Author:
Khisamova Zarina I.,Begishev Ildar R.
Publisher
Springer Nature Singapore
Reference39 articles.
1. Agre, P. E. (1994). Surveillance and capture: Two models of privacy. The Information Society, 10(2), 101–127. https://doi.org/10.1080/01972243.1994.9960162
2. Begishev, I. R., Khisamova, Z. I, & Mazitova, G. I. (2019). Information Infrastructure of Safe Computer Attack. HELIX, 9(5), 5639–5642. https://doi.org/10.29042/2019-5639-5642
3. Bikeev, I., Kabanov, P., Begishev, I., & Khisamova, Z. (2019). Criminological Risks and Legal Aspects of Artificial Intelligence Implementation. PervasiveHealth: Pervasive Computing Technologies for Healthcare, a20. https://doi.org/10.1145/3371425.3371476
4. Bokovnya, A. Y., Begishev, I. R., Bikeev, I. I., Almuhamedova, I. R., Bersei, D. D., & Nechaeva, N. B. (2020a). Analysis of Russian judicial practice in cases of information security. International Journal of Engineering Research and Technology, 13(12), 4602–4605.
5. Bokovnya, A. Y., Begishev, I. R., Khisamova, Z. I., Bikeev, I. I., Sidorenko, E. L., & Bersei, D. D. (2020b). Pressing issues of unlawful application of artificial intelligence. International Journal of Criminology and Sociology, 9, 1054–1057. https://doi.org/10.6000/1929-4409.2020.09.119
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献