Documentation, Informaiton & Knowledge ›› 2023, Vol. 40 ›› Issue (6): 31-41.doi: 10.13366/j.dik.2023.06.031

• Academic Focus: Data Governance • Previous Articles     Next Articles

When We Talk About Data Sovereignty:From a Literature Review

LIU Yan   

  1. School of Information Management, Wuhan University, Wuhan, 430072
  • Online:2023-11-10 Published:2023-12-10
  • Contact: Correspondence should be addressed to LIU Yan, Email:yanmiko@whu.edu.cn,ORCID:0000-0002-5402-1988
  • Supported by:
    This is an outcome of the Youth Project "Research on Important Legal Issues of Machine-Generated Data in the Context of the Civil Code"(21YBQ070)supported by Philosophy and Social Science Foundation of Hunan Province.

Abstract: [Purpose/Significance] The purpose of this study is to delineate the domestic and international research landscape of data sovereignty, achieve a broad consensus on the understanding of data sovereignty, eliminate existing or potential misunderstandings and misuse related to data sovereignty, and uncover current research limitations while proposing pathways for future research. [Design/Methodology] Employing content analysis method, the study designs a research framework for textual analysis that spans from the evolution of concepts to connotations, values, subjects, powers, and applications. It compiles data sovereignty literature from both domestic and international sources, showcasing the academic community's level of understanding regarding data sovereignty. [Findings/Conclusion] Data sovereignty is often intertwined with control and governance of data flow. Historically, the academic community has exhibited a strong sense of sovereignty awareness and acute risk perception, and attaches great importance to cyber security. However, this has also revealed issues such as limited theoretical research, simplistic risk exploration, and difficulties in implementing security recommendations. There is a need to delve deeper into the legal exploration of data sovereignty, investigate the inherent logic of its risks, and thoroughly study solutions and strategies for its security development. [Originality/Value] By reviewing data sovereignty research from domestic and international sources, this study preliminarily defines the concept of data sovereignty and the primary concerns when discussing it. Building upon the summary of current research deficiencies, it proposes directions for future research enhancement.

Key words: Data sovereignty, Digital sovereignty, Cyber sovereignty, Data security, Data governance