Javascript must be enabled to continue!
Lock-out, lock-in, and networked sovereignty. Resistance and experimentation in Africa’s trajectory towards AI
View through CrossRef
The conception of digital sovereignty has been associated, especially in the early stages of the diffusion of the Internet, with efforts to keep specific data and information outside of a state’s jurisdiction. AI sovereignty responds to an almost opposite logic, indicating the ability of a state to access and make use of data that are produced within its jurisdiction. These two strategies –which I refer to as lock-out and lock-in sovereignty –share some common roots (e.g. the attempt to protect and enhance specific cultural attributes recognised as important by a national community), but they also point to different technical, economic, and political characteristics needed to enforce one or the other type of sovereignty. The article examines key elements that set these concepts, and their implementation, apart and how they intersect with both existing and potential articulations of national sovereignty in Africa. In particular it opposes a negative –and still pervasive –definition of sovereigntyapplied to African states, based on the Westphalian ideal and “measuring the gap between what Africa is and what we are told it ought to be” (Mbembe 2019, p.26); and the possibilities disclosed by re-appropriating practices of “networked sovereignty” (Mbembe, 2016).
The definition of sovereignty that has prevailed after independence has followed what Achille Mbembe provocatively referred to as the “fetishization” of the concept of nation-state. African governments “borrowed concepts from the Western lexicon such as “national interest”, “risks”, “threats” or “national security” [which] refer to a philosophy of movement and a philosophy of space entirely predicated on the existence of an enemy in a world of hostility” disregarding Africa’s “long held traditions of flexible, networked sovereignty” (Mbembe, 2017). But, following Mbembe, it is by reconnecting with the epistemic traditions that characterized pre-colonial Africa (Mbembe, 2020) that it becomes possible to experiment with new forms of resistance and value making that seem more attuned to some of the realities brought by digital technologies, and Artificial Intelligence more specifically. As he explained, “precolonial Africa might not have been a borderless world. But where they existed borders were always porous and permeable. [...] Networks, flows and crossroads were more important than borders. What mattered the most was the extent to which flows intersected with other flows” (Mbembe, 2017).
Title: Lock-out, lock-in, and networked sovereignty. Resistance and experimentation in Africa’s trajectory towards AI
Description:
The conception of digital sovereignty has been associated, especially in the early stages of the diffusion of the Internet, with efforts to keep specific data and information outside of a state’s jurisdiction.
AI sovereignty responds to an almost opposite logic, indicating the ability of a state to access and make use of data that are produced within its jurisdiction.
These two strategies –which I refer to as lock-out and lock-in sovereignty –share some common roots (e.
g.
the attempt to protect and enhance specific cultural attributes recognised as important by a national community), but they also point to different technical, economic, and political characteristics needed to enforce one or the other type of sovereignty.
The article examines key elements that set these concepts, and their implementation, apart and how they intersect with both existing and potential articulations of national sovereignty in Africa.
In particular it opposes a negative –and still pervasive –definition of sovereigntyapplied to African states, based on the Westphalian ideal and “measuring the gap between what Africa is and what we are told it ought to be” (Mbembe 2019, p.
26); and the possibilities disclosed by re-appropriating practices of “networked sovereignty” (Mbembe, 2016).
The definition of sovereignty that has prevailed after independence has followed what Achille Mbembe provocatively referred to as the “fetishization” of the concept of nation-state.
African governments “borrowed concepts from the Western lexicon such as “national interest”, “risks”, “threats” or “national security” [which] refer to a philosophy of movement and a philosophy of space entirely predicated on the existence of an enemy in a world of hostility” disregarding Africa’s “long held traditions of flexible, networked sovereignty” (Mbembe, 2017).
But, following Mbembe, it is by reconnecting with the epistemic traditions that characterized pre-colonial Africa (Mbembe, 2020) that it becomes possible to experiment with new forms of resistance and value making that seem more attuned to some of the realities brought by digital technologies, and Artificial Intelligence more specifically.
As he explained, “precolonial Africa might not have been a borderless world.
But where they existed borders were always porous and permeable.
[.
] Networks, flows and crossroads were more important than borders.
What mattered the most was the extent to which flows intersected with other flows” (Mbembe, 2017).
Related Results
Emotions and Networked Learning
Emotions and Networked Learning
Emotions in networked learning have been underresearched despite their importance. The present research is one of the first few attempts to better understand adult learners’ emotio...
Evolution of Antimicrobial Resistance in Community vs. Hospital-Acquired Infections
Evolution of Antimicrobial Resistance in Community vs. Hospital-Acquired Infections
Abstract
Introduction
Hospitals are high-risk environments for infections. Despite the global recognition of these pathogens, few studies compare microorganisms from community-acqu...
Afrikanske smede
Afrikanske smede
African Smiths Cultural-historical and sociological problems illuminated by studies among the Tuareg and by comparative analysisIn KUML 1957 in connection with a description of sla...
Postcolonial Entry Points into Networked Learning
Postcolonial Entry Points into Networked Learning
It would be overly simplistic to assume that these collaborative pedagogical approaches function uniformly across diverse student cohorts. Postcolonial theory can provide a framewo...
A Trajectory Similarity Computation Method based on GAT-based Transformer and CNN model
A Trajectory Similarity Computation Method based on GAT-based Transformer and CNN model
Trajectory similarity computation is very important for trajectory data
mining. It is applied into many trajectory mining tasks, including
trajectory clustering, trajectory classif...
Control-Oriented Real-Time Trajectory Planning for Heterogeneous UAV Formations
Control-Oriented Real-Time Trajectory Planning for Heterogeneous UAV Formations
Aiming at the trajectory planning problem for heterogeneous UAV formations in complex environments, a trajectory prediction model combining Convolutional Neural Networks (CNNs) and...
A trajectory similarity computation method based on GAT-based transformer and CNN model
A trajectory similarity computation method based on GAT-based transformer and CNN model
AbstractTrajectory similarity computation is very important for trajectory data mining. It is applied into many trajectory mining tasks, including trajectory clustering, trajectory...
A Genealogy of State Sovereignty
A Genealogy of State Sovereignty
AbstractA genealogical account of state sovereignty explores the ways in which the concept has emerged, evolved, and is in decline today. Sovereignty has a theological foundation, ...

