Problems and Prospects of Digitalisation in the Field of Jurisprudence to Ensure Cyber Protection of Information
DOI:
https://doi.org/10.26512/lstr.v17i2.56248Palabras clave:
Virtual Consultations. DDoS Attacks. Quantum Encryption. Cybersecurity. Control Systems. Automation.Resumen
[Purpose] The purpose of the study is to examine the impact of digitalisation on the field of jurisprudence with a special focus on ensuring cyber protection of information.
[Methodology/approach/design] The study methodology includes the analysis of cyber threats for law firms, such as phishing and distributed denial of service (DDoS) attacks, an assessment of international cybersecurity standards (Budapest Convention, ISO/IEC 27001), and the use of modern security technologies (encryption, multi-factor authentication).
[Findings] Employee training programmes and the possibilities of using artificial intelligence and machine learning to automate data protection were examined. Electronic platforms simplify the exchange of documents and increase the transparency of interactions due to the session recording function. The legal field is facing acute cybersecurity problems due to the processing of confidential information. The main types of cyber-attacks faced by law firms include phishing, ransomware, and DDoS attacks. Each of these attacks can have serious consequences for data security, the reputation of companies, and their ability to provide legal services.
[Practical implications] The research underscores the critical need for law firms to implement robust cybersecurity measures, including compliance with international standards and regular employee training, to protect sensitive information and maintain client trust. This shift not only enhances operational efficiency and compliance but also positions firms competitively in a digitally-driven market, ultimately impacting client access to legal services and the overall landscape of legal practice.
[Originality/value] The development of specialised software for the legal field has opened up new opportunities to improve the efficiency and protection of information, ensuring compliance with legislation and integration with external systems.
Referencias
Abdalla Abdelkarim, Y. (2024). Introduction to cyber jurisprudence. SSRN, 8. https://dx.doi.org/10.2139/ssrn.4929165
Adonis, A. A. (2020). International law on cyber security in the age of digital sovereignty. E-International Relations, 5, 1-5.
Amelin, O. Yu., Kyrychenko, T. M., Leonov, B. D., Shablystyi, V. V., & Chenshova, N. V. (2021). Cyberbullying as a way of causing suicide in the digital age. Journal of the National Academy of Legal Sciences of Ukraine, 28(3), 277-289. https://doi.org/10.37635/jnalsu.28(3).2021.277-289
Bakhramova, M., Ekaterina, K., Khazratkulov, O., & Rustam, R. (2023). Legal services 4.0: Digital transformation for increased fairness and efficiency. International Journal of Cyber Law, 1(4), 111-116. https://doi.org/10.59022/ijcl.48
Bocheliuk, V. I., Nechyporenko, V. V., Dergach, M. A., Pozdniakova-Kyrbiatieva, E. G., & Panov, N. S. (2019). Management of professional readaptation in terms of the modern Ukrainian society. Astra Salvensis, 1, 539-552. https://repository.khnnra.edu.ua/scientific-texts/management-of-professional-readaptation-in-terms-of-the-modern-ukrainian-society/
Corne, T. C. (2020). Legal protection of privacy data through encryption technology. Lampung Journal of International Law, 1(2), 63-70. https://doi.org/10.25041/lajil.v1i2.2027
Council of Europe. (2024). Convention on Cybercrime (Budapest Convention, ETS No. 185) and Its Protocols. https://www.coe.int/en/web/cybercrime/the-budapest-convention
Gafni, R., Aviv, I., & Haim, D. (2024). Multi-Party Secured Collaboration Architecture from Cloud to Edge. Journal of Computer Information Systems, 64(5), 698-709. https://doi.org/10.1080/08874417.2023.2248921
General Data Protection Regulation. (2024). https://gdpr-info.eu/
Ginters, E., Aizstrauts, A., & Chinea, R. M. A. (2014). Sociotechnical aspects of policy simulation. In: Handbook of Research on Advanced ICT Integration for Governance and Policy Modeling (pp. 113-128). Hershey: IGI Global. https://doi.org/10.4018/978-1-4666-6236-0.ch007
Gonzalez, O. (2017). Cracks in the armor: Legal approaches to encryption. Journal Of Law, Technology & Policy, 2019(1), 1-48.
Gupta, B. B., Dahiya, A., Upneja, C., Garg, A., & Choudhary, R. (2020). A comprehensive survey on DDoS attacks and recent defense mechanisms. In: B. B. Gupta, S. Srinivasagopalan (Eds.), Handbook of Research on Intrusion Detection Systems (pp. 186-218). Hershey: IGI Global. https://doi.org/10.4018/978-1-7998-2242-4.ch010
Haciyeva, A. (2021). Personal data, their protection and legislation of the republic of Azerbaijan and the European union in this area. Law of Ukraine, 12, 251-262.
Iklassova, K., Aitymova, A., Kopnova, O., Shaporeva, A., Abildinova, G., Nurbekova, Z., Almagambetova, L., Gorokhov, A., & Aitymov, Z. (2024). Ontology modeling for automation of questionnaire data processing. Eastern-European Journal of Enterprise Technologies, 5(2-131), 36-52. https://doi.org/10.15587/1729-4061.2024.314129
Islam, M. T., & Huda, N. (2019). Material flow analysis (MFA) as a strategic tool in E-waste management: Applications, trends and future directions. Journal of Environmental Management, 244, 344-361. https://doi.org/10.1016/j.jenvman.2019.05.062
Karovska Andonovska, B., & Taneski, N. (2020). Legal aspects of security in cyberspace. Security Dialogues, 11(1), 99-110.
Kerimkhulle, S., Dildebayeva, Z., Tokhmetov, A., Amirova, A., Tussupov, J., Makhazhanova, U., Adalbek, A., Taberkhan, R., Zakirova, A., & Salykbayeva, A. (2023). Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things. Symmetry, 15(10), 1958. https://doi.org/10.3390/sym15101958
Khomyshyn, I., Ortynska, N., Skochylias-Pavliv, O., Andrusiak, I., & Rym, O. (2022). The main systemic engineering problems of using computer and digital technologies in legal activities in the context of ensuring security. International Journal of Safety and Security Engineering, 12(5), 597-602. https://doi.org/10.18280/ijsse.120507
Larry, C. (2021). Massive data leaks in Albania highlight national cybersecurity shortcomings. https://theowp.org/massive-data-leaks-in-albania-highlight-national-cybersecurity-shortcomings/
Lopes, I. M., Guarda, T., & Oliveira, P. (2019). Implementation of ISO 27001 standards as GDPR compliance facilitator. Journal of Information Systems Engineering & Management, 4(2), em0089. https://doi.org/10.29333/jisem/5888
Manko, D., Zghama, A., Atamanova, N., Arabadzhy, N., & Ustinov, D. (2023). Legal regulation of the digital environment: Digitization of the state-legal and law enforcement sphere. Amazonia Investiga, 12(70), 125-133. https://doi.org/10.34069/AI/2023.70.10.11
Nechyporenko, V. V., Bocheliuk, V. I., Pozdniakova-Kyrbiatieva, E. G., Pozdniakova, O. L., & Panov, N. S. (2019). Value foundation of the behavior of managers of different administrative levels: Comparative analysis. Espacios, 40(34), 17. https://www.revistaespacios.com/a19v40n34/19403417.html
Nurbatyrova, R., Japarov, B., Apakhayev, N., Abdulaziz, B., & Khushkeldiyeva, S. (2024). Digital Transformation of Archives in the Context of the Introduction of an Electronic Document Management System in Kazakhstan. Preservation, Digital Technology and Culture, 53(3), 147-155. https://doi.org/10.1515/pdtc-2024-0017
Ofori, A. Y., & Akoto, D. (2020). Digital forensics investigation jurisprudence: Issues of admissibility of digital evidence. Journal of Forensic, Legal & Investigative Sciences, 6, 045. https://doi.org/10.24966/flis-733x/100045
Pandey, S., Singh, R. K., Gunasekaran, A., & Kaushik, A. (2020). Cyber security risks in globalized supply chains: Conceptual framework. Journal of Global Operations and Strategic Sourcing, 13(1), 103-128. https://doi.org/10.1108/JGOSS-05-2019-0042
Pyrohovska, V., Rezvorovych, K., Pavlichenko, I., Sushytska, Y., & Ostashova, V. (2024). Human rights protection in the context of information technology development: Problems and future prospects. Futurity Economics & Law, 4(1), 38-51. https://doi.org/10.57125/FEL.2024.03.25.03
Rajabova, A. (2024). Navigating legal data privacy risks in real estate transactions: Safeguarding client data through robust data protection measures. Web of Semantics: Journal of Interdisciplinary Science, 2(7), 154-162.
Ramadhan, N., & Rose, U. (2022). Adapting ISO/IEC 27001 information security management standard to SMEs. Luleå: Luleå University of Technology.
Rossner, M., & Tait, D. (2023). Presence and participation in a virtual court. Criminology & Criminal Justice, 23(1), 135-157. https://doi.org/10.1177/17488958211017372
Sidorenko, E. L., & von Arx, P. (2020). Transformation of law in the context of digitalization: Defining the correct priorities. Digital Law Journal, 1(1), 24-28. https://doi.org/10.38044/DLJ-2020-1-1-24-38
Sinha, A. R., Singla, K., & Victor, T. M. M. (2023). Artificial intelligence and machine learning for cybersecurity applications and challenges. In: R. Kumar, P. K. Pattnaik (Eds.), Risk Detection and Cyber Security for the Success of Contemporary Computing (pp. 109-146). Hershey: IGI Global. https://doi.org/10.4018/978-1-6684-9317-5.ch007
Sohal, K. S., & Gupta, A. (2020). Cloud computing technology and its adoption in law firms. Amity Journal of Energy & Environment Studies, 6(1), 14-19.
Spytska, L. (2024). Practice-based methods of bringing to legal liability for anonymous defamation on the Internet and in the media. Social and Legal Studios, 7(1), 202-209. https://doi.org/10.32518/sals1.2024.202
Sultanbayeva, G. S., Тurdubaeva, Е. O., Lozhnikova, O. P., & Tastemirova, G. A. (2023). Developing a platform for cross-border investigative journalism in Central Asia. Herald of Journalism, 68(2), 72-81. https://doi.org/10.26577/HJ.2023.v68.i2.07
Susskind, R. (2023). Tomorrow’s lawyers: An introduction to your future. Oxford: Oxford University Press.
Talesh, S. A., & Cunningham, B. (2021). The technologization of insurance: An empirical analysis of big data an artificial intelligence’s impact on cybersecurity and privacy. Utah Law Review, 2021(5), 967-1027. https://doi.org/10.26054/0d-9y6k-1t55
Teichmann, F. M., & Boticiu, S. R. (2024). Phishing attacks: Risks and challenges for law firms. International Cybersecurity Law Review, 5, 615–622. https://doi.org/10.1365/s43439-024-00110-8
Teichmann, F. M., & Wittmann, C. (2023). When is a law firm liable for a data breach? An exploration into the legal liability of ransomware and cybersecurity. Journal of Financial Crime, 30(6), 1491-1498. https://doi.org/10.1108/JFC-04-2022-0093
Tkachenko, O., Goncharov, V., & Jatkiewicz, P. (2024). Enhancing Front-End Security: Protecting User Data and Privacy in Web Applications. Computer Animation and Virtual Worlds, 35(6), e70003. https://doi.org/10.1002/cav.70003
Veasey, E. N. (2019). Protection of client confidential information from cyberattacks is a compelling business and ethical priority for inside and outside corporate counsel. Business Lawyer, 75(1), 1495-1518.
Vilks, A., Kipane, A., & Krivins, A. (2024). Preventing international threats in the context of improving the legal framework for national and regional security. Social and Legal Studios, 7(1), 97-105. https://doi.org/10.32518/sals1.2024.97
Widespread cyberattack blocks government and public websites in Albania. (2022). https://www.euronews.com/2022/07/18/widespread-cyberattack-blocks-government-and-public-websites-in-albania
Descargas
Publicado
Número
Sección
Licencia
Derechos de autor 2025 Law, State and Telecommunications Review

Esta obra está bajo una licencia internacional Creative Commons Atribución 4.0.
Al enviar este documento a la Revista de Derecho, Estado y Telecomunicaciones,
declaro que estoy aceptando los términos de Creative Commons Attribution 4.0 International (CC BY 4.0)
