The Role of International Human Rights Law in Cybersecurity Assignment Sample

Understand the impact of international human rights law on cybersecurity, ensuring digital security while upholding privacy and ethical standards. Rapid Assignment Help!

  •  
  •  
  •  
  • Type Assignment
  • Downloads597
  • Pages9
  • Words2166

Chapter 1: Introduction

For expert guidance on cybersecurity and human rights law, consult our Affordable Online Assignment Help Experts for top-quality academic support.

Feeling overwhelmed by your assignment?

Get assistance from our PROFESSIONAL ASSIGNMENT WRITERS to receive 100% assured AI-free and high-quality documents on time, ensuring an A+ grade in all subjects.

1.1 Background of the study

The core foundation of the study is profound on the implication of the international human rights legislation to address the cyber security threats in the context of the “United Kingdom” (UK). A harmony between the insurance of fundamental freedoms and public safety contemplations should be kept up with by applying basic liberties ideas to network protection challenges. In order to keep individuals' privacy from being inadvertently compromised, it is absolutely necessary for cybersecurity measures, such as the gathering and monitoring of data, to adhere to these rights.

1.2 Rationale

States have the obligation to protect fundamental foundations, for example, data organisations, from cyberattacks to ensure the security and government assistance of their populace. Like different countries, the UK might pass homegrown regulations to battle cyber threats. These laws must adhere to international human rights standards.

1.3 Aim, Objective, and Questions

Research Aim

This research aims to examine the implications of the role of international human rights law in addressing cyber security threats in the UK.

Research Objectives

To identify the contribution of the “international human rights law” in addressing cyber security threats.

To evaluate the rules of “international human rights law” that account for enhancement in the cyber security measure’s efficiency.

To analyse the challenges that are witnessed by the “international human rights law” when it comes to reducing cyber security threats.

To provide suggestions that might enhance the integration of the “international human rights law” within cybersecurity and decrease the impact of the cyber security threats.

Research Questions

What is the contribution of the “international human rights law” to the cyber security measures?

What are the rules of the “international human rights law” that are responsible for improving the efficacy of cyber security measures?

What are the issues that are faced by the “international human rights law” when it comes to elevating the outcomes of cyber security measures?

What are the recommendations that might enhance the integration of the “international human rights law” within cybersecurity and the outcomes from the cyber security measures?

1.4 Problem Statement

In the UK, there are numerous troubles while tending to network protection concerns by means of the crystal of global common liberties regulation. Worldwide basic freedoms regulation offers an establishment for protecting individuals' privileges in the computerized time, yet changing it to the complexities of network safety requires conquering various moral, legitimate, and mechanical impediments.

Scan QR code from mobile camera
Grab an Extra 10% OFF on WhatsApp order!
use discount
scan QR code for get extra discount

Chapter 2: Literature Review

2.1 Introduction

This section of the study comprehends different implications of international law to tackle the cyber security threats across the UK in light of different pieces of literature. Different legislative structures have been derived that are predominant to deal with the cyber security-related complaints in the country.

2.2 Analysis of the international law towards Cyber Security threats

The United Nations has acknowledged the significance of addressing cybersecurity threats. In a number of resolutions and reports, the UN General Assembly has stressed the importance of international cooperation in the fight against cyber threats. The Budapest Show, frequently known as the Show on Cybercrime, was made by the Chamber of Europe. “The Computer Misuse Act, of 1990” which makes it illegal to access computer content without authorization, access it with the intention of committing or assisting in the commission of other crimes, and alter computer content without authorization, is a significant piece of legislation in the UK. International principles for mindful state conduct on the internet are being chipped away at. Cooperating with the confidential area is fundamental to fighting online protection gambles. An extensive arrangement requires the execution of public-private organizations and stages for data sharing.

Let our expert team assist you with your law assignment help, offering insights into legal practices, ethical considerations, and judicial processes.

2.3 Determine the challenges associated with law implementation

There can be ambiguities in global regulation in regard to a few components of cyber threats. This might prompt an absence of clearness and uncertainty in the law, which makes it challenging to indict hoodlums and implement rules. Since the internet is transnational in nature, it is challenging to appoint awards to individual cyberattacks. It very well may be challenging to figure out which country has ward over a cybercrime, which makes it hard to uphold global regulations. The legal systems of various nations differ greatly. Certain countries could never have exhaustive online protection regulation, or their general sets of laws probably won't be fit for tending to new and creating cyber threats. It is challenging to blend overall endeavours due to this error.

2.4 Examine new paths to sort out cyber security threats

Urge worldwide participation in trade innovation, best practices, and danger data to effectively balance digital assaults. support worldwide establishments like the “United Nations” (UN) that might advance correspondence and joint efforts on network safety-related matters. Ensure that international treaties and agreements that establish guidelines and standards for state behaviour in cyberspace are drafted and ratified. The creation of such agreements may contribute to the development of a more stable and secure cyberspace by defining expectations for responsible state behaviour. Make and set up facilitated worldwide strategies for dealing with network safety emergencies and recuperating from them. Establish procedures for the exchange of information prior to, during, and after events in order to support the operations of attribution and response.

2.5 Theoretical Overview

Control theory approach

Numerical and designing disciplines that concentrate on the way of behaving of dynamical frameworks incorporate control hypotheses. Digital protection is one of the numerous areas in which it tracks down use. In the context of cybersecurity, control theory can be utilized to design and implement systems that monitor, identify, and respond dynamically and adaptively to cyber threats. Creating models for different digital dangers, their dispersal, and conceivable framework impacts is valuable. To constantly screen the situation with the framework and contrast it with an ideal state, use input control procedures.

Systems theory

The System theory is a thorough methodology that underscores the communications between parts instead of separating explicit pieces. It considers systems to be connected and dependent entities. When it comes to cybersecurity, systems theory provides a useful foundation for comprehending and addressing the challenges of protecting information systems. The identification of relationships and interactions between various components is made easier by systems theory. The security of the entire framework might be influenced by a blemish in one part. Frameworks hypothesis advances input circles and progressing perception. This involves regularly assessing and altering safety efforts in network protection considering the changing danger climate. Changes or disturbances in just one system component may have unintended consequences.

2.6 Literature Gap

The research has highlighted that collaboration with the UN could foster as the agency has determined the concern of cyber security issues in its council. However, any specific knowledge regarding what steps are being taken to counter the threats has not been described as well as potential challenges are also missing. This can be considered as the gap in the research that will be mitigated as far as this study is concerned.

2.7 Summary

This chapter summarises different literature and their analysis to deal with the cybersecurity-related threats across the UK in light of international legislation and agencies. Moroever, a comprehensive overview has been presented regarding different theoretical underpinnings has also been portrayed in the section. A notion of analysis has also been annotated in the section regarding different gaps in the research.

Chapter 3: Methodology

3.1 Introduction

The methodology chapter uncovered that the specialist might have a reasonable course to propel the review. Furthermore, it is noticed that a satisfactory examination might be created by focusing on the perspectives of exploration plans, strategies, and reasoning.

3.2 Research Philosophy

The "interpretivism research paradigm" assists with considering the effect of a few inspirations, which incorporate social order and human connections, behind the scattering of conditional proof and their changes. Nonetheless, it likewise offers more grounded help for the factors that cause situational shifts in a bigger setting something that the positivist worldview battles to distinguish. The interpretivism study viewpoint portrays all features of individuals' commitment, culture, and society, which offers a careful degree of help during the time spent going with a choice. Moreover, it allows a complex way to deal with assessing the real working of social qualities and their potential impacts on the situational parts. Subjective examination procedures including contextual investigations, perceptions, and meetings, are unequivocally connected with interpretivism. These strategies empower top-to-bottom examinations concerning the lavishness of human encounters, perspectives, and implications. This comprehensive technique helps with catching the intricacy and variety of social cycles. Context is an essential part of interpretative research. Understanding the context in which people and social processes are situated is the aim of research. Therefore, this research will deploy the interpretivism paradigm to catapult neutral findings and lead to ultimate completion.

3.3 Research approach

Inductive research, a methodological approach, builds hypotheses or generalizations on the basis of observed patterns, empirical data, and specific cases. Deductive research, which begins with a specific idea or hypothesis and evaluates it through the collection and analysis of evidence, is sometimes contrasted with inductive research. Researchers collect data without having any prior concepts or ideas. Tracking down examples, topics, or patterns in the assembled information is the following stage. Analysts chase after examples, relationships, or similitudes that could appear in the information. Interpretivism and subjective examination techniques like contextual investigations, and dynamic screening are firmly related. The variety of human perspectives, experiences, and meanings can be studied in depth using these methods. This exhaustive methodology assists with catching the assortment and intricacy of social cycles. The setting is a pivotal component in interpretative exploration. Understanding the setting in which people and cultural cycles are set is the point of the review. The inductive approach will be incorporated into the final execution of the study and analysis of human perspectives.

3.4 Research Design

A sort of examination approach called descriptive design configuration looks to portray the elements of a populace, peculiarities, or explicit exploration points. Engaging exploration means to precisely portraying the condition of the peculiarity without attempting to exhibit causal connections between factors.This sort of study is many times utilized when the scientist wishes to create a preview of a given situation, assess the recurrence of specific ways of behaving or conditions, or have a piece of superior information on a specific issue. Elucidating research does exclude evolving factors, rather than trial research, which does as such to notice the outcomes. Its primary goal is to depict what as of now exists. The descriptive design will be integrated into the study to reduce the room for bias as well as analyse distinct terminologies.

3.5 Data Collection

It should be noted that the secondary qualitative data collection method excludes statistical data from this study's perspective in addition to including non-numerical data perspectives. Prior articles distributed after 2016 will be used for information gathering for this study by means of Google Researcher, Science Direct, and other solid sites. In order to arrive at pertinent conclusions, it will also be beneficial to gather up-to-date facts and information.

3.6 Data Analysis

The Braun and Clerk thematic examination approach will be utilized for the topical investigation. Information assortment on topics and sub-topics will likewise profit from it. It should be noted that the following procedures were followed in order to identify subjects suitable for thematic analysis: conceptual screening, watchword looking, and full-text screening. We will be able to develop pertinent study topics with sufficient assistance from the included and excluded data.

3.7 Ethical Underpinnings

Throughout the evaluation, a thorough commitment to the ethical frameworks is required to ensure its overall validity and authenticity. To accomplish the most significant level of legitimacy, this study has thought about an extensive variety of moral consistency. To ensure the straightforward utilization of datasets and forestall any infractions in the more extensive setting, patent guidelines have been looked for. It is accepted that observing the patent regulations has ensured that no datasets are utilized in research by abuse or ill-advised danger at the end of the day.

References

  • Alharahsheh H and Pius A, ‘A Review of Key Paradigms: Positivism vs Interpretivism’ (2020) 2 Global Academic Journal of Humanities and Social Sciences 39 <https://gajrc.com/media/articles/GAJHSS_23_39-43_VMGJbOK.pdf>
  • Bhamare D and others, ‘Cybersecurity for Industrial Control Systems: A Survey’ (2020) 89 Computers & Security 101677
  • Brass I and Sowell JH, ‘Adaptive Governance for the Internet of Things: Coping with Emerging Security Risks’ [2020] Regulation & Governance
  • Braun V, Clarke V and Hayfield N, ‘“A Starting Point for Your Journey, Not a Map”: Nikki Hayfield in Conversation with Virginia Braun and Victoria Clarke about Thematic Analysis’ (2019) 19 Qualitative Research in Psychology 1
  • Corley K, Bansal P (Tima) and Yu H, ‘An Editorial Perspective on Judging the Quality of Inductive Research When the Methodological Straightjacket Is Loosened’ (2020) 19 Strategic Organization 161
  • da Veiga A and others, ‘Defining Organisational Information Security Culture – Perspectives from Academia and Industry’ (2020) 92 Computers & Security 101713
  • Doyle L and others, ‘An Overview of the Qualitative Descriptive Design within Nursing Research’ (2019) 25 Journal of Research in Nursing <https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7932381/>
  • Eger MA and Hjerm M, ‘Identifying Varieties of Nationalism: A Critique of a Purely Inductive Approach’ [2021] Nations and Nationalism
  • Habibzadeh H and others, ‘A Survey on Cybersecurity, Data Privacy, and Policy Issues in Cyber-Physical System Deployments in Smart Cities’ (2019) 50 Sustainable Cities and Society 101660
  • Lallie HS and others, ‘Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic’ (2021) 105 Computers & Security 1 <https://www.sciencedirect.com/science/article/pii/S0167404821000729>
  • Markopoulou D, Papakonstantinou V and de Hert P, ‘The New EU Cybersecurity Framework: The NIS Directive, ENISA’s Role and the General Data Protection Regulation’ [2019] Computer Law & Security Review 105336
  • Matheu SN and others, ‘A Survey of Cybersecurity Certification for the Internet of Things’ (2021) 53 ACM Computing Surveys 1
  • Ncsc.gov.uk, ‘The Cyber Threat to UK Legal Sector’ (Ncsc.gov.uk2018) <https://www.ncsc.gov.uk/files/the_cyber_threat_to_uk_legal_sector_NCSC_2.pdf>
  • Srinivas J, Das AK and Kumar N, ‘Government Regulations in Cyber Security: Framework, Standards and Recommendations’ (2019) 92 Future Generation Computer Systems 178 <https://www.sciencedirect.com/science/article/abs/pii/S0167739X18316753>
  • Taeihagh A and Lim HSM, ‘Governing Autonomous Vehicles: Emerging Responses for Safety, Liability, Privacy, Cybersecurity, and Industry Risks’ (2019) 39 Transport Reviews 103
  • Yaacoub J-PA and others, ‘Robotics Cyber Security: Vulnerabilities, Attacks, Countermeasures, and Recommendations’ (2021) 21 International Journal of Information Security

Recently Downloaded Samples by Customers

Business Culture And Change In Context Assignment Sample

Introduction Get free samples written by our Top-Notch subject experts for taking assignment help services. Define...View and Download

Unilever's Brand Strategy: Engaging Customers & Driving Growth Assignment Sample

Introduction Rapid Assignment Help ensures your assignments are always delivered on time with our efficient and dependable...View and Download

Optimisation Of Protein Expression And Purification Assignment Sample

Introduction Get Free Online Assignment Samples from UK's Best Assignment Help Experts to boost your academic...View and Download

BA3UK32O: Academic Performance Assignment Sample

Introduction Get free samples written by our Top-Notch subject experts for taking online Assignment...View and Download

Preparing for Success at University: Knowledge and Creativity Assignment Sample

Explaining how I have developed as a learner during this module Source evaluation skill Step into a world of academic...View and Download

Unit 12 – Organisational Behaviour Assignment Sample

Introduction Get Free Online Assignment Samples from UK's Best Assignment Help Experts to boost your academic...View and Download

scan QR code from mobile
Scan QR Code From Mobile
Get best price for your work
  • 15698+ Projects Delivered
  • 500+ Experts 24*7 Online Help

offer valid for limited time only*