Abstract
The rise of the Internet of Things (IoT), of various smart objects and services, of smart cities, presents commercial, governance and metagovernance challenges. The effects on business challenge traditional governance, by increasing the value of data, something poorly captured in competition law and sectoral regulation. A central challenge is ensuring at least the present levels of privacy, requiring extensions of data protection laws and institutions, and training of engineers and entrepreneurs in well-established principles, notably privacy by design. It requires modifications and extension of competition law to protect consumers and the addition of the collection and processing of data into merger control and abuse of dominance proceedings. Metagovernance encompasses the design of the systems, of the various agencies, laws, appeals and oversight, accountability and transparency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A unicorn is a startup company with a value of over USD 1 billion.
- 2.
The EU-US privacy shield, supposedly allowing data transfers, has proved highly controversial.
- 3.
See, for example, special issue of IEEE Internet of Things Journal, 5(3).
- 4.
The term jailbreaking is used to describe overriding requirements to use proprietary refills.
- 5.
This company recently failed.
- 6.
The same issue arose in the 1950s over the requirement by IBM that customers use only their punched cards with their mainframe computers.
- 7.
Similar problems can arise in bankruptcy, with the possible disposal of large data sets, where contracted conditions for the use of data may be lost or the purchaser may wish them lost.
- 8.
To complicate matters ages of legal consent vary considerably between jurisdictions.
- 9.
It is unlikely that acceptance of T&Cs in an unfamiliar language would be enforceable in court.
- 10.
- 11.
These are blogged mercilessly by https://twitter.com/internetofshit.
References
Ahlmeyer, M., & Chircu, A. M. (2016). Securing the Internet of Things: A review. Issues in Information Systems, 17(iv), 21–28. Retrieved from: http://www.iacis.org.
AIOTI. (2017). Alliance for Internet of Things Innovation. AIOTI. Retrieved October 28, 2017, from: https://aioti.eu/.
Bache, I., Bartle, I., & Flinders, M. (2014). Multi-level governance. In C. Ansell & J. Torfing (Eds.), Handbook on theories of governance (pp. 486–498). Cheltenham: Edward Elgar.
Bamforth, R., & Longbottom, C. (2011). Death of the traditional telco. London: Quocirca.
Baron, D. P. (1995). Integrated strategy: Market and nonmarket components. California Management Review, 37(2), 47–65.
BBC. (2017). German parents told to destroy Cayla dolls over hacking fears. BBC News. Retrieved from: https://www.bbc.co.uk/.
BMBF. (2018). Industrie 4.0. Bundesministerium für Bildung und Forschung. Retrieved from: https://www.bmbf.de.
Buchak, G., Matvos, G., Piskorski, T., & Seru, A. (2017). Fintech, regulatory arbitrage, and the rise of shadow banks (NBER Working Paper No. 23288). Cambridge: National Bureau of Economic Research. Retrieved from: http://www.nber.org/papers/w23288.
Chemerinsky, K. (2014). ComScore reaches $14 million settlement in electronic privacy class action. Alston & Bird. Retrieved from: https://www.alstonprivacy.com.
Cimpanu, C. (2017). BrickerBot author claims he bricked two million devices. Bleeping Computer. Retrieved from: https://www.bleepingcomputer.com.
Coldewey, D. (2017). Hackers send silent commands to speech recognition systems with ultrasound. Tech Crunch. Retrieved from: https://techcrunch.com.
Cowen, T. (2016). Big data as a competition issue: Should the EU Commission’s approach be more careful? European Networks Law & Regulation Quarterly, 4(1), 14–23.
CPS. (2018). Joint press release from the Crown Prosecution Service and National Police Chiefs’ Council—Action on disclosure. Retrieved from: https://www.cps.gov.uk/news.
Dehghantanha, A., & Choo, K.-K. R. (2019). Handbook of big data and IoT security. Cham: Springer.
Díaz Zayas, A., García Pérez, C. A., Recio Pérez, Á. M., & Merino, P. (2018). 3GPP evolution on LTE connectivity for IoT. In R. Gravina, A. Liotta, C. E. Palau, G. Fortino, & M. Manso (Eds.), Integration, interconnection, and interoperability of IoT systems. Cham: Springer.
EC. (2010). A comprehensive approach on personal data protection in the European Union. COM(2010) 609. Brussels: European Commission.
EC. (2012). Proposal for a regulation on the protection of individuals with regard to the processing of personal data. COM(2012) 11. Brussels: European Commission.
EC. (2016). Communication on ICT standardisation priorities for the digital single market. COM(2016)176. Brussels: European Commission.
EC. (2017). Exchanging and protecting personal data in a globalised world. COM(2017) 7. Brussels: European Commission.
Elliott, R. E. (2016). Sharing app or regulation hackney: Defining Uber Technologies, Inc. Journal of Corporate Law, 41(3), 727–754.
Ericsson. (2017). 5G readiness survey 2017: An assessment of operators’ progress on the road to 5G. Stockholm: L. M. Ericsson.
FDA. (2017, August 29). Firmware update to address cybersecurity vulnerabilities identified in Abbott’s (formerly St. Jude Medical’s) implantable cardiac pacemakers: FDA safety communication. Food and Drug Administration. Retrieved from: https://www.fda.gov.
Ferguson, A. G. (2016). The Internet of things and the Fourth Amendment of effects. California Law Review, 104(4), 805–880.
Franceschi-Bicchierai, L. (2017). Hackers can easily hijack this dildo camera and livestream the inside of your vagina (or butt). Motherboard. Retrieved from: https://motherboard.vice.com.
Frick, W. (2017). Do tech companies really need all that user data? Harvard Business Review. Retrieved from: https://hbr.org.
Froomkin, A. M. (1997). The internet as a source of regulatory arbitrage. In B. Kahin & C. Nesson (Eds.), Borders in cyberspace: Information policy and the global information infrastructure. Cambridge: MIT Press.
FTC. (2011). Horzontal merger control guidelines. Washington DC: U.S. Department of Justice & Federal Trade Commission.
FTC. (2013, September 4). Marketer of internet-connected home security video cameras settles FTC charges it failed to protect consumers’ privacy. Federal Trade Commission. Retrieved from: https://www.ftc.gov.
FTC. (2017a, May 22). D-Link. Federal Trade Commission. Retrieved from: https://www.ftc.gov.
FTC. (2017b). VIZIO to pay $2.2 million to FTC, State of New Jersey to settle charges it collected viewing histories on 11 million smart televisions without users’ consent. Federal Trade Commission. Retrieved from: https://www.ftc.gov.
FTC. (2018). Electronic toy make VTech settles FTC allegations that it violated Children’s Privacy Law and the FTC Act. Federal Trade Commission. Retrieved from: https://www.ftc.gov.
Fuchs, G. (1994). Policy-making in a system of multi-level governance – the Commission of the European Community and the restructuring of the telecommunications sector. Journal of European Public Policy, 1(2), 177–194.
Gartner. (2018). Gartner says worldwide IoT security spending will reach $1.5 Billion in 2018. Gartner Group. Retrieved from: http://www.gartner.com.
Handeyside, H., & Bhandari, E. (2017). Warrantless border searches of smartphones are skyrocketing: We’re suing to stop them. American Civil Liberties Union. Retrieved from: https://www.aclu.org.
Hern, A. (2016, April 5). Revolv devices bricked as Google’s Nest shuts down smart home company. The Guardian. Retrieved from: https://www.theguardian.com.
Herzberg, B., Bekerman, D., & Zeifman, I. (2016). Breaking down Mirai: An IoT DDoS Botnet analysis. Incapsula. Retrieved from: https://www.incapsula.com.
Hillman, A. J., Keim, G. D., & Schuler, D. (2004). Corporate political activity: A review and research agenda. Journal of Management, 30(6), 837–857.
HMIC. (2015). Real lives, real crimes: A study of digital crime and policing. London: Her Majesty’s Inspectorate of Constabulary.
Hogan, M., & Piccarreta, B. (2018). Interagency report on status of international cybersecurity standardization for the Internet of Things (IoT). Gaithersburg, MD: National Institute of Standards and Technology.
Hruska, J. (2017). Sonos: Accept our new privacy policy or we may brick your device. Extreme Tech. Retrieved from: https://www.extremetech.com.
IEC. (2014). White paper: Internet of Things—Wireless sensor networks. Geneva: International Electrotechnical Commission.
IEC. (2016). IoT 2020: Smart and secure IoT platform. Geneva: International Electrotechnical Commission.
Internet Policy Task Force and Digital Economy Leadership Team. (2017). Fostering the advancement of the Internet of things. Washington, DC: Department of Commerce.
IoT-EPI. (2018). IoT-European Platforms Initiative. Retrieved from: http://iot-epi.eu/.
IoT-FA. (2017). Horizon 2020—Internet of Things—Focus area. European Commission. Retrieved from: https://ec.europa.eu.
Jamil, R. (2017). Drivers vs Uber—The limits of the judicialization: Critical review of London’s employment tribunal verdict in the case of Aaslam Y. & Farrar J. against Uber. Revue Interventions Économiques, 58, 1–8.
Jones, R. (2017, August 14). Smart locks used by Airbnb get bricked by software update. Gizmodo. Retrieved from: https://gizmodo.com.
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.
LabMD Inc v Federal Trade Commission, 16-16270 (US Court of Appeal for 11th Circuit June 6, 2018). Retrieved from: https://law.justia.com.
Laitenberger, J. (2017). Striking the right balance in the enforcement of competition rules. European Commission. Retrieved from: http://ec.europa.eu.
Liaropoulos, A. N. (2017). Cyberspace governance and state sovereignty. In G. C. Bitros & N. C. Kyriazis (Eds.), Democracy and an open-economy world order (pp. 25–35). Cham: Springer International.
London Economics. (2010). Study on the economic benefits of privacy-enhancing technologies (PETs). Brussels: European Commission.
Maggetti, M., & Gilardi, F. (2011). The policy-making structure of European regulatory networks and the domestic adoption of standards. Journal of European Public Policy, 18(6), 830–847.
Maréchal, N. (2017). Networked authoritarianism and the geopolitics of information: Understanding Russian internet policy. Media and Communication, 5(1), 29–41.
Mathews, L. (2017, April 10). A malware outbreak is bricking insecure IoT devices. Forbes. Retrieved from: https://www.forbes.com.
McAfee, A., & Brynjolfsson, E. (2017). Machine, platform, crowd: Harnessing the digital revolution. New York: W. W. Norton.
Meddeb, A. (2016). Internet of things standards: Who stands out from the crowd? IEEE Communications Magazine, 54(7), 40–47.
N.P. v Standard Innovation Corp, 1:16-cv-8655 (US District Court—Northern District of Illinois-Eastern August 15, 2017).
NIST. (2017). Framework for cyber-physical systems. Washington, DC: National Institute of Standards and Technology. Retrieved from: https://nvlpubs.nist.gov.
NIST. (2018). Framework for improving critical infrastructure cybersecurity. Version 1.1. National Institute of Standards and Technology. Retrieved from: https://nvlpubs.nist.gov.
OECD. (2016). ICTs and jobs: Complements or substitutes? Paris: Organisation for Economic Cooperation and Development.
OECD. (2017). Enhancing the role of insurance in cyber risk management. Paris: Organisation for Economic Cooperation and Development.
OECD. (2018). OECD reviews of digital transformation: Going digital in Sweden. Paris: Organisation for Economic Cooperation and Development.
Schumpeter, J. A. (1947). The creative response in economic history. The Journal of Economic History, 7(2), 149–159.
Science and Technology Select Committee. (2019). Forensic science and the criminal justice system: A blueprint for change (HL Paper 333). London: House of Lords. Retrieved from: https://publications.parliament.uk.
Sly, L. (2018). U.S. soldiers are revealing sensitive and dangerous information by jogging. Washington Post. Retrieved from: https://www.washingtonpost.com.
Sørensen, E. (2006). Metagovernance: The changing role of politicians in processes of democratic governance. The American Review of Public Administration, 36(1), 98–114.
Sørensen, E., & Torfing, J. (2009). Making governance networks effective and democratic through metagovernance. Public Administration, 87(2), 234–258.
Stephenson, P. (2013). Twenty years of multi-level governance: ‘Where Does It Come From? What Is It? Where Is It Going?’. Journal of European Public Policy, 20(6), 817–837.
Strava Labs. (2018). Global Heatmap. Retrieved from: https://labs.strava.com.
Sutherland, E. (2018). Cybersecurity: Governance of a new technology. Political Studies Association International Conference (PSA18). Cardiff: Political Studies Association.
US CERT. (2017). Heightened DDoS threat posed by Mirai and other botnets. Alert TA16-288A. United States Computer Emergency Response Team: Heightened DDoS Threat Posed by Mirai and Other Botnets.
Valente, J., & Cardenas, A. A. (2017). Security & privacy in smart toys. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (IoTS&P ‘17) (pp. 19–24). New York: ACM.
Vodacom. (2018). Vodacom e-school. Retrieved from: http://www.vodacom.co.za.
Weber, R. H., & Studer, E. (2016). Cybersecurity in the Internet of Things: Legal aspects. Computer Law & Security Review, 32, 715–728.
Whalley, J., & Curwen, P. (2017). From phones to football: The changing strategic focus of BT. Telematics and Informatics, 34(5), 798–809.
Woods, D., & Simpson, A. (2017). Policy measures and cyber insurance: A framework. Journal of Cyber Policy, 2(2), 209–226.
Zeng, J., Stevens, T., & Chen, Y. (2017). China’s solution to global cyber governance: Unpacking the domestic discourse of ‘Internet Sovereignty’. Politics & Policy, 45(3), 432–464.
Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., & Xu, W. (2017). DolphinAtack: Inaudible voice commands. Retrieved from: https://arxiv.org/abs/1708.09537.
Zuhdi, M., Pereira, E. T., & Teixeira, A. (2011). Impact of internet companies on traditional telcos’ business model: A global research study. World Review of Business Research, 1(3), 102–112. Retrieved from: http://www.wrbrpapers.com.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
Sutherland, E. (2020). Internet of Things: Governance and Metagovernance of Networking Everything. In: Cunningham, J., Whalley, J. (eds) The Internet of Things Entrepreneurial Ecosystems. Palgrave Pivot, Cham. https://doi.org/10.1007/978-3-030-47364-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-47364-8_6
Published:
Publisher Name: Palgrave Pivot, Cham
Print ISBN: 978-3-030-47363-1
Online ISBN: 978-3-030-47364-8
eBook Packages: Business and ManagementBusiness and Management (R0)