Rechtsinformatik als Methodenwissenschaft DOI: 10.38023/1a8abe46-9b7f-452f-ad2a-6a4adc09d22a

Governance of societal cyber and information security risks:

How legal informatics can help future-looking law

Tuomas Pöysti
Tuomas Pöysti
Region:

EU, Finnland

Rechtsgebiete:

Rechtsinformatik

Sammlung:

Tagungsband IRIS 2023

Zitiervorschlag: Tuomas Pöysti, Governance of societal cyber and information security risks:, in: Jusletter IT 23-Februar-2023

Over decades legal informatics has endeavoured for a deep understanding of the inter-section of law and ICT and of the risks related to digitalisation by variations of systematic multi-disciplinary studies. This quest continues. A systematic inquiry informed by legal informatics contributes to epistemic foundations to socio-legal understanding and governance of the cyber and information security risks. These risks are today shaped by the artificial intelligence (AI) and, the human – machine collaboration digital technologies increasingly enable. I will discuss current risks of digital network society with specific relevance for cyber and information security in an effort to place cyber and information security to a wider societal context and, to identify the needs of law and legislation in the future protection of human autonomy and dignity. The article discusses how the approach in the legal informatics continues to be helpful in constructing well-founded solutions to societal risks related to digitalisation in general and cyber and information security in particular by law and, hence, future proof the law. Mission of the legal informatics continues to develop intellectual foundations of both legislation and the application of the law in practise beyond individual substantive fields of law.


Inhaltsverzeichnis

  • 1. Introduction
  • 2. Conception of Information Related Risks Underlying Law and Path from Data Security to Cyber and Information Security
  • 3. The Revisited List of 20 Digital Network Society Risks
  • 4. Legal Informatics in the Future Proofing of Law
  • 5. Conclusions
Loggen Sie sich bitte ein, um den ganzen Text zu lesen.
Für Campus registrieren? Mehr dazu
Login Poster