Abstract
The state remains the primary role player, which will determine cybersecurity policy and governance for the 4IR. The purpose of this chapter is to determine how states under international law should govern cybersecurity globally when faced with the disruptions that the 4IR will bring. The chapter uses the perceived future 4IR disruptions, prominent international law policy documents and the diversity of state practice to discern the prevailing normative order of state cybersecurity governance. The chapter identifies cyber justice as the desired foundational normative prescript to manage state cybersecurity governance and policy interventions. It further identifies two critical disruptions for state cybersecurity governance under a 4IR paradigm. These are the redundancy of customary legislative and regulatory intervention to legal and policy challenges and the threat to the notion of the state and state sovereignty through an evolved interpretation of cyber sovereignty as uncoupled from state territorial integrity. The research in the chapter is prescriptive. It provides a novel contribution for normative modelling of state cybersecurity governance under international law.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Bitcoin is one of the most famous digital currencies used online. It is also known as cryptocurrencies or e-currencies. It employs a decentralised banking method to record and maintain transactions. The solving of mathematical problems through computational solutions is how new units of the currency is produced.
- 2.
The employment of the term state cybersecurity governance is deliberate to distinguish it from instances of cyber security governance that involves natural persons. See (European Union 2016). The focus of this chapter is how the state governs its own security in anticipation of the disruptive technologies of the fourth industrial revolution.
- 3.
The main known examples of these tangible technologies are self-driving or autonomous vehicles, advanced robotics and 3D printing.
- 4.
The digital revolution will be driven by the interconnectivity of things via what has been described as the ‘internet of things’. The internet of things technology will connect the digital worlds with the physical realm.
- 5.
The advances in computing processing power have opened a door to the biological building blocks of humanity. Consequently, the 4IR allows for a world where human genes can be sequenced, activated and edited.
- 6.
Case Concerning the Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosnia and Herzegovina v. Serbia and Montenegro), ICJ Rep 2007, para. 406. See also Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v. USA) ICJ Rep 1986, paras. 109 and 115.
- 7.
Island of Palmas Case (or Miangas), United States v Netherlands, Award (1928) II RIAA 829.
- 8.
The Lotus Case (France v. Turkey), PCIJ Reports, Series A, No. 10 1927, 18.
- 9.
Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 ICJ Rep, 226.
- 10.
The UNGGE was established through the UN General Assembly resolution 68/243.
- 11.
These non-state actors, consists of terrorists, criminal groups as well as individuals operating independently.
- 12.
Agreement Governing the Activities of States on the Moon and Other Celestial Bodies, Dec. 5, 1979, 1363 U.N.T.S. 3.
References
Alvik I (2011) Contracting with sovereignty: state contracts and international arbitration. Studies in international law, vol 31. Hart Pub, Oxford, Portland, Or
Aspremont J (2012) From a pluralization of international norm-making processes to a pluralization of the concept of international law. In: Informal international lawmaking. Oxford University Press, pp 185–199. https://hdl.handle.net/11245/1.378436
Benvenisti E (2013) Sovereigns as trustees of humanity: on the accountability of states to foreign stakeholders. Am J Int Law 107(2):295. https://doi.org/10.5305/amerjintelaw.107.2.0295
Berman PS (2007) A pluralist approach to international law. Yale J Int Law 32:301
Besson S, Tasioulas J (eds) (2010) The philosophy of international law. Oxford Univ. Press, Oxford
Bonikowski B, DiMaggio P (2016) Varieties of American popular nationalism. Am Sociol Rev 81(5):949–980. https://doi.org/10.1177/0003122416663683
Chirwa DM, Chenwi LM (eds) (2016) The protection of economic, social and cultural rights in Africa: international, regional and national perspectives. Cambridge University Press, Cambridge, United Kingdom, New York, NY
Clough J (2014) A world of difference: the Budapest convention on cybercrime and the challenges of harmonisation. Monash UL Rev 40(3): 698
Colli A, Nicoletta C (2013) The role of the state in the third industrial revolution. In: Giovanni D, Louis G (eds) The third industrial revolution in global business. Cambridge University Press, Cambridge, pp 229–251. https://doi.org/10.1017/CBO9781139236706.008
Council of Europe (2004) Convention on cybercrime. No. 185. vol. ETS No. 185. https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185
De Vattel E (2011) The law of nations: or, principles of the law of nature, applied to the conduct and affairs of nations and sovereigns. In: Chitty J (ed). Cambridge University Press, Cambridge. https://doi.org/10.1017/CBO9781139
Dekker IF, Werner (eds) (2004) Governance and international legal theory. Nova et Vetera Iuris Gentium Series A, Modern International Law 23. Nijhoff, Leiden
Dugard J, Plessis MD, Katz A, Pronto AN (eds) (2011) International law: a South African perspective, 4th edn. Juta, Cape Town
European Union (2016) Regulation (EU) 2016/679 of the European parliament and of the council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (General Data Protection Regulation), vol 2016/679
Fang B (2018) Cyberspace sovereignty: reflections on building a community of common future in cyberspace. Springer, Singapore Beijing
Freeman DH, de Jongste H (1984) A new critique of theoretical thought: the necessary presuppositions of philosophy (Dooyeweerd, H. Works. Ser. A, V. 1). Paideia Press Ltd
Gill TD, Robin G, Robert H, Tim M, Christophe P, Jessica D (eds) (2014) Yearbook of international humanitarian law vol 15, 2012. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-90-6704-924-5
Goldring J (1998) Globalisation, national sovereignty and the harmonisation of law. Unif Law Rev 3:435
Groscurth CR (2018) Future-ready leadership: strategies for the fourth industrial revolution. Praeger, Santa Barbara, California
Grotius H (1925) De Jure Belli Ac Pacis “On the Land of War and Peace.” Carnegie ed. vol. chapter I
Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, and UN Secretary-General (2015) Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. A/70/150. New York, NY. https://digitallibrary.un.org/record/799853?ln=en
Hathaway, OA, Rebecca C (2012) The law of cyber-attack. Digital Commons Yale Law, Faculty Scholarship Series, no. Paper 3852
Howlett M (2018) Policy analytical capacity: the supply and demand for policy analysis in government. In: Xun W, Michael H, Ramesh M (eds) Policy capacity and governance: assessing governmental competencies and capabilities in theory and practice. Springer International Publishing, Cham, pp 49–66. https://doi.org/10.1007/978-3-319-54675-9_3
Island of Palmas Case (or Miangas), United States v the Netherlands, Award, (1928) II RIAA 829. n.d
Iyi J-M (2016) Humanitarian intervention and the AU-ECOWAS intervention treaties under international law. Springer International Publishing, Cham. https://doi.org/10.1007/978-3-319-23624-7
Janssen M, van den Hoven J (2015) Big and Open Linked Data (BOLD) in government: a challenge to transparency and privacy? Gov Inf Quart 32(4):363–368. https://doi.org/10.1016/j.giq.2015.11.007
Jayasuriya K (2001) Globalization, sovereignty, and the rule of law: from political to economic constitutionalism? Constellations 8(4):442–460. https://doi.org/10.1111/1467-8675.00252
Kelsen H (1961) General theory of law and state. Russell & Russell, New York
Kosseff J (2017) Defining cybersecurity law. Iowa Law Rev 103:985
Kriangsak K (2017) Public international law of cyberspace. Law, governance and technology series, vol 32. Springer, Cham
Kulesza J (2009) State responsibility for cyber-attacks on international peace and security. Polish Yearbook Int Law 29:139–151
Macak K (2016) Is the international law of cyber security in crisis? NATO CCD COE Publications 127, Tallinn, Estonia
Marwala T, Lagazio M (2011) Militarized conflict modeling using computational intelligence. Advanced information and knowledge processing. Springer London, London. https://doi.org/10.1007/978-0-85729-790-7
Michelman FI (1995) Always under law? Const Commentary 12:227
Mihr A (2016) Cyber justice: cyber governance through human rights and a rule of law in the internet. US-China Law Rev 13(4). https://doi.org/10.17265/1548-6605/2016.04.002
Pascariu C, Ionuţ-Daniel B, Ioan B (2017) Investigative analysis and technical overview of ransomware based attacks. Case Study: WannaCry. Int J Inf Secur Cybercrime 6(1): 57–62. https://doi.org/10.19107/IJISC.2017.01.06
SADC (2013) Harmonization of ICT policies in Sub-Saharan Africa—computer crime and cybercrime: South African development community model law
Schwab K (2016) The fourth industrial revolution. World Economic Forum, Cologny/Geneva
Sendler U (ed) (2018) The internet of things: industry 4.0 unleashed. Springer Vieweg, Berlin, Germany
Smith PAC, Pourdehnad J (2018) Organizational leadership for the fourth industrial revolution: emerging research and opportunities. Advances in Logistics, Operations, and Management Science (ALOMS) Book Series. IGI, Business Science Reference, Hershey PA, USA
Steyn L (2017) Data loss will make you wanna cry. The M&G Online. https://mg.co.za/article/2017-05-19-00-data-loss-will-make-you-wanna-cry/
Teitel R (2013) Author’s response to Martti Koskenniemi’s review of humanity’s law. Ethics Int Affairs 27(02):233–234. https://doi.org/10.1017/S0892679413000154
The Lotus Case (France v. Turkey), PCIJ Reports, Series A, No. 10. 1927
United Nations (1979) Agreement governing the activities of states on the moon and other celestial bodies, vol 1363 U.N.T.S. 3
Venktess K (2017) Up to million computers hit in biggest cyber attack ever | Fin24. https://www.fin24.com/Tech/Cyber-Security/up-to-million-computers-hit-in-biggest-cyber-attack-ever-20170515
von Heinegg WH (2014) The Tallinn manual and international cyber security law. In: Terry DG, Robin G, Robert H, Tim M, Christophe P, Jessica D (eds) Yearbook of international humanitarian law, vol 15, 2012. T.M.C. Asser Press, The Hague, pp 3–18. https://doi.org/10.1007/978-90-6704-924-5_1
Vyas L (2018) Re-Invention of the Public Sector Training. In: Ali F (ed) Global encyclopedia of public administration, public policy, and governance. Springer International Publishing, Cham, pp 5411–5416. https://doi.org/10.1007/978-3-319-20928-9_2545
Weil P (1983) Towards relative normativity in international law? Am J Int Law 77(3):413. https://doi.org/10.2307/2201073
Weiler J (2001) The rule of lawyers and the ethos of diplomats : reflections on the internal and external legitimacy of WTO dispute settlement. Harvard Jean Monnet Working Paper 9. Harvard Law School, Cambridge, MA
World Economic Forum (2019) Leading through the fourth industrial revolution: putting people at the centre. World Economic Forum
Acknowledgements
This paper is part of activities, assistance and incentives provided at the University of Johannesburg to be at the vanguard of research involving the 4IR. The assistance and patience of Mallissa Lenong have also been invaluable.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lenong, J. (2020). State Cybersecurity Governance in the Fourth Industrial Revolution: An International Law Perspective. In: Doorsamy, W., Paul, B., Marwala, T. (eds) The Disruptive Fourth Industrial Revolution. Lecture Notes in Electrical Engineering, vol 674. Springer, Cham. https://doi.org/10.1007/978-3-030-48230-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-48230-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-48229-9
Online ISBN: 978-3-030-48230-5
eBook Packages: Computer ScienceComputer Science (R0)