Legal Aspects ofCyber Securityin A Borderless World

Main Article Content

Suteeraporn Saengchansri
Salila Klanreaungseang

Abstract

The world development into digital age and the convenience enjoyed by human in the digitalized and borderless world are in the midst of risk of threat exposure if information technologies or digital systems are misused. Such vulnerability may have already occurred but it is invisible. Indeed, Thailand can likely become the target of cyber criminals one day, especially so-called “Advanced Persistent Threats (APT) Actors”. This is regarded not only as a new problem in the world of changes but also as the important challenge for law development in the effort to introduce relevant measures


            This article is a documentary research analyzing the importance of cyber security protection law. This particular law can then be one of the tools to ensure the safety of vital information infrastructure of public and private sectors. Also, it can serve as a ground for the borderless-world way of life as well as for guaranteeing national security.

Article Details

How to Cite
Saengchansri, S., & Klanreaungseang, S. (2021). Legal Aspects ofCyber Securityin A Borderless World. INTERDISCIPLINARY SOCIAL SCIENCES AND COMMUNICATION JOURNAL, 4(3), 101–114. retrieved from https://so02.tci-thaijo.org/index.php/ISSC/article/view/251833
Section
Academic article

References

กรมเจรจาทางการค้าระหว่างประเทศ. (2561). สรุปสาระสำคัญของ GDPR (General Data Protection
Regulation) Retrieved from : https://www.moc.go.th/images/633/GDPR-3-5.pdf
ยุทธศาสตร์การรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ พ.ศ. 2561-2564 สำนักยุทธศาสตร์ความมั่นคง
เกี่ยวกับภัยคุกคามข้ามชาติ สำนักงานสภาความมั่นคงแห่งชาติ สำนักงานสำนักนายกรัฐมนตรี
(สำนักพิมพ์คณะรัฐมนตรีและราชกิจจานุเบกษา, มิถุนายน 2561) สืบค้นจาก http://www.
nsc.go.th/Download1/ยุทธศาสตร์การรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ พ.ศ.๒๕๖๐-๒๕๖๔.pdf
สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์. (2012). คลังความรู้. Retrieved from :
https://www.etda.or.th/terminology-detail/988.html
สำนักรัฐบาลอิเล็กทรอนิกส์ (องค์การมหาชน) (EGA ). (2016). Retrieved from :
https://dga.or.th/upload/download/file_769c60982e4c374dcd33b41c29227a31.pdf
เอกสารเรื่อง National Cybersecurity Strategy ยุทธศาสตร์ความมั่นคงปลอดภัยไซเบอร์แห่งชาติ
6 ตุลาคม 2560 โดย พันเอก ดร. เศรษฐพงค์ มะลิสุวรรณ (ประธานกรรมการกจการโทรคมนาคม/
รองประธาน กสทช.) สืบค้นจาก http://nbtc.go.th/getattachment/News/Information/National-
Cybersecurity-Strategy-ยุทธศาสตร์ความั่น/เอกสารแนบ.pdf.aspx
Anthony Giddens. (1996). Affluence, Poverty and the Idea of a Post-Scarcity Society. Retrieved from :
https://www.files.ethz.ch/isn/29014/dp63.pdf
Artur Appazov. (2014). Legal Aspects of Cybersecurity Retrieved from :
https://www.justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/Forskni
ngspuljen/Legal_Aspects_of_Cybersecurity.pdf
Brad Smith. (2017). Protecting and Defending against Cyberthreats in Uncertain Times
Retrieved from : https://www.rsaconference.com/industry-topics/presentation/protecting-and-
defending-against-cyberthreats-in-uncertain-times
Costanzo, Charles E., (2011). "Human Security in a Borderless World," Naval War College Review: Vol.
64 : No. 3 , Article 11. Retrieved from : https://digital-commons.usnwc.edu/nwc-eview/vol64/iss3/11
Deloitte. (2012). Cyber Security in a Borderless World. Retrieved from : https://deloitte.wsj.com/cio/
2012/05/23/cyber-security-in-a-borderless-world/
Dr. Frederick Wamala (Ph.D.), CISSP®. (2011). ITU National Cybersecurity Strategy Guide. Retrieved
from : http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
Gregory C. Shaffer & Mark A. Pollack. (2011). Hard Versus Soft Law In International Security.
Retrieved from : http://lawdigitalcommons.bc.edu/bclr/vol52/iss4/1
Henning Schaloske, Dr. Kathrin Feldmann and AmreiZürn. (2018). Cyber cross-jurisdictional risks and
the impact of GDPR: Europe. Retrieved from : https://www.clydeco.com/insight/article/2018-
03-cyber-cross-jurisdictional-risks-and-the-impact-of-gdpr-europe M
ITU. (2019). Definition of cybersecurity Retrieved from : https://www.itu.int/en/ITU-
T/studygroups/com17/Pages/cybersecurity.aspx
Luke Irwin. (2020). What’s the difference between information security and cyber security?
Retrieved from : https://www.itgovernance.eu/blog/en/whats-the-difference-between-
information-security-and-cyber-security
OECD. (2015). Digital Security Risk Management for Economic and Social Prosperity : OECD
Recommendation and Companion Document, OECD Publishing, Paris. Retrieved from :
http://dx.doi.org/10.1787/9789264245471-en
Philip Alston. International Commission of Jurists. (1981). Development and the Rule of Law :
Prevention Versus Cure as a Human Rights Strategy. Retrieved from : https://www.icj.org/wp-
content/uploads/2013/06/Universal-rule-of-law-development-working-paper-1981-eng.pdf
See M. Goldmann, “Inside Relative Normativity: From Sourcesto Standard Instruments for the
Exercise of International Public Authority”, 9 German LawJournal (2008) pp. 1865–1908.
Steven Feldstein and David Sullivan. (2018). Protecting Civilians in Cyberspace: Ideas for the Road
Ahead Retrieved from : https://www.justsecurity.org/58838/protecting-civilians-cyberspace-
ideas-road/
The cyber threat landscape : Challenges and future research directions. K. Choo. Computers &
Security 30(8), 719-731. (2011)
Thaicert. (2011). Retrieved from : ttps://www.thaicert.or.th/papers/technical/2011/pa2011te002.html
UN. (2018). Consensus on The Application of Rule of Law and UN Charter to Make Cyberspace Safe
Retrieved from : https://www.un.org/sustainabledevelopment/blog/2018/11/consensus-on-
the-application-of-rule-of-law-and-un-charter-to-make-cyberspace-safe/
United States Government Publishing Office. (2020). Federal Information Security Modernization Act
of 2014 Retrieved. from : https://www.govinfo.gov/app/details/PLAW-113publ283/