Skip to main content

State Cybersecurity Governance in the Fourth Industrial Revolution: An International Law Perspective

  • Chapter
  • First Online:
The Disruptive Fourth Industrial Revolution

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 674))

Abstract

The state remains the primary role player, which will determine cybersecurity policy and governance for the 4IR. The purpose of this chapter is to determine how states under international law should govern cybersecurity globally when faced with the disruptions that the 4IR will bring. The chapter uses the perceived future 4IR disruptions, prominent international law policy documents and the diversity of state practice to discern the prevailing normative order of state cybersecurity governance. The chapter identifies cyber justice as the desired foundational normative prescript to manage state cybersecurity governance and policy interventions. It further identifies two critical disruptions for state cybersecurity governance under a 4IR paradigm. These are the redundancy of customary legislative and regulatory intervention to legal and policy challenges and the threat to the notion of the state and state sovereignty through an evolved interpretation of cyber sovereignty as uncoupled from state territorial integrity. The research in the chapter is prescriptive. It provides a novel contribution for normative modelling of state cybersecurity governance under international law.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Bitcoin is one of the most famous digital currencies used online. It is also known as cryptocurrencies or e-currencies. It employs a decentralised banking method to record and maintain transactions. The solving of mathematical problems through computational solutions is how new units of the currency is produced.

  2. 2.

    The employment of the term state cybersecurity governance is deliberate to distinguish it from instances of cyber security governance that involves natural persons. See (European Union 2016). The focus of this chapter is how the state governs its own security in anticipation of the disruptive technologies of the fourth industrial revolution.

  3. 3.

    The main known examples of these tangible technologies are self-driving or autonomous vehicles, advanced robotics and 3D printing.

  4. 4.

    The digital revolution will be driven by the interconnectivity of things via what has been described as the ‘internet of things’. The internet of things technology will connect the digital worlds with the physical realm.

  5. 5.

    The advances in computing processing power have opened a door to the biological building blocks of humanity. Consequently, the 4IR allows for a world where human genes can be sequenced, activated and edited.

  6. 6.

    Case Concerning the Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosnia and Herzegovina v. Serbia and Montenegro), ICJ Rep 2007, para. 406. See also Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v. USA) ICJ Rep 1986, paras. 109 and 115.

  7. 7.

    Island of Palmas Case (or Miangas), United States v Netherlands, Award (1928) II RIAA 829.

  8. 8.

    The Lotus Case (France v. Turkey), PCIJ Reports, Series A, No. 10 1927, 18.

  9. 9.

    Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 ICJ Rep, 226.

  10. 10.

    The UNGGE was established through the UN General Assembly resolution 68/243.

  11. 11.

    These non-state actors, consists of terrorists, criminal groups as well as individuals operating independently.

  12. 12.

    Agreement Governing the Activities of States on the Moon and Other Celestial Bodies, Dec. 5, 1979, 1363 U.N.T.S. 3.

References

  • Alvik I (2011) Contracting with sovereignty: state contracts and international arbitration. Studies in international law, vol 31. Hart Pub, Oxford, Portland, Or

    Google Scholar 

  • Aspremont J (2012) From a pluralization of international norm-making processes to a pluralization of the concept of international law. In: Informal international lawmaking. Oxford University Press, pp 185–199. https://hdl.handle.net/11245/1.378436

  • Benvenisti E (2013) Sovereigns as trustees of humanity: on the accountability of states to foreign stakeholders. Am J Int Law 107(2):295. https://doi.org/10.5305/amerjintelaw.107.2.0295

    Article  Google Scholar 

  • Berman PS (2007) A pluralist approach to international law. Yale J Int Law 32:301

    Google Scholar 

  • Besson S, Tasioulas J (eds) (2010) The philosophy of international law. Oxford Univ. Press, Oxford

    Google Scholar 

  • Bonikowski B, DiMaggio P (2016) Varieties of American popular nationalism. Am Sociol Rev 81(5):949–980. https://doi.org/10.1177/0003122416663683

    Article  Google Scholar 

  • Chirwa DM, Chenwi LM (eds) (2016) The protection of economic, social and cultural rights in Africa: international, regional and national perspectives. Cambridge University Press, Cambridge, United Kingdom, New York, NY

    Google Scholar 

  • Clough J (2014) A world of difference: the Budapest convention on cybercrime and the challenges of harmonisation. Monash UL Rev 40(3): 698

    Google Scholar 

  • Colli A, Nicoletta C (2013) The role of the state in the third industrial revolution. In: Giovanni D, Louis G (eds) The third industrial revolution in global business. Cambridge University Press, Cambridge, pp 229–251. https://doi.org/10.1017/CBO9781139236706.008

  • Council of Europe (2004) Convention on cybercrime. No. 185. vol. ETS No. 185. https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185

  • De Vattel E (2011) The law of nations: or, principles of the law of nature, applied to the conduct and affairs of nations and sovereigns. In: Chitty J (ed). Cambridge University Press, Cambridge. https://doi.org/10.1017/CBO9781139

  • Dekker IF, Werner (eds) (2004) Governance and international legal theory. Nova et Vetera Iuris Gentium Series A, Modern International Law 23. Nijhoff, Leiden

    Google Scholar 

  • Dugard J, Plessis MD, Katz A, Pronto AN (eds) (2011) International law: a South African perspective, 4th edn. Juta, Cape Town

    Google Scholar 

  • European Union (2016) Regulation (EU) 2016/679 of the European parliament and of the council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (General Data Protection Regulation), vol 2016/679

    Google Scholar 

  • Fang B (2018) Cyberspace sovereignty: reflections on building a community of common future in cyberspace. Springer, Singapore Beijing

    Book  Google Scholar 

  • Freeman DH, de Jongste H (1984) A new critique of theoretical thought: the necessary presuppositions of philosophy (Dooyeweerd, H. Works. Ser. A, V. 1). Paideia Press Ltd

    Google Scholar 

  • Gill TD, Robin G, Robert H, Tim M, Christophe P, Jessica D (eds) (2014) Yearbook of international humanitarian law vol 15, 2012. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-90-6704-924-5

  • Goldring J (1998) Globalisation, national sovereignty and the harmonisation of law. Unif Law Rev 3:435

    Google Scholar 

  • Groscurth CR (2018) Future-ready leadership: strategies for the fourth industrial revolution. Praeger, Santa Barbara, California

    Google Scholar 

  • Grotius H (1925) De Jure Belli Ac Pacis “On the Land of War and Peace.” Carnegie ed. vol. chapter I

    Google Scholar 

  • Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, and UN Secretary-General (2015) Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. A/70/150. New York, NY. https://digitallibrary.un.org/record/799853?ln=en

  • Hathaway, OA, Rebecca C (2012) The law of cyber-attack. Digital Commons Yale Law, Faculty Scholarship Series, no. Paper 3852

    Google Scholar 

  • Howlett M (2018) Policy analytical capacity: the supply and demand for policy analysis in government. In: Xun W, Michael H, Ramesh M (eds) Policy capacity and governance: assessing governmental competencies and capabilities in theory and practice. Springer International Publishing, Cham, pp 49–66. https://doi.org/10.1007/978-3-319-54675-9_3

  • Island of Palmas Case (or Miangas), United States v the Netherlands, Award, (1928) II RIAA 829. n.d

    Google Scholar 

  • Iyi J-M (2016) Humanitarian intervention and the AU-ECOWAS intervention treaties under international law. Springer International Publishing, Cham. https://doi.org/10.1007/978-3-319-23624-7

    Book  Google Scholar 

  • Janssen M, van den Hoven J (2015) Big and Open Linked Data (BOLD) in government: a challenge to transparency and privacy? Gov Inf Quart 32(4):363–368. https://doi.org/10.1016/j.giq.2015.11.007

    Article  Google Scholar 

  • Jayasuriya K (2001) Globalization, sovereignty, and the rule of law: from political to economic constitutionalism? Constellations 8(4):442–460. https://doi.org/10.1111/1467-8675.00252

  • Kelsen H (1961) General theory of law and state. Russell & Russell, New York

    Google Scholar 

  • Kosseff J (2017) Defining cybersecurity law. Iowa Law Rev 103:985

    Google Scholar 

  • Kriangsak K (2017) Public international law of cyberspace. Law, governance and technology series, vol 32. Springer, Cham

    Google Scholar 

  • Kulesza J (2009) State responsibility for cyber-attacks on international peace and security. Polish Yearbook Int Law 29:139–151

    Google Scholar 

  • Macak K (2016) Is the international law of cyber security in crisis? NATO CCD COE Publications 127, Tallinn, Estonia

    Google Scholar 

  • Marwala T, Lagazio M (2011) Militarized conflict modeling using computational intelligence. Advanced information and knowledge processing. Springer London, London. https://doi.org/10.1007/978-0-85729-790-7

  • Michelman FI (1995) Always under law? Const Commentary 12:227

    Google Scholar 

  • Mihr A (2016) Cyber justice: cyber governance through human rights and a rule of law in the internet. US-China Law Rev 13(4). https://doi.org/10.17265/1548-6605/2016.04.002

  • Pascariu C, Ionuţ-Daniel B, Ioan B (2017) Investigative analysis and technical overview of ransomware based attacks. Case Study: WannaCry. Int J Inf Secur Cybercrime 6(1): 57–62. https://doi.org/10.19107/IJISC.2017.01.06

  • SADC (2013) Harmonization of ICT policies in Sub-Saharan Africa—computer crime and cybercrime: South African development community model law

    Google Scholar 

  • Schwab K (2016) The fourth industrial revolution. World Economic Forum, Cologny/Geneva

    Google Scholar 

  • Sendler U (ed) (2018) The internet of things: industry 4.0 unleashed. Springer Vieweg, Berlin, Germany

    Google Scholar 

  • Smith PAC, Pourdehnad J (2018) Organizational leadership for the fourth industrial revolution: emerging research and opportunities. Advances in Logistics, Operations, and Management Science (ALOMS) Book Series. IGI, Business Science Reference, Hershey PA, USA

    Google Scholar 

  • Steyn L (2017) Data loss will make you wanna cry. The M&G Online. https://mg.co.za/article/2017-05-19-00-data-loss-will-make-you-wanna-cry/

  • Teitel R (2013) Author’s response to Martti Koskenniemi’s review of humanity’s law. Ethics Int Affairs 27(02):233–234. https://doi.org/10.1017/S0892679413000154

    Article  Google Scholar 

  • The Lotus Case (France v. Turkey), PCIJ Reports, Series A, No. 10. 1927

    Google Scholar 

  • United Nations (1979) Agreement governing the activities of states on the moon and other celestial bodies, vol 1363 U.N.T.S. 3

    Google Scholar 

  • Venktess K (2017) Up to million computers hit in biggest cyber attack ever | Fin24. https://www.fin24.com/Tech/Cyber-Security/up-to-million-computers-hit-in-biggest-cyber-attack-ever-20170515

  • von Heinegg WH (2014) The Tallinn manual and international cyber security law. In: Terry DG, Robin G, Robert H, Tim M, Christophe P, Jessica D (eds) Yearbook of international humanitarian law, vol 15, 2012. T.M.C. Asser Press, The Hague, pp 3–18. https://doi.org/10.1007/978-90-6704-924-5_1

  • Vyas L (2018) Re-Invention of the Public Sector Training. In: Ali F (ed) Global encyclopedia of public administration, public policy, and governance. Springer International Publishing, Cham, pp 5411–5416. https://doi.org/10.1007/978-3-319-20928-9_2545

  • Weil P (1983) Towards relative normativity in international law? Am J Int Law 77(3):413. https://doi.org/10.2307/2201073

    Article  Google Scholar 

  • Weiler J (2001) The rule of lawyers and the ethos of diplomats : reflections on the internal and external legitimacy of WTO dispute settlement. Harvard Jean Monnet Working Paper 9. Harvard Law School, Cambridge, MA

    Google Scholar 

  • World Economic Forum (2019) Leading through the fourth industrial revolution: putting people at the centre. World Economic Forum

    Google Scholar 

Download references

Acknowledgements

This paper is part of activities, assistance and incentives provided at the University of Johannesburg to be at the vanguard of research involving the 4IR. The assistance and patience of Mallissa Lenong have also been invaluable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jentley Lenong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lenong, J. (2020). State Cybersecurity Governance in the Fourth Industrial Revolution: An International Law Perspective. In: Doorsamy, W., Paul, B., Marwala, T. (eds) The Disruptive Fourth Industrial Revolution. Lecture Notes in Electrical Engineering, vol 674. Springer, Cham. https://doi.org/10.1007/978-3-030-48230-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-48230-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-48229-9

  • Online ISBN: 978-3-030-48230-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics