{"id":30251,"date":"2023-11-27T12:09:20","date_gmt":"2023-11-27T11:09:20","guid":{"rendered":"https:\/\/www.sfsic.org\/?p=30251"},"modified":"2023-11-26T12:11:52","modified_gmt":"2023-11-26T11:11:52","slug":"big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts","status":"publish","type":"post","link":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/","title":{"rendered":"Big Tech as an Actor of Global Security and Geopolitical Conflicts"},"content":{"rendered":"<p><!-- fxzn:singledetail --><\/p>\n<div class=\"zone zn-singledetail\" id=\"fxzn-singledetail-1\">\n<div class=\"zone-block zn-singledetail-block alignwide va-top\">\n<div class=\"row\">\n<div class=\"columns large-8 large-push-4\">\n<div class=\"zn-singledetail-metabox\">\n<div class=\"zn-singledetail-pubdate pubdate\">\n\t\t\t\t\t<span class=\"pubdate-txt\">Mis en ligne le<\/span><span class=\"doubledot\"><\/span> 26 novembre 2023\t\t\t\t<\/div>\n<div class=\"zn-singledetail-thematiques with-sep-comma\">\n<ul class=\"termslist termslist-thematique\">\n<li class=\"termslist-item termslist-title\"><span class=\"termslist-titletxt\">Th\u00e9matiques<\/span><span class=\"doubledot\"><\/span><\/li>\n<li class=\"termslist-item tax-thematique term-communication-publique-et-politique\"><a class=\"termslist-itemlink\" href=\"https:\/\/www.sfsic.org\/en\/thematiques\/public-and-political-communication\/\" title=\"Communication publique et politique\"><span class=\"termslist-itemname\">Communication publique et politique<\/span><\/a><\/li>\n<li class=\"termslist-item tax-thematique term-numerique-strategies-dispositifs-et-usages\"><a class=\"termslist-itemlink\" href=\"https:\/\/www.sfsic.org\/en\/thematiques\/digital-strategies-devices-and-uses-en\/\" title=\"Num\u00e9rique : strat\u00e9gies, dispositifs et usages\"><span class=\"termslist-itemname\">Num\u00e9rique : strat\u00e9gies, dispositifs et usages<\/span><\/a><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"row\">\n<div class=\"columns large-4\">\n<div class=\"zn-singledetail-sidebar bg-cornersquares\">\n<div class=\"zn-singledetail-infos\">\n<p class=\"zn-singledetail-reponse-date\">\n\t\t\t\t\t\t<span>R\u00e9ponse attendue pour le<\/span><span class=\"doubledot\"><\/span> <strong>05\/12\/2023<\/strong>\n\t\t\t\t\t<\/p>\n<p class=\"zn-singledetail-reponse-type\">\n\t\t\t\t\t<span>Type de r\u00e9ponse<\/span><span class=\"doubledot\"><\/span> <strong>R\u00e9sum\u00e9<\/strong>\n\t\t\t\t\t<\/p>\n<p class=\"zn-singledetail-type\">\n\t\t\t\t\t\t\t<span>Type d\u2019\u00e9v\u00e9nement<\/span><span class=\"doubledot\"><\/span> <strong>Colloque<\/strong>\n\t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"columns large-8\">\n<div class=\"zn-singledetail-contentbox\">\n<div class=\"zn-singledetail-eventinfo\">\n<div class=\"zn-singledetail-eventinfo-inner\">\n<div class=\"zn-singledetail-eventdates\">\n\t\t\t\t\t\t<span class=\"zn-singledetail-label\">Dates de l\u2019\u00e9v\u00e9nement<span class=\"doubledot\"><\/span><\/span><\/p>\n<ul class=\"zn-singledetail-eventdates-list\">\n<li class=\"zn-singledetail-eventdates-item\">\n\t\t\t\t\t\t\t\tDu 02\/05\/2024 au 03\/05\/2024\t\t\t\t\t\t\t<\/li>\n<\/ul><\/div>\n<p class=\"zn-singledetail-eventplace\">\n\t\t\t\t\t\t<span class=\"zn-singledetail-label\">Lieu de l\u2019\u00e9v\u00e9nement<span class=\"doubledot\"><\/span><\/span><br \/>\n\t\t\t\t\t\t<span class=\"zn-singledetail-eventplace-adr\"><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"adr-place\">Centre Panth\u00e9on<\/span>,<\/p>\n<p>\t\t\t\t\t\t<\/span>\t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"zn-singledetail-annonce wig-content\">\n<p>From the war in Ukraine to geopolitical rivalries between China and the USA, and terrorism-related threats, the digital giants colloquially known as \u201cBig Tech\u201d corporations are increasingly involved in issues of national and international security.<\/p>\n<p>Most often, their involvement stems from <strong>their services and platforms serving as new theaters of conflict in cyberspace <\/strong>(Singer &amp; Brooking, 2018), as with Russian or Chinese information operations on social media during elections (Jeang\u00e8ne Vilmer et al., 2018&#160;; Charon &amp; Jeang\u00e8ne Vilmer, 2021&#160;; Marang\u00e9 &amp; Quessard 2021)&#160;; or when Donald Trump, then President of the United States, took to Twitter to threaten North Korea with nuclear war (Schwartz, 2022). In such cases, the role of Big Tech companies in conflict is an infrastructural, near invisible one, as the services they provide and govern are used as intermediaries for conflict (Musiani et al. 2016). In other cases, <strong>these firms are themselves the objects of conflict<\/strong>, as with the multiple bans on Huawei&rsquo;s 5G (Statista, 2020) and on the social network TikTok owned by Chinese conglomerate ByteDance (Chan, 2023)&#160;; or Russia&rsquo;s designation of Meta as a \u00ab&#160;terrorist&#160;\u00bb organization in the context of the Ukraine war (Euronews, 2022). In International Relations scholarship, it is commonly assumed that private corporations act as \u201cambassadors\u201d of their country of origin and that their technical innovations are prolongations of national power on the world stage (Carr, 2016&#160;; Strange, 1996&#160;; Keohane &amp; Nye, 1998). It therefore comes as no surprise that conflict situations involving Big Tech are becoming more common with the internationalization of Chinese internet giants, signaling the emergence of non-American Big Tech. Meanwhile, tech giants\u2019 political power is increasingly recognized by the traditional actors of international affairs, with multiple states naming \u201ctech ambassadors\u201d. Finally, Big Tech companies are increasingly becoming <strong>actors of global security in their own right, <\/strong>by \u201cco-producing\u201d security alongside public authorities (Bellanova &amp; de Goede, 2022) and even in some cases launching their own initiatives, such as Microsoft\u2019s Digital Geneva Convention, or YouTube, Twitter, Facebook and Microsoft\u2019s launch of the Global Internet Forum to Counter Terrorism (GIFCT) in 2017.<\/p>\n<p>While it is not unprecedented for private companies to be involved in security issues, policymaking and enforcement (Abrahamsen &amp; Leander, 2016), and especially so in cyberspace (Dunn Cavelty, 2016), the variety and importance of current ties between digital giants, security and conflict seems to indicate a general trend towards the privatization of security through these (quasi-) global players. Due to their scale and economic clout, Big Tech companies profit from a particular form of \u201centrepreneurial private authority\u201d (Srivastava, 2021) or \u201cplatform power\u201d (Culpepper &amp; Thelen, 2020). In practice, this notably means a privileged access to public authorities and international fora, and the ability to impose standards (\u00ab&#160;best practices&#160;\u00bb, definitions, processes), as well as to form coalitions to defend their interests. As its central position in the digital industry and economy is being translated into a centrality in security- related policy areas, Big Tech can leverage its integration within security governance networks and geopolitical rivalries to fend off threats of antitrust action (Woll, 2019), thereby consolidating its market power and becoming further integrated into high politics, raising multiple concerns in terms of legitimacy, accountability, and sovereignty (Monsees et al., 2023).<\/p>\n<p>Such developments invite us to look beyond the instrumental study of Big Tech platforms, services and technologies, and to turn our attention to the agency of these actors in global security and geopolitical conflicts. With this in mind, the aim of this conference is to initiate a holistic discussion on the diversity of the security roles played by these companies, how they \u201clearn to see the world through a security lens\u201d (de Goede, 2018:26) and their relationship to traditional security networks. A number of disciplinary perspectives and fields of study are relevant to this theme, and the goal is to bring together their respective contributions. This conference will be of relevance for, and expects contributions from, a range of disciplines including but not limited to international relations, political science, media studies, security studies, science and technology studies and political economy.<\/p>\n<p>&nbsp;<\/p>\n<h2>1.\u00a0\u00a0\u00a0\u00a0\u00a0 Big Tech in transnational conflicts and social movements<\/h2>\n<p><strong><em>\u00a0<\/em><\/strong><\/p>\n<p>How do Big Tech companies position themselves or try to remain neutral when their services are used during armed conflicts or insurrections&#160;? We seek to understand how companies shape their \u2018crisis response\u2019, both in relation to international conflicts, where Big Tech takes a stand for one country against another (or avoids taking a stand altogether), and to local conflicts where one party seems to be favored by Big Tech in the context of social movements.<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><em>Transnational conflicts<\/em><\/li>\n<\/ol>\n<p>Facebook\/Meta\u2019s communication on the subject is clearly the most open one, ever since it was formally accused by the UN of contributing to the Rohingya genocide in Myanmar (Whitten-Woodring <em>et al., <\/em>2020). Following the Rohingya scandal, in 2019 Facebook created a Strategic Response Team (Meta, 2019) with a mission to operate global watch of international conflicts to better adapt its services\u2019 features and avoid escalating the situation on site. Five years since its launch, the team\u2019s efficiency remains hard to measure, while its functioning itself is quite vague. It appears that conflicts are still handled by the company on an <em>ad hoc <\/em>basis. Since its launch, Meta\u2019s Oversight Board insists on the need for a specific conflict management policy that is seemingly being developed but is yet to come into effect (Oversight Board, 2022).<\/p>\n<p>The company has also adapted its content policy in Eastern Europe following the Russian invasion of Ukraine (Meta, 2022), and in Afghanistan after the US army left the country and the Taliban regained power (<em>The New York Times<\/em>, 2023). In other conflicts, namely in Ethiopia or during frequent clashes between Israel and Palestine, Meta is regularly accused (including by its own Oversight Board) of being too passive or the other way around, of ruthless censorship of certain parties to the conflict (notably Palestinian voices) (Human Rights Watch, 2022).<\/p>\n<p>According to recent studies (Kaneva <em>et al.<\/em>, 2023), the role of social media in the Russia-Ukraine conflict is quite unprecedented, with Ukraine using social media to crowdfund the war and creating an IT army (Manor, 2023). On a more personal level, the new owner of Twitter (X) Elon Musk taking a clear stand on the Ukraine conflict and sending Starlink Internet drones to Ukraine caused controversy as well (Twitter, 2022). As far as Google is concerned, a recent study shows the introduction of bias and manipulation in search engine results in favor of pro-Kremlin sources for Ukraine-related requests made from Russia (<em>Novaya Gazeta<\/em>, 2023), in what can only be described as a counterintuitive move, given that these same sources are blocked by the company on YouTube.<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><em>Social movements<\/em><\/li>\n<\/ol>\n<p><em>\u00a0<\/em><\/p>\n<p>Big Tech companies\u2019 role in social movements became clear during the \u201cArab Springs\u201d, with Facebook playing a defining role (Wolsfeld, 2013), while social media affordances allowing transnational connections and global support for local causes go as far back as the Zapatista movement in the nineties (Russel, 2005).<\/p>\n<p>Traditionally, social media are viewed as facilitating social movements\u2019 development, without, however, guaranteeing their efficiency (Tufekci, 2019). On the other hand, Access Now claims that Big Tech\u2019s sanctions against Russia have a negative impact on Russian civil society (Access Now, 2022).<\/p>\n<p>Partisan conflicts between the right and left are also of relevance when they generate violence. A telling case in this regard was President Donald Trump&rsquo;s suspension from all mainstream social media platforms in January 2021 following the Capitol attack. The move fueled accusations of \u201cwokeness\u201d (Sobande <em>et al., <\/em>2022) and censorship, leading to a notable growth of existing alt-right platforms and the creation of new ones (including Trump\u2019s own, Truth Social). In response, Apple and Google (Android) banned the most libertarian services from their app stores for failing to protect their users, while Amazon (AWS) kicked them off of its cloud services &#8212; a phenomenon that has been called \u201cdeplatformization\u201d (van Dijck et al., 2021).<\/p>\n<h2>2.\u00a0\u00a0\u00a0\u00a0\u00a0 Big Tech and everyday \u201ctrust and safety\u201d<\/h2>\n<p>While moments of crisis concentrate exceptional threats over a short period of time, platform companies must also deal with safety and security issues that are ongoing. These include threats related to terrorism and violent extremisms (Borelli, 2021), disinformation and hate speech (Badouard, 2021), and organized crime. How do Big Tech companies integrate security considerations into their respective product development processes, platform governance and internal organization&#160;?<\/p>\n<p>As security and safety-related scrutiny and demands from public authorities and users grow, Big Tech companies are increasingly forced to respond in order to adapt to multiplying regulations, and\/or to preempt scandals and new projects to regulate them. In the European Union, the DSA notably mandates that VLOPs assess the \u201csystemic risks\u201d associated with their services and deploy mitigation strategies. As Big Tech adapts to these new roles, its products evolve. Visible changes in the name of safety include, for instance, prominent reporting buttons, ReDirect links, fact-checking labels or \u2018sensitive content\u2019 warnings on Facebook, YouTube\u2019s information panels for Covid content or state-owned media, or Twitter (X)\u2019s \u201care you sure you want to retweet this without having opened the link first\u201d pop-up. Other adaptations which are more opaque to end users bring out questions of censorship (Badouard, 2020), such as the formation of \u201ccontent cartels\u201d (Douek, 2020)<a href=\"#_bookmark0\"><sup>1<\/sup><\/a> and other industry standard-setting mechanisms<a href=\"#_bookmark1\"><sup>2<\/sup><\/a>, the deployment of \u201cautomated\u201d moderation (Gorwa et al., 2020) or delisting\/downranking\/demonetization<a href=\"#_bookmark2\"><sup>3<\/sup> <\/a>(Goldman, 2021).<\/p>\n<p>From the point of view of civil society organizations and individuals, platform design and affordances are particularly salient. For instance, the availability of strong encryption on given services can contribute to protecting users from authoritarian regimes. However, measures implemented in the name of user safety also have unforeseen externalities&#160;: encryption can complicate the investigative process for security services, seemingly neutral platform design choices were shown to favor conservative viewpoints (Schradie, 2019), while some content moderation policies disproportionately affect certain vulnerable groups\u2019 right to free expression (Common, 2020), such as LGBTQ+ activists (Grison &amp; Julliard, 2022), or journalists documenting war crimes (Human Rights Watch, 2020). Meanwhile, actors who are deplatformed hone their camouflage techniques (Renaut, 2020&#160;; Criezis, 2023) or migrate to services lacking the human and\/or technical capacity or the willingness (small, encrypted and\/or alt- right platforms, Fediverse) to moderate their services (Conway, 2020). The most extreme individuals then find themselves in spaces where they are less likely to be contradicted, and where it is more difficult for the authorities to monitor them, hence a lively debate on deplatforming and its efficiency. How do the Big Tech arbitrate between freedom of speech, user safety and national security concerns, all the while balancing them with their commercial interests&#160;?<\/p>\n<p>As technology companies appropriate these new considerations, their sociology as organizations is also evolving. The hiring of experts, often with previous backgrounds in academia or law enforcement roles is an important aspect of this adaptation, given that those companies\u2019 cultures traditionally favor engineering roles (Frenkel &amp; Kang, 2021). Public-facing Public Policy and Government Affairs teams are tasked with responding to ever-increasing demands from public authorities and regulators, while behind-the-scenes Product Policy and Trust &amp; Safety teams develop rules, plan for use cases involving so-called \u201cbad actors\u201d and mitigate recurring threats. For social media corporations like YouTube (Google) and Meta, large numbers of content moderators to enforce policies &#8211;usually subcontractors\u2014 are a key part of the equation as well (Roberts, 2019). What means are these staff given to conduct their mission, and how do they make themselves heard by upper management&#160;? Despite all the evidence that safety, in particular through content moderation, is what makes (or breaks) the value of a platform (Gillespie, 2018), Frances Haugen\u2019s testimony and recent layoffs appear to show that these teams are still seen as adjustment variables which are peripheral to the \u2018core (engineering-based) business\u2019 of Big Tech, thereby questioning the industry\u2019s capacity for collective learning. A noteworthy development innthis regard is the move towards a structuration of \u2018trust and safety\u2019 as a new professional field, with the emergence of a Trust and Safety Professional Association (TSPA) to advance the interests of these professionals within Silicon Valley.<\/p>\n<p><sup>1<\/sup> Examples include the GIFCT on terrorist content, the Tech Coalition for child sexual abuse materials (CSAM), or the informal group to secure the 2020 US election from foreign interference (Isaac &amp; Conger, 2020).<\/p>\n<p><sup>2<\/sup> For instance the Digital Trust and Safety Partnership.<\/p>\n<p><sup>3<\/sup> This last \u2018freedom of speech, not freedom of reach\u2019 approach is particularly favored by X (formerly Twitter) owner Elon Musk.<\/p>\n<h2>3.\u00a0\u00a0\u00a0\u00a0\u00a0 Big Tech and digital sovereignty<\/h2>\n<p>Never in history has it been clearer than today&#160;: digital infrastructures, from the physical ones (submarine cables, data centers, Internet Exchange Points) to the \u201clogical\u201d ones (protocols such as TCP\/IP or algorithms such as Google\u2019s PageRank) are crucial components in arrangements of power. Thus, the private entities that design these infrastructures and keep them operational, as well as leverage them for their profit, are key actors in these arrangements of power (DeNardis, 2012&#160;; Easterling, 2014&#160;; Amoore, 2018&#160;; M\u00f6llers, 2021).<\/p>\n<p>Indeed, Big Tech actors are the designers and de facto \u201cgovernors\u201d of the infrastructures that influence the field of possibilities for actors of international security. These infrastructures are doubly relevant, because on the one hand, the private actors who manage them follow their own agendas and on the other hand, they act as vectors for the political and cultural soft power of the states where they are situated&#160;; in both dimensions, stark conflicts can emerge. In some instances, such private actors can even be likened to technical \u201cstandards entrepreneurs\u201d, as was the case during the controversy surrounding Huawei as a provider of 5G technology.<\/p>\n<p>For states, particularly in Europe (e.g. Tr\u00e9guer, 2017), but also in Russia and China (e.g. Budnitsky &amp; Jia, 2018), and other BRICS countries such as India (Gurumurthy &amp; Chami, 2016) Big Tech services raise questions related to \u201cdigital sovereignty\u201d (Pohle &amp; Thiel, 2020). While this label is primarily understood to indicate a legal concept and a set of political discourses, digital sovereignty can also be understood as a set of infrastructures and socio-material practices&#160;; the concept of sovereignty is re- defined today by a number of political and economic projects which aim to establish autonomous digital infrastructures in a hyperconnected world (Musiani, 2022).<\/p>\n<p>Manifold examples in recent history illustrate this, such as when European or Russian governments host security-defense data at AWS, use Palantir software, or, as mentioned, debate the security soundness of 5G technology provided by Huawei. Finally, regulatory efforts from public institutions sometimes clash with geopolitical considerations, showing the ever more complex relationship between states and platforms. For example, the American peregrinations of TikTok show that, on one hand, the United States is also concerned about digital sovereignty when the hegemony of its champions is compromised&#160;; and on the other hand, digital sovereignty issues concern both the lower layers of cyberspace and the surface of the web and the application layer, as shown by data protection and disinformation issues.<\/p>\n<h2>4.\u00a0 Big Tech and its relations to traditional security actors<\/h2>\n<p>In 2013, Edward Snowden revealed the extent of long-suspected ties between Big Tech firms and the US security apparatus, as leaked documents showed that all major US commercial online service providers participated in the NSA\u2019s global PRISM surveillance program. Ties between the American public sector and the tech industry on security issues are prolific and multifaceted, spanning over the whole spectrum of defense, intelligence and law enforcement. They range from strategic R&amp;D investments and service contracts which can be considered part of the US military-industrial complex, to informal relations on foreign policy and law enforcement (Lakier, 2021), and punctual staged or real resistance<a href=\"#_bookmark3\"><sup>4<\/sup> <\/a>(Tr\u00e9guer, 2019&#160;; Thibout, 2021). A decade after the Snowden affair, what do we know of public-private relations between Big Tech and the American security apparatus&#160;?<\/p>\n<p>Beyond the US, the Big Tech firms have also had to develop relations to security and foreign policy bureaucracies in the various regions of the world where they operate. Vice versa, some states have named \u201ctech ambassadors\u201d (Denmark, France, etc.) and the EU opened a permanent office in the Silicon Valley in 2022. In the European Union, intense public pressure around the question of terrorist uses of the internet has led to the establishment of new norms and permanent fora for public-private cooperation at the national and regional levels<a href=\"#_bookmark4\"><sup>5<\/sup><\/a>, through which security is \u201cco-produced\u201d across public-private boundaries (Bellanova &amp; de Goede, 2022). But sometimes, public authorities themselves constitute the threat, and the UN\u2019s public recognition of Facebook and WhatsApp\u2019s role in the Rohingya genocide has also posed the pressing question of how these firms should proceed in cases where their users need protection from their own government.<\/p>\n<p>Lastly, Big Tech is also becoming further integrated within the existing multilateral international security governance landscape, for instance by participating in United Nations Security Council, G7 or G20 meetings. Here, Microsoft stands out due to its longstanding presence at the UN, where it maintains a permanent office and is particularly involved in cybersecurity governance (Hurel &amp; Lobato, 2018&#160;; Fairbank, 2019).<\/p>\n<p>How do national and international bureaucracies and regulators manage their relationship to the Big Tech corporations in security-related domains&#160;? How do they organize to navigate these relationships&#160;? How is the political division of labor negotiated, and what are the power dynamics within the novel \u201cassemblages\u201d of networked security governance (Abrahamsen &amp; Williams, 2010) involving Big Tech&#160;? The salience of these questions increases as Big Tech becomes further integrated into global security governance, but such public-private relationships are especially difficult to investigate because of the cultures of secrecy and opacity traditional to both security bureaucracies and Big Tech. Leaks, scandals and transparency efforts (voluntary or mandated) provide periodic glances into their workings, and recent scholarship also shows that revolving door phenomena and public tendering records can provide fruitful insights (Tr\u00e9guer, 2019&#160;; Thibout, 2021&#160;; Valdivia et al., 2022).<\/p>\n<p><sup>4<\/sup> Some of the publicized conflicts between the US administration and Big Tech have included privacy-related debates (for instance Apple\u2019s refusal to break encryption on the San Bernardino terrorists\u2019 iPhone), conducting business in China and periodical resistance from Big Tech staff on specific contracts (e.g. in 2018 with Google employees\u2019 vocal resistance to Project Maven, or when Microsoft employees protested a contract with ICE over Trump\u2019s immigration policies).<\/p>\n<p><sup>5<\/sup> See for instance the Groupe de contact permanent in France, or at EU level, the EU Internet Forum and Europol\u2019s Internet Referral Unit (Vieth, 2019).<\/p>\n<h2>Organizing Committee<\/h2>\n<ul>\n<li>Marguerite Borelli (Carism, Universit\u00e9 Paris-Panth\u00e9on-Assas)<\/li>\n<li>Ksenia Ermoshina (Centre Internet et Soci\u00e9t\u00e9, CNRS)<\/li>\n<li>Francesca Musiani (Centre Internet et Soci\u00e9t\u00e9, CNRS)<\/li>\n<li>Gulnara Zakharova (Carism, Universit\u00e9 Paris-Panth\u00e9on-Assas)<\/li>\n<\/ul>\n<h2>International Scientific Committee<\/h2>\n<ul>\n<li>Olivier Alexandre (Centre Internet et Soci\u00e9t\u00e9, CNRS, France) Maxime Audinet (IRSEM, Minist\u00e8re des arm\u00e9es, France)<\/li>\n<li>Romain Badouard (Carism, Universit\u00e9 Paris-Panth\u00e9on-Assas, France)<\/li>\n<li>Anne Bellon (COSTECH, Universit\u00e9 de technologie de Compi\u00e8gne, France)<\/li>\n<li>Enka Blanchard (LAMIH, CNRS\/Universit\u00e9 Polytechnique Hauts de France, France) Maura Conway (Dublin City University, Ireland and VOX-Pol coordinator)<\/li>\n<li>Valentine Crosset (Universit\u00e9 de Gen\u00e8ve, associ\u00e9e au m\u00e9dialab, Sciences Po Paris, France) Fr\u00e9d\u00e9rick Douzet (IFG Lab et GEODE, Universit\u00e9 Paris 8, France)<\/li>\n<li>Bharath Ganesh (University of Amsterdam, NL)<\/li>\n<li>Rikke Bjerg Jensen (Information Security Group, Royal Holloway-University of London, UK) Rikke Frank J\u00f8rgensen (The Danish Institute for Human Rights, DK)<\/li>\n<li>Fabrizio Li Vigni (Centre Internet et Soci\u00e9t\u00e9, CNRS, France) Ilan Manor (Ben Gurion University of the Negev, Israel)<\/li>\n<li>Tristan Mattelart (Carism, Universit\u00e9 Paris-Panth\u00e9on-Assas, France) C\u00e9cile M\u00e9adel (Carism, Universit\u00e9 Paris-Panth\u00e9on-Assas, France)<\/li>\n<li>Julien Nocetti (Centre d&rsquo;analyse, de pr\u00e9vision et de strat\u00e9gie, Minist\u00e8re des Affaires \u00e9trang\u00e8res, chercheur associ\u00e9 \u00e0 l\u2019IFRI et \u00e0 GEODE, France)<\/li>\n<li>Sarah Perret (ESPOL, Universit\u00e9 catholique de Lille, France) Maud Quessard (IRSEM, Minist\u00e8re des arm\u00e9es, France)<\/li>\n<li>Pablo Rauzy (LIASD-PASTIS, Universit\u00e9 Paris 8 Vincennes-Saint-Denis, France)<\/li>\n<\/ul>\n<h2>Key Dates<\/h2>\n<ul>\n<li>October 10th, 2023&#160;: Call for Papers<\/li>\n<li>December 5th, 2023&#160;: Submission Deadline<\/li>\n<li>December 15th, 2023 &#8211; February 1st, 2024&#160;: Evaluation of submissions by the ISC February 15th, 2024&#160;: Notification of Acceptance<\/li>\n<li>May 2nd and 3rd&#160;: 2024&#160;: Conference at the Centre Panth\u00e9on<\/li>\n<\/ul>\n<h2>Guidelines for Submission<\/h2>\n<ul>\n<li>Please plan to submit an extended abstract (800-1000 words long, excluding bibliography) that should include one or more research question(s), a description of the data supporting the proposal, the used methodology, the main findings of the paper, and the paper\u2019s primary contributions to literature and\/or ongoing policy debates.<\/li>\n<li>Panel submissions and alternative formats are also welcome. In this case, please submit a proposal including a working title, brief description of the modalities and questions raised, participants and their affiliations (if relevant), and proposed duration.<\/li>\n<li>Submissions should be sent by <strong>December 5th, 2023<\/strong> to the following address&#160;: <a href=\"mailto:bigtechinsec@protonmail.com\">bigtechinsec@protonmail.com<\/a><\/li>\n<\/ul>\n<h2><strong>References<\/strong><\/h2>\n<p><em>URLs were active on 11\/09\/2023.<\/em><\/p>\n<p>Abrahamsen, R. and Leander, A. eds. 2016. <em>Routledge Handbook of Private Security Studies<\/em>. London&#160;; New<\/p>\n<p>York&#160;: Routledge, Taylor &amp; Francis Group.<\/p>\n<p>Abrahamsen, R. and Williams, M.C. 2010. <em>Security Beyond the State&#160;: Private Security in International Politics<\/em>. Cambridge&#160;: Cambridge University Press.<\/p>\n<p>Access Now. 2022.\u201cCivil society to U.S. government&#160;: Do not disrupt internet access in Russia or Belarus\u201d, 10.03.2022, URL<a href=\"https:\/\/www.accessnow.org\/press-release\/us-government-internet-access-russia-ukraine-war-sanctions\/\">&#160;:<\/a><a href=\"https:\/\/www.accessnow.org\/press-release\/us-government-internet-access-russia-ukraine-war-sanctions\/\"> https:\/\/www.accessnow.org\/press-release\/us-government-internet-access-russia-ukraine-war-<\/a> <a href=\"https:\/\/www.accessnow.org\/press-release\/us-government-internet-access-russia-ukraine-war-sanctions\/\">sanctions\/<\/a><\/p>\n<p>Amoore, L. 2018. \u201cCloud geographies&#160;: Computing, data, sovereignty\u201d, <em>Progress in Human Geography<\/em>, <em>42<\/em>(1), 4- 24.<\/p>\n<p>Badel, L. 2018. Diplomatie \u00e9conomique, diplomatie d\u2019entreprise. In&#160;: Balzacq, T. et al. eds. <em>Manuel de diplomatie<\/em>. Relations internationales. Paris&#160;: Presses de Sciences Po, pp. 243\u2013261.<\/p>\n<p>Badouard, R. 2020. <em>Les Nouvelles Lois du web&#160;: Mod\u00e9ration et censure<\/em>. Paris&#160;: Seuil.<\/p>\n<p>Badouard, R. 2021. Moderation on social networks. <em>R\u00e9seaux <\/em>225(1), pp. 87\u2013120. doi&#160;: 10.3917\/res.225.0087. Bellanova, R. and de Goede, M. 2022. Co-Producing Security&#160;: Platform Content Moderation and European Security Integration. <em>JCMS&#160;: Journal of Common Market Studies <\/em>60(5), pp. 1316\u20131334. doi<a href=\"https:\/\/doi.org\/10.1111\/jcms.13306\">&#160;:<\/a> <a href=\"https:\/\/doi.org\/10.1111\/jcms.13306\">10.1111\/jcms.13306.<\/a><\/p>\n<p>Borelli, M. 2021. Social media corporations as actors of counter-terrorism. <em>New Media &amp; Society<\/em>. doi<a href=\"http:\/\/journals.sagepub.com\/doi\/10.1177\/14614448211035121\">&#160;:<\/a> <a href=\"http:\/\/journals.sagepub.com\/doi\/10.1177\/14614448211035121\">10.1177\/14614448211035121.<\/a><\/p>\n<p>Budnitsky, S. &amp; Jia, L. 2018. \u201cBranding Internet sovereignty&#160;: Digital media and the Chinese\u2013Russian cyberalliance\u201d, <em>European Journal of Cultural Studies<\/em>, 21, 594\u2013613.<\/p>\n<p>Carr, M. 2016. <em>US power and the Internet in international relations&#160;: the irony of the Information Age<\/em>.<\/p>\n<p>Houndmills, Basingstoke, Hampshire&#160;; New York, NY&#160;: Palgrave Macmillan.<\/p>\n<p>Chakrabarti, S., Birch, R., \u201cUnderstanding Social Media and Conflict\u201d, <em>Meta<\/em>, 20.06.2019, [online], URL<a href=\"https:\/\/about.fb.com\/news\/2019\/06\/social-media-and-conflict\/\">&#160;:<\/a> <a href=\"https:\/\/about.fb.com\/news\/2019\/06\/social-media-and-conflict\/\">https:\/\/about.fb.com\/news\/2019\/06\/social-media-and-conflict\/<\/a><\/p>\n<p>Chan, K. 2023. Here are the countries that have bans on TikTok. URL<a href=\"https:\/\/apnews.com\/article\/tiktok-ban-privacy-cybersecurity-bytedance-china-2dce297f0aed056efe53309bbcd44a04\">&#160;: <\/a><a href=\"https:\/\/apnews.com\/article\/tiktok-ban-privacy-cybersecurity-bytedance-china-2dce297f0aed056efe53309bbcd44a04\">https:\/\/apnews.com\/article\/tiktok-ban-<\/a> <a href=\"https:\/\/apnews.com\/article\/tiktok-ban-privacy-cybersecurity-bytedance-china-2dce297f0aed056efe53309bbcd44a04\">privacy-cybersecurity-bytedance-china-2dce297f0aed056efe53309bbcd44a04<\/a><\/p>\n<p>Charon, P. and Jeang\u00e8ne Vilmer, J.-B. 2021. <em>Les op\u00e9rations d\u2019influence chinoises. Un moment machiav\u00e9lien<\/em>. Paris&#160;: Institut de Recherche Strat\u00e9gique de l\u2019Ecole Militaire (IRSEM). URL&#160;: <a href=\"https:\/\/www.irsem.fr\/institut\/actualites\/rapport.html\">https:\/\/www.irsem.fr\/institut\/actualites\/rapport.html<\/a><\/p>\n<p>Common, M.F. 2020. Fear the Reaper&#160;: how content moderation rules are enforced on social media. <em>International Review of Law, Computers &amp; Technology <\/em>34(2), pp. 126\u2013152. doi<a href=\"https:\/\/doi.org\/10.1080\/13600869.2020.1733762\">&#160;: 10.1080\/13600869.2020.1733762.<\/a><\/p>\n<p>Conway, M. 2020. Routing the Extreme Right &#8211; Challenges for Social Media Platforms. <em>The RUSI Journal <\/em>165(1), pp. 108\u2013113. doi<a href=\"https:\/\/doi.org\/10.1080\/03071847.2020.1727157\">&#160;:<\/a><a href=\"https:\/\/doi.org\/10.1080\/03071847.2020.1727157\">10.1080\/03071847.2020.1727157.<\/a><\/p>\n<p>Criezis, M. 2023. Wilayat Facebook and Instagram&#160;: An Exploration of Pro-IS Activities on Mainstream Platforms. <em>GNET <\/em>21 April. URL&#160;: <a href=\"https:\/\/gnet-research.org\/2023\/04\/21\/wilayat-facebook-and-instagram-an-exploration-of-pro-is-activities-on-mainstream-platforms\/\">https:\/\/gnet-research.org\/2023\/04\/21\/wilayat-facebook-and-instagram-an-<\/a> <a href=\"https:\/\/gnet-research.org\/2023\/04\/21\/wilayat-facebook-and-instagram-an-exploration-of-pro-is-activities-on-mainstream-platforms\/\">exploration-of-pro-is-activities-on-mainstream-platforms\/<\/a><\/p>\n<p>Culpepper, P.D. and Thelen, K. 2020. Are We All Amazon Primed&#160;? Consumers and the Politics of Platform Power. <em>Comparative Political Studies <\/em>53(2), pp. 288\u2013318. doi<a href=\"https:\/\/doi.org\/10.1177\/0010414019852687\">&#160;: 10.1177\/0010414019852687.<\/a><\/p>\n<p>DeNardis, L. 2012. Hidden levers of Internet control&#160;: An infrastructure-based theory of Internet governance. <em>Information, Communication &amp; Society<\/em>, <em>15<\/em>(5), 720-738.<\/p>\n<p>Douek, E. 2020. The Rise of Content Cartels. URL&#160;:<a href=\"https:\/\/papers.ssrn.com\/abstract%3D3572309\"> https:\/\/papers.ssrn.com\/abstract=3572309<\/a><\/p>\n<p>Dunn Cavelty, M. 2016. Cyber-security and private actors. In&#160;: Abrahamsen, R. and Leander, A. eds. <em>Routledge Handbook of Private Security Studies<\/em>. London&#160;; New York&#160;: Routledge, Taylor &amp; Francis Group, pp. 89\u201399.<\/p>\n<p>Easterling, K. 2014. <em>Extrastatecraft&#160;: The Power of Infrastructure Space<\/em>. Verso Books.<\/p>\n<p>Euronews 2022. Russia adds Meta to list of \u2018terrorist and extremist organisations\u2019. URL&#160;: <a href=\"https:\/\/www.euronews.com\/2022\/10\/12\/russia-adds-meta-to-list-of-terrorist-and-extremist-organisations\">https:\/\/www.euronews.com\/2022\/10\/12\/russia-adds-meta-to-list-of-terrorist-and-extremist-organisations<\/a><\/p>\n<p>Fairbank, N.A. 2019. The state of Microsoft&#160;?&#160;: the role of corporations in international norm creation. <em>Journal of Cyber Policy <\/em>4(3), pp. 380\u2013403. doi&#160;: 10.1080\/23738871.2019.1696852.<\/p>\n<p>Frenkel, S. and Kang, C. 2021. <em>An ugly truth&#160;: inside Facebook\u2019s battle for domination<\/em>. First edition. New York, NY&#160;: Harper, an imprint of HarperCollinsPublishers.<\/p>\n<p>Gillespie, T. 2018. <em>Custodians of the internet&#160;: platforms, content moderation, and the hidden decisions that shape social media<\/em>. New Haven&#160;: Yale University Press.<\/p>\n<p>Goede, M. de 2018. The chain of security. <em>Review of International Studies <\/em>44(1), pp. 24\u201342. doi<a href=\"https:\/\/doi.org\/10.1017\/S0260210517000353\">&#160;:<\/a> <a href=\"https:\/\/doi.org\/10.1017\/S0260210517000353\">10.1017\/S0260210517000353.<\/a><\/p>\n<p>Goldbaum, C., Padshah, S., The Taliban Government Runs on WhatsApp. There\u2019s Just One Problem, <em>The New York Times<\/em>, 17.06.2023, URL<a href=\"https:\/\/www.nytimes.com\/2023\/06\/17\/world\/asia\/taliban-whatsapp-afghanistan.html\">&#160;:<\/a><a href=\"https:\/\/www.nytimes.com\/2023\/06\/17\/world\/asia\/taliban-whatsapp-afghanistan.html\"> https:\/\/www.nytimes.com\/2023\/06\/17\/world\/asia\/taliban-whatsapp-<\/a> <a href=\"https:\/\/www.nytimes.com\/2023\/06\/17\/world\/asia\/taliban-whatsapp-afghanistan.html\">afghanistan.html<\/a><\/p>\n<p>Goldman, E. 2021. Content Moderation Remedies. <em>Michigan Technology Law Review <\/em>28(1), pp. 1\u201360. doi<a href=\"https:\/\/doi.org\/10.36645\/mtlr.28.1.content\">&#160;:<\/a> <a href=\"https:\/\/doi.org\/10.36645\/mtlr.28.1.content\">https:\/\/doi.org\/10.36645\/mtlr.28.1.content.<\/a><\/p>\n<p>Gorwa, R. et al. 2020. Algorithmic content moderation&#160;: Technical and political challenges in the automation of platform governance. <em>Big Data &amp; Society <\/em>7(1), p. 2053951719897945. doi<a href=\"https:\/\/doi.org\/10.1177\/2053951719897945\">&#160;: <\/a><a href=\"https:\/\/doi.org\/10.1177\/2053951719897945\">10.1177\/2053951719897945.<\/a><\/p>\n<p>Grison, T. and Julliard, V. 2022. Se mobiliser contre la censure en ligne quand on est pd, trans, gouine ou pute. <em>Mouvements <\/em>112(4), pp. 167\u2013175. doi<a href=\"https:\/\/doi.org\/10.3917\/mouv.112.0167\">&#160;: <\/a><a href=\"https:\/\/doi.org\/10.3917\/mouv.112.0167\">10.3917\/mouv.112.0167.<\/a><\/p>\n<p>Gurumurthy, A. &amp; Chami, N. (2016). \u201cInternet governance as \u201cideology in practice\u201d \u2013 India\u2019s \u201cFree Basics\u201d controversy\u201d, <em>Internet Policy Review<\/em>, 5.<\/p>\n<p>Human Rights Watch 2020. <em>\u201cVideo Unavailable\u201d &#8211; Social Media Platforms Remove Evidence of War Crimes<\/em>, p. 100.<\/p>\n<p>Human Rights Watch. 2022. \u201cStatement Regarding BSR\u2019s HRA for Meta on Palestine &amp; Israel\u201d, 27.09.2022, URL<a href=\"https:\/\/www.hrw.org\/news\/2022\/09\/27\/statement-regarding-bsrs-hra-meta-palestine-israel\">&#160;:<\/a><a href=\"https:\/\/www.hrw.org\/news\/2022\/09\/27\/statement-regarding-bsrs-hra-meta-palestine-israel\"> https:\/\/www.hrw.org\/news\/2022\/09\/27\/statement-regarding-bsrs-hra-meta-palestine-israel<\/a><\/p>\n<p>Hurel, L.M. and Lobato, L.C. 2018. Unpacking cyber norms&#160;: private companies as norm entrepreneurs. <em>Journal of Cyber Policy <\/em>3(1), pp. 61\u201376. doi<a href=\"https:\/\/doi.org\/10.1080\/23738871.2018.1467942\">&#160;: 10.1080\/23738871.2018.1467942.<\/a><\/p>\n<p>Isaac, M. and Conger, K. 2020. Google, Facebook and Others Broaden Group to Secure U.S. Election. <em>The New York Times <\/em>12 August. URL&#160;: <a href=\"https:\/\/www.nytimes.com\/2020\/08\/12\/technology\/google-facebook-coalition-us-election.html\">https:\/\/www.nytimes.com\/2020\/08\/12\/technology\/google-facebook-coalition-us-<\/a> <a href=\"https:\/\/www.nytimes.com\/2020\/08\/12\/technology\/google-facebook-coalition-us-election.html\">election.html<\/a><\/p>\n<p>Jeang\u00e8ne Vilmer, J.-B. et al. 2018. <em>Les manipulations de l\u2019information&#160;: Un d\u00e9fi pour nos d\u00e9mocraties<\/em>. Paris&#160;: Centre d\u2019analyse, de pr\u00e9vision et de strat\u00e9gie (CAPS, minist\u00e8re de l\u2019Europe et des Affaires \u00e9trang\u00e8res)&#160;; Institut de recherche strat\u00e9gique de l\u2019\u00c9cole militaire (IRSEM, minist\u00e8re des Arm\u00e9es)., p. 214. URL&#160;: <a href=\"https:\/\/www.diplomatie.gouv.fr\/fr\/politique-etrangere-de-la-france\/manipulations-de-l-information\/rapport-conjoint-caps-irsem-les-manipulations-de-l-information-un-defi-pour-nos\/\">https:\/\/www.diplomatie.gouv.fr\/fr\/politique-etrangere-de-la-france\/manipulations-de-l-information\/rapport-<\/a> <a href=\"https:\/\/www.diplomatie.gouv.fr\/fr\/politique-etrangere-de-la-france\/manipulations-de-l-information\/rapport-conjoint-caps-irsem-les-manipulations-de-l-information-un-defi-pour-nos\/\">conjoint-caps-irsem-les-manipulations-de-l-information-un-defi-pour-nos\/.<\/a><\/p>\n<p>Kaneva, N., Dolea, A., Manor, I. 2023. \u00ab&#160;Public diplomacy and nation branding in the wake of the Russia\u2013 Ukraine War&#160;\u00bb, <em>Place Branding and Public Diplomacy<\/em>, Palgrave Macmillan, vol. 19(2), 185-189, DOI&#160;: 10.1057\/s41254-022-00293-z<\/p>\n<p>Keohane, R.O. and Nye, J.S. 1998. Power and Interdependence in the Information Age. <em>Foreign Affairs <\/em>77(5). URL&#160;: <a href=\"https:\/\/www.foreignaffairs.com\/articles\/1998-09-01\/power-and-interdependence-information-age\">https:\/\/www.foreignaffairs.com\/articles\/1998-09-01\/power-and-interdependence-information-age<\/a> Lakier, G. 2021. Informal Government Coercion and The Problem of \u2018Jawboning\u2019. <em>Lawfare <\/em>26 July. URL&#160;: <a href=\"https:\/\/www.lawfareblog.com\/informal-government-coercion-and-problem-jawboning\">https:\/\/www.lawfareblog.com\/informal-government-coercion-and-problem-jawboning<\/a><\/p>\n<p>Manor, I., \u201cThe Power of Memes&#160;: Analyzing War-Time Messaging\u201d, <em>The Times of Israel, <\/em>08.08.2022, URL<a href=\"https:\/\/blogs.timesofisrael.com\/the-power-of-memes-analyzing-war-time-messaging\/\">&#160;:<\/a> <a href=\"https:\/\/blogs.timesofisrael.com\/the-power-of-memes-analyzing-war-time-messaging\/\">https:\/\/blogs.timesofisrael.com\/the-power-of-memes-analyzing-war-time-messaging\/<\/a><\/p>\n<p>Marang\u00e9, C. and Quessard, M. eds. 2021. <em>Les guerres de l\u2019information \u00e0 l\u2019\u00e8re num\u00e9rique<\/em>. Paris&#160;: Presses Universitaire de France.<\/p>\n<p>McGee-Abe, J., \u201cOne year on&#160;: 10 technologies used in the war in Ukraine\u201d, Tech Informed, 26.02.2023, URL<a href=\"https:\/\/techinformed.com\/one-year-on-10-technologies-used-in-the-war-in-ukraine\/\">&#160;:<\/a> <a href=\"https:\/\/techinformed.com\/one-year-on-10-technologies-used-in-the-war-in-ukraine\/\">https:\/\/techinformed.com\/one-year-on-10-technologies-used-in-the-war-in-ukraine\/<\/a><\/p>\n<p>Meta. 2022. \u201cMeta\u2019s Ongoing Efforts Regarding Russia\u2019s Invasion of Ukraine\u201d, 26.02.2022, URL<a href=\"https:\/\/about.fb.com\/news\/2022\/02\/metas-ongoing-efforts-regarding-russias-invasion-of-ukraine\/\">&#160;:<\/a> <a href=\"https:\/\/about.fb.com\/news\/2022\/02\/metas-ongoing-efforts-regarding-russias-invasion-of-ukraine\/\">https:\/\/about.fb.com\/news\/2022\/02\/metas-ongoing-efforts-regarding-russias-invasion-of-ukraine\/<\/a><\/p>\n<p>M\u00f6llers, N. 2021. \u201cMaking Digital Territory&#160;: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State\u201d, <em>Science, Technology, &amp; Human Values<\/em>, <em>46<\/em>(1), pp. 112-138.<\/p>\n<p>Monsees, L. et al. 2023. Transversal Politics of Big Tech. <em>International Political Sociology <\/em>17(1), p. olac020. doi&#160;: 10.1093\/ips\/olac020.<\/p>\n<p>Musiani, F. et al. 2016. <em>The Turn to Infrastructure in Internet Governance<\/em>. London&#160;; New York&#160;: Palgrave Macmillan.<\/p>\n<p>Musiani, F. 2022. \u201c<em>Infrastructuring <\/em>digital sovereignty&#160;: a research agenda for an infrastructure-based sociology of digital self-determination practices\u201d, <em>Information, Communication &amp; Society<\/em>, 25(6), p. 785-800.<\/p>\n<p>Musk, E., \u201cStarlink service is now active in Ukraine. More terminals en route\u201d, Twitter, 26.02.2022, [online], URL<a href=\"https:\/\/twitter.com\/elonmusk\/status\/1497701484003213317\">&#160;:<\/a><a href=\"https:\/\/twitter.com\/elonmusk\/status\/1497701484003213317\"> https:\/\/twitter.com\/elonmusk\/status\/1497701484003213317<\/a><\/p>\n<p>Oversight Board 2022. Oversight Board upholds Meta\u2019s decision in \u2018Tigray Communication Affairs Bureau\u2019 case (2022-006-FB-MR). URL&#160;: <a href=\"https:\/\/www.oversightboard.com\/news\/592325135885870-oversight-board-upholds-meta-s-decision-in-tigray-communication-affairs-bureau-case-2022-006-fb-mr\/\">https:\/\/www.oversightboard.com\/news\/592325135885870-oversight-board-<\/a> <a href=\"https:\/\/www.oversightboard.com\/news\/592325135885870-oversight-board-upholds-meta-s-decision-in-tigray-communication-affairs-bureau-case-2022-006-fb-mr\/\">upholds-meta-s-decision-in-tigray-communication-affairs-bureau-case-2022-006-fb-mr\/<\/a><\/p>\n<p>Pohle, J., &amp; Thiel, T. (2020). \u201cDigital sovereignty\u201d, <em>Internet Policy Review<\/em>, <em>9<\/em>(4).<\/p>\n<p>Renaut, L. 2020. Sur les r\u00e9seaux sociaux, une djihadosph\u00e8re en constante \u00e9volution. URL&#160;: <a href=\"http:\/\/theconversation.com\/sur-les-reseaux-sociaux-une-djihadosphere-en-constante-evolution-149754\">http:\/\/theconversation.com\/sur-les-reseaux-sociaux-une-djihadosphere-en-constante-evolution-149754<\/a> Roberts, S.T. 2019. <em>Behind the screen&#160;: content moderation in the shadows of social media<\/em>. New Haven&#160;: Yale University Press.<\/p>\n<p>Russell, A. 2005. \u201cMyth and the Zapatista movement&#160;: exploring a network identity\u201d, <em>New Media &amp; Society<\/em>, 7(4), 559\u2013577<a href=\"https:\/\/doi.org\/10.1177\/1461444805054119\">.<\/a><a href=\"https:\/\/doi.org\/10.1177\/1461444805054119\"> https:\/\/doi.org\/10.1177\/1461444805054119<\/a><\/p>\n<p>Schradie, J. 2019. <em>The Revolution That Wasn\u2019t&#160;: How Digital Activism Favors Conservatives<\/em>. Cambridge&#160;: Harvard University Press.<\/p>\n<p>Schwarz, J. 2022. Does Elon Musk Know Trump Could Have Started Nuclear War via Twitter in 2018&#160;? URL&#160;: <a href=\"https:\/\/theintercept.com\/2022\/05\/14\/twitter-elon-musk-trump-nuclear-war-north-korea\/\">https:\/\/theintercept.com\/2022\/05\/14\/twitter-elon-musk-trump-nuclear-war-north-korea\/<\/a><\/p>\n<p>Singer, P.W. and Brooking, E.T. 2018. <em>Likewar&#160;: the weaponization of social media<\/em>. Boston&#160;: Houghton Mifflin Harcourt, an Eamon Dolan Book.<\/p>\n<p>Sobande, F., Kanai, A., &amp; Zeng, N. 2022. \u201cThe hypervisibility and discourses of \u2018wokeness\u2019 in digital culture\u201d,<\/p>\n<p><em>Media, Culture &amp; Society<\/em>, 44(8), 1576\u20131587.<a href=\"https:\/\/doi.org\/10.1177\/01634437221117490\"> https:\/\/doi.org\/10.1177\/01634437221117490<\/a><\/p>\n<p>Srivastava, S. 2021. Algorithmic Governance and the International Politics of Big Tech. <em>Perspectives on Politics<\/em>, pp. 1\u201312. doi<a href=\"https:\/\/doi.org\/10.1017\/S1537592721003145\">&#160;: 10.1017\/S1537592721003145.<\/a><\/p>\n<p>Statista 2020. Infographic&#160;: Which Countries Have Banned Huawei&#160;? URL&#160;: <a href=\"https:\/\/www.statista.com\/chart\/17528\/countries-which-have-banned-huawei-products\">https:\/\/www.statista.com\/chart\/17528\/countries-which-have-banned-huawei-products<\/a><\/p>\n<p>Strange, S. 1996. <em>The Retreat of the State&#160;: The Diffusion of Power in the World Economy<\/em>. Cambridge University Press.<\/p>\n<p>Thibout, C. 2021. Google et l\u2019\u00c9tat f\u00e9d\u00e9ral \u00e9tats-unien&#160;: interd\u00e9pendance, contestation et hybridation. <em>Entreprises et histoire <\/em>104(3), pp. 142\u2013163. doi<a href=\"https:\/\/doi.org\/10.3917\/eh.104.0142\">&#160;: 10.3917\/eh.104.0142.<\/a><\/p>\n<p>Tr\u00e9guer, F. 2017. \u201cIntelligence Reform and the Snowden Paradox&#160;: The Case of France\u201d, <em>Media and Communication<\/em>, 5,<a href=\"https:\/\/doi.org\/10.17645\/mac.v5i1.821\">https:\/\/doi.org\/10.17645\/mac.v5i1.821<\/a><\/p>\n<p>Tr\u00e9guer, F. 2019. Seeing like Big Tech&#160;: security assemblages, technology, and the future of state bureaucracy. In&#160;: Bigo, D. et al. eds. <em>Data Politics&#160;: Worlds, Subjects, Rights<\/em>. Routledge Studies in International Political Sociology. Routledge.<\/p>\n<p>Tucker, M., \u201cThe Ukrainian honeytrappers persuading Russian soldiers to reveal all\u201d, The Times, 19.07.2023, URL&#160;: <a href=\"https:\/\/www.thetimes.co.uk\/article\/ukrainian-honey-trappers-russian-soldiers-russia-ukraine-war-9kxzqwqp8\">https:\/\/www.thetimes.co.uk\/article\/ukrainian-honey-trappers-russian-soldiers-russia-ukraine-war-<\/a> <a href=\"https:\/\/www.thetimes.co.uk\/article\/ukrainian-honey-trappers-russian-soldiers-russia-ukraine-war-9kxzqwqp8\">9kxzqwqp8<\/a><\/p>\n<p>Tufeksi, Z. 2017. <em>Twitter and Tear Gas&#160;: The Power and Fragility of Networked Protest<\/em>, London&#160;: Yale University Press, 360 p.<\/p>\n<p>Tumakova, I., \u00ab&#160;\u0413\u0443\u0433\u043b \u0443 \u043d\u0438\u0445 \u2014 \u0441\u043b\u0435\u0432\u0430, \u042f\u043d\u0434\u0435\u043a\u0441 \u2014 \u0441\u043f\u0440\u0430\u0432\u0430, \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u044f \u043f\u0440\u0435\u0437\u0438\u0434\u0435\u043d\u0442\u0430 \u043e\u043f\u0435\u0440\u0438\u0440\u0443\u0435\u0442 \u0438\u043c\u0438, \u043a\u0430\u043a \u0437\u0430\u0445\u043e\u0447\u0435\u0442&#160;\u00bb (\u201cThey have Google to the left, Yandex to the right, the Presidential administration operates them to its liking\u201d), <em>Novaya Gazeta<\/em>, 27.06.2023, URL<a href=\"https:\/\/novayagazeta.ru\/amp\/articles\/2023\/06\/27\/gugl-u-nikh-sleva-iandeks-sprava-administratsiia-prezidenta-operiruet-imi-kak-zakhochet\">&#160;:<\/a><a href=\"https:\/\/novayagazeta.ru\/amp\/articles\/2023\/06\/27\/gugl-u-nikh-sleva-iandeks-sprava-administratsiia-prezidenta-operiruet-imi-kak-zakhochet\"> https:\/\/novayagazeta.ru\/amp\/articles\/2023\/06\/27\/gugl-u-nikh-sleva-<\/a> <a href=\"https:\/\/novayagazeta.ru\/amp\/articles\/2023\/06\/27\/gugl-u-nikh-sleva-iandeks-sprava-administratsiia-prezidenta-operiruet-imi-kak-zakhochet\">iandeks-sprava-administratsiia-prezidenta-operiruet-imi-kak-zakhochet<\/a><\/p>\n<p>Valdivia, A. et al. 2022. Neither opaque nor transparent&#160;: A transdisciplinary methodology to investigate datafication at the EU borders. <em>Big Data &amp; Society <\/em>9(2). doi<a href=\"https:\/\/doi.org\/10.1177\/20539517221124586\">&#160;: <\/a><a href=\"https:\/\/doi.org\/10.1177\/20539517221124586\">10.1177\/20539517221124586.<\/a><\/p>\n<p>Van Dijck, J. et al. 2021. Deplatformization and the governance of the platform ecosystem. <em>New Media &amp; Society <\/em>, p. 14614448211045662. doi<a href=\"https:\/\/doi.org\/10.1177\/14614448211045662\">&#160;: <\/a><a href=\"https:\/\/doi.org\/10.1177\/14614448211045662\">10.1177\/14614448211045662.<\/a><\/p>\n<p>Vieth, K. 2019. Policing \u2018Online Radicalization\u2019&#160;: The Framing of Europol\u2019s Internet Referral Unit. In&#160;: Wagner, et al. eds. <em>Research handbook on human rights and digital technology&#160;: global politics, law and international relations<\/em>. Research handbooks in human rights. Cheltenham&#160;: Edward Elgar Publishing.<\/p>\n<p>Whitten-Woodring, J., Kleinberg, M. S., Thawnghmung, A., &amp; Thitsar, M. T. 2020. Poison If You Don\u2019t Know How to Use It&#160;: Facebook, Democracy, and Human Rights in Myanmar. <em>The International Journal of Press\/Politics, <\/em>25(3), 407\u2013425.<a href=\"https:\/\/doi.org\/10.1177\/1940161220919666\"> https:\/\/doi.org\/10.1177\/1940161220919666<\/a><\/p>\n<p>Wolfsfeld, G., Segev, E., &amp; Sheafer, T. 2013, \u201cSocial Media and the Arab Spring&#160;: Politics Comes First\u201d, <em>The International Journal of Press\/Politics, <\/em>18(2), 115\u2013137.<a href=\"https:\/\/doi.org\/10.1177\/1940161212471716\"> https:\/\/doi.org\/10.1177\/1940161212471716<\/a><\/p>\n<p>Woll, C. 2019. Corporate Power Beyond Lobbying. <em>American Affairs <\/em>III(3), pp. 38\u201355<\/p>\n<\/p><\/div>\n<div class=\"zn-singledetail-attachedfiles\">\n<h3 class=\"zn-singledetail-section-title\">Fichier(s) attach\u00e9(s)<\/h3>\n<ul class=\"zn-singledetail-attachedfiles-list\">\n<li class=\"zn-singledetail-attachedfiles-item\">\n\t\t\t\t\t\t\t<a class=\"zn-singledetail-attachedfiles-link button outline for-download\" href=\"https:\/\/www.sfsic.org\/wp-inside\/uploads\/skp-membership\/demande_adh\/cfp_big_tech_in_sec_conference_2023.pdf\" title=\"T\u00e9l\u00e9charger : \u00ab cfp_big_tech_in_sec_conference_2023.pdf \u00bb\" target=\"_blank\" rel=\"noopener\"><br \/>\n\t\t\t\t\t\t\t\t<span class=\"button-txt\">CFP_Big_Tech_In_Sec_Conference_2023<span class=\"button-txt-type\"> (pdf)<\/span><\/span><br \/>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t<\/li>\n<\/ul><\/div>\n<div class=\"zn-singledetail-keywords\">\n<h3 class=\"zn-singledetail-section-title\">Mots-cl\u00e9s<\/h3>\n<ul class=\"termslist termslist-post_tag\">\n<li class=\"termslist-item termslist-title\"><span class=\"termslist-titletxt\">Mots-cl\u00e9s<\/span><span class=\"doubledot\"><\/span><\/li>\n<li class=\"termslist-item tax-post_tag term-crise\"><a class=\"termslist-itemlink\" href=\"https:\/\/www.sfsic.org\/en\/tag\/crisis\/\" title=\"Crise\"><span class=\"termslist-itemname\">Crise<\/span><\/a><\/li>\n<li class=\"termslist-item tax-post_tag term-data-2\"><a class=\"termslist-itemlink\" href=\"https:\/\/www.sfsic.org\/en\/tag\/data-2\/\" title=\"Data\"><span class=\"termslist-itemname\">Data<\/span><\/a><\/li>\n<li class=\"termslist-item tax-post_tag term-politique\"><a class=\"termslist-itemlink\" href=\"https:\/\/www.sfsic.org\/en\/tag\/politics\/\" title=\"Politique\"><span class=\"termslist-itemname\">Politique<\/span><\/a><\/li>\n<li class=\"termslist-item tax-post_tag term-securite\"><a class=\"termslist-itemlink\" href=\"https:\/\/www.sfsic.org\/en\/tag\/securite\/\" title=\"S\u00e9curit\u00e9\"><span class=\"termslist-itemname\">S\u00e9curit\u00e9<\/span><\/a><\/li>\n<li class=\"termslist-item tax-post_tag term-technologie\"><a class=\"termslist-itemlink\" href=\"https:\/\/www.sfsic.org\/en\/tag\/technology\/\" title=\"technologie\"><span class=\"termslist-itemname\">technologie<\/span><\/a><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p><!-- \/fxzn:singledetail --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mis en ligne le 26 novembre 2023 Th\u00e9matiques Communication publique et politique Num\u00e9rique : strat\u00e9gies, dispositifs et usages R\u00e9ponse attendue pour le 05\/12\/2023 Type de r\u00e9ponse R\u00e9sum\u00e9 Type d\u2019\u00e9v\u00e9nement Colloque [&hellip;]<\/p>\n","protected":false},"author":781,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29,57],"tags":[202,774,190,747,105],"thematique":[36,39],"sfsic":[],"class_list":["post-30251","post","type-post","status-publish","format-standard","hentry","category-aac-evenement","category-colloque","tag-crise","tag-data-2","tag-politique","tag-securite","tag-technologie","thematique-communication-publique-et-politique","thematique-numerique-strategies-dispositifs-et-usages","wp-sticky"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Big Tech as an Actor of Global Security and Geopolitical Conflicts<\/title>\n<meta name=\"description\" content=\"Appel \u00e0 communication pour la conf\u00e9rence internationale \u201cBig Tech as an Actor of Global Security and Geopolitical Conflicts\u201d co-organis\u00e9e par le CARIS, le CIS et l&#039;IRSEM.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Big Tech as an Actor of Global Security and Geopolitical Conflicts\" \/>\n<meta property=\"og:description\" content=\"Appel \u00e0 communication pour la conf\u00e9rence internationale \u201cBig Tech as an Actor of Global Security and Geopolitical Conflicts\u201d co-organis\u00e9e par le CARIS, le CIS et l&#039;IRSEM.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/\" \/>\n<meta property=\"og:site_name\" content=\"SFSIC\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-27T11:09:20+00:00\" \/>\n<meta name=\"author\" content=\"Axelle Martin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/aac-evenement\\\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/aac-evenement\\\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\\\/\"},\"author\":{\"name\":\"Axelle Martin\",\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/#\\\/schema\\\/person\\\/d3606993477708f4359fb9aeda58df3b\"},\"headline\":\"Big Tech as an Actor of Global Security and Geopolitical Conflicts\",\"datePublished\":\"2023-11-27T11:09:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/aac-evenement\\\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\\\/\"},\"wordCount\":5039,\"publisher\":{\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/#organization\"},\"keywords\":[\"Crise\",\"Data\",\"Politique\",\"S\u00e9curit\u00e9\",\"technologie\"],\"articleSection\":[\"AAC \u00c9v\u00e9nement\",\"Colloque\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/aac-evenement\\\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\\\/\",\"url\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/aac-evenement\\\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\\\/\",\"name\":\"Big Tech as an Actor of Global Security and Geopolitical Conflicts\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/#website\"},\"datePublished\":\"2023-11-27T11:09:20+00:00\",\"description\":\"Appel \u00e0 communication pour la conf\u00e9rence internationale \u201cBig Tech as an Actor of Global Security and Geopolitical Conflicts\u201d co-organis\u00e9e par le CARIS, le CIS et l'IRSEM.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/aac-evenement\\\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sfsic.org\\\/en\\\/aac-evenement\\\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/aac-evenement\\\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Calls for Contributions\",\"item\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/cfc-event\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Conference\",\"item\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/cfc-event\\\/conference\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Big Tech as an Actor of Global Security and Geopolitical Conflicts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/\",\"name\":\"SFSIC\",\"description\":\"Soci\u00e9t\u00e9 Fran\u00e7aise des Sciences de l&#039;Information &amp; de la Communication\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/#organization\",\"name\":\"SFSIC\",\"url\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.sfsic.org\\\/wp-inside\\\/uploads\\\/2020\\\/05\\\/logo-sfsic.jpg\",\"contentUrl\":\"https:\\\/\\\/www.sfsic.org\\\/wp-inside\\\/uploads\\\/2020\\\/05\\\/logo-sfsic.jpg\",\"width\":1085,\"height\":1080,\"caption\":\"SFSIC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sfsic.org\\\/en\\\/#\\\/schema\\\/person\\\/d3606993477708f4359fb9aeda58df3b\",\"name\":\"Axelle Martin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1065035eb5e480668fbf77e163c2e86f81ac342eaad4c8783acdf4a63f3c917b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1065035eb5e480668fbf77e163c2e86f81ac342eaad4c8783acdf4a63f3c917b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1065035eb5e480668fbf77e163c2e86f81ac342eaad4c8783acdf4a63f3c917b?s=96&d=mm&r=g\",\"caption\":\"Axelle Martin\"},\"sameAs\":[\"@antropocominside\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Big Tech as an Actor of Global Security and Geopolitical Conflicts","description":"Appel \u00e0 communication pour la conf\u00e9rence internationale \u201cBig Tech as an Actor of Global Security and Geopolitical Conflicts\u201d co-organis\u00e9e par le CARIS, le CIS et l'IRSEM.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/","og_locale":"en_US","og_type":"article","og_title":"Big Tech as an Actor of Global Security and Geopolitical Conflicts","og_description":"Appel \u00e0 communication pour la conf\u00e9rence internationale \u201cBig Tech as an Actor of Global Security and Geopolitical Conflicts\u201d co-organis\u00e9e par le CARIS, le CIS et l'IRSEM.","og_url":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/","og_site_name":"SFSIC","article_published_time":"2023-11-27T11:09:20+00:00","author":"Axelle Martin","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/#article","isPartOf":{"@id":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/"},"author":{"name":"Axelle Martin","@id":"https:\/\/www.sfsic.org\/en\/#\/schema\/person\/d3606993477708f4359fb9aeda58df3b"},"headline":"Big Tech as an Actor of Global Security and Geopolitical Conflicts","datePublished":"2023-11-27T11:09:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/"},"wordCount":5039,"publisher":{"@id":"https:\/\/www.sfsic.org\/en\/#organization"},"keywords":["Crise","Data","Politique","S\u00e9curit\u00e9","technologie"],"articleSection":["AAC \u00c9v\u00e9nement","Colloque"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/","url":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/","name":"Big Tech as an Actor of Global Security and Geopolitical Conflicts","isPartOf":{"@id":"https:\/\/www.sfsic.org\/en\/#website"},"datePublished":"2023-11-27T11:09:20+00:00","description":"Appel \u00e0 communication pour la conf\u00e9rence internationale \u201cBig Tech as an Actor of Global Security and Geopolitical Conflicts\u201d co-organis\u00e9e par le CARIS, le CIS et l'IRSEM.","breadcrumb":{"@id":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sfsic.org\/en\/aac-evenement\/big-tech-as-an-actor-of-global-security-and-geopolitical-conflicts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.sfsic.org\/en\/"},{"@type":"ListItem","position":2,"name":"Calls for Contributions","item":"https:\/\/www.sfsic.org\/en\/cfc-event\/"},{"@type":"ListItem","position":3,"name":"Conference","item":"https:\/\/www.sfsic.org\/en\/cfc-event\/conference\/"},{"@type":"ListItem","position":4,"name":"Big Tech as an Actor of Global Security and Geopolitical Conflicts"}]},{"@type":"WebSite","@id":"https:\/\/www.sfsic.org\/en\/#website","url":"https:\/\/www.sfsic.org\/en\/","name":"SFSIC","description":"Soci\u00e9t\u00e9 Fran\u00e7aise des Sciences de l&#039;Information &amp; de la Communication","publisher":{"@id":"https:\/\/www.sfsic.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sfsic.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sfsic.org\/en\/#organization","name":"SFSIC","url":"https:\/\/www.sfsic.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sfsic.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.sfsic.org\/wp-inside\/uploads\/2020\/05\/logo-sfsic.jpg","contentUrl":"https:\/\/www.sfsic.org\/wp-inside\/uploads\/2020\/05\/logo-sfsic.jpg","width":1085,"height":1080,"caption":"SFSIC"},"image":{"@id":"https:\/\/www.sfsic.org\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sfsic.org\/en\/#\/schema\/person\/d3606993477708f4359fb9aeda58df3b","name":"Axelle Martin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1065035eb5e480668fbf77e163c2e86f81ac342eaad4c8783acdf4a63f3c917b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1065035eb5e480668fbf77e163c2e86f81ac342eaad4c8783acdf4a63f3c917b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1065035eb5e480668fbf77e163c2e86f81ac342eaad4c8783acdf4a63f3c917b?s=96&d=mm&r=g","caption":"Axelle Martin"},"sameAs":["@antropocominside"]}]}},"_links":{"self":[{"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/posts\/30251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/users\/781"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/comments?post=30251"}],"version-history":[{"count":2,"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/posts\/30251\/revisions"}],"predecessor-version":[{"id":30255,"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/posts\/30251\/revisions\/30255"}],"wp:attachment":[{"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/media?parent=30251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/categories?post=30251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/tags?post=30251"},{"taxonomy":"thematique","embeddable":true,"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/thematique?post=30251"},{"taxonomy":"sfsic","embeddable":true,"href":"https:\/\/www.sfsic.org\/en\/wp-json\/wp\/v2\/sfsic?post=30251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}