Digital Platform Regulation, Entrepreneurial Sustainability, And Cyberterrorism Governance: a Comparative Analysis Of Business Ecosystem Implications In The United States, The European Union, And India

Authors

  • DR RITUPRIYA GURTOO SCHOOL OF LAW, SVKMS NARSEE MONJEE INSTITUTE OF MANAGEMENT STUDIES- INDORE Author
  • Dr. Sumit Maheshwari In charge-Dean and Assistant Professor, School of Law and Public Policy, Avantika University, Ujjain. Author
  • Dr. Charu Maheshwari Assistant Professor, Department of Law, Prestige Institute of Management and Research, Deemed to be University, Indore. Author
  • Dr. Gopal Kag Sr. Assistant Professor, Department of Law, Prestige Institute of Management and Research, Deemed to be University, Indore. Author

DOI:

https://doi.org/10.66635/gzqj3778

Keywords:

Digital platform regulation, entrepreneurial sustainability, cyberterrorism governance, intermediary liability, digital business ecosystems, platform innovation, cross-border digital regulation, startup compliance

Abstract

The rapid growth of digital communication technologies has completely changed the way digital entrepreneurs, startups, and platform-based businesses operate. Extremist groups have used the internet, including social media and communication platforms, to spread propaganda, recruit new members, raise money, and plan operations. This has led to significant regulatory responses that directly reshape the compliance landscape for digital businesses and innovation ecosystems. This study contributes to the growing body of research on digital platform governance, sustainable entrepreneurship, and cyberterrorism regulation by examining how rules designed to prevent the spread of extremist content affect digital entrepreneurship, startup ecosystems, and sustainable business models across jurisdictions. Departing from earlier research that primarily framed cyberterrorism as a technological and cybersecurity issue, this study focuses on its entrepreneurial and sustainability implications. It adopts a comparative doctrinal approach to analyse regulatory frameworks in the United States, the European Union, and India. The analysis demonstrates that variations in intermediary liability regimes, content moderation requirements, and critical infrastructure protection strategies create significantly different environments for digital entrepreneurship and platform-based innovation.The findings highlight the need for internationally harmonised regulatory frameworks that can effectively mitigate cyberterrorism risks while supporting innovation and entrepreneurial sustainability. The study underscores that regulatory design plays a critical role in shaping the long-term viability of digital business ecosystems.

References

1.Alqahtani, A. (2015). Towards a framework for the potential cyber-terrorist threat to critical national infrastructure: A quantitative study. Information & Computer Security, 23(5), 532-569.

2.Backhaus, S., Gross, M. L., Waismel-Manor, I., Cohen, H., & Canetti, D. (2020). A cyberterrorism effect? Emotional reactions to lethal attacks on critical infrastructure. Cyberpsychology, Behavior, and Social Networking, 23(9), 595-603.

3.Bhushan, S. (2025). The Rise of India’s Start-up Ecosystem: Transforming into an Entrepreneurial Powerhouse. Indian Journal of Public Administration, 71(3), 463-479.

4.Bieda, D., & Halawi, L. (2015). Cyberspace: A venue for terrorism. Issues in Information Systems, 16(3), 33.

5.Chodankar, Y. M. R. (2019). An Imbalanced Ecosystem: Start-ups in India. Economic and political weekly, 54(45).

6.Damayanti, D. (2021). Implementation of the cyber terrorism prevention, and rehabilitation policy in Polda Metro Jaya Police in central Jakarta. Journal of Information Assurance & Cybersecurity, 2021(695424), 1-10.

7.Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy, 239, 288.

8.Denning, D. E. (2007). US HOUSE OF REPRESENTATIVES. Focus on terrorism, 9, 71.

9.He, K. (2021). The balance of infrastructure in the Indo‐Pacific: BRI, institutional balancing, and Quad’s policy choices. Global Policy, 12(4), 545-552.

10.Iftikhar, S. (2024). Cyberterrorism as a global threat: a review on repercussions and countermeasures. PeerJ Computer Science, 10, e1772.

11.Jewkes, Y., & Yar, M. (Eds.). (2013). Handbook of Internet crime. Routledge.

12.Jodanovic, A. (2024). The Digital Services Act Package: Protection of the Fundamental Rights of Digital Service Uses in the European Union. Regional L. Rev., 43.

13.Kosseff, J. (2019). The twenty-six words that created the Internet. Cornell University Press.

14.Krepinevich, A. F. (2012). Cyber warfare. Center for Strategic and Budgetary Assessments.

15.Kshetri, N. (2013). Cybercrime and cybersecurity in the global south. Springer.

16.Kuczerawy, A. (2018). The proposed Regulation on preventing the dissemination of terrorist content online: safeguards and risks for freedom of expression. For Center for Democracy and Technology.

17.Li, T. (2018, February). Beyond Intermediary Liability: The Future of Information Platforms. In Yale Law School Workshop Report.

18.Nyame, L., Marfo-Ahenkorah, E., Abrahams, A., Ashley-Osuzoka, J., Ashong, G., & Aboagye, D. (2024). Rise in cyber threats in the united states and the need for advanced cyber risk mitigation tools and adequate skills to combat cyber threats.

19.Pathak, S., & Mohini, L. (2024). Start-up Ecosystem and Company Law in India: Legal Simplifications and Complexities. penacclaims. com, 35.

20.Preciado, M. (2012). If you wish cyber peace, prepare for cyber war: the need for the federal government to protect critical infrastructure from cyber warfare. JL & Cyber Warfare, 1, 99.

21.Rao, B. S., Chakravarthi, C. V., & Jawahar, A. (2017). Industrial control systems security and supervisory control and data acquisition (SCADA). International Journal for Modern Trends in Science and Technology, 3(10), 109-118.

22.Salem, F. (2017). The Arab World Online 2017-2021: Digital Transformations and Societal Trends in the Age of the 4th Industrial Revolution.

23.Sander, I. (2020). What is critical big data literacy and how can it be implemented?. Internet Policy Review, 9(2), 1-22.

24.Taylor, M. (2017). An Analysis of Online Terrorist Recruiting and Propaganda Strategies. E International relations.

25.Theohary, C. A., & Harrington, A. I. (2015). Cyber operations in dod policy and plans: Issues for congress (Vol. 5). Washington, DC: Congressional Research Service.

26.Timung, B., Bordoloi, K., & Mohan Das, A. (2024). The influence of social media on learning behaviours: A social science perspective. Available at SSRN 5387322.

27.van de Kerkhof, J. (2025). The DSA’s Tower of Babel: On Digital Services Coordinators and Freedom of Expression. European Journal of Risk Regulation, 1-26.

28.Walters, R. (2022). The Digital Economy and International Trade: Transnational Data Flows Regulation.

29.Weimann, G. (2015). Terrorism in cyberspace: The next generation. Columbia University Press.

30.White, J. (2016). Cyber Threats and Cyber Security: National Security Issues, Policy and Strategies. Global Security Studies, 7(4).

Downloads

Published

2026-04-23

How to Cite

Digital Platform Regulation, Entrepreneurial Sustainability, And Cyberterrorism Governance: a Comparative Analysis Of Business Ecosystem Implications In The United States, The European Union, And India. (2026). Journal of Asia Entrepreneurship and Sustainability, 22(2S), 146-157. https://doi.org/10.66635/gzqj3778