Book on Digital Sovereignty

Digital sovereignty ensures that AI technologies serve people’s best interests while preserving their privacy, ethics, and morals. It involves a country or organization controlling its digital infrastructure, technology, and data without over-reliance on external forces.

Publisher: Routledge, (Taylor & Francis Group) 

Call For Papers: Artificial Intelligence in Context of Digital Sovereignty 

Editors: 

  1. Sanjay Misra, Institute for Energy Technology, Norway, sanjay.misra@ife.no  
  2. Petter Kvalvik, Institute for Energy Technology, Norway, Petter.Kvalvik@ife.no  
  3. Bjørn Axel Gran, Institute for Energy Technology, Norway, Bjorn.Axel.Gran@ife.no  
  4. Kai Morgan Kjølerbakken, Institute for Energy Technology, Norway, kai.kjolerbakken@ife.no  
  5. Aida Omerovic, SINTEF Digital, Norway, aida.omerovic@sintef.no  
  6. Nadia Saad Noori, University of Agder, Norway, nadia.saad.noori@uia.no   

Book Description:

Digital sovereignty ensures that AI technologies serve people’s best interests while preserving their privacy, ethics, and morals. It involves a country or organization controlling its digital infrastructure, technology, and data without over-reliance on external forces. AI can be used as a tool for digital sovereignty and maintaining sovereignty in AI-driven societies. AI-driven algorithms aid in maintaining data sovereignty by allowing for data localization, encrypting, and protecting data storage within national borders. This means that it prevents sensitive industrial data from being stored outside the borders and increases control over the most certain information. AI allows for tailored solutions to industrial problems. By developing the capability at home, AI empowers countries to avoid reliance on imports and order customised solutions that meet local needs and requirements.  

This book provides readers with a thorough overview of the state-of-the-art at the moment and forthcoming trends in the field of Data Sovereignty. This book’s practical examples, multidisciplinary outlooks, and forward-thinking abstraction will prove immensely valuable for practitioners, academics, professionals, and students desiring to increase their knowledge of advanced intelligent applications. This book will inspire readers to apply new technologies and unconventional thinking to produce clever solutions in any industry. 

Target Audience:

The primary audience for this book includes practitioners, researchers, academics, professionals, and students interested in the field of advanced intelligence applications. In addition, it targets those wanting to be up to date with emerging trends and advancements, offering practical insights into possible intelligent applications, and reviewing upcoming possible future implementations in this fast-changing field. 

Key Features: 

  • Context of AI in Digital Sovereignty: How to improve Digital Sovereignty regarding AI to meet legal and technological barriers/challenges. 
  • Ongoing Research and Development: Current development of Digital Sovereignty and its realization. 
  • Future Development and Enhancement: Improvement of policy. In future development, a few areas that could benefit from AI are Cyber sovereignty, Data sovereignty, and technological sovereignty. 
  • Comprehensive Coverage: The book will have a broad spectrum of topics that are related to cyber sovereignty, data sovereignty, technological sovereignty, AI role, industrial application, Data Center Sovereignty, Industrial data Space and others. 
  • Views from Various Fields: State-of-the-art AI applications and Digital Sovereignty are inherently multidisciplinary, drawing on knowledge in computer science, engineering, cognitive science, and other areas. A book will function as a platform for experts in many fields to share their novel insights and showcase the multidisciplinary nature of the field.  

Recommended Topics: 

  • Introduction to Digital Sovereignty. 
  • Conceptualization – Sovereignty. 
  • Sovereignty in the Digital Age – How can we measure Digital Sovereignty? 
  • Digital Sovereignty: State, firms, and citizens overlap, and conflict. 
  • Data Sovereignty: integrity, confidentiality and availability of information shared across business partners. 
  • Data Center Sovereignty – failure scenarios and improvisation to design guidelines. 
  • Blockchain (BC) – based self-sovereignty. 
  • Self-sovereignty identity – ownership of the digital identity. 
  • Practical implementations. 
  • Challenges and future scope. 

Submission Procedure: 

Researchers and practitioners are invited to submit on or before December 31st, 2024, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of her proposed chapter. Authors will be notified by January 15th, 2025, about the status of their proposals and sent chapter guidelines. Full chapters of 5000- 15,000 words (word count includes references and related readings) are expected to be submitted by January 31st, 2025. All submitted chapters will be reviewed on a peer-review basis. Contributors may also be requested to serve as reviewers for this project. 

Submission will be done through the easy chair.  

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication. 

Important Dates (Tentative): 

Book Chapter Proposal Submission Deadline: December 31st, 2024 

Notification of Acceptance: January 15th, 2025 

Book Chapter Proposal Submission Deadline: January  31st, 2025 

Review Results Sent to Authors: February 28th, 2025  

Revised Submission Due: March 15th, 2025 

Chapter Acceptance Decision: March 31st, 2025 

Camera Ready Submission: April 30th, 2025 

Submission to Taylor and Francis: May 31st, 2025   

Contact Person:

Sanjay Misra, Institute for Energy Technology, sanjay.misra@ife.no  

Review Process: 

Initial Screening 

The Guest Editor(s) will be checking the plagiarism of all the submitted papers for ensuring the originality of content using Turnitin/iThenticate. Hence, authors are advised in their interest, to use a tool like Turnitin, iThenticate etc. to check the plagiarism level of their manuscripts before submission. The originality report generated by the tool may also be submitted at the time of paper submission. The paper having plagiarism above the minimum level will be dropped from the next round of the review process. 

Three Tier Review Process 

In the first round of review, the papers submitted by the authors will be assessed based on their technical suitability, and scope of work. 

The peer review by three experts based on originality, novelty, clarity, completeness, relevance, significance, and research contribution will be taken. The final decision regarding the acceptance of papers will be based on review remarks received after the comments by at least 3 reviewers. 

The final decision on the papers will be sent by the Guest Editor(s) considering the reviews, plagiarism, and theme.