Problems and Prospects of Digitalisation in the Field of Jurisprudence to Ensure Cyber Protection of Information

Autores

DOI:

https://doi.org/10.26512/lstr.v17i2.56248

Palavras-chave:

Virtual Consultations. DDoS Attacks. Quantum Encryption. Cybersecurity. Control Systems. Automation.

Resumo

[Purpose] The purpose of the study is to examine the impact of digitalisation on the field of jurisprudence with a special focus on ensuring cyber protection of information.

[Methodology/approach/design] The study methodology includes the analysis of cyber threats for law firms, such as phishing and distributed denial of service (DDoS) attacks, an assessment of international cybersecurity standards (Budapest Convention, ISO/IEC 27001), and the use of modern security technologies (encryption, multi-factor authentication).

[Findings] Employee training programmes and the possibilities of using artificial intelligence and machine learning to automate data protection were examined. Electronic platforms simplify the exchange of documents and increase the transparency of interactions due to the session recording function. The legal field is facing acute cybersecurity problems due to the processing of confidential information. The main types of cyber-attacks faced by law firms include phishing, ransomware, and DDoS attacks. Each of these attacks can have serious consequences for data security, the reputation of companies, and their ability to provide legal services.

[Practical implications] The research underscores the critical need for law firms to implement robust cybersecurity measures, including compliance with international standards and regular employee training, to protect sensitive information and maintain client trust. This shift not only enhances operational efficiency and compliance but also positions firms competitively in a digitally-driven market, ultimately impacting client access to legal services and the overall landscape of legal practice.

[Originality/value] The development of specialised software for the legal field has opened up new opportunities to improve the efficiency and protection of information, ensuring compliance with legislation and integration with external systems.

Biografia do Autor

  • Henris Balliu, University of Tirana

    Lecturer at the Department of Public Law, University of Tirana, 1010, 4 Mother Teresa Str., Tirana, Albania. E-mail: balliuhenris@gmail.com.  

  • Erisa Xhixho, University of Tirana

    Full Doctor, Researcher at the Department of Public Law, University of Tirana, 1010, 4 Mother Teresa Str., Tirana, Albania. E-mail: erisaxhixho@outlook.com.

  • Nazira Abdukarimova, Jusup Balasagyn Kyrgyz National University

    Full Doctor, Professor at the Faculty of Law, Jusup Balasagyn Kyrgyz National University, 720033, 547 Frunze Str., Bishkek, Kyrgyz Republic. E-mail: abdukarim_na@hotmail.com.

  • Nazgul Adylova, Jusup Balasagyn Kyrgyz National University

    PhD, Associate Professor at the Faculty of Law, Jusup Balasagyn Kyrgyz National University, 720033, 547 Frunze Str., Bishkek, Kyrgyz Republic. E-mail: n.adylova@outlook.com.

  • Nail Abbasov, Baku Business University

    PhD, Researcher at the Department of Humanitarian Sciences, Baku Business University, AZ1122, 88A H. Zardabi Str., Baku, Azerbaijan. E-mail: nail-abbasov@hotmail.com.

Referências

Abdalla Abdelkarim, Y. (2024). Introduction to cyber jurisprudence. SSRN, 8. https://dx.doi.org/10.2139/ssrn.4929165

Adonis, A. A. (2020). International law on cyber security in the age of digital sovereignty. E-International Relations, 5, 1-5.

Amelin, O. Yu., Kyrychenko, T. M., Leonov, B. D., Shablystyi, V. V., & Chenshova, N. V. (2021). Cyberbullying as a way of causing suicide in the digital age. Journal of the National Academy of Legal Sciences of Ukraine, 28(3), 277-289. https://doi.org/10.37635/jnalsu.28(3).2021.277-289

Bakhramova, M., Ekaterina, K., Khazratkulov, O., & Rustam, R. (2023). Legal services 4.0: Digital transformation for increased fairness and efficiency. International Journal of Cyber Law, 1(4), 111-116. https://doi.org/10.59022/ijcl.48

Bocheliuk, V. I., Nechyporenko, V. V., Dergach, M. A., Pozdniakova-Kyrbiatieva, E. G., & Panov, N. S. (2019). Management of professional readaptation in terms of the modern Ukrainian society. Astra Salvensis, 1, 539-552. https://repository.khnnra.edu.ua/scientific-texts/management-of-professional-readaptation-in-terms-of-the-modern-ukrainian-society/

Corne, T. C. (2020). Legal protection of privacy data through encryption technology. Lampung Journal of International Law, 1(2), 63-70. https://doi.org/10.25041/lajil.v1i2.2027

Council of Europe. (2024). Convention on Cybercrime (Budapest Convention, ETS No. 185) and Its Protocols. https://www.coe.int/en/web/cybercrime/the-budapest-convention

Gafni, R., Aviv, I., & Haim, D. (2024). Multi-Party Secured Collaboration Architecture from Cloud to Edge. Journal of Computer Information Systems, 64(5), 698-709. https://doi.org/10.1080/08874417.2023.2248921

General Data Protection Regulation. (2024). https://gdpr-info.eu/

Ginters, E., Aizstrauts, A., & Chinea, R. M. A. (2014). Sociotechnical aspects of policy simulation. In: Handbook of Research on Advanced ICT Integration for Governance and Policy Modeling (pp. 113-128). Hershey: IGI Global. https://doi.org/10.4018/978-1-4666-6236-0.ch007

Gonzalez, O. (2017). Cracks in the armor: Legal approaches to encryption. Journal Of Law, Technology & Policy, 2019(1), 1-48.

Gupta, B. B., Dahiya, A., Upneja, C., Garg, A., & Choudhary, R. (2020). A comprehensive survey on DDoS attacks and recent defense mechanisms. In: B. B. Gupta, S. Srinivasagopalan (Eds.), Handbook of Research on Intrusion Detection Systems (pp. 186-218). Hershey: IGI Global. https://doi.org/10.4018/978-1-7998-2242-4.ch010

Haciyeva, A. (2021). Personal data, their protection and legislation of the republic of Azerbaijan and the European union in this area. Law of Ukraine, 12, 251-262.

Iklassova, K., Aitymova, A., Kopnova, O., Shaporeva, A., Abildinova, G., Nurbekova, Z., Almagambetova, L., Gorokhov, A., & Aitymov, Z. (2024). Ontology modeling for automation of questionnaire data processing. Eastern-European Journal of Enterprise Technologies, 5(2-131), 36-52. https://doi.org/10.15587/1729-4061.2024.314129

Islam, M. T., & Huda, N. (2019). Material flow analysis (MFA) as a strategic tool in E-waste management: Applications, trends and future directions. Journal of Environmental Management, 244, 344-361. https://doi.org/10.1016/j.jenvman.2019.05.062

Karovska Andonovska, B., & Taneski, N. (2020). Legal aspects of security in cyberspace. Security Dialogues, 11(1), 99-110.

Kerimkhulle, S., Dildebayeva, Z., Tokhmetov, A., Amirova, A., Tussupov, J., Makhazhanova, U., Adalbek, A., Taberkhan, R., Zakirova, A., & Salykbayeva, A. (2023). Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things. Symmetry, 15(10), 1958. https://doi.org/10.3390/sym15101958

Khomyshyn, I., Ortynska, N., Skochylias-Pavliv, O., Andrusiak, I., & Rym, O. (2022). The main systemic engineering problems of using computer and digital technologies in legal activities in the context of ensuring security. International Journal of Safety and Security Engineering, 12(5), 597-602. https://doi.org/10.18280/ijsse.120507

Larry, C. (2021). Massive data leaks in Albania highlight national cybersecurity shortcomings. https://theowp.org/massive-data-leaks-in-albania-highlight-national-cybersecurity-shortcomings/

Lopes, I. M., Guarda, T., & Oliveira, P. (2019). Implementation of ISO 27001 standards as GDPR compliance facilitator. Journal of Information Systems Engineering & Management, 4(2), em0089. https://doi.org/10.29333/jisem/5888

Manko, D., Zghama, A., Atamanova, N., Arabadzhy, N., & Ustinov, D. (2023). Legal regulation of the digital environment: Digitization of the state-legal and law enforcement sphere. Amazonia Investiga, 12(70), 125-133. https://doi.org/10.34069/AI/2023.70.10.11

Nechyporenko, V. V., Bocheliuk, V. I., Pozdniakova-Kyrbiatieva, E. G., Pozdniakova, O. L., & Panov, N. S. (2019). Value foundation of the behavior of managers of different administrative levels: Comparative analysis. Espacios, 40(34), 17. https://www.revistaespacios.com/a19v40n34/19403417.html

Nurbatyrova, R., Japarov, B., Apakhayev, N., Abdulaziz, B., & Khushkeldiyeva, S. (2024). Digital Transformation of Archives in the Context of the Introduction of an Electronic Document Management System in Kazakhstan. Preservation, Digital Technology and Culture, 53(3), 147-155. https://doi.org/10.1515/pdtc-2024-0017

Ofori, A. Y., & Akoto, D. (2020). Digital forensics investigation jurisprudence: Issues of admissibility of digital evidence. Journal of Forensic, Legal & Investigative Sciences, 6, 045. https://doi.org/10.24966/flis-733x/100045

Pandey, S., Singh, R. K., Gunasekaran, A., & Kaushik, A. (2020). Cyber security risks in globalized supply chains: Conceptual framework. Journal of Global Operations and Strategic Sourcing, 13(1), 103-128. https://doi.org/10.1108/JGOSS-05-2019-0042

Pyrohovska, V., Rezvorovych, K., Pavlichenko, I., Sushytska, Y., & Ostashova, V. (2024). Human rights protection in the context of information technology development: Problems and future prospects. Futurity Economics & Law, 4(1), 38-51. https://doi.org/10.57125/FEL.2024.03.25.03

Rajabova, A. (2024). Navigating legal data privacy risks in real estate transactions: Safeguarding client data through robust data protection measures. Web of Semantics: Journal of Interdisciplinary Science, 2(7), 154-162.

Ramadhan, N., & Rose, U. (2022). Adapting ISO/IEC 27001 information security management standard to SMEs. Luleå: Luleå University of Technology.

Rossner, M., & Tait, D. (2023). Presence and participation in a virtual court. Criminology & Criminal Justice, 23(1), 135-157. https://doi.org/10.1177/17488958211017372

Sidorenko, E. L., & von Arx, P. (2020). Transformation of law in the context of digitalization: Defining the correct priorities. Digital Law Journal, 1(1), 24-28. https://doi.org/10.38044/DLJ-2020-1-1-24-38

Sinha, A. R., Singla, K., & Victor, T. M. M. (2023). Artificial intelligence and machine learning for cybersecurity applications and challenges. In: R. Kumar, P. K. Pattnaik (Eds.), Risk Detection and Cyber Security for the Success of Contemporary Computing (pp. 109-146). Hershey: IGI Global. https://doi.org/10.4018/978-1-6684-9317-5.ch007

Sohal, K. S., & Gupta, A. (2020). Cloud computing technology and its adoption in law firms. Amity Journal of Energy & Environment Studies, 6(1), 14-19.

Spytska, L. (2024). Practice-based methods of bringing to legal liability for anonymous defamation on the Internet and in the media. Social and Legal Studios, 7(1), 202-209. https://doi.org/10.32518/sals1.2024.202

Sultanbayeva, G. S., Тurdubaeva, Е. O., Lozhnikova, O. P., & Tastemirova, G. A. (2023). Developing a platform for cross-border investigative journalism in Central Asia. Herald of Journalism, 68(2), 72-81. https://doi.org/10.26577/HJ.2023.v68.i2.07

Susskind, R. (2023). Tomorrow’s lawyers: An introduction to your future. Oxford: Oxford University Press.

Talesh, S. A., & Cunningham, B. (2021). The technologization of insurance: An empirical analysis of big data an artificial intelligence’s impact on cybersecurity and privacy. Utah Law Review, 2021(5), 967-1027. https://doi.org/10.26054/0d-9y6k-1t55

Teichmann, F. M., & Boticiu, S. R. (2024). Phishing attacks: Risks and challenges for law firms. International Cybersecurity Law Review, 5, 615–622. https://doi.org/10.1365/s43439-024-00110-8

Teichmann, F. M., & Wittmann, C. (2023). When is a law firm liable for a data breach? An exploration into the legal liability of ransomware and cybersecurity. Journal of Financial Crime, 30(6), 1491-1498. https://doi.org/10.1108/JFC-04-2022-0093

Tkachenko, O., Goncharov, V., & Jatkiewicz, P. (2024). Enhancing Front-End Security: Protecting User Data and Privacy in Web Applications. Computer Animation and Virtual Worlds, 35(6), e70003. https://doi.org/10.1002/cav.70003

Veasey, E. N. (2019). Protection of client confidential information from cyberattacks is a compelling business and ethical priority for inside and outside corporate counsel. Business Lawyer, 75(1), 1495-1518.

Vilks, A., Kipane, A., & Krivins, A. (2024). Preventing international threats in the context of improving the legal framework for national and regional security. Social and Legal Studios, 7(1), 97-105. https://doi.org/10.32518/sals1.2024.97

Widespread cyberattack blocks government and public websites in Albania. (2022). https://www.euronews.com/2022/07/18/widespread-cyberattack-blocks-government-and-public-websites-in-albania

Downloads

Publicado

2025-10-01