The Сoncept of Сyber Sovereignty of the People’s Republic of China: Development History and Essence

Cover Page

Cite item


The transformation of cyber sovereignty into an independent concept is a recent phenomenon, and thus its development and distribution is currently underway, which indicates the relevance of studying this topic. Being one of the most influential actors of contemporary international politics, China uses the concept of cyber sovereignty to promote its national interests and is able to shape the rules in the highly volatile field of international cyberspace. The study is based on quantitative and qualitative content analysis of legal acts and concept of China’s cyber sovereignty. The author defines a concept of cyber sovereignty and identifies its place in the system of international law and in the architecture of international information security. China’s concept of cyber sovereignty does not imply the division of a common cyberspace into separate segments but contributes to the creation of a ‘cyber community of a common destiny’, in which states can exercise their rights to govern the Internet on the principles of equality, justice, cooperation, peace and rule of law. It is concluded that this concept can be used as the basis for the formation of an international legal framework that regulates relations between states in the field of cyberspace.

About the authors

Ekaterina A. Mikhalevich

Saint Petersburg State University

Author for correspondence.
ORCID iD: 0000-0003-0703-4134

Postgraduate of the School of International Relations

Saint Petersburg, Russian Federation


  1. Ayers, C.E. (2016). Rethinking Sovereignty in the Context of Cyberspace. U.S. Army War College Journal, 1, 13–44.
  2. Evdokimov, E.V. (2011). China’s policy in the global information space. International processes, 9(1), 74–83. (In Russian).
  3. Holmes, D. (2005). Communication theory: media, technology, society. New York: SAGE Publications Ltd.
  4. Ibragimova, G. (2013). The PRC strategy in the field of Internet governance and information security. Security Index, 19(1), 169–184. (In Russian).
  5. Isayev, A.S. (2018). Russian-Chinese interaction on information security. China in world and regional politics. History and modernity, XXIII, 223–237. (In Russian).
  6. Mckune, S. & Ahmed, S. (2018). The Contestation and Shaping of Cyber Norms Through China’s Internet Sovereignty Agenda. International Journal of Communication, 12, 35–55.
  7. Moiseev, A.A., editor. (2009). State sovereignty in international law. Moscow: Vostok–Zapad publ. (In Russian).
  8. Wang, A. (2020). Cyber Sovereignty at its Boldest: a Chinese Perspective. The Ohio State Technology Law Journal, 16(2), 395–466.

Copyright (c) 2021 Mikhalevich E.A.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies