Abstract
Organisations need to have an updated strategic understanding of information security to safeguard their intangible assets (such as intellectual property, talents and skills, privacy data). This understanding should not be limited to the organisation per se, but should include the whole organisational universe. The return of geopolitics, coupled with the fact that the space of cyber is largely ungoverned poses new and significant challenges. The rising plethora of regulations in the digital domain aim to restore public trust in a digitised society, at the same time as the general distrust in both institutions and technology is on the rise. In this context, technology is never objective, but any application of technology will, by necessity, counter or reinforce one of the two main information paradigms that are developing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
As a point for further reflection, the ability to respond decisively to these attacks has further been weakened by the philosophical victories of the postmodern worldview, where concepts such as “truth” have been deconstructed to anything which is true for the individual. “Alternative facts”, no matter how factually untrue they are, is just another version of the truth. Unfortunately, this has become a severe weakness in the ability of states and organizations to take action.
- 3.
One example of an ambitious and growing body of legislative exploration in this area is the Tallinn Manual, developed by, Estonia. The 2.0 version was published in 2017.
- 4.
Lawfare is a form of war consisting of the use of the legal system against an enemy, such as by damaging or delegitimizing them, tying up their time or winning a public relations victory. The term is a portmanteau of the words law and warfare. https://en.wikipedia.org/wiki/Lawfare
References
Carney M (2018) Leave no dark corner. ABC News. https://www.abc.net.au/news/2018-09-18/china-social-credit-a-model-citizen-in-a-digital-dictatorship/10200278. Accessed 17 Sep 2018
Cimpanu C (2019) China’s cybersecurity law update lets state agencies ‘pen-test’ local companies. ZD Net. https://www.zdnet.com/article/chinas-cybersecurity-law-update-lets-state-agencies-pen-test-local-companies/. Accessed 9 Feb 2019
Gartner, Inc. (2018) Gartner forecasts worldwide information security spending to exceed $124 billion in 2019. https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019. Accessed 03 July 2019
Govt names the 10 agencies with powers to snoop on you (n.d.) India Today. https://www.indiatoday.in/india/story/government-snooping-order-1414231-2018-12-21
Hobbes T (2005) In: Klenner H (ed) Chapter 14: Leviathan. Meiner Verlag, Hamburg
Mee P, Schuermann T (2018) How a cyber attack could cause the next financial crisis. Harvard Business Review. https://hbr.org/2018/09/how-a-cyber-attack-could-cause-the-next-financial-crisis?utm_campaign=hbr&utm_source=linkedin&utm_medium=social. Accessed 14 Sept 2018
Probst L, Scharff C (2018) Upskill – 6 steps to unlock economic opportunity for all. reka print+, Luxembourg
Siers R (2018) Cybersecurity. In: Williams PD, McDonald M (eds) Security studies: an introduction, 3rd edn. Routledge, Glasgow
Stoltenberg J (2018) Why cyber space matters as much to Nato as land, sea and air defence. Financial Times. https://www.ft.com/content/9c3ae876-6d90-11e8-8863-a9bb262c5f53. Accessed 12 July 2018
Tallinn Manual 2.0 (2017) The most comprehensive guide for policy advisors and legal experts on how existing International Law applies to cyber operations. https://ccdcoe.org/research/tallinn-manual/
Wheeler T (2018) In cyberwar, there are no rules. Foreign Policy. https://foreignpolicy.com/2018/09/12/in-cyberwar-there-are-no-rules-cybersecurity-war-defense/. Accessed 12 Sept 2018
Wikipedia (2019) Lawfare. https://en.wikipedia.org/wiki/Lawfare. Accessed 03 July 2019
Wooldridge A (2015) The great disruption – how business is coping with turbulent times. The Economist. Profile Books, Great Britain, pp 19–21
World Economic Forum (2020) The global risks report 2020, http://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Owman, L. (2020). The Ungoverned Space of Cyber: Protecting Your Intangibles. In: Matos, F., Vairinhos, V., Salavisa, I., Edvinsson, L., Massaro, M. (eds) Knowledge, People, and Digital Transformation. Contributions to Management Science. Springer, Cham. https://doi.org/10.1007/978-3-030-40390-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-40390-4_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-40389-8
Online ISBN: 978-3-030-40390-4
eBook Packages: Business and ManagementBusiness and Management (R0)