Volume 15 , Issue 1 , PP: 205-213, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Luis F. Piñas Piñas 1 * , Luis R. Miranda Chávez 2 * , Carlos J. Lizcano Chapeta 3 , Marina Abdurashidova 4
Doi: https://doi.org/10.54216/FPA.150116
The integration of Information and Communication Technologies (ICT) into notarial activities has revolutionized the way procedures are processed by significantly enhancing speed and legal security, which are key aspects for user satisfaction. This shift responds to the growing demand for fast and secure notarial services, where efficiency and legal protection are priorities. Through the analysis conducted with the neutrosophic RAFSI method, risks derived from digitalization have been identified and classified, proposing effective solutions for their mitigation. Among these, the need to update regulations to adapt them to the digital context and the importance of training notaries in digital competencies and cyber security stand out. These measures are focused not only on streamlining notarial procedures but also on reinforcing trust in notarial services, marking a significant advance toward the modernization of notarial practice in the digital era. In conclusion, the fusion of ICT with notarial activities, supported by risk control and supervision, has effectively balanced service speed with legal security, meeting the current expectations of users.
notarial activity , speed , legal security , technology , principle.
[1] T. M. R. Navarro et al., "Notarial Management and Technology: Evaluation of Legal Certainty in Intestate Succession Procedures in Peru," Revista de Gestão Social e Ambiental, vol. 18, no. 1, p. e04920, 2024. [Online]. Available: https://rgsa.emnuvens.com.br/rgsa/article/view/4920.
[2] L. Fantacci and M. Lorenzini, "Technology versus trust: Non-bank credit systems from notarized loans in Early Modern Europe to cryptolending," Structural Change and Economic Dynamics, vol. 69, no. June, pp. 83-95, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0954349X23001662.
[3] C. Koolen, K. Wuyts, W. Joosen, and P. Valcke, "From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models," Computer Law & Security Review, vol. 52, no. April, pp. 2-9, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0267364923001243?via%3Dihub.
[4] V. Rupp and M. von Grafenstein, "Clarifying “personal data” and the role of anonymisation in data protection law: Including and excluding data from the scope of the GDPR (more clearly) through refining the concept of data protection," Computer Law & Security Review, vol. 52, no. April, pp. 2-8, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0267364923001425.
[5] C. Mennella, U. Maniscalco, P. Giuseppe De, and M. Esposito, "Ethical and regulatory challenges of AI technologies in healthcare: A narrative review," Heliyon, vol. 10, no. 4, pp. 1-10, 2024. [Online]. Available: https://www.cell.com/heliyon/pdf/S2405-8440(24)02328-4.pdf.
[6] S. Bernd Carsten and D. Eke, "The ethics of ChatGPT – Exploring the ethical issues of an emerging technology," International Journal of Information Management, vol. 74, no. February, pp. 2-7, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0268401223000816.
[7] W. Samuel Fosso, W.-T. Serge-Lopez, Q. Lu, and M. M. Queiroz, "How emerging technologies can solve critical issues in organizational operations: An analysis of blockchain-driven projects in the public sector," Government Information Quarterly, vol. 41, no. 1, pp. 1-4, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0740624X24000042.
[8] P. A. Sarasti, "Constitutional Rights, Human Rights and Information and Communication Technologies in Ecuador," Migration Letters, vol. 20, no. S10, pp. 1150-1158, 2023. [Online]. Available: https://migrationletters.com/index.php/ml/article/view/5493.
[9] S. Turner and T. Leonie Maria, "In principle vs in practice: User, expert and policymaker attitudes towards the right to data portability in the internet of things," Computer Law & Security Review, vol. 52, no. April, pp. 1-5, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S026736492300122X.
[10] D. Božanić, A. Milić, D. Tešić, W. Salabun, and D. Pamučar, "D NUMBERS – FUCOM – FUZZY RAFSI MODEL FOR SELECTING THE GROUP OF CONSTRUCTION MACHINES FOR ENABLING MOBILITY," Facta Universitatis, Series: Mechanical Engineering, vol. 19, no. 3, p. 447, 2021. [Online]. Available: http://casopisi.junis.ni.ac.rs/index.php/FUMechEng/article/view/7578.
[11] B. D. Rouyendegh and Ş. Savalan, "An Integrated Fuzzy MCDM Hybrid Methodology to Analyze Agricultural Production," Sustainability, vol. 14, no. 8, p. 4835, 2022. [Online]. Available: https://www.mdpi.com/2071-1050/14/8/4835.
[12] E. González Caballero, M. Leyva Vázquez, and F. Smarandache, "On neutrosophic uninorms," Neutrosophic Sets and Systems, vol. 45, no. 2021, pp. 340-348, 2021. [Online]. Available: https://digitalrepository.unm.edu/nss_journal/vol45/iss1/22.
[13] B. Karaduman, B. T. Tezel, and M. Challenger, "On the impact of fuzzy-logic based BDI agent model for cyber–physical systems," Expert Systems with Applications, vol. 238, no. Part E, p. 122265, 2024/03/15/ 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0957417423027677.
[14] K. Jaramillo, J. Quilambaqui, and J. Yanez, "Blockchain in Healthcare from a Neutrosophic Analysis," International Journal of Neutrosophic Science, vol. 18, no. 3, pp. 177-188, 01/01 2022. [Online]. Available: https://www.americaspg.com/articleinfo/21/show/1084.