Conveners
Virtually Transformed? Digital Infrastructures, Competition, and Governance
- Julia Carver (University of Oxford)
-
Tobias Liebetrau (University of Copenhagen)11/06/2026, 10:45Digital Transformations 1Paper Abstract (Closed Panels)
Big tech companies authoritatively produce data, information, and knowledge about cybersecurity threats to individuals, businesses, and states. But how do they render international cybersecurity phenomena knowable? Through which practices, means, and devices is this knowledge generated? This paper argues that examining the epistemic infrastructural power of big tech companies addresses these...
Go to contribution page -
Moritz Weiss (LMU Munich)11/06/2026, 10:55Digital Transformations 1Paper Abstract (Closed Panels)
Digital technologies have become deeply entangled with the fabric of contemporary societies. Data infrastructures and cybersecurity practices underpin not only economic activity but also state authority and national security. This growing entanglement gives rise to a central question: how are states reorganizing their authority structures and cybersecurity policies, when digital...
Go to contribution page -
Barbora Valockova (National University of Singapore), Ms Mae Chow (National University of Singapore)11/06/2026, 11:05Digital Transformations 1Paper Abstract (Closed Panels)
How do small and middle powers preserve autonomy amid great-power competition in critical digital infrastructure? This paper addresses this foundational question in International Relations by examining Southeast Asian states' navigation of US-China rivalry in submarine cable governance. Drawing on semi-structured interviews and comparative case analysis of Singapore, Vietnam, and Indonesia, we...
Go to contribution page -
Mattia Sguazzini (University of Genova, Italy)11/06/2026, 11:15Digital Transformations 1Paper Abstract (Closed Panels)
Cybersecurity has become central to strategic competition and foreign policy, yet research has focused primarily on executive decision-making, military doctrines, and national cyber strategies, marginalising parliamentary roles in this securitised and technically complex domain. This paper examines how legislatures scrutinise cyber policy in democratic systems.
Go to contribution page
Using the framework of...