อธิปไตยทางดิจิทัล: การออกแบบการกำกับดูแลและธรรมาภิบาล ในมิติที่หลากหลาย

Main Article Content

เกียรติอนันต์ ล้วนแก้ว
วรกฤษณ์ นุ้ยพิน
จิรภัทร บุญอาจ

บทคัดย่อ

บทความนี้วิเคราะห์แนวคิดอธิปไตยทางดิจิทัลและการออกแบบการกำกับดูแลในมิติต่าง ๆ ท่ามกลางการเปลี่ยนแปลงทางเทคโนโลยีและภูมิรัฐศาสตร์ที่รวดเร็ว การศึกษานี้ครอบคลุมการวิเคราะห์มิติที่สำคัญของอธิปไตยทางดิจิทัล ได้แก่ อธิปไตยของรัฐ อธิปไตยทางเศรษฐกิจ อธิปไตยของปัจเจกบุคคล อธิปไตยทางเทคโนโลยี และอธิปไตยทางข้อมูล โดยพิจารณาทั้งรูปแบบการกำกับดูแลที่แตกต่างกัน การออกแบบและการนำกฎระเบียบไปปฏิบัติ รวมถึงความท้าทายและความตึงเครียดที่เกิดขึ้น การวิเคราะห์กรณีศึกษาจากสหภาพยุโรปและประเทศต่าง ๆ แสดงให้เห็นว่าการรักษาอธิปไตยทางดิจิทัลต้องการการสร้างสมดุลระหว่างการควบคุมและการเปิดกว้าง การพัฒนาความสามารถภายในประเทศและความร่วมมือระหว่างประเทศ การวิเคราะห์เผยให้เห็นความซับซ้อนในการนำกรอบอธิปไตยทางดิจิทัลไปปฏิบัติ โดยเฉพาะในด้านการจัดเก็บข้อมูลในประเทศ การพัฒนาโครงสร้างพื้นฐาน และการแข่งขันในตลาด การวิจัยเน้นย้ำความสำคัญของการพัฒนากรอบการกำกับดูแลที่ยืดหยุ่นและปรับตัวได้ บทความมีข้อเสนอแนะสำหรับการพัฒนากรอบการกำกับดูแลที่มีประสิทธิภาพและยั่งยืน โดยเน้นความสำคัญของความยืดหยุ่น การมีส่วนร่วม และการปรับตัวต่อการเปลี่ยนแปลง


 

Article Details

ประเภทบทความ
บทความวิชาการ

เอกสารอ้างอิง

Adonis, A. A. (2019). Critical engagement on digital sovereignty in international relations: Actor transformation and global hierarchy. Global Jurnal Politik Internasional, 21(2), 262-282. https://doi.org/10.7454/global.v21i2.412

Ali,O., & Osmanaj,V. (2020). The role of government regulations in the adoption of cloud computing: A case study of local government. Computer Law & Security Review,36,105396. https://doi.org/10.1016/j.clsr.2020.105396

Anthony Jnr, B. (2023). Distributed ledger and decentralised technology adoption for smart digital transition in collaborative enterprise, Enterprise Information Systems, 17(4), 465-498, https://doi.org/10.1080/17517575.2021.1989494

Anwar, U.A.A., Rahayu, A., Wibowo, L.A., Sultan,M.A., Aspiranti, A., Furqon, C., & Rani, A.M. (2025). Supply chain integration as the implementation of strategic management in improving business performance. Discover Sustainability, 6, 101. https://doi.org/10.1007/s43621-025-00867-w

Autolitano, S., & Pawlowska, A. (2021). Europe's quest for digital sovereignty: GAIA-X as a case study. Istituto Affari Internazionali.

Belli,L., Gaspar,W.B., & Jaswant,S.S. (2024). Data sovereignty and data transfers as fundamental elements of digital transformation: Lessons from the BRICS countries. Computer Law & Security Review, 54, 106017. https://doi.org/10..1016/j.clsr.2024.106017.

Bellanova, R., Carrapico, H., & Duez, D. (2022). Digital/sovereignty and European security integration: An introduction. European Security, 31(3), 337-355.https://doi.org/10.1080/09662839

.2022.2101887

Braun, M., & Hummel, P. (2024). Is digital sovereignty normatively desirable? Information, Communication & Society, 1–14. https://doi.org/10.1080/1369118X.2024.2332624

Bria, Francesca. (2015). Public policies for digital sovereignty. Platform Cooperativism Consortium conference, New York. Retrieved October 26, 2024, from https://www.academia.

edu/19102224/

Burri, M., & Kugler, K. (2024).Regulatory autonomy in digital trade agreements, Journal

of International Economic Law, 27(3), 397–423, https://doi.org/10.1093/jiel/jgae025

Casaril,F. & Galletta, L. (2023). Developing security metrics for space systems: A study considering

the NIST cybersecurity framework 2.0 and the NIS2. International Journal of Critical Infrastructure Protection, 51, 100805, https://doi.org/10.1016/j.ijcip.2025.100805

Celeste, E. (2021). Digital Sovereignty in the EU: Challenges and Future Perspectives. In F. Fabbrini,

E. Celeste, & J. Quinn (Eds.), Data Protection Beyond Borders: Transatlantic Perspectives

on Extraterritoriality and Sovereignty (pp. 29–82). Hart Publishing.

Chander, A., & Sun, H. (2021). Sovereignty 2.0. Georgetown University Law Center.

Christakis, T. (2024). Data free flow with trust: current landscape, challenges and opportunities. Journal of Cyber Policy, 9(1), 95–120. https://doi.org/10.1080/23738871.2024.2421838.

Donnelly, S., Ríos Camacho, E., & Heidebrecht, S. (2024). Digital sovereignty as control: The regulation of digital finance in the European Union. Journal of European Public Policy, 31(8), 2226-2249. https://doi.org/10.1080/1369118X.2024.2332624

Ducato,R. (2020). Data protection, scientific research, and the role of information. Computer

Law & Security Review, 37, 105412. https://doi.org/10.1016/j.clsr.2020.105412

Falkner, G., Heidebrecht, S., Obendiek, A., & Seidl, T. (2024). Digital sovereignty - Rhetoric and reality. Journal of European Public Policy, 31(8), 2099-2120. https://doi.org/10.1080/

2024.2358984

Floridi, L. (2020). The fight for digital sovereignty: What it is, and why it matters, especially for the EU.

Philosophy & Technology, 33, 369-378. https://doi.org/10.1007/s13347-020-00423-6.

Fratini, S., Hine, E., Novelli, C., Roberts, H., & Floridi, L. (2024). Digital sovereignty: A descriptive analysis and a critical evaluation of existing models. Digital Society, 3(3), 1-10 https://doi.org/10.2139/ssrn.4816020

Glasze, G., Cattaruzza, A., Douzet, F., Dammann, F., Bertran, M-G., Bômont, C., Braun, M., Danet, D., Desforges, A., Géry, A.,Grumbach, S., Hummel, P. (2023). Contested spatialities of digital sovereignty. Geopolitics, 28(2), 919-958. https://doi.org/10.1080/14650045.2022.2050070

Gudipati,R.R. (2025). Verifiable credentials: Transforming digital identity in the real world. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 11(2), 684-692, https://doi.org/10.32628/CSEIT25112382.

Heidebrecht, S. (2024). From market liberalism to public intervention: Digital sovereignty and changing

European union digital single market governance. Journal of Common Market Studies, 62(1), 205-223. https://doi.org/10.1111/jcms.13488

Hoeffler, C., & Mérand, F. (2024). Digital sovereignty, economic ideas, and the struggle over the digital markets act: A political-cultural approach. Journal of European Public Policy, 31(8),

-2146. https://doi.org/10.1080/13501763.2023.2294144

Issaoui, A., Örtensjö, J. & Islam, M.S. (2023). Exploring the general data protection regulation (GDPR) compliance in cloud services: Insights from Swedish public organizations on privacy compliance. Future Business Journal, 9(1),107. https://doi.org/10.1186/s43093-023-00285-2

Jansen,B., Kadenko,N., Broeders,D., van Eeten,M., Borgolte,M., & Fiebig ,T. (2023). Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions. Government Information Quarterly, 40(4), 101862. https://doi.org/10.1016/

j.giq.2023.101862.

Kaloudis, M. (2021). Digital sovereignty--European union's action plan needs a common understanding to succeed. History Compass, 19(12), e12698. https://doi.org/10.1111/hic3.12698

Krasyuk, I.A, Kolgan, M.V, Medvedeva,Y. (2022). Digital ecosystem structure formation depending

on the archetype of distribution network participants. European Journal of Management and Business Economics, 31(2), 176–191,https://doi.org/10.1108/EJMBE-07-2021-0202.

Lambach, D., & Oppermann, K. (2022). Narratives of digital sovereignty in German political discourse.

Governance, 36(3), 693-709. https://doi.org/10.1111/gove.12690

Leese, M. (2024). Staying in control of technology: Predictive policing, democracy, and digital sovereignty. Democratization, 31(5), 963-978. https://doi.org/10.1080/13510347.2023.2197217

Lehuedé, S. (2024). An alternative planetary future? Digital sovereignty frameworks and the decolonial option. Big Data & Society, 11(1). https://doi.org/10.1177/20539517231221778

Lemmi, L.; Puliafito, C.;Virdis, A.; Mingozzi, E. (2024). SRv6-based edge service continuity in 5G mobile networks. Future Internet, 16, 138.https://doi.org/10.3390/fi16040138

Moerel, L., & Timmers, P. (2021). Reflections on digital sovereignty. EU Cyber Direct, Research

in Focus series 2021. Retrieved October 26, 2024, from https://ssrn.com/abstract=3772777

Monsees, L., & Lambach, D. (2022). Digital sovereignty, geopolitical imaginaries, and the reproduction of European identity. European Security, 31(3), 377-394. https://doi.org/10.1080/

2022.2101883

Misraa,S., Barikb ,K., & Kvalvik,P. (2025). Digital Sovereignty in the era of industry 5.0: Challenges and

opportunities. Procedia Computer Science,254, 108–117. https://doi.org/10.1016/

j.procs.2025.02.069.

Oerlemans, J. J., & Langenhuijzen, S. (2024). Balancing national security and privacy: Examining

the use of commercially available information in OSINT practices. International Journal

of Intelligence and CounterIntelligence, 38(2), 579–597. https://doi.org/10.1080/

2024.2387850.

Pranith,S. (2023) Risk reporting to management on federal offers and How to navigate

the conundrum?. Journal of Economics & Management Research, 4(6), 1-4.

https://doi.org/10.47363/JESMR/2022(4)217.

Pohle, J., & Santaniello, M. (2024). From multistakeholderism to digital sovereignty: Toward a new discursive order in internet governance? Policy & Internet, 1-20.https://doi.org/10.1002/poi3.426

Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4).), 1-4.

https://doi.org/10.14763/2020.4.1532

Quinn, J., & Connolly, B. (2021). Distributed ledger technology and property registers: displacement

or status quo. Law, Innovation and Technology, 13(2), 377–397. https://doi.org/10.1080/

2021.1977223

Roberts, H. (2024). Digital sovereignty and artificial intelligence: A normative approach. Ethics

and Information Technology, 26, 70. https://doi.org/10.1007/s10676-024-09810-5

Roberts, H., Cowls, J., Casolari, F., Morley, J., Taddeo, M., & Floridi, L. (2021). Safeguarding European values

with digital sovereignty: An analysis of statements and policies. Internet Policy Review, 10(3). https://doi.org/10.14763/2021.3.1575

Rone, J. (2024). ‘The sovereign cloud’ in Europe: diverging nation state preferences and disputed institutional competences in the context of limited technological capabilities. Journal

of European Public Policy, 31(8), 2343–2369. https://doi.org/10.1080/13501763.2024.2348618

Ruohonen, J. (2021). The Treachery of Images in the Digital Sovereignty Debate. Minds and Machines, 31(3), 439-456. https://doi.org/10.1007/s11023-021-09566-7

Sayankina, S., Tsen, E., Tan, E. W., & Ko, R. K. L. (2025). Defining the intension and extension

of nations’ sovereignty in the age of generative AI. Territory, Politics, Governance, 1–16. https://doi.org/10.1080/21622671.2025.2568474

Sheikh, H. (2022). European Digital Sovereignty: A layered approach. Digital Society, 1, 25 https://doi.org/10.1007/s44206-022-00025-z

Soltani, R.; Zaman, M.;Joshi, R.; Sampalli, S. (2022). Distributed ledger technologies and their applications: A Review. Applied. Sciences. 12, 7898. https://doi.org/10.3390/app12157898.

Spandler,K., Hartelius,J., Monti,A., & Söderbaum,F. (2024). Sovereignty scripts and regional governance: ASEAN’s response to the Covid-19 pandemic, The Pacific Review, 37(3), 604-633, https://doi.org/10.1080/09512748.2023.2205164

Swire, P.,Kennedy-Mayo,D.,Bagley,D., Krasser,S.,Modak,A., & Bausewein,C. (2024). Risks to cybersecurity from data localization, organized by techniques, tactics and procedures, Journal of Cyber Policy, 9(1), 20-51, https://doi.org/10.1080/23738871.2024.2384724.

Tan, K. L., Chi-Hung, C., & Lam, K.-Y. (2023). Survey on digital sovereignty and identity: From digitization

to digitalization. ACM Computing Surveys, 56(3), 61. https://doi.org/10.1145/3616400

Uršič,D. & Čater,T.(2025). Digital innovation in management and business: A comprehensive review, multi-level framework, and future research agenda, Journal of Business Research, 197,115475. https://doi.org/10.1016/j.jbusres.2025.115475

Zhao, X.; Zhong, B.; Cui, Z. (2023). Design of a decentralized identifier-based authentication

and access control model for smart homes. Electronics. 12, 3334. https://doi.org/10.3390/electronics12153334.