S.: Why AI is a threat to the rule of law. Digit. Soc. 1(2), 10 (2022)
Ruohonen, J.: The treachery of images in the digital sovereignty debate. Mind. Mach. 31(3), 439–456 (2021)
Schelenz, L., et al.: The theory, practice, and ethical challenges of designing a diversity-aware platform for social relations. In: Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society, AIES 2021, pp. 905–915. Association for Computing Machinery, New York, NY, USA (2021). https://doi.org/10.1145/3461702.3462595
Siapera, M., Douloudis, K., Prentza, A.: A common data model for once-only cross-border data exchanges in Europe. In: Proceedings of the 14th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2021, pp. 223–230. Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3494193.3494224
Stadnik, I.: Internet governance in Russia-sovereign basics for independent Runet. In: TPRC47: The 47th Research Conference on Communication, Information and Internet Policy (2019)
Stallman, R.: Viewpoint why “open source’’ misses the point of free software. Commun. ACM 52(6), 31–33 (2009)
Stein, M., Meurer, J., Boden, A., Wulf, V.: Mobility in later life: appropriation of an integrated transportation platform. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI 2017, pp. 5716–5729. Association for Computing Machinery, New York, NY, USA (2017). https://doi.org/10.1145/3025453.3025672
Stevens, G., Boden, A., Winterberg, L., Gómez, J.M., Bala, C.: Digitaler konsum: Herausforderungen und chancen der verbraucherinformatik (2019)
Tretter, M.: Sovereignty in the digital and contact tracing apps. Digit. Soc. 2(1), 2 (2023)
Vigil, M., Rantanen, M., Belding, E.: A first look at tribal web traffic. In: Proceedings of the 24th International Conference on World Wide Web, WWW 2015, pp. 1155–1165. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE (2015). https://doi.org/10.1145/2736277.2741645
Waller, A.: Public policy issues in augmentative and alternative communication technologies a comparison of the UK and the US. Interactions 20(3), 68–75 (2013)
Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. MIS Q. xiii–xxiii (2002)
Weigl, L., Amard, A., Codagnone, C., Fridgen, G.: The EU’s digital identity policy: tracing policy punctuations. In: Proceedings of the 15th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2022, pp. 74–81. Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3560107.3560121
Wessel, D., et al.: Prototypes for e-government websites to support the digital sovereignty of citizens. In: Proceedings of Mensch Und Computer 2022, MuC 2022, pp. 615–617. Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3543758.3547514
Zakiyeva, Z.: Problems and perspectives of digital silk road in central Asia. In: Proceedings of the 6th International Conference on Engineering & MIS 2020. ICEMIS 2020. Association for Computing Machinery, New York, NY, USA (2020). https://doi.org/10.1145/3410352.3410741
Zambrano, R., Sanchez-Torres, J.M.: AI public policies in Latin America: disruption or more of the same? In: Proceedings of the 14th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2021, pp. 25–33. Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3494193.3494294
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Lawo, D., Neifer, T., Esau, M., Stevens, G. (2023). Human-Centred Digital Sovereignty: Explorative Conceptual Model and Ways Forward. In: da Silva, H.P., Cipresso, P. (eds) Computer-Human Interaction Research and Applications. CHIRA 2023. Communications in Computer and Information Science, vol 1997. Springer, Cham. https://doi.org/10.1007/978-3-031-49368-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-49368-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49367-6
Online ISBN: 978-3-031-49368-3
eBook Packages: Computer ScienceComputer Science (R0)