Technology (DP IB Global Politics: HL): Revision Note

Jane Hirons

Written by: Jane Hirons

Reviewed by: Lisa Eades

Updated on

Technology in global politics

A set of topic areas is presented for the study of global political challenges to facilitate your explorations. These should not be seen as fully discrete or disconnected topics, but rather as overlapping areas of study that can contribute to understanding and addressing global challenges.

You can conduct an in-depth study of two of the topic areas—for example, security and health—or you may choose to explore the interconnections of multiple topic areas based on a selected case study.

  • Technology has transformed how political actors communicate, organise, exercise power and wage conflict

  • The political implications of technology are far-reaching — affecting governance, warfare, human rights, development and social organisation

  • Technology is both a tool for political actors and a site of political contestation in itself

Why is technology a global political challenge?

  • Technology develops faster than the political and legal frameworks designed to govern it, creating significant regulatory gaps

  • Technology concentrates power in the hands of those who control it

    • States with advanced cyber capabilities and large technology corporations can exercise enormous influence over others

  • The benefits and risks of technology are distributed unequally

    • The digital divide excludes some populations from the benefits of digital technology while leaving them exposed to its political consequences

  • Technology challenges traditional concepts of sovereignty

    • Cyberattacks cross borders without physical intrusion; information spreads globally regardless of national censorship

  • Technology is dual-use

    • The same tools can empower citizens and oppress them, enable development and accelerate environmental harm, facilitate communication and spread disinformation

Key terms and concepts

Term

Definition

Cyberattack

  • A hostile act carried out in digital space, targeting computer systems, networks or data

Cyberwarfare

  • The use of cyberattacks by states as a form of warfare or political coercion

Disinformation

  • False information deliberately created and spread to deceive

Misinformation

  • False information spread without deliberate intent to deceive

Artificial intelligence (AI)

  • Computer systems capable of performing tasks that typically require human intelligence

Algorithmic bias

  • Systematic and unfair discrimination produced by AI systems, often reflecting biases in training data

Digital divide

  • The gap between those with and without access to digital technology and the internet

Surveillance capitalism

  • The practice of technology companies collecting and monetising user data as a primary business model

Internet sovereignty

  • The concept that states have the right to control and regulate the internet within their territory

Dual-use technology

  • Technology that has both legitimate civilian uses and potential military or oppressive applications

A useful analytical lens: the governance gap

  • One of the most productive ways to read a technology case study is through the governance gap - the structural mismatch between how fast technology develops and how slowly political and legal frameworks adapt to it

    • It won't be the right lens for every case, but it has analytical traction on most of them

  • This gap is what creates the political space in which the topic's central conflicts play out

Colourful arrow timeline showing stages: technological development, power concentration, information environment shifts, security implications, digital inequality, backlash and fragmentation

Technological development

  • New technologies emerge faster than regulatory frameworks can adapt

  • Governance gaps allow technology to be used in ways that existing law does not cover

Power concentration

  • States and corporations with advanced technology gain disproportionate capabilities

  • Others face surveillance, intellectual property theft or exclusion from digital markets

Information environment shifts

  • Social media and algorithms reshape how people receive and evaluate information

  • Disinformation spreads rapidly

  • Political polarisation deepens

  • Democratic deliberation is undermined

Security implications

  • Cyberattacks target critical infrastructure, elections and military systems

  • Traditional security frameworks are inadequate for threats that cross borders without physical action

Digital inequality

  • Unequal access to technology persists between and within states

  • Those without digital access are excluded from economic opportunity, political participation and public services

Backlash and fragmentation

  • States respond with censorship, internet shutdowns and national digital borders

  • The global internet fragments into national networks, reducing the free flow of information and deepening geopolitical divides

Current and recent technology challenges

  • With those concepts and the governance-gap framework in place, the contemporary world presents five major technology challenges that affect states at every level

    • Cybersecurity

      • Protecting digital systems, networks and data from hostile attack

      • Targets include critical infrastructure (power grids, financial systems), government networks and private corporations

      • State-sponsored cyberattacks blur the line between espionage, sabotage and warfare

      • E.g. the SolarWinds hack (2020), in which state-linked actors compromised US government and private sector systems

    • Information warfare and disinformation

      • The use of technology to spread false information, manipulate public opinion and interfere in political processes

      • Social media algorithms amplify emotionally engaging content - which is often false or extreme — over accurate but moderate material

      • Disinformation campaigns have been used to undermine trust in democratic institutions, scientific consensus and electoral outcomes

      • E.g. the use of social media campaigns to interfere in the 2016 US presidential election

    • Surveillance and digital authoritarianism

      • States using technology to monitor and control their populations - including facial recognition, location tracking and social media monitoring

      • Raises profound human rights concerns about privacy, free expression and political dissent

      • Democratic states also use surveillance technology, raising questions about accountability and the rule of law

      • E.g. China's social credit system; AI-powered facial recognition used to surveil the Uyghur minority in Xinjiang; internet shutdowns by authoritarian governments during periods of protest

    • Artificial intelligence and autonomous systems

      • AI is transforming decision-making in governance, warfare, policing and employment

      • Algorithmic bias - AI systems can reproduce and amplify human prejudices, producing discriminatory outcomes at scale

      • Autonomous weapons raise fundamental questions about accountability when lethal force is exercised without direct human control

    • The digital divide

      • Unequal access to digital technology and the internet within and between states

      • Shapes economic opportunity, political participation and access to public services

      • The divide operates along lines of wealth, geography, gender and age — and intersects with other forms of inequality

Internet penetration rate by country, 2024

World map shaded in bright colours showing countries by percentage ranges, from 0–9% to 90–100%, with a key legend at the left-hand side.
  • Approximately 63% of people worldwide had reliable access to the internet in 2024, including:

    • 57% of people in the developing world

    • 90% of people in the developed world

  • Approximately 2.6 billion people remain without internet access globally, concentrated in lower-income states (UN data)

Technology at different levels

Level

Overview

Global

  • International governance of cyberspace, digital trade rules and the influence of global technology corporations

Regional

  • Regional data protection frameworks (e.g. the EU's GDPR), regional cybersecurity cooperation

National

  • State surveillance systems, digital infrastructure, technology regulation and censorship

Local

  • Access to digital technology, community-level surveillance and local digital activism

Actors and stakeholders

  • When researching a case study on technology, students should identify a range of actors and stakeholders

    • Nation-states

      • Develop offensive and defensive cyber capabilities

      • Regulate technology within their territory and negotiate international norms

      • May conduct state-sponsored cyberattacks or disinformation campaigns

    • Large technology corporations

      • E.g. Google, Meta, Microsoft and Huawei

      • Control significant global digital infrastructure and shape information environments through algorithms

      • Collect and monetise vast amounts of user data; operate across borders with limited international accountability

    • Hackers and cybercriminal organisations

      • Non-state actors who conduct cyberattacks for financial gain, political purposes or at the direction of states

      • The line between independent hackers and state proxies is frequently blurred

    • Civil society and digital rights organisations

      • E.g. the Electronic Frontier Foundation and Access Now

      • Advocate for privacy rights, internet freedom and accountability of technology companies and governments

    • International organisations

      • E.g. the UN GGE and the International Telecommunication Union (ITU)

      • Attempt to develop international norms, standards and agreements for technology governance

    • Individuals and communities

      • Both users of technology and subjects of technological surveillance

      • Rights to privacy, free expression and equal digital access are central to all technology governance debate

Case Study

THE GOVERNANCE OF CYBERSPACE

  • Cyberspace is often described as the fifth domain of conflict, alongside land, sea, air and space, but it is uniquely difficult to govern

  • There is currently no comprehensive international treaty governing state behaviour in cyberspace

Key governance challenges

  • Attribution

    • It is technically difficult to prove definitively who carried out a cyberattack, allowing states to deny involvement plausibly

  • Dual-use technology

    • The same tools used for legitimate cybersecurity research can be weaponised

  • Differing visions of internet governance

    • Democratic states generally favour an open, globally connected internet; authoritarian states advocate for internet sovereignty and national control

  • The role of non-state actors

    • Major technology corporations (Google, Meta, Microsoft) play significant roles in governing cyberspace, often without democratic accountability

Key developments in cyber governance

  • The UN Group of Governmental Experts (GGE) has produced consensus reports establishing that international law applies in cyberspace — but states disagree sharply on how

  • The Budapest Convention on Cybercrime (2001) is the primary international treaty on cybercrime; major powers including Russia and China have not ratified it

  • The EU's General Data Protection Regulation (GDPR, 2018) is the most significant regional data protection framework and has influenced global standards

Example case studies

  • The following examples illustrate the kinds of case studies students could develop for this topic area

Case study

Outline

Connections to other HL topics

Cyberattacks and US-China relations

  • Growing confrontation in cyberspace between the USA and China, involving state-sponsored hacking of intellectual property, infrastructure and government systems

  • Raises questions about sovereignty, international law and what constitutes an "act of war" in cyberspace

  • Borders

  • Security

  • Equality

Far-right social media and elections in Germany

  • The role of far-right platforms and recommendation algorithms in radicalising voters and influencing electoral politics

  • State and EU responses to online hate speech and disinformation

  • Security

  • Identity

  • Equality

Green technology and development in India

  • Government, IGO and private sector collaboration on renewable energy infrastructure in rural India

  • Illustrates technology as a pathway to development and environmental protection

  • Environment

  • Poverty

  • Equality

  • The technology topic area connects to all four areas of the IB Global Politics course

Section

Key connections

Core topics

  • Power in the digital age

  • The role of non-state actors (technology corporations)

  • Sovereignty in cyberspace

  • Interdependence through digital infrastructure

Rights and justice

  • The right to privacy

  • Freedom of expression online

  • Algorithmic bias as a justice issue

  • Digital rights as human rights

Development and sustainability

  • The digital divide and development

  • Green technology and the SDGs

  • The environmental cost of digital infrastructure

Peace and conflict

  • Cyberwarfare and international security

  • Technology in armed conflict (drone warfare, autonomous weapons)

  • Social media in conflict and peacebuilding

  • A case study on technology will frequently connect to other HL topic areas - identifying these links is essential for question 3

HL topic area

Key connections

Security

  • Cyberattacks, autonomous weapons and surveillance are transforming the nature of security threats and the tools available to address them

  • Technology is increasingly central to both the conduct of conflict and efforts to prevent it

Equality

  • The digital divide reinforces existing inequalities; those without digital access are excluded from economic and political participation

  • Algorithmic bias systematically disadvantages marginalised groups in policing, employment and access to services

Identity

  • Social media shapes how identities are expressed, politicised and targeted

  • Online platforms amplify both identity-based solidarity and coordinated hate campaigns

Borders

  • Digital borders — censorship, surveillance and internet shutdowns — are reshaping the concept of territorial sovereignty

  • Technology is used both to monitor border crossings and to organise migration and refugee networks

Poverty

  • Digital technology can create pathways out of poverty through mobile banking, digital markets and access to information

  • Unequal access to technology can deepen rather than reduce existing economic inequalities

Environment

  • Green technology offers significant pathways to addressing climate change and sustainable development

  • Data centres, cryptocurrency mining and the production of digital devices have substantial carbon footprints

Examiner Tips and Tricks

What distinguishes top-band answers is the deployment of named analytical concepts rather than description alone.

The governance gap is one strong lens for many technology cases - when applying it, consider how the mismatch between technological development and regulation creates opportunities for state and non-state actors to act with impunity, and ask which actors benefit from weak governance and which are harmed.

The syllabus also rewards drawing on the four core concepts (power, sovereignty, legitimacy, interdependence), broader theoretical perspectives (realism, liberalism, constructivism, critical theory), levels of analysis (local to global) and multiple stakeholder perspectives. The right concept depends on your specific case - and many cases reward more than one.

Unlock more, it's free!

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Jane Hirons

Author: Jane Hirons

Expertise: Content Writer

Jane has been actively involved in all levels of educational endeavors including designing curriculum, teaching and assessment. She has extensive experience as an international classroom teacher and understands the challenges students face when it comes to revision.

Lisa Eades

Reviewer: Lisa Eades

Expertise: Business Content Creator

Lisa has taught A Level, GCSE, BTEC and IBDP Business for over 20 years and is a senior Examiner for Edexcel. Lisa has been a successful Head of Department in Kent and has offered private Business tuition to students across the UK. Lisa loves to create imaginative and accessible resources which engage learners and build their passion for the subject.