Return to Article Details Where do data sovereignty security risks come from?-Production perspective based on social reproduction Download Download PDF