Claim Missing Document
Check
Articles

Found 3 Documents
Search

The Risks of Using Artificial Intelligence on Privacy and Human Rights: Unifying Global Standards Al-Billeh, Tareq; Hmaidan, Ruba; Al-Hammouri, Ali; AL Makhmari, Mohammed
Jurnal Media Hukum Vol. 31 No. 2: December 2024
Publisher : Fakultas Hukum Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jmh.v31i2.23480

Abstract

Artificial intelligence (AI) presents significant opportunities and challenges, particularly balancing innovation with protecting privacy and human rights. The increasing integration of AI into daily life has amplified risks to digital privacy, access to information, and online communication, raising concerns about human rights violations. Governments must address these risks by implementing practical measures to ensure safe AI usage and redressing harm caused by unethical practices. This article explores the impact of AI on privacy and human rights, utilizing the 2024 Council of Europe Framework Convention on AI, Human Rights, Democracy, and the Rule of Law as a basis for ethical considerations. Employing an analytical methodology, the study examines international charters and national legislation to highlight disparities in addressing AI-related privacy concerns and to identify gaps between global human rights standards and digital technologies. Comparative analysis is conducted to evaluate international and national approaches to AI governance. The findings emphasize the urgent need for unified global standards to protect digital human rights, harmonize AI ethics, and reduce risks associated with AI applications. Recommendations include adopting comprehensive legal frameworks and promoting international cooperation to ensure ethical AI deployment aligned with human rights principles.
Digital Evidence in Human Rights Violations and International Criminal Justice Al-Billeh, Tareq; Al-Hammouri, Ali; Khashashneh, Tawfiq; AL Makhmari, Mohammed; Al Kalbani, Hamad
Journal of Human Rights, Culture and Legal System Vol. 4 No. 3 (2024): Journal of Human Rights, Culture and Legal System
Publisher : Lembaga Contrarius Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53955/jhcls.v4i3.446

Abstract

The rapid development of the use of digital technologies has facilitated access to digital information and evidence. This information and digital evidence are obtained via the Internet, social media or satellite. And may be used to investigate violations of human rights and international criminal law. Therefore, there is a problem of rebalancing between the right to privacy and the use of information and digital evidence in the investigation of violations of human rights and international criminal law. This study has objective of unified universal principles that set out the origins and rules for the use of information and digital evidence in the investigation of violations of human rights and international criminal law. In order to ensure international and national justice and criminal accountability and to document all violations of human rights and international criminal law. The analytical approach will be used through analysis of previous studies on the use of digital information and evidence in the investigation of violations of human rights and international criminal law. And analysis of the Berkeley Protocol on Open-Source Digital Investigations. Several findings and recommendations were reached in this paper, the most important of which is the need for the international community to recognize the information and digital evidence obtained to demonstrate violations of human rights and international criminal law.
The legal effect of electronic bonds lacking an authenticated signature in Jordanian legislation Albnian, Ahmad; Al-Hammouri, Ali; Al-Billeh, Tareq; Al Makhmari, Mohammed; Belghit, Roua; Himmich, Mohammed Chakib
Jurnal Hukum Novelty Vol. 16 No. 1 (2025)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jhn.v16i1.29437

Abstract

Introduction to the Problem: This study examines the Jordanian legislator's stance on the conditions for electronic signatures, as outlined in the Electronic Transactions Law and the Jordanian Evidence Law. It aims to assess the consistency between the two laws, particularly since the Electronic Transactions Law specifies requirements for electronic signatures, while the Evidence Law remains silent on such conditions. Purpose/Objective Study: This study aims to examine how the recognition and enforceability of electronic bonds vary depending on the type of electronic signature used—specifically comparing authenticated and secured signatures versus unauthenticated yet secured signatures. The analysis will assess the impact of these signatures on the validity and legal standing of electronic bonds, similar to how handwritten signatures affect traditional bonds. Identifying gaps in this relationship will help address potential shortcomings in ensuring authenticity and legal compliance. Design/Methodology/Approach: In this study, we follow two approaches: the descriptive approach in presenting electronic bonds, their types, protection, the validity of an authenticated and protected electronic signature in one hand, and the unauthenticated and unprotected electronic signature. The analytical approach was also relied on. The legal texts regulating the process of electronic bonds and electronic signatures will be reviewed, analyzed, and compared with other laws. Findings: The study highlights how electronic authentication can streamline international trade by reducing documentation costs, provided legal frameworks ensure security and reliability. While Jordan’s Electronic Transactions Law grants e-signatures legal validity, gaps remain in regulating authentication entities. Key recommendations include: (1) establishing an 'electronic examiner' to verify signatures, (2) clarifying certification providers’ liability for data protection, and (3) formalizing government-contractor agreements for authentication services. Strengthening judicial training on digital transactions is also advised to enhance enforcement. Paper Type: Research Article