Professional Documents
Culture Documents
Baikov
Visit to download the full and correct content document:
https://ebookmass.com/product/digital-international-relations-andrey-baikov/
Digital International
Relations
Edited by
Andrey Baykov · Elena Zinovieva
Digital International Relations
Andrey Baykov · Elena Zinovieva
Editors
Digital International
Relations
Editors
Andrey Baykov Elena Zinovieva
MGIMO University MGIMO University
Moscow, Russia Moscow, Russia
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer
Nature Singapore Pte Ltd. 2023
This work is subject to copyright. All rights are solely and exclusively licensed by the
Publisher, whether the whole or part of the material is concerned, specifically the rights
of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on
microfilms or in any other physical way, and transmission or information storage and
retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc.
in this publication does not imply, even in the absence of a specific statement, that such
names are exempt from the relevant protective laws and regulations and therefore free for
general use.
The publisher, the authors, and the editors are safe to assume that the advice and informa-
tion in this book are believed to be true and accurate at the date of publication. Neither
the publisher nor the authors or the editors give a warranty, expressed or implied, with
respect to the material contained herein or for any errors or omissions that may have been
made. The publisher remains neutral with regard to jurisdictional claims in published maps
and institutional affiliations.
This Palgrave Macmillan imprint is published by the registered company Springer Nature
Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore
189721, Singapore
Introduction
v
vi INTRODUCTION
In Part II, the book takes an analytical journey into the concept
of sovereignty in cyberspace. It discusses sovereignty as a practice in
the digital age, comparing American and Russian conceptions of cyber
sovereignty, and the implications of digital space for the principle of
sovereignty in international law.
Part III explores the interplay between the digital world and legal
norms. It elucidates the problems of legal regulation of digitalization,
with a special focus on artificial intelligence, and discusses the digitaliza-
tion of taxation in Russia and the implications of the digital economy for
financial law. It ends with an assessment of the risks associated with the
development of information and communication technologies in interna-
tional criminal law. As the book covers the legal aspects of digitalization,
it illuminates the issues of legal regulation of this emerging domain, espe-
cially with innovations like artificial intelligence. The authors provide an
refreshing look at how law and policy struggle to keep pace with techno-
logical advancement, addressing issues ranging from the digitalization of
the tax sphere in Russia to the evolving role of financial law in the era of
digital economy.
Part IV investigates the economic aspects of digital international
relations. It talks about digital employment platforms, the impact of digi-
talization on Eurasian industrial performance, and the role of “green”
investment in renewable energy in the context of digitalization. It also
presents an overview of the world robotics market’s key characteristics
and trends. With the exponential growth of digital platforms, the global
economy has experienced a seismic shift, a theme that the fourth part
of the book meticulously unpacks. This exploration is augmented by a
discussion on the new forms of digital employment, sustainable devel-
opment within the Eurasian industrial sphere, and the role of green
investments within the digital era.
Part V is devoted to the role of digital technologies in education and
research in international relations. With respect to digital education, it
offers an examination of hybrid learning, the evolution of digital educa-
tion, and the efficiency of distance and traditional academic activities in
teaching English language to students of international economic rela-
tions. Regarding the new dimensions of the digital research in the field
of international politics, it delves into the use of network data analysis
in researching political groups. The significance of digital technology in
transforming education and research is another pivotal theme that this
book touches upon. Hybrid learning, digital education, and the efficiency
INTRODUCTION vii
Andrey Baykov
Elena Zinovieva
Contents
ix
x CONTENTS
Index 365
List of Contributors
xiii
xiv LIST OF CONTRIBUTORS
xix
xx LIST OF FIGURES
Fig. 13.1 Installed wind power capacity in the world and the global
volume of electricity production (Source IRENA Wind
Energy Data, https://www.irena.org/wind) 219
Fig. 13.2 Installed capacity of solar installations in the world
and the global volume of electricity production (Source
IRENA Solar Energy Data, https://www.irena.org/solar) 220
Fig. 14.1 Annual installations of industrial robots in the world,
2010–2020, thousand units (Source World Robotics
2021 Presentation. International Federation of Robotics.
October 28, 2021. https://ifr.org/downloads/press2
018/2021_10_28_WR_PK_Presentation_long_version.
pdf [accessed December 1, 2022]) 240
Fig. 14.2 Annual robot installations by customer industry,
2018–2020, thousand units (Source World Robotics
2021 Presentation. International Federation of Robotics.
October 28, 2021. https://ifr.org/downloads/press2
018/2021_10_28_WR_PK_Presentation_long_version.
pdf [accessed December 1, 2022]) 241
Fig. 14.3 Operational stock of industrial robots in 2010–2020,
thousand units (Source World Robotics 2021
Presentation. International Federation of Robotics.
October 28, 2021. https://ifr.org/downloads/press2
018/2021_10_28_WR_PK_Presentation_long_version.
pdf [accessed June 26, 2022]) 241
Fig. 14.4 Robot density in the manufacturing industry in 2020,
by Country (Source World Robotics 2021 Presentation.
International Federation of Robotics. October
28, 2021. https://ifr.org/downloads/press2018/
2021_10_28_WR_PK_Presentation_long_version.pdf
[accessed December 1, 2022]) 242
Fig. 14.5 Changes in the ratio of collaborative and traditional
industrial robots in 2018–2020, in thousands (Source
World Robotics 2021 Presentation. International
Federation of Robotics. October 28, 2021. https://ifr.
org/downloads/press2018/2021_10_28_WR_PK_Pres
entation_long_version.pdf [accessed December 1, 2022]) 243
Fig. 14.6 Service robots for professional use, unit sales in 2019
and 2020, thousands of units (Source World Robotics
2021 Presentation. International Federation of Robotics.
October 28, 2021. https://ifr.org/downloads/press2
018/2021_10_28_WR_PK_Presentation_long_version.
pdf [accessed December 1, 2022]) 244
LIST OF FIGURES xxi
xxiii
xxiv LIST OF TABLES
Introduction
Recent international developments have exacerbated the existing prob-
lems and intensified contradictions in the field of information security at
the global level. This has created an unprecedented situation for Russian
industry, which is faced with large-scale sanctions and new challenges and
threats in the digital space.
Protecting the information infrastructure, especially critical informa-
tion infrastructure, has always been a priority for business. Under the
current circumstances, the largest Western tech companies have decided
to leave the Russian market. Thus, Russian companies, which have been
building their information security systems for years primarily on the basis
of the leading and internationally recognized Western information and
the next steps towards a unified, fair and efficient international informa-
tion security system, which serves the interests of both state and business
equally.
An analysis of the existing scientific and research base reveals a number
of methodological problems with regard to assessing the current situation
(Tikk & Kertunnen, 2018). We have studied multiple, interdisciplinary
approaches towards the constantly changing external situation in the
cyber sphere. It is hard to find a comprehensive research paper that
covers all the issues that the industry is dealing with when it comes
to protecting its information infrastructure and securing the continuity
of business processes. Methodologically, our research is based on the
neorealist approach to the role of transnational business in world politics,
according to which non-state actors advance the foreign policy priorities
of states in their activities (Waltz, 2004).
Empirically, the research is based on the widely recognized documents
and public declarations, which form the current ideology of co-existence
in cyberspace: the UN (1945) United Nations Charter, UN resolu-
tions on ICT security issues (UN, 2018), reports of the UN Group of
Governmental Experts on information security (UN, 2021b), reports and
working documents of the UN Open-Ended Working Group (OEWG)
(UN, 2021a, 2021b), the Paris Call for Trust and Security in Cyberspace
(Paris Call…, 2018), and public documents and position papers of the
regional organizations and forums. We also carefully studied and consid-
ered input by the United Nations Institute for Disarmament Research
(UNIDIR), primarily on supply chain security (Demidov & Paoli, 2020),
as well as well-known international initiatives regarding private sector
involvement in cybersecurity issues: Siemens Cybersecurity—Charter of
Trust (2018) publications by the Cybersecurity Tech Accord (2023),
Microsoft initiatives, including Digital Geneva Convention (Microsoft,
2017) and others. Our goal was to study the extent to which these docu-
ments can ensure the safety of the information infrastructure of industrial
companies and, consequently, the security and integrity of digital supply
chains around the world.
This is not the first time that business has been hostage to geopoli-
tics, but this is a unique case because it takes place in the sphere of ICT
and global cybersecurity (Krutskikh & Zinovieva, 2021). The roots of
this complex situation lie in the fact that the IT infrastructure of large
industrial holdings is built mainly on solutions, products and services of
a limited number of vendors registered in the jurisdiction of the United
6 D. GRIGORIEV AND A. MANAKHOVA
The global community faces the urgent need to intensify the dialogue
on the rules, norms and principles of responsible behaviour in global
cyberspace, taking the new realities into account (Krutskikh, 2019).
Not every country is able to withstand the onslaught of such pressure
in the use of information and communications technologies, and the
consequences will be visible at the global level.
Thus, a legally binding international agreement in the sphere of ICT
looks like the most viable, and indeed the most balanced, option (Tikk &
Kertunnen, 2020). It should guarantee the rights of all actors in the
sphere of ICT, considering the need to protect CII and create equal
conditions for all players, including industry.
International dialogue on security issues of technological cooperation
should actively engage business—both tech companies producing cyber-
security solutions and industry representatives using their products. It
is important to discuss the possibility of creating separate international
regulatory mechanisms to ensure the integrity and continuity of the
cybersecurity supply chain. The final report of the 2021 UN Group of
Governmental Experts (GGE) on Advancing Responsible State Behaviour
in Cyberspace in the Context of International Security (UN, 2021a,
2021b) says that “… states should continue to encourage the private
sector and civil society to play an appropriate role to improve the secu-
rity of and in the use of ICTs, including supply chain security for ICT
products” (UN, 2021a, 2021b).
It is of fundamental importance to include provisions that are crit-
ical for the industry in international documents on information security.
It would be also extremely useful to adopt a specialized regulatory
document that establishes the principles of protecting information infras-
tructure (including CII) at the international level. A draft of such a
document, the Information Security Charter for Critical Industrial Facili-
ties, was developed and introduced by Norilsk Nickel at the international
level in 2018 (OSCE, 2018). The main idea was to create a frame-
work document of a declarative nature for the international business
community, which does not impose any legal obligations, but at the
same time determines the framework of safe and respectful behaviour
in cyberspace. The Charter leaves out the political aspects of informa-
tion security, focusing on global industry, while its wording is universal
10 D. GRIGORIEV AND A. MANAKHOVA
outside the Western bloc. And this contradicts the idea of establishing a
just, integrated and reliable global cybersecurity regime, which is being
discussed in the United Nations. Even those declarations and recommen-
dations made at the highest international level appear to be useless when
individual actors take measures that affect others without much consid-
eration of the consequences. This underlines the importance of adopting
a legally binding international agreement in the sphere of ICT, which
would create equal conditions for all players, including industry.
The list of measures could be the subject of a high-level discussion on
the next steps towards a unified, fair and efficient international informa-
tion security system that serves the interests of both state and business
actors. In order to achieve this, the voice of industrial business should be
heard and taken into consideration.
References
Charter of Trust. (2018). https://www.charteroftrust.com/. Accessed 22 Feb
2023.
Cisco. (2022). Companies Using Cisco Routers. Statistical Report. https://enl
yft.com/tech/products/cisco-routers. Accessed 22 Feb 2023.
Creemers, R. (2022). China’s Cybersecurity Regime: Securing the Smart State.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4070682. Accessed 22
Feb 2023.
Cybersecurity Tech Accord. (2023). https://cybertechaccord.org/. Accessed 22
Feb 2023.
Demidov, O., & Paoli, G. (2020). Supply Chain Security in the Cyber Age: Sector
Trends, Current Threats and Multi-Stakeholder Responses (p. 88). UNIDIR.
Fortinet. (2022). Companies Using Fortinet. https://enlyft.com/tech/pro
ducts/fortinet. Accessed 22 Feb 2023.
Krutskikh, A. V. (Ed.). (2019). International Information Security: Theory and
Practice (3 vols.) Aspekt Press (in Russian).
Krutskikh, A., & Zinovieva, E. (Eds.). (2021). International Information
Security: Russia’s Approaches. Moscow.
Microsoft. (2017). The Need for a Digital Geneva Convention. https://
blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-con
vention/#sm.0000181ffs46qtdzfqcqifespllr1. Accessed 22 Feb 2023.
OSCE. (2018). OSCE to Support Nornickel’s Initiatives in Global Cybersecu-
rity. https://www.nornickel.com/news-and-media/press-releases-and-news/
osce-to-support-nornickel-s-initiatives-in-global-cybersecurity/. Accessed 22
Feb 2023.
12 D. GRIGORIEV AND A. MANAKHOVA
Xuetong, Y. (2020). Bipolar rivalry in the Early Digital Age. The Chinese Journal
of International Politics, 13(3), 313–341. https://doi.org/10.1093/cjip/poa
a007. Accessed 22 Feb 2023.
Zinovieva, E. (2020). International Information Security: Problems of Multilat-
eral and Bilateral Cooperation. MGIMO University Publishing (in Russian).
CHAPTER 2
Introduction
Currently, digitalization influences all elements of corporate and indi-
vidual consumer activities, as well as those of the state. The American
scientist and publicist Nicholas Negroponte was one of the earliest
researchers of the digital economy, drawing a contrast between the
conventional “real” economy based on the movement of tangible prod-
ucts and the virtual economy of the future, where the key element would
be the exchange of digital goods (Negroponte, 1995). The Canadian
business exec and consultant Don Tapscott identified the key aspects of
Not only has digital transformation affected the virtual space, but it
has also contributed to the digital transformation of enterprises through
the automation, digitization and informatization of current business
processes.
The transition of enterprises to a digital economy is reflected in
the legislation both at the international level and at the level of indi-
vidual states. The 2030 Sustainable Development Goals include building
resilient infrastructure, promoting inclusive and sustainable industrial-
ization, and fostering innovation and digital technologies will play an
essential part in this. The Declaration on Global Electronic Commerce
was adopted within the framework of the WTO in 1998, and the Digital
Single Market strategy was endorsed by the European Union in 2015.
Russia also places a high priority on digitalization development in the
framework of the national programme “Digital Economy of the Russian
Federation,” adopted in 2017.
Since the impact of digitalization on the economy is immense, this
paper will only focus on the impact of digitalization on changing company
business models, as well as on the main benefits and drawbacks of
emerging new business models.
2 DIGITAL TRANSFORMATION OF BUSINESS MODELS … 17
Literature Review
Before we go into greater detail on the impact of digitalization on
evolving business models, let us define the term “business model”
and how different researchers interpret it. The construction of busi-
ness models has been examined by such experts as David Teece (2010),
Alexander Osterwalder and Yves Pigneur (2010), Paul Timmers (1998),
Patrick Stähler (2002). Researchers that have studied the features of
modern business models and their digital transformation include Carsten
Linz et al. (2019), Nick Srnicek (2016), Ted Ladd (2021), Selsabila
and Linder (2022), A.E. Issaeva (2022), M.V. Khachaturyan (2022),
T.V. Sergievich (2021), Juan D. Carillo and Tan Guofu (2021), I.Z.
Geliskhanov et al. (2018), E.S. Kravchenko and V.V. Ovsyannikova
(2021) and others.
Yves Pigneur and Alexander Osterwalder define business model in a
very general way, characterizing it as follows: a business model serves to
describe the basic principles for the creation, development and successful
operation of an organization (Osterwalder & Pigneur, 2010). According
to another interpretation, business models can be understood as a plan
created by a company to maximize profits and minimize costs, a kind
of guideline in cooperation with market participants, as well as in the
provision of services and the production of goods (Selsabila & Linder,
2022). A business model can also be defined as the means by which a
business provides value to customers, attracts customers to pay for that
value, and converts the payments received into profit (Teece, 2010).
A detailed definition of the business model was provided by European
Commission Director Paul Timmers. It represents the following:
In this case, we will take a broad view of the business model as the
primary method used by companies, allowing them to build relationships
with customers and make a profit.
Methodology
The study involves analysing published materials and systemizing knowl-
edge in order to examine the impact of digitalization on changing
business models. We will also examine the impact of digitalization on
changing business models in a historical timeline.
A SWOT analysis will also be carried out to assess the impact of
digitalization on changing business models, highlighting the strengths,
weaknesses, opportunities and threats.
Further, we will examine successful and unsuccessful attempts to
implement digitalization in business operations.
The emergence of Access to local and The advent of Industry 4.0, which
integrated circuits global networks sensors integrated is characterized by
considerably The active into wireless the emergence and
simplified and development of web networks opened up development of
accelerated and cloud services new opportunities in artificial intelligence
calculations provides common the development of enables not only
(engineers began to computing patterns monitoring systems the analysis of data
use programs for The emergence of a Methods for arrays but also the
computer design, virtual economy of intelligent algorithms performance of
and managers were interconnected PCs, for pattern detection human functions
able to track stocks software, and and verbal with the help of
of materials and processes where information robots that can
goods in real time) physical actions can processing are being learn from previous
be performed actively developed experience
digitally
Sources Digital Transformation: A Roadmap for Billion-Dollar Organizations. Findings from Phase 1
of the Digital Transformation (2011) and Kravchenko and Ovsyannikova (2021)
4. Enhanced Functionality
7. Environmental Friendliness
sectors of the economy for hybrid learning, distance education, and other
e-learning projects.
Red Hat, which provides software based on the open-source Linux
operating system, is another example of an open-source system.
3. The concept of “long tail” was first used by Chris Anderson in
2004. In this model, all products are classified into hits, mass market
products, and “long tail” niche products (Fig. 2.1). With a traditional
physical product business model, store and warehouse space is limited,
so stores will focus on bestsellers and mass market products, while niche
products are less popular and could be left unsold and thus incur losses.
The use of digital technologies, on the other hand, has the potential to
significantly expand the list of possible goods offered. The “long tail”
model is adopted, in particular, by such companies as Amazon, Netflix
and eBay. Electronic searches allow customers to find a product that meets
their needs much faster, and the range of products is not limited to those
currently available in the seller’s warehouse.
4. Digital Platforms
Mass production
Niche Products
(Long tail)
0 Degree of Customization
The following main groups can be identified among the main participants
of the platforms:
5. Digital Ecosystems
The digital ecosystem is the next stage in the evolution of digital plat-
forms. A digital ecosystem can be defined as an interdependent group of
entities that use standardized digital platforms to achieve common goals.
Collaborations between various organizations are a characteristic of the
digital ecosystem, as a result of which various platforms join together and
form a single ecosystem.
There can be both ecosystems of one key participant (for example, the
ecosystem of Sberbank), as well as ecosystems of partners in one or several
industries.
When using digital ecosystems, users can access different services on
the same platform, which may not necessarily be connected to one
another. The Yandex Go ecosystem, for example, provides services in
Another random document with
no related content on Scribd:
CHAPTER XVI.
(1776-1826.)
very fair instance of Jacobite sentiment
A PLEBISCITE
in London, in the year 1777, presents FOR THE
itself in a record by Boswell, in his ‘Life STUARTS.
of Dr. Johnson.’ The doctor, in argument
with the Whig Dr. Taylor, insisted that the popular
inclination was still for the Stuart family, against that of Brunswick,
and that if England were fairly polled, the present king would be sent
away to-night, and his adherents hanged to-morrow!’ Taylor
demurred, and Johnson gave this as the ‘state of the country.’—‘The
people, knowing it to be agreed on all hands, that this king has not
the hereditary right to the crown, and there being no hope that he
who has it can be restored, have grown cold and indifferent upon the
subject of loyalty and have no warm attachment to any king. They
would not, therefore, risk anything to restore the exiled family. They
would not give twenty shillings a piece to bring it about; but if a mere
vote could do it, there would be twenty to one; at least, there would
be a very great majority of voices for it. But, Sir, you are to consider
that all those who consider that a king has a right to his crown, as a
man has to his estate, which is the just opinion, would be for
restoring the king who certainly has the hereditary right, could he be
trusted with it; in which there would be no danger now, when laws
and everything else are so much advanced, and every king will
govern by the laws.’ It was in the same year, 1777, that Johnson
called the design of the young Chevalier to gain a crown for his
father ‘a noble attempt;’ and Boswell expressed his wish that ‘we
could have an authentic history of it.’ More than a generation had
passed away since the attempt had failed, but Johnson thought the
history might be written: ‘If you were not an idle dog, you might write
it by collecting from everybody what they can tell, and putting down
your authorities.’ It was shortly after that, hearing of a Mr. Eld, as
being a Whig, in Staffordshire, Johnson remarked, ‘There are rascals
in all counties.’ It was then he made his celebrated assertion that ‘the
first Whig was the Devil;’ but this Jacobite definition was provoked by
Eld’s coarse description of a Tory as ‘a creature generated between
a nonjuring parson and one’s grandmother.’ Lord Marchmont thought
Johnson had distinguished himself by being the first man who had
brought ‘Whig’ and ‘Tory’ into a dictionary.
‘Nonjuring parsons’ still existed; but the hierarchy was all but
extinguished.
In the last week of November 1779, reverential THE LAST OF
groups were assembled in Theobald’s Road, to THE
witness the passing to the grave of the last nonjuring NONJURING
bishop of the regular succession—Bishop Gordon. BISHOPS.
There was no demonstration but of respect. Yet there must have
been some Jacobites of the old leaven among the spectators;
though many Nonjurors were not Jacobites at all. To this record may
be added here the fact that in St. Giles’s churchyard, Shrewsbury, lie
the remains of another nonjuring bishop, William Cartwright, who is
commonly called ‘the Apothecary,’ because, like other bishops of the
sturdy little community, he practised medicine. Cartwright (who came
of the ‘Separatists,’ a division which started about 1734, with one
bishop) always dressed in prelatic violet cloth. Hoadley once
surprised a party at Shrewsbury by saying, ‘William Cartwright is as
good a bishop as I am.’ Cartwright hardly thought so himself, for in
1799, in which year he died, he was reconciled to the established
church, at the Abbey in Shrewsbury, by a clergyman who in his old
age revealed the fact to a writer who made it public in 1874, in the
‘Dictionary of Sects, Heresies, and Schools of Thought,’ edited by
the Rev. John Henry Blunt. No reason is given why the alleged fact
was made a mystery of for so long a period.
The very last of all the nonjuring bishops, one of the irregular
succession, died in Ireland in 1805, namely, Boothe. He was
irregularly consecrated by Garnet, who had been consecrated by
Cartwright, who had been consecrated by Deacon. Nonjuring
congregations, in London and elsewhere,—they generally met in
private houses,—diminished and dissolved. Here and there, a family
or an individual might be met with who would use no Prayer Books
but those published before the Revolution of 1688. Probably, the last
Nonjuror (if not the last Jacobite) in England died in the Charter
House, London, in 1875—the late Mr. James Yeowell, for many
years the worthy and well-known sub-editor of ‘Notes and Queries.’
To him, the true church was that of Ken, and his true sovereign was
to be looked for in the line of Stuart; but Mr. Yeowell acknowledged
the force of circumstances, and was as honest a subject of Queen
Victoria as that royal lady could desire to possess.
The Jacobite and Nonjuring pulpits were THE JACOBITE
unoccupied and silent, but the Muses manifested MUSE.
vitality. The tenacity, and one might almost say, the
audacity of Jacobite loyalty was well illustrated in 1779 by the
publication of a collection of songs, under the title of ‘The True
Loyalist, or Chevalier’s Favourite.’ In one of the ballads both Flora
Macdonald and Charles Edward are alluded to:—
Over yon hills and yon lofty mountain,
Where the trees are clad with snow;
And down by yon murm’ring crystal fountain,
Where the silver streams do flow;
There fair Flora sat, complaining
For the absence of our King,
Crying, ‘Charlie, lovely Charlie!
When shall we two meet again?’
At this period, the unhappy Charles Edward was neither lovely nor
loveable. His ballad poet, above, has paraphrased, or parodied, a
popular song, ‘Over Hills and high Mountains,’—but so ill, with
excess or lack of feet, indifferently, as to serve the measure with the
arbitrary despotism with which the Stuarts themselves would have
visited Church and Constitution.
It will be remembered that when Jacobite Johnson JACOBITE
was pensioned, the English language did not suffice JOHNSON.
to give expression to his feelings. He was obliged to
borrow a word from France: he was pénétré with his Majesty’s
goodness. In 1783,—weighing Stuart against Brunswick, Johnson
borrowed a word from the same foreign source, to disparage the
House of Hanover. It must be confessed that Dr. Johnson’s
Jacobitism had become a ‘sentiment,’ in 1783. He could then
indignantly denounce the factious opposition to Government, and yet
account for it on Jacobite principles. He imputed it to the Revolution.
One night, at Mrs. Thrale’s house in Argyle Street, where the
conversation turned on this subject, ‘Sir,’ said he, in a low voice,
having come nearer to me, while his old prejudices seemed to be
fermenting in his mind, ‘the Hanoverian family is isolée here. They
have no friends. Now, the Stuarts had friends who stuck by them so
late as 1745. When the right of the king is not reverenced, there will
not be reverence for those appointed by the king.’
In June of the following year, 1784, Johnson made
BOSWELL, ON
a remark which very reasonably struck Boswell ‘a ALLEGIANCE.
good deal.’—‘I never,’ said Johnson, ‘knew a Nonjuror
who could reason.’ On which observation and on the position of the
Nonjurors and their Jacobite allegiance, generally, Boswell makes
this comment:—‘Surely, he did not mean to deny that faculty to many
of their writers,—to Hickes, Brett, and other eminent divines of that
persuasion, and did not recollect that the seven Bishops, so justly
celebrated for their magnanimous resistance to arbitrary power, were
yet Nonjurors to the new Government. The nonjuring clergy of
Scotland, indeed, who, excepting a few, have lately, by a sudden
stroke, cut off all ties of allegiance to the House of Stuart, and
resolved to pray for our present lawful Sovereign by name, may be
thought to have confirmed this remark; as it may be said that the
divine, indefeasible, hereditary right which they professed to believe,
if ever true, must be equally true still. Many of my readers will be
surprised when I mention that Johnson assured me he had never in
his life been in a nonjuring meeting-house.’—Johnson’s disrespect
for the reasoning powers of the Nonjurors was still less intense than
his detestation of the Whigs. Of some eminent man of the party, he
allowed the ability, but he added, ‘Sir, he is a cursed Whig, a
bottomless Whig, as they all are now.’
Walpole was satisfied that the Stuart race was effete, and that the
family was incapable of exciting the smallest sensation in England.
He could not, however, pass over an incident in ‘the other family.’
In allusion to the Prince of Wales and the Roman Catholic widow
(of two husbands) whom he married,—Mrs. Fitzherbert, he says:
1786, ‘We have other guess matter to talk of in a higher and more
flourishing race; and yet were rumour;—aye, much more than
rumour, every voice in England—to be credited, the matter,
somehow or other, reaches from London to Rome.’ Happily, no new
‘Pretender’ arose from this extraordinary union.
In this year, in the month of July, the comedy of
A JACOBITE
‘The Provoked Husband’ was played at the ACTRESS.
Haymarket, ‘Lady Townley, by a Lady, her 1st
appearance in London.’ The lady and the incident had some interest
for those who held Jacobite principles. They knew she was the
daughter of an old Scotch Jacobite, Watson, whose participation in
the ’45 had perilled his life, ruined his fortune, and caused him to fly
his country. He died in Jamaica. His widow returned to Europe, and
brought up the family, creditably. In course of time; Miss Watson
married a paper-manufacturer, or vendor, named Brooks. His early
death compelled her to go on the stage; her success, fair in the
metropolis, was more brilliant in Dublin, Edinburgh, and other
important cities, especially where Jacobite sympathy was alive. It is
curious that in Boswell’s account of the tour to the Hebrides with
Johnson, under the date, September 7th, 1773, when they were at
Sir Alexander Macdonald’s, at the farm of Corrichattachin, in Skye,
among the things which he found in the house was ‘a mezzotinto of
Mrs. Brooks, the actress, by some strange chance in Skye.’ The
portrait, in 1773, was not that of an actress; nor was the lady then
Mrs. Brooks; but that was her name, and such was her profession
when Boswell published his Life of Dr. Johnson, in 1791; at which
time, however, he was not aware of her Jacobite descent. Some
persons, unpleasantly advanced in years, recollect old Mrs. Brooks’s
powerful delineation of Meg Murdockson, in T. Dibdin’s ‘Heart of Mid
Lothian,’ about the year 1820, at the Surrey Theatre, and they
suggest that she was the old Jacobite’s daughter.
In the year in which the Jacobite’s daughter made
BURNS’S
her first appearance in London, as ‘Lady Townley,’ ‘DREAM.’
Burns wrote the verses which he called ‘A Dream,’
with this epigraph:—
Thoughts, words, and deeds the Statute blames with reason,
But surely Dreams were ne’er indicted Treason.
The poet then dreams of being at St. James’s on the king’s birthday,
and addressing George III. in place of the Laureate. The feeling
expressed was no doubt one that had come to be universal,—
namely, of respect for a monarch and his family, about whom,
however, the poet could see nothing of that divinity which was
supposed of old to hedge such supreme folk. But Burns recognised
a constitutional king, from whom he turned, to attack his responsible
ministers:—
Far be’t frae me that I aspire
To blame your legislation,
Or say ye wisdom want, or fire,
To rule this mighty nation.
But, faith! I muckle doubt, my Sire,
Ye’ve trusted ’Ministration
To chaps who, in a barn or byre,
Wad better fill’d their station
Than courts, yon day.
In the following year, Burns still more satisfactorily BURNS ON
illustrated the general feeling as being one of loyalty THE
to the accomplished fact in the person of the king at STUARTS.
St. James’s, but with no diminution of respect for the
royal race that had lost the inheritance of majesty. This the Scottish
bard expressed in the ‘Poetical Address’ to Mr. W. Tytler. He
lamented indeed that the name of Stuart was now ‘despised and
neglected,’ but, he adds:—
My fathers that name have revered on a throne;
My fathers have fallen to right it.
Those fathers would spurn their degenerate son,
That name should he scoffingly slight it.
Still, in pray’rs for King George, I must heartily join
The Queen and the rest of the gentry:
Be they wise, be they foolish, is nothing of mine;
Their title’s avow’d by my country.