首页 > 最新文献

Masaryk University Journal of Law and Technology最新文献

英文 中文
Plea of Necessity: Legal Key to Protection against Unattributable Cyber Operations 必要性抗辩:防范不可归因网络操作的法律关键
Pub Date : 2022-09-30 DOI: 10.5817/mujlt2022-2-4
Jakub Spáčil
Cyber operations represent one of the main security threats today. The number of cyber operations attacking critical infrastructure is increasing year by year and states are looking for means to defend against this threat. However, the origin of hostile cyber operations is often located in the territory of another state, and attacked states must therefore grapple with the question of international law in their search for an effective defence mechanism. If states wish to defend themselves actively, the sovereignty of another state may be infringed, and such an infringement must be justified by an instrument of international law. These instruments of international law are retorsion, countermeasures, self-defence and plea of necessity. Application of plea of necessity, unlike the other alternatives mentioned, is not premised on the attributability of the cyber operation to the state, and it is precisely the attribution of cyber operation that poses one of the main problems of taking legal defensive measures. The article is divided into two parts. The first part is devoted to the relationship between retorsion, countermeasures, self-defence and plea of necessity. The second part discusses the conditions for the application of plea of necessity in the cyber context. The text takes into account the available state practice, in particular the national positions on the application of plea of necessity in the cyber context published in the last three years.
网络行动是当今主要的安全威胁之一。攻击关键基础设施的网络行动数量逐年增加,各国都在寻找防御这种威胁的手段。然而,敌对网络行动的起源往往位于另一个国家的领土上,因此,受攻击的国家在寻求有效的防御机制时必须努力解决国际法问题。如果一个国家希望积极保护自己,那么另一个国家的主权就可能受到侵犯,而这种侵犯必须得到国际法文书的证明。这些国际法文书是反击、反措施、自卫和必要抗辩。与上述两种抗辩方式不同的是,必要抗辩的适用并不以网络行为的国家归属为前提,而网络行为的国家归属正是构成采取法律防卫措施的主要问题之一。本文分为两部分。第一部分论述了反击、反制、自卫与正当防卫的关系。第二部分论述了网络环境下必要抗辩适用的条件。案文考虑了现有的国家实践,特别是过去三年公布的关于在网络环境下适用必要性抗辩的国家立场。
{"title":"Plea of Necessity: Legal Key to Protection against Unattributable Cyber Operations","authors":"Jakub Spáčil","doi":"10.5817/mujlt2022-2-4","DOIUrl":"https://doi.org/10.5817/mujlt2022-2-4","url":null,"abstract":"Cyber operations represent one of the main security threats today. The number of cyber operations attacking critical infrastructure is increasing year by year and states are looking for means to defend against this threat. However, the origin of hostile cyber operations is often located in the territory of another state, and attacked states must therefore grapple with the question of international law in their search for an effective defence mechanism. If states wish to defend themselves actively, the sovereignty of another state may be infringed, and such an infringement must be justified by an instrument of international law. These instruments of international law are retorsion, countermeasures, self-defence and plea of necessity. Application of plea of necessity, unlike the other alternatives mentioned, is not premised on the attributability of the cyber operation to the state, and it is precisely the attribution of cyber operation that poses one of the main problems of taking legal defensive measures. The article is divided into two parts. The first part is devoted to the relationship between retorsion, countermeasures, self-defence and plea of necessity. The second part discusses the conditions for the application of plea of necessity in the cyber context. The text takes into account the available state practice, in particular the national positions on the application of plea of necessity in the cyber context published in the last three years.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45152337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International Jurisdiction in Cross-Border Infringement of Personality Rights 跨国人格权侵权的国际管辖权
Pub Date : 2022-09-30 DOI: 10.5817/mujlt2022-2-1
A. Gonçalves
The legal provision applicable to determine the jurisdiction to decide claims regarding the cross-border infringement of personality rights is Article 7, Section 2, of Regulation (EU) No 1215/2012 on jurisdiction and the recognition and enforcement of judgments in civil and commercial matters (Brussels Ia). Article 7, Section 2, gives jurisdiction in non-contractual matters to the court of the place where the harmful event occurred or may occur. Called to interpret the concept of place where the harmful event occurred, the ECJ was forced to make an interpretative effort in case of online infringement of personality rights. It was so, because the information that is placed online can be accessed in any country. The offenses that occur on the Internet can have a global reach and cause damage with greater geographical extension and repercussions in the legal sphere of the victim, especially due to the geographical wide location of its users. The aim of this study is to highlight the latest trends of the Court of Justice of the European Union regarding this topic. 
适用于确定跨境人格权侵权索赔管辖权的法律规定是关于民商事管辖权以及判决的承认和执行的法规(EU) No 1215/2012第7条第2款(Brussels Ia)。《合同法》第七条第二款规定,非合同事项由损害事件发生地或者可能发生地的法院管辖。为了解释有害事件发生地的概念,欧洲法院不得不在网络侵害人格权案件中做出解释。之所以如此,是因为放在网上的信息在任何国家都可以访问。发生在互联网上的违法行为可以影响全球,造成损害,在受害者的法律领域具有更大的地域延伸和影响,特别是由于其用户的地理位置广泛。本研究的目的是强调欧洲联盟法院在这一专题方面的最新趋势。
{"title":"International Jurisdiction in Cross-Border Infringement of Personality Rights","authors":"A. Gonçalves","doi":"10.5817/mujlt2022-2-1","DOIUrl":"https://doi.org/10.5817/mujlt2022-2-1","url":null,"abstract":"The legal provision applicable to determine the jurisdiction to decide claims regarding the cross-border infringement of personality rights is Article 7, Section 2, of Regulation (EU) No 1215/2012 on jurisdiction and the recognition and enforcement of judgments in civil and commercial matters (Brussels Ia). Article 7, Section 2, gives jurisdiction in non-contractual matters to the court of the place where the harmful event occurred or may occur. Called to interpret the concept of place where the harmful event occurred, the ECJ was forced to make an interpretative effort in case of online infringement of personality rights. It was so, because the information that is placed online can be accessed in any country. The offenses that occur on the Internet can have a global reach and cause damage with greater geographical extension and repercussions in the legal sphere of the victim, especially due to the geographical wide location of its users. The aim of this study is to highlight the latest trends of the Court of Justice of the European Union regarding this topic. ","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48512818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Protection has Entered the Chat: Analysis of GDPR Fines 数据保护已进入聊天室:GDPR罚款分析
Pub Date : 2022-09-30 DOI: 10.5817/mujlt2022-2-3
N. Mike
Before the adoption of the EU-GDPR, researchers remarkably argued on law enforcement of personal data protection being „toothless” and a “paper tiger”. Almost three years after its enforcement date, the GDPR fines are increasing, and the world is beginning to witness the effect of sizeable fines awarded to organizations. This analysis aims to discover potential correlations between GDPR fines, and equally the lack of them. Such correlations might help to tap into trends that are followed by Data Protection Authorities (DPA) in their fining practices. This paper specifically describes the fines issued by the Romanian DPA, while also containing qualitative research findings extracted from discussions with interview subjects. The aim of this paper is to evaluate the possibility to construct a prediction model that is based on linear regression analysis and provide for future direction on the field of legal data analysis.
在采用EU-GDPR之前,研究人员就个人数据保护的执法是“无牙的”和“纸老虎”进行了显著的争论。《通用数据保护条例》实施近三年后,罚款不断增加,全世界开始看到对组织处以巨额罚款的影响。该分析旨在发现GDPR罚款之间的潜在相关性,以及罚款的缺乏。这种相关性可能有助于挖掘数据保护局(DPA)在罚款实践中遵循的趋势。本文具体描述了罗马尼亚国防部开出的罚单,同时也包含了从与访谈对象的讨论中提取的定性研究结果。本文的目的是评估构建基于线性回归分析的预测模型的可能性,并为法律数据分析领域的未来方向提供指导。
{"title":"Data Protection has Entered the Chat: Analysis of GDPR Fines","authors":"N. Mike","doi":"10.5817/mujlt2022-2-3","DOIUrl":"https://doi.org/10.5817/mujlt2022-2-3","url":null,"abstract":"Before the adoption of the EU-GDPR, researchers remarkably argued on law enforcement of personal data protection being „toothless” and a “paper tiger”. Almost three years after its enforcement date, the GDPR fines are increasing, and the world is beginning to witness the effect of sizeable fines awarded to organizations. This analysis aims to discover potential correlations between GDPR fines, and equally the lack of them. Such correlations might help to tap into trends that are followed by Data Protection Authorities (DPA) in their fining practices. This paper specifically describes the fines issued by the Romanian DPA, while also containing qualitative research findings extracted from discussions with interview subjects. The aim of this paper is to evaluate the possibility to construct a prediction model that is based on linear regression analysis and provide for future direction on the field of legal data analysis.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42374401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dispute Resolution Mechanism for Smart Contracts 智能合约的争议解决机制
Pub Date : 2022-09-30 DOI: 10.5817/mujlt2022-2-2
M. Kasatkina
Disputes regarding smart contracts are inevitable, and parties will need means for dealing with smart contract issues. This article highlights the need for dispute resolution mechanisms for smart contracts. The author provides analysis of the possible mechanisms to solve disputes arising from smart contracts, namely dispute resolution by traditional arbitration institutions and blockchain arbitration. Article acknowledges the benefits and challenges of both mechanisms. In the light of this, the author concludes about instituting a hybrid approach aimed at resolving disputes that will not stymie efficiencies of smart contracts.
关于智能合约的争议是不可避免的,各方将需要处理智能合约问题的手段。本文强调了智能合约争端解决机制的必要性。作者分析了解决智能合约争议的可能机制,即传统仲裁机构的争议解决和区块链仲裁。文章承认这两种机制的好处和挑战。有鉴于此,作者得出结论,要制定一种混合方法,旨在解决不会阻碍智能合约效率的纠纷。
{"title":"Dispute Resolution Mechanism for Smart Contracts","authors":"M. Kasatkina","doi":"10.5817/mujlt2022-2-2","DOIUrl":"https://doi.org/10.5817/mujlt2022-2-2","url":null,"abstract":"Disputes regarding smart contracts are inevitable, and parties will need means for dealing with smart contract issues. This article highlights the need for dispute resolution mechanisms for smart contracts. The author provides analysis of the possible mechanisms to solve disputes arising from smart contracts, namely dispute resolution by traditional arbitration institutions and blockchain arbitration. Article acknowledges the benefits and challenges of both mechanisms. In the light of this, the author concludes about instituting a hybrid approach aimed at resolving disputes that will not stymie efficiencies of smart contracts.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41253565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Based Decisiona and Disappearance of Law 人工智能决策与法律的消失
Pub Date : 2022-09-30 DOI: 10.5817/mujlt2022-2-5
Y. Razmetaeva, N. Satokhina
Based on the philosophical anthropology of Paul Ricoeur, the article examines, using the example of AI-based decisions, how the concept of responsibility changes under the influence of artificial intelligence, what a reverse effect this conceptual shift has on our moral experience in general, and what consequences it has for law. The problem of AI-based decisions is said to illustrate the general trend of transformation of the concept of responsibility, which consists in replacing personal responsibility with a system of collective insurance against risks and disappearing of the capacity for responsibility from the structure of our experience, which, in turn, makes justice and law impossible.
本文以Paul Ricoeur的哲学人类学为基础,以人工智能为基础的决策为例,考察了责任概念在人工智能的影响下是如何变化的,这种概念转变对我们一般的道德经验产生了怎样的反向影响,以及它对法律产生了什么后果。据说,基于人工智能的决策问题说明了责任概念转变的总趋势,这包括用集体保险制度来取代个人责任,并从我们的经验结构中消失责任能力,这反过来又使正义和法律成为不可能。
{"title":"AI-Based Decisiona and Disappearance of Law","authors":"Y. Razmetaeva, N. Satokhina","doi":"10.5817/mujlt2022-2-5","DOIUrl":"https://doi.org/10.5817/mujlt2022-2-5","url":null,"abstract":"Based on the philosophical anthropology of Paul Ricoeur, the article examines, using the example of AI-based decisions, how the concept of responsibility changes under the influence of artificial intelligence, what a reverse effect this conceptual shift has on our moral experience in general, and what consequences it has for law. The problem of AI-based decisions is said to illustrate the general trend of transformation of the concept of responsibility, which consists in replacing personal responsibility with a system of collective insurance against risks and disappearing of the capacity for responsibility from the structure of our experience, which, in turn, makes justice and law impossible.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44082594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Right to Privacy and Protection of Personal Data: Emerging Trends and Implications for Development in Jurisprudence of European Court of Human Rights 隐私权与个人资料保护:欧洲人权法院法理学的新趋势与发展意涵
Pub Date : 2022-06-30 DOI: 10.5817/mujlt2022-1-2
Yuliia Kovalenko
The emergence of the right to personal data protection is usually considered in close proximity to the right to private life, however, the two rights despite the sufficient degree of similarity are not identical. The article analyses the main concepts and discussions around the protection of privacy and personal data protection, which primarily was only perceived as another facet of privacy, as well as provides a comprehensive overview of theoretical and practical problems associated with their protection. Provided for the right to data protection is not explicitly mentioned in the ECHR the main concern, therefore, is whether it receives an adequate level of protection within the Convention system. The article argues that given the lack of an explicit criterion for distinguishing the rights to privacy and data protection, it is the jurisprudence of the ECHR, which is of the utmost importance for the development of the right to personal data protection as a fundamental right. Due regard is given to the evolution of the fundamental approaches of the ECHR in this field. It is concluded that the effective enjoyment of the right to data protection, which is not specified in the text of the ECHR or its Protocols, undeniably relies on the ECHR’s interpretation of the key data protection standards enlisted in the Convention no. 108, as well as relevant EU legislation.
个人数据保护权的出现通常被认为是与私人生活权密切相关的,然而,这两项权利尽管有足够程度的相似性,但并不完全相同。本文分析了隐私保护和个人数据保护的主要概念和讨论,主要是将其视为隐私的另一个方面,并全面概述了与隐私保护相关的理论和实践问题。鉴于《欧洲人权公约》没有明确提到数据保护的权利,因此,主要关注的是它是否在《公约》体系内得到充分的保护。本文认为,鉴于缺乏明确的区分隐私权和数据保护权的标准,欧洲人权法院的判例对于个人数据保护权作为一项基本权利的发展至关重要。对《欧洲人权公约》在这一领域的基本方法的演变给予了适当的关注。结论是,数据保护权利的有效享有,在《欧洲人权公约》或其议定书的案文中没有具体规定,不可否认地依赖于欧洲人权公约对第5号公约中列出的关键数据保护标准的解释。以及相关的欧盟立法。
{"title":"The Right to Privacy and Protection of Personal Data: Emerging Trends and Implications for Development in Jurisprudence of European Court of Human Rights","authors":"Yuliia Kovalenko","doi":"10.5817/mujlt2022-1-2","DOIUrl":"https://doi.org/10.5817/mujlt2022-1-2","url":null,"abstract":"The emergence of the right to personal data protection is usually considered in close proximity to the right to private life, however, the two rights despite the sufficient degree of similarity are not identical. The article analyses the main concepts and discussions around the protection of privacy and personal data protection, which primarily was only perceived as another facet of privacy, as well as provides a comprehensive overview of theoretical and practical problems associated with their protection. Provided for the right to data protection is not explicitly mentioned in the ECHR the main concern, therefore, is whether it receives an adequate level of protection within the Convention system. The article argues that given the lack of an explicit criterion for distinguishing the rights to privacy and data protection, it is the jurisprudence of the ECHR, which is of the utmost importance for the development of the right to personal data protection as a fundamental right. Due regard is given to the evolution of the fundamental approaches of the ECHR in this field. It is concluded that the effective enjoyment of the right to data protection, which is not specified in the text of the ECHR or its Protocols, undeniably relies on the ECHR’s interpretation of the key data protection standards enlisted in the Convention no. 108, as well as relevant EU legislation.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43120743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Insurance of Cyber Risks in International Transport 国际运输网络风险保险
Pub Date : 2022-06-30 DOI: 10.5817/mujlt2022-1-1
Petr Dobiáš
The international transport of goods, passengers and luggage is recently facing the threat of cyberattacks. The article is focused on the analysis of the possible cyber risks in the field of the international transport and their management created by the international governmental and non-governmental organisations. The international regulation of the cybersecurity has only recommendatory character and will be subject to future development. That’s the reason why should carriers pay greater attention to all possible cyber security measures. As the instrument of the reduction and mitigation of cyber risks could be used cyber-insurance. The insurance companies are offering insurance cover mainlyon individual base corresponding to the extent of protection required by the policyholder.
国际货物、乘客和行李运输最近正面临网络攻击的威胁。本文着重分析了国际政府和非政府组织在国际运输领域可能产生的网络风险及其管理。网络安全的国际监管只有建议性,有待于未来的发展。这就是为什么运营商应该更加关注所有可能的网络安全措施的原因。作为减少和缓解网络风险的工具,可以使用网络保险。保险公司主要根据投保人要求的保护范围提供个人保险。
{"title":"Insurance of Cyber Risks in International Transport","authors":"Petr Dobiáš","doi":"10.5817/mujlt2022-1-1","DOIUrl":"https://doi.org/10.5817/mujlt2022-1-1","url":null,"abstract":"The international transport of goods, passengers and luggage is recently facing the threat of cyberattacks. The article is focused on the analysis of the possible cyber risks in the field of the international transport and their management created by the international governmental and non-governmental organisations. The international regulation of the cybersecurity has only recommendatory character and will be subject to future development. That’s the reason why should carriers pay greater attention to all possible cyber security measures. As the instrument of the reduction and mitigation of cyber risks could be used cyber-insurance. The insurance companies are offering insurance cover mainlyon individual base corresponding to the extent of protection required by the policyholder.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42918506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EU Common Position on International Law and Cyberspace 欧盟关于国际法和网络空间的共同立场
Pub Date : 2022-06-30 DOI: 10.5817/mujl2022-1-4
Anna-Maria Osula, Agnes Kasper, Aleksi Kajander
The discussion on international law applicable to cyber operations has shifted from asking whether international law applies to cyberspace to how it applies. Recently the European Union declared in its renewed cybersecurity strategy the ambition to develop common EU position on the application of international law in cyberspace. As part of a broader vision in striving for leadership on standards, norms and regulatory frameworks in cyberspace, the joint communication underlined the need for taking a more proactive stance in the discussions at the United Nations and other relevant international fora. However, less than half of the European Union Member States have issued a public statementon the interpretation of international law in cyberspace and hence, reaching a consensus on the interpretation of relevant concepts of international law appears a challenge. This article provides an overview of the current status of EuropeanUnion Member States’ public statements on international law applicable to cyber operations, identifies the domains of international law where convergence of views can be observed and highlights the areas with notable differences.
关于网络行动适用国际法的讨论已经从国际法是否适用于网络空间转向如何适用。最近,欧盟在其更新的网络安全战略中宣布了在网络空间适用国际法方面发展欧盟共同立场的雄心。作为争取在网络空间标准、规范和监管框架方面发挥领导作用的更广泛愿景的一部分,联合来文强调有必要在联合国和其他相关国际论坛的讨论中采取更积极的立场。然而,只有不到一半的欧盟成员国发表了在网络空间解释国际法的公开声明,因此,就有关国际法概念的解释达成共识似乎是一项挑战。本文概述了欧盟成员国关于适用于网络行动的国际法的公开声明的现状,确定了可以观察到的观点趋同的国际法领域,并强调了存在显著差异的领域。
{"title":"EU Common Position on International Law and Cyberspace","authors":"Anna-Maria Osula, Agnes Kasper, Aleksi Kajander","doi":"10.5817/mujl2022-1-4","DOIUrl":"https://doi.org/10.5817/mujl2022-1-4","url":null,"abstract":"The discussion on international law applicable to cyber operations has shifted from asking whether international law applies to cyberspace to how it applies. Recently the European Union declared in its renewed cybersecurity strategy the ambition to develop common EU position on the application of international law in cyberspace. As part of a broader vision in striving for leadership on standards, norms and regulatory frameworks in cyberspace, the joint communication underlined the need for taking a more proactive stance in the discussions at the United Nations and other relevant international fora. However, less than half of the European Union Member States have issued a public statementon the interpretation of international law in cyberspace and hence, reaching a consensus on the interpretation of relevant concepts of international law appears a challenge. This article provides an overview of the current status of EuropeanUnion Member States’ public statements on international law applicable to cyber operations, identifies the domains of international law where convergence of views can be observed and highlights the areas with notable differences.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48133016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain and Artificial Intelligence: Connecting Two Distinct Technologies to Comply with GDPR's Data Protection By Design Principle 区块链和人工智能:连接两种不同的技术,以符合GDPR的数据保护设计原则
Pub Date : 2022-06-30 DOI: 10.5817/mujlt2022-1-3
Dániel Eszteri
The aim of the paper is to present some of the general principles of data protection law that can be applied to automated decision-making applications embedded into blockchain technology in order to comply with the provision of the European Union’s General Data Protection Regulation (GDPR). The analysis focuses on the applicability of the ‘data protection by design’ principle during the development of such systems. Because blockchain-based networks are built on distributed data processing operations, therefore data controlling or processing of participating nodes should comply some abstract data protection patterns predetermined and collectively built-in during the system’s development phase. On the other hand, the imprint of AI’s automated data processing could be also observed and tracked back in the blockchain due to its historically retroactive nature. In the end, the study presents the human mind and its ‘uploading’ with conscious and unconscious contents as an analogy to blockchain-based AI systems. My goal is to highlight that the synergy of blockchain and machine learning-based AI can be hypothetically suitable to develop robust yet transparent automated decision-making systems. The compliance of these distributed AI systems with data protection law’s principles is a key issue regarding the high risks posed by them to data subjects rights and freedoms.
本文的目的是介绍数据保护法的一些一般原则,这些原则可以应用于嵌入区块链技术的自动化决策应用程序,以符合欧盟《通用数据保护条例》(GDPR)的规定。分析的重点是“设计数据保护”原则在此类系统开发过程中的适用性。由于基于区块链的网络建立在分布式数据处理操作之上,因此参与节点的数据控制或处理应符合系统开发阶段预先确定并共同内置的一些抽象数据保护模式。另一方面,由于其历史追溯性,人工智能自动数据处理的印记也可以在区块链中观察和追溯。最后,该研究将人类的思维及其有意识和无意识内容的“上传”与基于区块链的人工智能系统进行了类比。我的目标是强调区块链和基于机器学习的人工智能的协同作用可以假设适用于开发强大而透明的自动化决策系统。这些分布式人工智能系统是否符合数据保护法的原则,是它们对数据主体权利和自由构成的高风险的一个关键问题。
{"title":"Blockchain and Artificial Intelligence: Connecting Two Distinct Technologies to Comply with GDPR's Data Protection By Design Principle","authors":"Dániel Eszteri","doi":"10.5817/mujlt2022-1-3","DOIUrl":"https://doi.org/10.5817/mujlt2022-1-3","url":null,"abstract":"The aim of the paper is to present some of the general principles of data protection law that can be applied to automated decision-making applications embedded into blockchain technology in order to comply with the provision of the European Union’s General Data Protection Regulation (GDPR). The analysis focuses on the applicability of the ‘data protection by design’ principle during the development of such systems. Because blockchain-based networks are built on distributed data processing operations, therefore data controlling or processing of participating nodes should comply some abstract data protection patterns predetermined and collectively built-in during the system’s development phase. On the other hand, the imprint of AI’s automated data processing could be also observed and tracked back in the blockchain due to its historically retroactive nature. In the end, the study presents the human mind and its ‘uploading’ with conscious and unconscious contents as an analogy to blockchain-based AI systems. My goal is to highlight that the synergy of blockchain and machine learning-based AI can be hypothetically suitable to develop robust yet transparent automated decision-making systems. The compliance of these distributed AI systems with data protection law’s principles is a key issue regarding the high risks posed by them to data subjects rights and freedoms.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49459912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To Disclose, or Not to Disclose, That Is the Question: A Methods-Based Approach for Examining & Improving the US Government's Vulnerabilities Equities Process 披露,还是不披露,这是一个问题:一种基于方法的方法来检查和改进美国政府的脆弱性股权流程
Pub Date : 2022-01-01 DOI: 10.7249/rgsda1954-1
{"title":"To Disclose, or Not to Disclose, That Is the Question: A Methods-Based Approach for Examining & Improving the US Government's Vulnerabilities Equities Process","authors":"","doi":"10.7249/rgsda1954-1","DOIUrl":"https://doi.org/10.7249/rgsda1954-1","url":null,"abstract":"","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71382576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Masaryk University Journal of Law and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1