THE GEOPOLITICS OF CYBERSECURITY: A COMPARATIVE ANALYSIS OF NATIONAL STRATEGIES FOR DIGITAL SOVEREIGNTY

Authors

  • Oksana Prokopyshyn Stepan Gzhytskyi National University of Veterinary Medicine and Biotechnologies Lviv image/svg+xml
  • Nataliia Trushkina Research Center for Industrial Problems of Development of the NAS of Ukraine

DOI:

https://doi.org/10.54658/ps.28153324.2025.12.2.pp.59-71

Keywords:

Digital Sovereignty, Geopolitics, Cybersecurity, Splinternet

Abstract

Abstract. This paper investigates the divergent national strategies for achieving "digital sovereignty" among four major geopolitical actors: the United States, the European Union, China, and Russia. It argues that digital sovereignty has evolved from a defensive concept focused on network security into a comprehensive geopolitical strategy for projecting power, values, and economic influence (Süsslin, 2025; Metakides, 2025). Through a comparative analysis of key policy and legal frameworks—including the US National Cybersecurity Strategy (2023), the EU's GDPR/DSA/DMA package, China's Cybersecurity Law (CSL), and Russia's "Sovereign Internet" laws—the paper identifies three distinct models of digital sovereignty: the US market-driven, rebalanced-responsibility model; the EU's regulation-as-power, normative model; and the Sino-Russian state-centric, control-oriented model (Metakides, 2025; Freedom House, n.d.). The analysis reveals that these approaches are creating a fragmented "splinternet," characterized by competing regulatory blocs, contested data governance regimes, and a securitized global technology supply chain (Carnegie Endowment for International Peace, 2025). The paper concludes by proposing a new framework that understands digital sovereignty not merely as a quest for autonomy but as a primary vector for exercising state power in a multipolar digital world order, with significant implications for global stability, international law, and the future of the internet..

Downloads

Download data is not yet available.

References

Alkan, M. (2012). Cybersecurity governance models: A brief overview. Information & Security: An International Journal, 38(2), 58–66.

Arsène, S. (2019). The turn to sovereignty in internet governance. In F. Musiani, S. Arsène, C. O. de la Sablière, & C. T. (Eds.), The turn to sovereignty in internet governance.

BDO. (2024, September). Top cybersecurity threats and predictions for 2025.

Belli, L. (2025). Cybersecurity and AI.

Bendiek, A., & Scholl, P. (2024). The EU's strategic turn in cybersecurity: a case of regulatory mercantilism?. International Affairs, 100(6), 2379-2397.

Captain Compliance. (2025, January 6). Russia Data Localization Law: 2025 Essential Guide.

Carnegie Endowment for International Peace. (2025, May). Digital democracy in a divided global landscape.

Carroll, J. M. (2024). Secure Your Supply Chains: A Recipe for Building the Best Products. Proceedings of the 23rd European Conference on Cyber Warfare and Security, ECCWS 2024.

Center for Long-Term Cybersecurity (CLTC), UC Berkeley. (2025). Reflections on cybersecurity futures 2025: Looking back from the present.

China Aerospace Studies Institute. (2021, October). U.S.-China Competition in AI.

Cleary Gottlieb. (2022, October 27). Digital Services Act Published in the EU Official Journal. Cleary Antitrust Watch.

Couture, S., & Toupin, S. (2019). What does the notion of “digital sovereignty” stand for? A comparison of the terms used in the public debates of Canada, China, France, and Russia. New Media & Society, 21(10), 2319-2337.

Creemers, R. (2020). China's approach to cyber sovereignty. Konrad Adenauer Stiftung.

Davis Center for Russian and Eurasian Studies, Harvard University. (2021). Digital Silk Road in Central Asia: Present and Future.

European Commission. (n.d.). The Digital Services Act. Retrieved July 3, 2025, from https://digital-strategy.ec.europa.eu/en/policies/digital-services-act

European Data Protection Supervisor (EDPS). (2025, March). EDPS Mandate Review 2020–2024.

European Liberal Forum. (2023). The Digital Services Act (DSA): Between European autonomy and transatlantic cooperation.

European Parliament. (2025, April). Digital agenda for Europe.

European Parliament. (2025). The Recovery and Resilience Facility (RRF) and cybersecurity.

European Union. (2022a). Regulation (EU) 2022/1925 of the European Parliament and of the Council of 14 September 2022 on contestable and fair markets in the digital sector and amending Directives (EU) 2019/1937 and (EU) 2020/1828 (Digital Markets Act). Official Journal of the European Union, L 265, 1-66.

European Union. (2022b). Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market For Digital Services and amending Directive 2000/31/EC (Digital Services Act). Official Journal of the European Union, L 277/1.

Federal Communications Commission. (2023, July). National Cybersecurity Strategy.

Freedom House. (n.d.). Freedom on the Net Reports.

Future of Privacy Forum. (2022, June). Chinese Data Protection in Transition.

Google Cloud. (2025). Cybersecurity Forecast 2025.

Gorodissky & Partners. (2023). Data protection in the Russian Federation: overview.

Government of Malta. (2023). Maltese National Cybersecurity Strategy 2023-2026.

Hausfeld. (2022, November 1). The EU Digital Markets Act.

Hernández, S., & Raina, A. (2020). Legal problems with data localization requirements: The case of the Russian Federation. Global Trade and Customs Journal, 15(9), 445–459.

Hivenet. (n.d.). Does national pride win over innovation? The contradictions in data localization.

Hunton Andrews Kurth LLP. (2023). 2023 Data Protection and Privacy: Introduction.

Institute for Defense Analyses. (2023). Summary of National Cybersecurity Strategy with Similarity Analysis to Executive Order 14028.

International Trade Administration. (n.d.). Challenges of the Chinese eCommerce Market. U.S. Department of Commerce.

James Cook University. (2020). Research Data & Information Management Framework 2020-2025.

KPMG. (2025, June). Cyber considerations 2025.

Lee, T.-L. (2025, February). Digital health governance: Technological solutionism, human rights, and data sovereignty. European Journal of Legal Studies, Special Issue, 101-159.

Martino, L., & Gamal, N. (Eds.). (2022). European Cybersecurity in Context. European Liberal Forum.

McKinsey & Company. (2022, September). Securing Europe's competitiveness: Addressing its technology gap.

McKinsey Global Institute. (2022, January). The data-driven enterprise of 2025.

MERICS. (2020, June). China's digital rise.

MERICS. (2023, November). The future of the internet: How China is shaping the infrastructure of tomorrow.

Metakides, G. (2025). A crucial decade for European sovereignty. In Perspectives on Digital Humanism.

Middle East Institute. (2023). The 2023 National Cybersecurity Strategy: How does America think about cyberspace?

Mirrlees, T. (2022). Sanctioning China's Tech Industry to 'Secure' Silicon Valley's Global Dominance. In The Geopolitical Economy of Communications and Digital Technology.

MS.codes. (2023). US National Cybersecurity Strategy 2023.

Munich Security Conference. (2022). Munich Cyber Security Conference 2022 SpringForum Report.

Musiani, F., et al. (2025, March 11). Infrastructuring digital sovereignty: A research agenda. Frontiers in Communication.

National Development and Reform Commission, PRC. (2021, May). 14th Five-Year Plan (2021-2025) for National Economic and Social Development and the Long-Range Objectives Through the Year 2035.

Old Dominion University. (2023, November 5). General Review of the National Cybersecurity Strategy March 2023.

Palo Alto Networks. (2025). Navigating the geopolitical cybersecurity landscape in 2025.

Pannier, A. (2023). Digital Middle Powers and the Global Tech Competition. Institut français des relations internationales (ifri).

Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4).

Precisely & Drexel University's LeBow College of Business. (2024). 2025 Outlook: Data Integrity Trends and Insights.

PromethEUs. (2023, June). The EU Data Strategy: The new EU framework for data flows and its international implications.

Republic of Bulgaria. (2021). National Cybersecurity Strategy "Cyber Resilient Bulgaria 2025" (Draft Translation).

ResearchGate. (2021, June). Digital Silk Road in Central Asia: Present and Future for Russian and Eurasian Studies. Davis Center for Russian and Eurasian Studies, Harvard University.

Royal United Services Institute (RUSI). (n.d.). New ways to frame responsible state behaviour in cyberspace.

SIPRI. (2024, June). Cyber risk reduction in China, Russia, the United States and the European Union.

Süsslin, L. E. (2025, February). Digital Sovereignty and Geopolitics in the Field of Data Protection: A Comparison of the EU, China, and the USA.

The Belfer Center for Science and International Affairs, Harvard Kennedy School. (2021, July). Sovereignty and Data Localization.

The Belfer Center for Science and International Affairs, Harvard Kennedy School. (2025, March). Cybersecurity Strategy Scorecard.

The White House. (2023, March). National Cybersecurity Strategy.

Threat Intelligence. (2024). 2025 Cybersecurity Trends.

Tzogopoulos, G. (2021, November). The Digital Markets Act (DMA): Between European autonomy and transatlantic cooperation. ELIAMEP.

U.S.-China Economic and Security Review Commission. (2023, November). China's increasingly global legal reach.

U.S. Department of State. (2023, March). 2022 Country Reports on Human Rights Practices: Russia.

Van De Grift, S. C. (2019). A Comparative Analysis of the State of Digital Rights in China, Russia, the United States, and Germany. Rollins Scholarship Online.

Werthner, H. (2025). Geopolitics, digital sovereignty, what's in a word. In Perspectives on Digital Humanism.

Winslow, E. (2025, January). Global Cybersecurity Outlook: A complex cyberspace in 2025. World Economic Forum.

World Bank. (2021). Cybersecurity in the financial sector: A digest of regulatory guidance.

World Health Organization. (2020). Global strategy on digital health 2020–2025.

Zenkina, S. (2021). Institutional aspects of Russia's transition to the sixth technological structure: political incentives, economic barriers and environmental impact. E3S Web of Conferences, 258, 05037.

Downloads

Published

31-07-2025

Issue

Section

General

How to Cite

THE GEOPOLITICS OF CYBERSECURITY: A COMPARATIVE ANALYSIS OF NATIONAL STRATEGIES FOR DIGITAL SOVEREIGNTY. (2025). Politics & Security, 12(2), 59-71. https://doi.org/10.54658/ps.28153324.2025.12.2.pp.59-71

Most read articles by the same author(s)