Legal Aspects ofCyber Securityin A Borderless World
Main Article Content
Abstract
The world development into digital age and the convenience enjoyed by human in the digitalized and borderless world are in the midst of risk of threat exposure if information technologies or digital systems are misused. Such vulnerability may have already occurred but it is invisible. Indeed, Thailand can likely become the target of cyber criminals one day, especially so-called “Advanced Persistent Threats (APT) Actors”. This is regarded not only as a new problem in the world of changes but also as the important challenge for law development in the effort to introduce relevant measures
This article is a documentary research analyzing the importance of cyber security protection law. This particular law can then be one of the tools to ensure the safety of vital information infrastructure of public and private sectors. Also, it can serve as a ground for the borderless-world way of life as well as for guaranteeing national security.
Article Details
The author(s) is only responsible for data appearing in the submitted manuscript of Interdisciplinary social sciences and communication journal.Besides, this journal encourages and enables you to share data such as statements, contents, figures, etc. that support your research publication where appropriate, and enables you to interlink the data with proper citation.
References
Regulation) Retrieved from : https://www.moc.go.th/images/633/GDPR-3-5.pdf
ยุทธศาสตร์การรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ พ.ศ. 2561-2564 สำนักยุทธศาสตร์ความมั่นคง
เกี่ยวกับภัยคุกคามข้ามชาติ สำนักงานสภาความมั่นคงแห่งชาติ สำนักงานสำนักนายกรัฐมนตรี
(สำนักพิมพ์คณะรัฐมนตรีและราชกิจจานุเบกษา, มิถุนายน 2561) สืบค้นจาก http://www.
nsc.go.th/Download1/ยุทธศาสตร์การรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ พ.ศ.๒๕๖๐-๒๕๖๔.pdf
สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์. (2012). คลังความรู้. Retrieved from :
https://www.etda.or.th/terminology-detail/988.html
สำนักรัฐบาลอิเล็กทรอนิกส์ (องค์การมหาชน) (EGA ). (2016). Retrieved from :
https://dga.or.th/upload/download/file_769c60982e4c374dcd33b41c29227a31.pdf
เอกสารเรื่อง National Cybersecurity Strategy ยุทธศาสตร์ความมั่นคงปลอดภัยไซเบอร์แห่งชาติ
6 ตุลาคม 2560 โดย พันเอก ดร. เศรษฐพงค์ มะลิสุวรรณ (ประธานกรรมการกจการโทรคมนาคม/
รองประธาน กสทช.) สืบค้นจาก http://nbtc.go.th/getattachment/News/Information/National-
Cybersecurity-Strategy-ยุทธศาสตร์ความั่น/เอกสารแนบ.pdf.aspx
Anthony Giddens. (1996). Affluence, Poverty and the Idea of a Post-Scarcity Society. Retrieved from :
https://www.files.ethz.ch/isn/29014/dp63.pdf
Artur Appazov. (2014). Legal Aspects of Cybersecurity Retrieved from :
https://www.justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/Forskni
ngspuljen/Legal_Aspects_of_Cybersecurity.pdf
Brad Smith. (2017). Protecting and Defending against Cyberthreats in Uncertain Times
Retrieved from : https://www.rsaconference.com/industry-topics/presentation/protecting-and-
defending-against-cyberthreats-in-uncertain-times
Costanzo, Charles E., (2011). "Human Security in a Borderless World," Naval War College Review: Vol.
64 : No. 3 , Article 11. Retrieved from : https://digital-commons.usnwc.edu/nwc-eview/vol64/iss3/11
Deloitte. (2012). Cyber Security in a Borderless World. Retrieved from : https://deloitte.wsj.com/cio/
2012/05/23/cyber-security-in-a-borderless-world/
Dr. Frederick Wamala (Ph.D.), CISSP®. (2011). ITU National Cybersecurity Strategy Guide. Retrieved
from : http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
Gregory C. Shaffer & Mark A. Pollack. (2011). Hard Versus Soft Law In International Security.
Retrieved from : http://lawdigitalcommons.bc.edu/bclr/vol52/iss4/1
Henning Schaloske, Dr. Kathrin Feldmann and AmreiZürn. (2018). Cyber cross-jurisdictional risks and
the impact of GDPR: Europe. Retrieved from : https://www.clydeco.com/insight/article/2018-
03-cyber-cross-jurisdictional-risks-and-the-impact-of-gdpr-europe M
ITU. (2019). Definition of cybersecurity Retrieved from : https://www.itu.int/en/ITU-
T/studygroups/com17/Pages/cybersecurity.aspx
Luke Irwin. (2020). What’s the difference between information security and cyber security?
Retrieved from : https://www.itgovernance.eu/blog/en/whats-the-difference-between-
information-security-and-cyber-security
OECD. (2015). Digital Security Risk Management for Economic and Social Prosperity : OECD
Recommendation and Companion Document, OECD Publishing, Paris. Retrieved from :
http://dx.doi.org/10.1787/9789264245471-en
Philip Alston. International Commission of Jurists. (1981). Development and the Rule of Law :
Prevention Versus Cure as a Human Rights Strategy. Retrieved from : https://www.icj.org/wp-
content/uploads/2013/06/Universal-rule-of-law-development-working-paper-1981-eng.pdf
See M. Goldmann, “Inside Relative Normativity: From Sourcesto Standard Instruments for the
Exercise of International Public Authority”, 9 German LawJournal (2008) pp. 1865–1908.
Steven Feldstein and David Sullivan. (2018). Protecting Civilians in Cyberspace: Ideas for the Road
Ahead Retrieved from : https://www.justsecurity.org/58838/protecting-civilians-cyberspace-
ideas-road/
The cyber threat landscape : Challenges and future research directions. K. Choo. Computers &
Security 30(8), 719-731. (2011)
Thaicert. (2011). Retrieved from : ttps://www.thaicert.or.th/papers/technical/2011/pa2011te002.html
UN. (2018). Consensus on The Application of Rule of Law and UN Charter to Make Cyberspace Safe
Retrieved from : https://www.un.org/sustainabledevelopment/blog/2018/11/consensus-on-
the-application-of-rule-of-law-and-un-charter-to-make-cyberspace-safe/
United States Government Publishing Office. (2020). Federal Information Security Modernization Act
of 2014 Retrieved. from : https://www.govinfo.gov/app/details/PLAW-113publ283/