Judul | : | “The Legal Challenges of Data Privacy Laws, Cybersecurity Regulations, and AI Accountability in the Digital Era”, JOIN: Journal of Social Science, Pages :656–668. Indexed Copernicus. | |||
Abstrak | : | This study examines the legal challenges associated with data privacy laws, cybersecurity regulations, and AI accountability in the digital era. The primary objective is to qualitatively analyze the literature to understand the complexities and implications of these legal frameworks in the context of rapidly advancing digital technologies. The research employs a qualitative literature review methodology, synthesizing findings from academic articles, legal texts, regulatory documents, and case studies to provide a comprehensive overview of the current state of knowledge in this area.The literature review methodology involves systematically collecting and analyzing scholarly sources that discuss various aspects of data privacy laws, cybersecurity regulations, and AI accountability. The study categorizes the literature into key themes, such as the effectiveness of existing data privacy laws, the evolving nature of cybersecurity threats and the adequacy of regulatory responses, and the challenges of establishing accountability in AI systems. Thematic analysis is used to identify patterns and trends in how these legal frameworks interact and their impact on individuals, organizations, and society.The findings reveal that current data privacy laws often struggle to keep pace with technological advancements, leading to gaps in protection and enforcement. Cybersecurity regulations face similar challenges, with emerging threats outpacing regulatory measures. The issue of AI accountability is particularly complex, as traditional legal concepts of liability and responsibility are difficult to apply to autonomous systems. Case studies highlight instances where these legal challenges have resulted in significant data breaches, privacy violations, and ethical dilemmas. 668Keywords:Legal Challenges, Data Privacy Laws, Cybersecurity Regulations, AI Accountability, Digital Era |
|||
Tahun | : | 2024 | Media Publikasi | : | Jurnal Internasional |
Kategori | : | Jurnal | No/Vol/Tahun | : | 4 / 1 / 2024 |
ISSN/ISBN | : | 2996-2390 | |||
PTN/S | : | Universitas Pakuan | Program Studi | : | ILMU HUKUM |
Bibliography | : | ReferencesBada, M., Creese, S., & Nurse, J. R. C. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour?. arXiv preprint arXiv:1901.02672.Binns, R. (2018). Fairness in machine learning: Lessons from political philosophy. Proceedings of the 2018 Conference on Fairness, Accountability, and Transparency, 149-159.Burrell, J. (2016). How the machine 'thinks': Understanding opacity in machine learning algorithms. Big Data & Society, 3(1), 2053951715622512.Calo, R. (2017). Artificial intelligence policy: A primer and roadmap. U.C. Davis Law Review, 51, 399-435.Crawford, K., & Calo, R. (2016). There is a blind spot in AI research. Nature, 538(7625), 311-313.ENISA. (2019). ENISA Threat Landscape Report 2018. European Union Agency for Cybersecurity.European Commission. (2019). Ethics Guidelines for Trustworthy AI. High-Level Expert Group on Artificial Intelligence.FBI. (2021). Colonial Pipeline ransomware attack. Federal Bureau of Investigation. Retrieved from https://www.fbi.gov/investigate/cyberFriedman, A., & Singer, P. W. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.Friedman, G. (2020). Cyber threats to critical infrastructure: An overview. Cybersecurity Review, 45(3), 33-40.Greenleaf, G. (2018). Global data privacy laws 2017: 120 national data privacy laws, including Indonesia and Turkey. Privacy Laws & Business International Report, 145, 10-13.Hadnagy, C. (2018). Social engineering: The science of human hacking. Wiley.Hodge, M. (2020). The impact of AI on cybersecurity. Journal of Cyber Security Technology, 4(2), 71-85.Kaspersky. (2021). Ransomware: An overview. Kaspersky Lab. Retrieved from https://www.kaspersky.comKoops, B. J. (2020). The trouble with European data protection law. International Data Privacy Law, 10(4), 240-248. 668Kuner, C. (2019). The Internet and the global reach of EU law. In C. Kuner, L. A. Bygrave, & C. Docksey (Eds.), The EU General Data Protection Regulation (GDPR): A Commentary (pp. 1-25). Oxford University Press.Mantzarlis, A. (2018). The GDPR's clash with the blockchain. Computer Law & Security Review, 34(6), 1256-1262.Ragan, S. (2021). The rise of ransomware-as-a-service. Security Weekly. Retrieved from https://securityweekly.comSadeghi, A., & Wachsmann, C. (2019). Security and privacy issues in the Internet of Things. IEEE Access, 7, 46214-46225.Suo, H., Wan, J., & Zhou, J. (2019). A survey of Internet of Things security. IEEE Communications Surveys & Tutorials, 21(1), 121-145.Symantec. (2019). Internet Security Threat Report. Symantec Corporation.Tene, O., & Polonetsky, J. (2012). Privacy in the age of big data: A time for big decisions. Stanford Law Review Online, 64, 63-69.Veale, M., & Binns, R. (2017). Fairer machine learning in the real world: Mitigating discrimination without collecting sensitive data. Big Data & Society, 4(2), 2053951717743530.Voigt, P., & Von dem Bussche, A. (2017). The EU General Data Protection Regulation (GDPR): A Practical Guide. Springer International Publishing.Zetter, K. (2019). The rise of zero-day exploits. Wired. Retrieved from https://www.wired.comZetzsche, D. A., Buckley, R. P., Arner, D. W., & Barberis, J. N. (2017). Regulating a revolution: From regulatory sandboxes to smart regulation. Fordham Journal of Corporate & Financial Law, 23(1), 31-103. |
|||
URL | : | https://ejournal.mellbaou.com/index.php/join/article/view/65 |