Submitted:
10 November 2025
Posted:
11 November 2025
You are already at the latest version
Abstract
Keywords:
Introduction
2. Conceptual and Theoretical Framework
2.1. Digital Sovereignty
2.2. Cybersecurity Governance
2.3. Postcolonial Technology Theory
3. Empirical Context: Cybersecurity Challenges in the Global South
3.1. Infrastructure Dependence
3.1.1. Some Major Foreign-Owned Digital Infrastructures and Companies That Nigeria Depends On Include the Following:
3.1.1.1 Google (United State)
- Infrastructure: You Tube, Android OS, Google Cloud Platform, and the Equiano subsea cable
- Dependency: Nigeria depends mostly on Google’s cloud storage, search engines, and digital advertising infrastructure.
3.1.1.2 Meta (formerly known as Facebook)
- Infrastructure: Facebook, Instagram, WhatsApp, and Meta’s data transmission network
- Dependency: Nigerians mostly rely on these platforms for social communication, business marketing, and digital commerce.
3.1.1.3 Microsoft (United State)
3.1.1.4 Huawei (China)
3.1.1.5 Oracle (United State)
3.2. Legal and Regulatory Gaps
3.3. External Threats and Internal Weaknesses
4. Cybersecurity as Digital Sovereignty: New Governance Models
4.1. Towards Sovereign Digital Infrastructure
4.2. Institutional Innovation
4.3. Policy Proposals
5. Critical Debates and Counterarguments
5.1. Can Sovereignty Be Achieved Without Autarky?
5.2. Security vs Openness
5.3. Private Sector Dominance
6. Conclusion and Policy Recommendations
References
- Akinbowale, M. E. , Zerihun, M. F., & Mashigo, P. N. The impact of legal framework on cyberfraud perpetration in the South African banking industry. Asian Journal of Economic Modelling 2025, 14, 1–12. [Google Scholar] [CrossRef]
- Alakitan, M. , & Makinde, E. (2024). Where are the ethical guidelines? Examining the governance of digital technologies and AI in Nigeria. Policy & Internet. [CrossRef]
- Alper, C. E. , & Miktus, M. Bridging the mobile digital divide in Sub-Saharan Africa: Costing under demographic change and urbanization. PSN: Population & Family Planning (Topic) 2019. [Google Scholar] [CrossRef]
- Ashley, T. D. , Kwon, R., Gourisetti, S., Katsis, C., Bonebrake, C., & Boyd, P. A. Gamification of cybersecurity for workforce development in critical infrastructure. IEEE Access 2022, 10, 112487–112501. [Google Scholar] [CrossRef]
- Bagui, L. , Lusinga, S., Pule, N., Tuyeni, T., Mtegha, C. Q., Calandro, E., Chigona, W., & Solms, S. V. The impact of COVID-19 on cybersecurity awareness-raising and mindset in the Southern African Development Community (SADC). The Electronic Journal of Information Systems in Developing Countries 2023, 89. [Google Scholar] [CrossRef]
- Belli, L. (2021). The BRICS countries and the shaping of digital sovereignty. In L. Belli & E. Zingales (Eds.), Platform Regulations: How Platforms Are Regulated and How They Regulate Us (pp. 113–132). Springer. [CrossRef]
- Botha-Badenhorst, D. , & Veerasamy, N. Examining barriers to entry: Disparate gender representation in cybersecurity within Sub-Saharan Africa. International Conference on Gender Research 2023. [Google Scholar] [CrossRef]
- Calderaro, A., & Craig, A. J. S. Transnational governance of cybersecurity: Policy challenges and global inequalities in cyber capacity building. Third World Quarterly 2020, 41, 917–938. https://doi.org/10.1080/01436597.2020.1729729Chaudhary, P. K. India’s cybersecurity diplomacy: Building global alliances. ShodhKosh: Journal of Visual and Performing Arts 2023, 4(2). [CrossRef]
- Couldry, N. , & Mejias, U. A. (2019). The Costs of Connection: How Data Is Colonizing Human Life and Appropriating It for Capitalism. Stanford University Press.
- David, I. C. , & Tijjani, A. Enhancing energy security in Nigeria: An analysis of international efforts (2015–2024). South Asian Journal of Social Studies and Economics. 2025. [Google Scholar] [CrossRef]
- de Jager, M. , Futcher, L., & Thomson, K. (2023). An investigation into the cybersecurity skills gap in South Africa. In L. Futcher, M. Coetzee, & M. Loock (Eds.), Cybersecurity Competency Frameworks (pp. 237–248). Springer. [CrossRef]
- Gummadi, J. C. S. Cybersecurity in international trade agreements: A new paradigm for economic diplomacy. American Journal of Trade and Policy 2024, 11. [Google Scholar] [CrossRef]
- Hwang, H. Digital sovereignty in an era of cyber threats and global connectivity. International Journal of Multidisciplinary Research Updates 2025, 9, 23–41. [Google Scholar] [CrossRef]
- Jiang, M. Models of state digital sovereignty from the Global South: Diverging experiences from China, India and South Africa. Policy & Internet 2024. [Google Scholar] [CrossRef]
- Khan, H. Cross-border data privacy and legal support: A systematic review of international compliance standards and cyber law practices. Asian Journal of Governance, Business and Economics 2025, 14, a4gbeb22. [Google Scholar] [CrossRef]
- Kruger, M. , Futcher, L., & Thomson, K. (2022). A thematic content analysis of the cybersecurity skills demand in South Africa. In Cybersecurity Education and Research (pp. 24–38). [CrossRef]
- Motlhabi, M. B. , Pantsi, P., Mangoale, B., Netshiya, R., & Chishiri, S. (2022). Context-aware cyber threat intelligence exchange platform. International Conference on Cyber Warfare and Security. [CrossRef]
- Mueller, M. (2017). Will the Internet fragment? Sovereignty, globalization and cyberspace. Polity Press.
- Nanni, M. , & Santaniello, M. (2025). Unthinking digital sovereignty: A critical reflection on origins, objectives, and practices. Policy & Internet.
- Nte, N. D. , Enoke, B. K., & Teru, V. A. (2022). A comparative analysis of cyber security laws and policies in Nigeria and South Africa. Law Research Review Quarterly. [CrossRef]
- Nye, J. S. (2010). Cyber power. Harvard Kennedy School Belfer Center Paper, https://www.belfercenter.org/publication/cyber-power.
- Ogidiaka, E. , Ogwueleka, F., Irhebhude, M. E., & Orji, U. Local cloud computing service adoption in Nigeria: Challenges and solutions. International Journal of Information Technology and Computer Science. 2022. [Google Scholar] [CrossRef]
- Olofinbiyi, S. A. A reassessment of public awareness and legislative framework on cybersecurity in South Africa. ScienceRise: Juridical Science 2022. [Google Scholar] [CrossRef]
- Onwuka, I. N. Impact of investment climate on foreign direct investment in Nigeria, Ghana, Kenya and South Africa. International Journal of Science and Research Archive. 2024. [Google Scholar] [CrossRef]
- Orji, U. J. Moving beyond criminal law responses to cybersecurity governance in Africa. International Journal of Criminal Justice. 2021. [Google Scholar] [CrossRef]
- Roumani, Y. , & Alraee, M. Examining the factors that impact the severity of cyberattacks on critical infrastructures. Computers & Security 2024, 148, 104074. [Google Scholar] [CrossRef]
- Salmiati, & Singh, B. A cyber diplomacy framework for promoting global cybersecurity norms and cooperation. International Journal of Advanced Networking and Applications 2024. [CrossRef]
- Scott, W. R. (2008). Institutions and Organizations: Ideas and Interests (3rd ed.). SAGE Publications.
- Simba-Mwogosi, J. , Kaijage, S., Kinyua, J., & Shidende, N. Digital policy and governance frameworks for EHR systems in Tanzania: A scoping review. Digital Policy, Regulation and Governance 2025. [Google Scholar] [CrossRef]
- Souter, D. (2022). Sovereignty in the digital environment: A challenge to multistakeholder governance. Association for Progressive Communications (APC) Policy Brief, https://www.apc.org/en/pubs/sovereignty-digital-environment-challenge-multistakeholder-governance.
- Timcke, S. , Gaffley, M., & Rens, A. The centrality of cybersecurity to socioeconomic development policy: A case study of cyber-vulnerability at South Africa’s Transnet. The African Journal of Information and Communication (AJIC) 2023. [Google Scholar] [CrossRef]
- Ude, N. , Ude, K., Ugbor, U., Igwe, C., & Ogu, E. E-governance and economic development in Sub-Saharan Africa: A case of Nigeria. International Journal of Development Strategies in Humanities, Management and Social Sciences 2021, 11, 87–100. [Google Scholar] [CrossRef]
- van Dijck, J. , Poell, T., & de Waal, M. (2018). The Platform Society: Public Values in a Connective World. Oxford University Press.
- Watney, M. Exploring South Africa’s cybersecurity legal framework regulating information confidentiality, integrity, and availability. International Conference on Cyber Warfare and Security 2024, 19, 210–219. [Google Scholar] [CrossRef]
- Yizhen. Cyber security in Nigeria: Emerging issues, domestic governance and international cooperation. World Journal of Advanced Research and Reviews. 2025. [CrossRef]
- Zwarts, H. , du Toit, J., & von Solms, B. A cyber-diplomacy and cybersecurity awareness framework (CDAF) for developing countries. European Conference on Cyber Warfare and Security. 2022. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).