Refine
Year of publication
- 2012 (2)
Document Type
Language
- English (2)
Has Fulltext
- yes (2)
Is part of the Bibliography
- no (2)
Keywords
- Law (2)
- Social Justice (2)
- Abnormal Use (1)
- Absolute Level (1)
- Architecture (1)
- Cloud Computing (1)
- Defect (1)
- Encryption Technology (1)
- Ethical Use (1)
- Fusion (1)
Institute
In information society, legal norm communications have been never established in certain fields for a long time. That is, a few legal norms have never obeyed in the fields. Above all, legal norms which relate to data protection, information contents and information security, would often infringed. Most violation would be conducted by using information technologies. Information technologies would often be used in these infringing incidents. It can be said that these infringing incidents would have never been conducted without information technology. These infringing incidents include hacking actions, personal data abuse, personal information disclosure, unauthorized access, infringing copyrights, infringing privacy rights, and so on. A way of preventing those infringements is to raise the level of punishment against the violators. But, it will prove to be disappointing. Furthermore, it would be an ex post facto measure to the last. It would be needed to invent an ex ante measure, if it is possible. As the ex ante measure, the author proposes a fusion of law and information technology. An information technology will lead people to a lawful deed when they conduct actions in using computers and networks. They say that information technology cures information technology. After all, the fusion will aim at realizing laws, and it will contribute to recover a social justice.
The author will deal with the relationship between law and technology from the viewpoint of technology security standard. One of the relationships can be found in that law has been providing a security level of technology. They have been saying that law would often follow technology. Law is too slow to adapt the changing technology through the advancement of technology. Above all, information technology has an electronic rapidity and a legislation technology has a paper one. There might be a big estrangement between law and technology. However, law must provide a security standard of technology. The standard must be based on a relative security level. The relative level would premise on the ordinary, lawful and ethical use of technology. Most technology has been opened to the public without any technology impact assessment. Technology would have some defect, which the producers have overlooked. As a result, the users might often meet with the accidents caused on the defects.
Then law should provide a technology security standard to exclude the defects from the users’ viewpoint as secure as possible. The security standard must be reflected on the architecture standard of technology. The architecture standard may be a yardstick whether the creators can evade the responsibility for the accidents.
The standard would also premise on the ordinary, lawful and ethical use of technology. The ordinary use means that the users should use normally technology within the extent of the architecture standard. The ethical use means that the users should use technology being conscious of the defects in order to avoid accidents.
The relative security level may be the sum of the architecture standard and the ethical use of technology.