{"title":"马来西亚高等法院采用资讯及通讯科技:探讨所涉及的安全风险","authors":"Z. Hamin, M. B. Othman, A. Mohamad","doi":"10.1109/ICIMTR.2012.6236404","DOIUrl":null,"url":null,"abstract":"It is a truism that the information and communication technologies (ICT) have changed the way people engage in all aspects of their lives, including how the judiciary functions. The ICT applications adopted by the courts are varied including access to legal materials, high technology information and evidence display systems, electronic filing, foreign language translation, multimedia court records, information and evidence retrieval, audio conferencing, video conferencing and the public's access to court information via the worldwide web. Drawn from an ongoing research, this paper aims to highlight that the growing adoption of ICT by the courts in many jurisdictions in fact raises several issues of security risks. This paper begins by illustrating the concept of courtroom technology and the current technical applications available in the Malaysian courts. The examination of the emergence of non-legal risks closely connected to security and the legal risk raised by courtroom technology is mediated through the understanding of several basic security control requirements involving authentication, non-repudiation, confidentiality, data integrity and privacy encroachment. The paper contends that despite the common notion that law will always lag behind technology, the courts would need to understand these legal and non-legal security risks and manage them in the most efficient and effective manner if judicial business were to be continually advanced by the ICT.","PeriodicalId":117572,"journal":{"name":"2012 International Conference on Innovation Management and Technology Research","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"ICT adoption by the Malaysian high courts: Exploring the security risks involved\",\"authors\":\"Z. Hamin, M. B. Othman, A. Mohamad\",\"doi\":\"10.1109/ICIMTR.2012.6236404\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is a truism that the information and communication technologies (ICT) have changed the way people engage in all aspects of their lives, including how the judiciary functions. The ICT applications adopted by the courts are varied including access to legal materials, high technology information and evidence display systems, electronic filing, foreign language translation, multimedia court records, information and evidence retrieval, audio conferencing, video conferencing and the public's access to court information via the worldwide web. Drawn from an ongoing research, this paper aims to highlight that the growing adoption of ICT by the courts in many jurisdictions in fact raises several issues of security risks. This paper begins by illustrating the concept of courtroom technology and the current technical applications available in the Malaysian courts. The examination of the emergence of non-legal risks closely connected to security and the legal risk raised by courtroom technology is mediated through the understanding of several basic security control requirements involving authentication, non-repudiation, confidentiality, data integrity and privacy encroachment. The paper contends that despite the common notion that law will always lag behind technology, the courts would need to understand these legal and non-legal security risks and manage them in the most efficient and effective manner if judicial business were to be continually advanced by the ICT.\",\"PeriodicalId\":117572,\"journal\":{\"name\":\"2012 International Conference on Innovation Management and Technology Research\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Innovation Management and Technology Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIMTR.2012.6236404\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Innovation Management and Technology Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIMTR.2012.6236404","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ICT adoption by the Malaysian high courts: Exploring the security risks involved
It is a truism that the information and communication technologies (ICT) have changed the way people engage in all aspects of their lives, including how the judiciary functions. The ICT applications adopted by the courts are varied including access to legal materials, high technology information and evidence display systems, electronic filing, foreign language translation, multimedia court records, information and evidence retrieval, audio conferencing, video conferencing and the public's access to court information via the worldwide web. Drawn from an ongoing research, this paper aims to highlight that the growing adoption of ICT by the courts in many jurisdictions in fact raises several issues of security risks. This paper begins by illustrating the concept of courtroom technology and the current technical applications available in the Malaysian courts. The examination of the emergence of non-legal risks closely connected to security and the legal risk raised by courtroom technology is mediated through the understanding of several basic security control requirements involving authentication, non-repudiation, confidentiality, data integrity and privacy encroachment. The paper contends that despite the common notion that law will always lag behind technology, the courts would need to understand these legal and non-legal security risks and manage them in the most efficient and effective manner if judicial business were to be continually advanced by the ICT.