Cyber Policy and Digital Affairs
Legal, Ethical, and Democratic Issues
![Graphe-World-BGP-zones-[EN]qualitémoyenne-01 Graphe-World-BGP-zones-[EN]qualitémoyenne-01](https://geode.science/wp-content/uploads/elementor/thumbs/Graphe-World-BGP-zones-ENqualitémoyenne-01-p63dvbqw6z1oxefah18h7xhpte2ig8ubl354dp7gd0.png)
The datasphere presents new challenges for collective security, economic prosperity, democratic values and state sovereignty. The public policy challenges concern in particular:
- International regulation to ensure peace and stability in cyberspace in the face of the proliferation of tools and offensive operations
- Conflicts of jurisdiction between States or between the State and the private sector and the transformation of the exercise of the regalian powers of States faced with the power of intermediation platforms
- The development of digital technologies (cryptography, AI, 5G, cloud)
- The challenges and strategies of digital sovereignty in a context of strategic competition
- Ethical, legal and democratic issues in an environment that offers a multitude of actors unprecedented access to personal data.
News of the theme



Researchers of the theme
BÔMONT Clotilde PhD geography, Cloud specialist













TAILLAT Stéphane Lecturer, Cyber Warfare specialist
