Skip to main content

Internet of Things: Governance and Metagovernance of Networking Everything

  • Chapter
  • First Online:
The Internet of Things Entrepreneurial Ecosystems

Abstract

The rise of the Internet of Things (IoT), of various smart objects and services, of smart cities, presents commercial, governance and metagovernance challenges. The effects on business challenge traditional governance, by increasing the value of data, something poorly captured in competition law and sectoral regulation. A central challenge is ensuring at least the present levels of privacy, requiring extensions of data protection laws and institutions, and training of engineers and entrepreneurs in well-established principles, notably privacy by design. It requires modifications and extension of competition law to protect consumers and the addition of the collection and processing of data into merger control and abuse of dominance proceedings. Metagovernance encompasses the design of the systems, of the various agencies, laws, appeals and oversight, accountability and transparency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 64.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A unicorn is a startup company with a value of over USD 1 billion.

  2. 2.

    The EU-US privacy shield, supposedly allowing data transfers, has proved highly controversial.

  3. 3.

    See, for example, special issue of IEEE Internet of Things Journal, 5(3).

  4. 4.

    The term jailbreaking is used to describe overriding requirements to use proprietary refills.

  5. 5.

    This company recently failed.

  6. 6.

    The same issue arose in the 1950s over the requirement by IBM that customers use only their punched cards with their mainframe computers.

  7. 7.

    Similar problems can arise in bankruptcy, with the possible disposal of large data sets, where contracted conditions for the use of data may be lost or the purchaser may wish them lost.

  8. 8.

    To complicate matters ages of legal consent vary considerably between jurisdictions.

  9. 9.

    It is unlikely that acceptance of T&Cs in an unfamiliar language would be enforceable in court.

  10. 10.

    https://dejure.org/dienste/vernetzung/rechtsprechung?Gericht=LG%20K%F6ln&Datum=28.07.2017&Aktenzeichen=118%20KLs%204%2F17.

  11. 11.

    These are blogged mercilessly by https://twitter.com/internetofshit.

References

  • Ahlmeyer, M., & Chircu, A. M. (2016). Securing the Internet of Things: A review. Issues in Information Systems, 17(iv), 21–28. Retrieved from: http://www.iacis.org.

  • AIOTI. (2017). Alliance for Internet of Things Innovation. AIOTI. Retrieved October 28, 2017, from: https://aioti.eu/.

  • Bache, I., Bartle, I., & Flinders, M. (2014). Multi-level governance. In C. Ansell & J. Torfing (Eds.), Handbook on theories of governance (pp. 486–498). Cheltenham: Edward Elgar.

    Google Scholar 

  • Bamforth, R., & Longbottom, C. (2011). Death of the traditional telco. London: Quocirca.

    Google Scholar 

  • Baron, D. P. (1995). Integrated strategy: Market and nonmarket components. California Management Review, 37(2), 47–65.

    Article  Google Scholar 

  • BBC. (2017). German parents told to destroy Cayla dolls over hacking fears. BBC News. Retrieved from: https://www.bbc.co.uk/.

  • BMBF. (2018). Industrie 4.0. Bundesministerium für Bildung und Forschung. Retrieved from: https://www.bmbf.de.

  • Buchak, G., Matvos, G., Piskorski, T., & Seru, A. (2017). Fintech, regulatory arbitrage, and the rise of shadow banks (NBER Working Paper No. 23288). Cambridge: National Bureau of Economic Research. Retrieved from: http://www.nber.org/papers/w23288.

  • Chemerinsky, K. (2014). ComScore reaches $14 million settlement in electronic privacy class action. Alston & Bird. Retrieved from: https://www.alstonprivacy.com.

  • Cimpanu, C. (2017). BrickerBot author claims he bricked two million devices. Bleeping Computer. Retrieved from: https://www.bleepingcomputer.com.

  • Coldewey, D. (2017). Hackers send silent commands to speech recognition systems with ultrasound. Tech Crunch. Retrieved from: https://techcrunch.com.

  • Cowen, T. (2016). Big data as a competition issue: Should the EU Commission’s approach be more careful? European Networks Law & Regulation Quarterly, 4(1), 14–23.

    Google Scholar 

  • CPS. (2018). Joint press release from the Crown Prosecution Service and National Police Chiefs’ Council—Action on disclosure. Retrieved from: https://www.cps.gov.uk/news.

  • Dehghantanha, A., & Choo, K.-K. R. (2019). Handbook of big data and IoT security. Cham: Springer.

    Book  Google Scholar 

  • Díaz Zayas, A., García Pérez, C. A., Recio Pérez, Á. M., & Merino, P. (2018). 3GPP evolution on LTE connectivity for IoT. In R. Gravina, A. Liotta, C. E. Palau, G. Fortino, & M. Manso (Eds.), Integration, interconnection, and interoperability of IoT systems. Cham: Springer.

    Google Scholar 

  • EC. (2010). A comprehensive approach on personal data protection in the European Union. COM(2010) 609. Brussels: European Commission.

    Google Scholar 

  • EC. (2012). Proposal for a regulation on the protection of individuals with regard to the processing of personal data. COM(2012) 11. Brussels: European Commission.

    Google Scholar 

  • EC. (2016). Communication on ICT standardisation priorities for the digital single market. COM(2016)176. Brussels: European Commission.

    Google Scholar 

  • EC. (2017). Exchanging and protecting personal data in a globalised world. COM(2017) 7. Brussels: European Commission.

    Google Scholar 

  • Elliott, R. E. (2016). Sharing app or regulation hackney: Defining Uber Technologies, Inc. Journal of Corporate Law, 41(3), 727–754.

    Google Scholar 

  • Ericsson. (2017). 5G readiness survey 2017: An assessment of operators’ progress on the road to 5G. Stockholm: L. M. Ericsson.

    Google Scholar 

  • FDA. (2017, August 29). Firmware update to address cybersecurity vulnerabilities identified in Abbott’s (formerly St. Jude Medical’s) implantable cardiac pacemakers: FDA safety communication. Food and Drug Administration. Retrieved from: https://www.fda.gov.

  • Ferguson, A. G. (2016). The Internet of things and the Fourth Amendment of effects. California Law Review, 104(4), 805–880.

    Google Scholar 

  • Franceschi-Bicchierai, L. (2017). Hackers can easily hijack this dildo camera and livestream the inside of your vagina (or butt). Motherboard. Retrieved from: https://motherboard.vice.com.

  • Frick, W. (2017). Do tech companies really need all that user data? Harvard Business Review. Retrieved from: https://hbr.org.

  • Froomkin, A. M. (1997). The internet as a source of regulatory arbitrage. In B. Kahin & C. Nesson (Eds.), Borders in cyberspace: Information policy and the global information infrastructure. Cambridge: MIT Press.

    Google Scholar 

  • FTC. (2011). Horzontal merger control guidelines. Washington DC: U.S. Department of Justice & Federal Trade Commission.

    Google Scholar 

  • FTC. (2013, September 4). Marketer of internet-connected home security video cameras settles FTC charges it failed to protect consumers’ privacy. Federal Trade Commission. Retrieved from: https://www.ftc.gov.

  • FTC. (2017a, May 22). D-Link. Federal Trade Commission. Retrieved from: https://www.ftc.gov.

  • FTC. (2017b). VIZIO to pay $2.2 million to FTC, State of New Jersey to settle charges it collected viewing histories on 11 million smart televisions without users’ consent. Federal Trade Commission. Retrieved from: https://www.ftc.gov.

  • FTC. (2018). Electronic toy make VTech settles FTC allegations that it violated Children’s Privacy Law and the FTC Act. Federal Trade Commission. Retrieved from: https://www.ftc.gov.

  • Fuchs, G. (1994). Policy-making in a system of multi-level governance – the Commission of the European Community and the restructuring of the telecommunications sector. Journal of European Public Policy, 1(2), 177–194.

    Article  Google Scholar 

  • Gartner. (2018). Gartner says worldwide IoT security spending will reach $1.5 Billion in 2018. Gartner Group. Retrieved from: http://www.gartner.com.

  • Handeyside, H., & Bhandari, E. (2017). Warrantless border searches of smartphones are skyrocketing: We’re suing to stop them. American Civil Liberties Union. Retrieved from: https://www.aclu.org.

  • Hern, A. (2016, April 5). Revolv devices bricked as Google’s Nest shuts down smart home company. The Guardian. Retrieved from: https://www.theguardian.com.

  • Herzberg, B., Bekerman, D., & Zeifman, I. (2016). Breaking down Mirai: An IoT DDoS Botnet analysis. Incapsula. Retrieved from: https://www.incapsula.com.

  • Hillman, A. J., Keim, G. D., & Schuler, D. (2004). Corporate political activity: A review and research agenda. Journal of Management, 30(6), 837–857.

    Article  Google Scholar 

  • HMIC. (2015). Real lives, real crimes: A study of digital crime and policing. London: Her Majesty’s Inspectorate of Constabulary.

    Google Scholar 

  • Hogan, M., & Piccarreta, B. (2018). Interagency report on status of international cybersecurity standardization for the Internet of Things (IoT). Gaithersburg, MD: National Institute of Standards and Technology.

    Book  Google Scholar 

  • Hruska, J. (2017). Sonos: Accept our new privacy policy or we may brick your device. Extreme Tech. Retrieved from: https://www.extremetech.com.

  • IEC. (2014). White paper: Internet of Things—Wireless sensor networks. Geneva: International Electrotechnical Commission.

    Google Scholar 

  • IEC. (2016). IoT 2020: Smart and secure IoT platform. Geneva: International Electrotechnical Commission.

    Google Scholar 

  • Internet Policy Task Force and Digital Economy Leadership Team. (2017). Fostering the advancement of the Internet of things. Washington, DC: Department of Commerce.

    Google Scholar 

  • IoT-EPI. (2018). IoT-European Platforms Initiative. Retrieved from: http://iot-epi.eu/.

  • IoT-FA. (2017). Horizon 2020—Internet of Things—Focus area. European Commission. Retrieved from: https://ec.europa.eu.

  • Jamil, R. (2017). Drivers vs Uber—The limits of the judicialization: Critical review of London’s employment tribunal verdict in the case of Aaslam Y. & Farrar J. against Uber. Revue Interventions Économiques, 58, 1–8.

    Google Scholar 

  • Jones, R. (2017, August 14). Smart locks used by Airbnb get bricked by software update. Gizmodo. Retrieved from: https://gizmodo.com.

  • Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.

    Article  Google Scholar 

  • LabMD Inc v Federal Trade Commission, 16-16270 (US Court of Appeal for 11th Circuit June 6, 2018). Retrieved from: https://law.justia.com.

  • Laitenberger, J. (2017). Striking the right balance in the enforcement of competition rules. European Commission. Retrieved from: http://ec.europa.eu.

  • Liaropoulos, A. N. (2017). Cyberspace governance and state sovereignty. In G. C. Bitros & N. C. Kyriazis (Eds.), Democracy and an open-economy world order (pp. 25–35). Cham: Springer International.

    Chapter  Google Scholar 

  • London Economics. (2010). Study on the economic benefits of privacy-enhancing technologies (PETs). Brussels: European Commission.

    Google Scholar 

  • Maggetti, M., & Gilardi, F. (2011). The policy-making structure of European regulatory networks and the domestic adoption of standards. Journal of European Public Policy, 18(6), 830–847.

    Article  Google Scholar 

  • Maréchal, N. (2017). Networked authoritarianism and the geopolitics of information: Understanding Russian internet policy. Media and Communication, 5(1), 29–41.

    Article  Google Scholar 

  • Mathews, L. (2017, April 10). A malware outbreak is bricking insecure IoT devices. Forbes. Retrieved from: https://www.forbes.com.

  • McAfee, A., & Brynjolfsson, E. (2017). Machine, platform, crowd: Harnessing the digital revolution. New York: W. W. Norton.

    Google Scholar 

  • Meddeb, A. (2016). Internet of things standards: Who stands out from the crowd? IEEE Communications Magazine, 54(7), 40–47.

    Article  Google Scholar 

  • N.P. v Standard Innovation Corp, 1:16-cv-8655 (US District Court—Northern District of Illinois-Eastern August 15, 2017).

    Google Scholar 

  • NIST. (2017). Framework for cyber-physical systems. Washington, DC: National Institute of Standards and Technology. Retrieved from: https://nvlpubs.nist.gov.

  • NIST. (2018). Framework for improving critical infrastructure cybersecurity. Version 1.1. National Institute of Standards and Technology. Retrieved from: https://nvlpubs.nist.gov.

  • OECD. (2016). ICTs and jobs: Complements or substitutes? Paris: Organisation for Economic Cooperation and Development.

    Google Scholar 

  • OECD. (2017). Enhancing the role of insurance in cyber risk management. Paris: Organisation for Economic Cooperation and Development.

    Book  Google Scholar 

  • OECD. (2018). OECD reviews of digital transformation: Going digital in Sweden. Paris: Organisation for Economic Cooperation and Development.

    Book  Google Scholar 

  • Schumpeter, J. A. (1947). The creative response in economic history. The Journal of Economic History, 7(2), 149–159.

    Article  Google Scholar 

  • Science and Technology Select Committee. (2019). Forensic science and the criminal justice system: A blueprint for change (HL Paper 333). London: House of Lords. Retrieved from: https://publications.parliament.uk.

  • Sly, L. (2018). U.S. soldiers are revealing sensitive and dangerous information by jogging. Washington Post. Retrieved from: https://www.washingtonpost.com.

  • Sørensen, E. (2006). Metagovernance: The changing role of politicians in processes of democratic governance. The American Review of Public Administration, 36(1), 98–114.

    Article  Google Scholar 

  • Sørensen, E., & Torfing, J. (2009). Making governance networks effective and democratic through metagovernance. Public Administration, 87(2), 234–258.

    Article  Google Scholar 

  • Stephenson, P. (2013). Twenty years of multi-level governance: ‘Where Does It Come From? What Is It? Where Is It Going?’. Journal of European Public Policy, 20(6), 817–837.

    Article  Google Scholar 

  • Strava Labs. (2018). Global Heatmap. Retrieved from: https://labs.strava.com.

  • Sutherland, E. (2018). Cybersecurity: Governance of a new technology. Political Studies Association International Conference (PSA18). Cardiff: Political Studies Association.

    Google Scholar 

  • US CERT. (2017). Heightened DDoS threat posed by Mirai and other botnets. Alert TA16-288A. United States Computer Emergency Response Team: Heightened DDoS Threat Posed by Mirai and Other Botnets.

    Google Scholar 

  • Valente, J., & Cardenas, A. A. (2017). Security & privacy in smart toys. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (IoTS&P ‘17) (pp. 19–24). New York: ACM.

    Google Scholar 

  • Vodacom. (2018). Vodacom e-school. Retrieved from: http://www.vodacom.co.za.

  • Weber, R. H., & Studer, E. (2016). Cybersecurity in the Internet of Things: Legal aspects. Computer Law & Security Review, 32, 715–728.

    Article  Google Scholar 

  • Whalley, J., & Curwen, P. (2017). From phones to football: The changing strategic focus of BT. Telematics and Informatics, 34(5), 798–809.

    Article  Google Scholar 

  • Woods, D., & Simpson, A. (2017). Policy measures and cyber insurance: A framework. Journal of Cyber Policy, 2(2), 209–226.

    Article  Google Scholar 

  • Zeng, J., Stevens, T., & Chen, Y. (2017). China’s solution to global cyber governance: Unpacking the domestic discourse of ‘Internet Sovereignty’. Politics & Policy, 45(3), 432–464.

    Article  Google Scholar 

  • Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., & Xu, W. (2017). DolphinAtack: Inaudible voice commands. Retrieved from: https://arxiv.org/abs/1708.09537.

  • Zuhdi, M., Pereira, E. T., & Teixeira, A. (2011). Impact of internet companies on traditional telcos’ business model: A global research study. World Review of Business Research, 1(3), 102–112. Retrieved from: http://www.wrbrpapers.com.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sutherland, E. (2020). Internet of Things: Governance and Metagovernance of Networking Everything. In: Cunningham, J., Whalley, J. (eds) The Internet of Things Entrepreneurial Ecosystems. Palgrave Pivot, Cham. https://doi.org/10.1007/978-3-030-47364-8_6

Download citation

Publish with us

Policies and ethics