Legal Protection of Digital Information in the era of Information Warfare

被引:0
|
作者
Skorzewska-Amberg, Malgorzata [1 ]
机构
[1] Kozminski Univ, Fac Law, Warsaw, Poland
关键词
computer network; legal interception; unauthorized access; cybercrime; anonymity; cryptography;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The danger of uncontrolled use of computers and computer networks has begun to be noticed in the last few years. Criminal acts committed in networks with the use of networks and against networks, reach beyond national borders. Since the 1990s, when the United Nations (UN) recognized computer violation as a form of transborder crime, profits originating in computer crime have surpassed those from drug trade. Organized crime is adapting to the environment of advanced technology, using thousands of computer networks to commit crimes on a global scale. Openness and anonymity is the strength of the Internet, but remains at the same time its greatest weakness. Among the network users, the group which aims at undesired or even unlawful accessing, distributing and exchanging information is growing. Technical solutions in information security have to be supported by demands to follow the rules of relevant procedures - assured through legal state obligations and sanctions in case of violation of such rules. To translate the language used by modern technology into proper legal language and catching behaviour seemingly unimportant or of minor consequence, but causing major damage, turned out to be most difficult. It is hence of great significance to adopt laws covering as much as possible of cyberspace behaviour. One of the most effective methods of securing digital information is concealing it with the use of cryptography. It is true that communication using concealed information protects privacy and secrecy of mails to a high degree, but renders at the same time considerably more difficult accessing to information in cases when common good demands breaking such secrecy. Such procedures are most often carefully described and rigorously regulated by law since they interfere with the sensitive question of privacy of citizens. There is nevertheless still a need to specify i.a. how to use available cryptographic tools in order to access content of cryptographically concealed transmission without having access to the cryptographic keys. All efforts to exercise control over the Internet create controversy, raising questions about freedom of speech, stirring up protests about censorship, calling in question the intrusion of state authorities upon the private sphere of network users. At the same time, more countries introduce legal instruments of decree and prohibition in order to prevent law violation, something the Internet facilitates or even makes possible. In times of terrorism threats, efforts are intensified aiming at introducing measures which allow certain degree of control over the virtual space. It certainly requires a balance between the necessity of security regarding citizens and the need to guarantee their rights.
引用
收藏
页码:237 / 244
页数:8
相关论文
共 50 条
  • [1] Political and legal aspects of the information warfare
    Sheremet, Oleg S.
    Voluiko, Oleksii M.
    Posmitna, Victoriia V.
    Poda, Tetiana
    Bidzilya, Yuriy M.
    [J]. AMAZONIA INVESTIGA, 2021, 10 (45): : 31 - 41
  • [2] The Sustainable Protection of Intangible Cultural Heritage Information in Digital Era
    Yang, Cheng
    Wu, Long-wei
    [J]. PROCEEDINGS OF THE 3D INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE RESEARCH, 2016, 105 : 315 - 320
  • [3] In the name of protection-A critical analysis of China's legal framework of children's personal information protection in the digital era
    Zheng, Guan
    Shu, Jinchun
    [J]. COMPUTER LAW & SECURITY REVIEW, 2024, 53
  • [4] Digital information warfare trends in Eurasia
    Aunshul Rege
    [J]. Security Journal, 2014, 27 : 374 - 398
  • [5] Digital information warfare trends in Eurasia
    Rege, Aunshul
    [J]. SECURITY JOURNAL, 2014, 27 (04) : 374 - 398
  • [6] Warning to Information Operations Planners: Ignore the Information-Seeking Patterns and the Legal Protection of Information Warfare Victims in the Middle East at Your Peril
    Hyacinthe, Berg
    [J]. 4TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 27 - 34
  • [7] Legal framework for Digital Information
    Muller, Harald
    [J]. ZEITSCHRIFT FUR BIBLIOTHEKSWESEN UND BIBLIOGRAPHIE, 2010, 57 (05): : 245 - 252
  • [8] The RBO in the era of digital information
    Freire Portes, Arlindo Jose
    [J]. REVISTA BRASILEIRA DE OFTALMOLOGIA, 2011, 70 (01) : 5 - 6
  • [9] Legal Protection of Human Rights in the Digital Era
    齐延平
    CHEN Feng
    [J]. The Journal of Human Rights., 2023, 22 (06) - 1184
  • [10] International Legal Issues and Approaches Regarding Information Warfare
    Nitu, Alexandru
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 200 - 206