DIGITAL FUTURE & CYBER SECURITY NECESSITY

Authors

  • Gulyamov Said Saidakhrarovich Doctor of Sciences in Law (DSc), Professor, Head of the Private International Law Department, Tashkent State University of Law
  • Khazratkulov Odilbek Tursunovich PhD in Law, associate Professor of the Private International Law Department, Tashkent State University of Law.
  • Eshbayev Gayrat Bolibek ugli the student of the Tashkent State University of Law

Keywords:

Digital afterlife industry, Digital asset inheritance, Digital asset inheritance protocol, Data

Abstract

This article mainly considers the effect of cyber theft and data theft and its effect to the digital inheritance and analyses its consequences. However, this article considers the problems of electronic wills, which are the barriers to implement electronic wills instead of in a traditional, paper format. The implementation of digital inheritance combined with increasing proportion of cyber-attacks. To protect digital inheritance, cyber security issues are essential on this article. Finally, article concerns the current situation in Uzbekistan and what measures must be done.

References

The authors are Carl J Öhman and David Watson. The title of the article is “Are the dead taking over Facebook? A Big Data approach to the future of death online” page 1 “Abstract, published on January-June 2019.

Online available at: https://journals.sagepub.com/doi/10.1177/2053951719842540

The authors of the book are Michael Arnold, Martin Gibbs, Tamara Kohn, James Meese and Bjorn Nansen. The title of the book is “Death and Digital Media”, the first edition, published in 2017.

Online available at: https://www.taylorfrancis.com/books/mono/10.4324/9781315688749/death-digital-media-michael-arnold-martin-gibbs-tamara-kohn-james-meese-bjorn-nansen

Scolyer-Gray, P., Shaghaghi, A., Ashenden, D.: Digging your own digital grave: how should you manage the data you leave behind?

Online available at: https://theconversation.com/digging-your-own-digital-grave-how-should-you-manage-the-data-you-leave-behind-143755,

about Australia is given here: https://hallandwilcox.com.au/thinking/what-happens-to-your-digital-wealth-on-death-and-incapacity/

The authors are Ram Govind Singh, Ananya Shrivastava and Sushmita Ruj. The title of the article is “A Digital Asset Inheritance Model to Convey Online Persona Posthumously” published on 30 April, 2022.

Online available at: A Digital Asset Inheritance Model to Convey Online Persona Posthumously (springer.com)

The title of the article is “Issues of Legal Regulation of Robotics in the Form of Artificial Intelligence”. The author of the article is Said Gulyamov and Sardor Yusupov, published 23 May, 2022. Online available at:

https://scholar.google.com/citations?view_op=view_citation&hl=ru&user=kqUdLCsAAAAJ&sortby=pubdate&citation_for_view=kqUdLCsAAAAJ:WA5NYHcadZ8C

Harvard Law Review. Cyber law/Internet. What is an “Electronic will”? Development in the law. Online available at: https://harvardlawreview.org/2018/04/what-is-an-electronic-will/

The author is Gökalp Y. Gürer. The title of the article is “No Paper? No Problem: Ushering in Electronic Wills Through California’s “Harmless Error” Provision”. University of California, Davis, published in 2016.

Langbein, supra note 16, at 489; see also Gürer, supra note 18, at 1965–66.

ee, e.g., Martina v. Elrod, 748 S.E.2d 412, 414 (Ga. 2013) (“The doctrine of substantial compliance, though tolerant of ‘variations in the mode of expression’ utilized to satisfy statutory requisites, nonetheless requires ‘actual compliance as to all matters of substance.’” (Quoting Gen. Elec. Credit Corp. v. Brooks, 249 S.E.2d 596, 602 (Ga. 1978))); Smith v. Smith, 348 S.W.3d 63, 63 (Ky. App. 2011) (holding that the doctrine of substantial compliance could not be used to deem a will compliant where it was signed by only one witness and two were usually required).

Beyer & Hargrove, supra note 26, at 890–96. The title of the article is “Digital Wills: Has the Time Come for Wills to Join the Digital Revolution?”. Published on February 2009. The author is Gerry W. Beyer from Texas Tech University.

Monica Anderson, Technology Device Ownership: 2015, PEW RES. CTR. (Oct. 29, 2015), Online available at: http://www.pewinternet.org/2015/10/29/technology-device-ownership-2015/, https://perma.cc/AP3X-7ESX.

Twitter was launched on March 21, 2006. Amanda MacArthur, The Real History of Twitter, in Brief, LIFEWIRE (Nov. 7, 2017), Online available at: https://www.lifewire.com/history-of-twitter-3288854, https://perma.cc/U3RU-M7AW

Ami Sedghi, Facebook: 10 Years of Social Networking, in Numbers, THE GUARDIAN: DATABLOG (Feb. 4, 2014, 9:38 AM), Online available at: https://www.theguardian.com/news/datablog/2014/feb/04/facebook-in-numbers-statistics, https://perma.cc/5HYH-TE37

Kathleen Chaykowski, Mark Zuckerberg: 2 billion Users Means Facebook’s “Responsibility Is Expanding,” FORBES (June 27, 2017, 1:37 PM), https://www.forbes.com/sites/kathleenchaykowski/2017/06/27/facebook-officially-hits-2-billion-users, https://perma.cc/GPJ4-EHC8

See, e.g., LEGALZOOM, https://www.legalzoom.com/sem/homepage/, https://perma.cc/ZB7H-932E

See Caldwell, supra note 5, at 467.

The authors are Said Gulyamov, Otabek Narziev, Sadoqat Safoeva, Jahongir Juraev. The title of the article is “State Role Securities Market Development in Uzbekistan”, published on the American Journal of Political Science Law and Criminology, on June 18, 2021.

Section V, inheritance law, chapter 66. General provisions on inheritance. Online available at: https://lex.uz/docs/180550

The title of the article is “International inheritance law - avoiding conflicts of jurisdiction”. The authors are Walter Häberling and Alexandra Schnyder. MLL Meyerlustenberger Lachenal Froriep Ltd. Switzerland, published on February 22, 2018. Online available at: https://www.lexology.com/library/detail.aspx?g=eff04523-1946-42d9-b026-cdd85288e5f1

Kroiß, L. Vorsorge für den Erbfall durch Testament, Erbvertrag und Schenkung / L. Kroiß. – München. – Bech. – 2019. – 52 s.

The author is Gulyamov Said Saidakhrarovich – Doctor of Law, Professor, head of the Department of International Private Law of the Tashkent state university of Law. The title of the article is “The Institutional and Legal Framework of Emerging Capital Markets: The Experience of Cis Countries”. Turkish Journal of Computer and Mathematics Education. Published on 05.04.2021

Schjolberg Stein. A Cyberspace Treaty – United Nations Convention, Protocol on Cyber-Security and Cybercrime. Twelfth United Nations Congress on Crime Prevention and Criminal Justice. Salvador, Brazil, 12-19 April 2010.

The title of the article is “Digitalization of international arbitration and dispute resolution by artificial intelligence”. The authors are Said Gulyamov, Mokhinur Bakhramova, page 83, published on April 24th, 2022.

Karpova D.N. Cybercrimes: a global issue and its solution. Vlas= The Power, 2014, no. 8, pp. 46-50. (Russian language).

The title of the article is “Influence of fake news in Twitter during the 2016 US presidential election”. The authors are Alexandre Bovet & Hernán A. Makse, published on 02 January, 2019. Online available at: https://www.nature.com/articles/s41467-018-07761-2

Anonymous hacker group. Business Info and System Analytics GBA-327-CA03. The author is Dr. Bryan Reagan. Online available at: https://www.saintleo.edu/hubfs/Resource%20PDFs%20and%20DOCs/Academics/Center%20for%20Cybersecurity/Student%20Projects/2019/Anonymous%20Hacker%20Group.pdf

The author is Slobodyan E. The title of the article is “What is the group of hackers Fancy Bears? // Arguments and Facts”. Published on 14.09.2016 Online available at: http://aif/ru/dontknows/file/chto_predstavlyaet_soboy_gruppirovka_hakerov_fancy_bears

Bissel K., LaSalle R.M., Richards K., “The Accenture Security Index”. Redefining security performance and how to achieve it in 2017, page 19.

Online available at: https://www.markle.org/sites/default/files/dotforce_2001_Okinawacharter.pdf

Okinawa Charter of the Global Information Society. Adopted on July 21, 2000.

The Global Cybersecurity Index. Online available at: https://www/itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx

Online available at: https://www.itu.int/en/ITU-D/Cybersecurity/Documents/RES_130_rev_Dubai.pdf, https://www.itu.int/en/Pages/default.aspx

United Nations Convention against Transnational Organized Crime and the Protocols Thereto. Adopted by the UN General Assembly on 15 November, 2000 by Resolution 55/25. Entered into force on 29 September 2003, in accordance with article 38. Signatories: 147. Online available at: https://www.unodc.org/unodc/en/organized-crime/intro/UNTOC.html

Online available at: https://lex.uz/docs/1304112

Convention on Cybercrime, adopted on 23.11.2001 in Budapesht.

Okinawa Charter of the Global Information Society. Adopted on July 21, 2000.

Resolution adopted by the UN General Assembly // Twelfth United Nations Congress on Crime Prevention and Criminal Justice / A / RES / 65/230 1/01/2011. Online available at: http://www.unodc.org/documents/justice-and-prison-reform/AGMs/A_RES_65_230r.pdf

Comprehensive Cybercrime Study // United Nations Office on Drugs and Crime. Project, February 2013. UN-Vienna, 2013, page 360.

Doha Declaration, adopted on April 19, 2015. The 13th United Nations Congress on Crime Prevention and Criminal Justice / UNODC. New York. Online available at: https://www.unodc.org/congress/en/previous/previous-13.html

Index of cyber security. International Telecommunication Union, Geneva, 2017.

Online available at: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf

Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.

Online available at: https://www.cybersecurityintelligence.com/blog/cyber-attacks-up-500-in-a-month-4901.html

The authors are Adhirath Kapoor, Ankur Gupta, Rajesh Gupta, Sudeep Tanwar, Gulshan Sharma and Innocent E. Davidson. The title of the article is Ransomware Detection, Avoidance, and Mitigation Scheme: A Review and Future Directions. Published on 21 December, 2021. Online available at: file:///C:/Users/user/Downloads/sustainability-14-00008.pdf, https://www.ncsc.gov.uk/news/warning-issued-uk-usa-healthcare-organisations

Online available at: https://www.stat.go.jp/english/data/handbook/c0117.html#:~:text=Japan's%20total%20population%20in%202020,of%2010%20million%20or%20more.

The author is Atsuda Matsushi, Japan Digital Shuukatsu (End-of-life-planning) Association Representative. The title of the article is “Manual for Handling Digital assets Left by the Deceased”, page 2, “legal considerations of inheriting offline data”, page 2, published in 2020.

DANS, founded in 2005 as an institute of the Royal Netherlands Academy of Arts and Sciences (KNAW) and of the Netherlands Organisation for Scientific Research (NWO), has cumulative responsibility for 50 years of digital research data in the social sciences and humanities from its predecessor organizations. Online available at: AM15ProceedingsBorgmanDANS-FINAL20150819 (acm.org), page 2.

Online available at: https://www.gazeta.uz/ru/2022/04/14/ict/

The title of the article is “Strategies and future prospects of development of artificial intelligence: World experience”, conclusion, the authors are Gulyamov Said Saidakhrarovich, Bozarov Sardor Sokhibjonovich, published on April 20th, 2022. Online available at:

https://scholarexpress.net/index.php/wbml/article/view/841.

Downloads

Published

2022-05-11

How to Cite

Gulyamov Said Saidakhrarovich, Khazratkulov Odilbek Tursunovich, & Eshbayev Gayrat Bolibek ugli. (2022). DIGITAL FUTURE & CYBER SECURITY NECESSITY. World Bulletin of Management and Law, 10, 31-45. Retrieved from https://scholarexpress.net/index.php/wbml/article/view/948

Issue

Section

Articles