Criminalistic prediction and criminalistic prevention of cyber crimes in the field of healthcare
( Pp. 265-278)
More about authors
Perepechina Irina Olegovna
d-r med. nauk, professor, deystvitelnyy chlen Rossiyskoy akademii estestvennyh nauk (RAEN), yuridicheskiy fakultet.
Lomonosov Moscow State University
Moscow, Russia Perepechin Dmitry Vladimirovich kand. med. nauk, starshiy nauchnyy sotrudnik, sovetnik Rossiyskoy akademii estestvennyh nauk (RAEN)
N. Lopatkin Scientific Research Institute of Urology and Interventional Radiology - branch of the National Medical Research Radiologiсal Center of the Ministry of Health of Russian Federation
Lomonosov Moscow State University
Moscow, Russia Perepechin Dmitry Vladimirovich kand. med. nauk, starshiy nauchnyy sotrudnik, sovetnik Rossiyskoy akademii estestvennyh nauk (RAEN)
N. Lopatkin Scientific Research Institute of Urology and Interventional Radiology - branch of the National Medical Research Radiologiсal Center of the Ministry of Health of Russian Federation
Abstract:
The aim of the work is to deal with the current state of the problem of cybersecurity of healthcare institutions in the context of the widespread introduction of information and telecommunication technologies in medical practice. It has been shown that medical institutions are very vulnerable to cyber attacks, which have already become a reality today. The forensic signs of crimes committed through cyber attacks on health care institutions have been investigated; a prognostic model of the forensic characteristics of the corresponding crimes has been developed. Taking into account the experience gained in connection with the COVID-19 pandemic, an opinion was expressed on the advisability of developing legal acts related to countering cyber attacks on medical institutions in special situations (in an emergency, in a situation of high alert). A complex of systemic, multilevel preventive measures to ensure the cybersecurity of medical institutions is presented. It has been substantiated that until a serious restructuring of the entire work in the field of information security in the healthcare sector and the creation of appropriate guarantees, it is unacceptable to adopt any legal acts that promote access to medical data and potentially create a risk of their unauthorized use.
How to Cite:
Perepechina I.O., Perepechin D.V., (2020), CRIMINALISTIC PREDICTION AND CRIMINALISTIC PREVENTION OF CYBER CRIMES IN THE FIELD OF HEALTHCARE. Gaps in Russian Legislation, 5 => 265-278.
Reference list:
Anosov A.V. Spetsial no-kriminologicheskoe preduprezhdenie prestupleniy, sovershaemykh s ispol zovaniem vysokikh tekhnologiy // Trudy Akademii upravleniya MVD Rossii. 2018. T. 48. № 4. S. 93-97.
Bevza D. Skrytaya ugroza: internet veshchey. URL: https://www.gazeta.ru/tech/2018/01/06/11573180/iot is not safe.shtml (data obrashcheniya: 01.08.2020).
Butorina E. Kibermeditsinskiy detektiv // Profil . 2020. № 2. S. 24-27.
Enikolopov S.N., Mkrtchyan A.A. Psikhologicheskie posledstviya terrorizma i rol SMI v protsesse ikh formirovaniya // Natsional nyy psikhologicheskiy zhurnal. 2010. № 2(4). C. 41-46.
Kazarnovskiy P., Gubernatorov E. Dannye o voennykh bazakh SSHA stali dostupny blagodarya fitnes-trekeram. 29 yanvarya 2018 g. URL: https://www.rbc.ru/politics/ 29/01/2018/5a6e92369a7947613df97252 (Data obrashcheniya: 01.08.2020).
Karev A.A. Bol shoy FAQ po kiberbezopasnosti meditsinskikh informatsionnykh sistem (17 iyulya 2019). URL: https://habr.com/ru/post/460361 (data obrashcheniya: 01.08.2020).
Kondrashova N., Istomina M. KHakery potrebovali vykup posle ataki na bol nitsy po vsey Velikobritanii. 12 maya 2017. URL: https://www.rbc.ru/society/12/05/ 2017/5915cb609a794752f6b24e9d (Data obr.: 01.08.20).
Lebedev G.S., SHaderkin I.A., Fomina I.V. i dr. Internet meditsinskikh veshchey: pervye shagi po sistematizatsii // ZHurnal telemeditsiny i elektronnogo zdravookhraneniya. 2017. № 3. URL: http://jtelemed.ru/article/inter-net-medicinskih-veshhej-pervye-shagi-po-sistematizacii (data obrashcheniya: 01.08.2020).
Lyapin D. Kiberbezopasnost dlya sistem videonablyudeniya: ugrozy i riski. 22 noyabrya 2017 g. URL: https://ru-bezh.ru/svoimi-slovami/19192-kiberbezopasnost-dlya-sistem-videonablyudeniya-ugrozyi-i-riski (data obrashcheniya: 01.08.2020).
Mal tseva D. Resheniya IoT v zdravookhranenii. Internet meditsinskikh veshchey. 22 oktyabrya 2018. URL: https://blak-it.com/ru/blog/iot-applications-in-healthcare-internet-of-medical-things (data obrashcheniya: 01.08.2020).
Makhtaev M.SH. Tekhniko-kriminalisticheskoe obespechenie preduprezhdeniya prestupleniy / V kn.: Teoreticheskie i prikladnye problemy kriminalisticheskoy tekhniki: nauch.-prakt. posobie / pod red. N.N. Egorova. Gl. 4. M.: YUrlitinform, 2018. S. 54.
Perepechina I.O., Perepechin D.V. Vrachebnaya tayna v realiyakh sovremennoy meditsiny: kriminalisticheskie aspekty. V sb.: Kriminalistika i sudebnaya meditsina: voprosy teorii i praktiki: sbornik nauchnykh trudov. Pod red. I.O. Perepechinoy i A.M. Bagmeta. - M.: OOO Buki Vedi , 2018. S. 194-204.
Perepechina I.O., Perepechin D.V. Ispol zovanie innovatsionnykh tsifrovykh tekhnologiy v meditsine: kriminalisticheskie aspekty // Kriminalistika i sudebnaya ekspertologiya: nauka, obuchenie, praktika XV. Tom I. Sostavitel : G. YUodkayte-Granskiene. TSentr sudebnoy ekspertizy Litvy, Litovskoe obshchestvo kriminalistov, Universitet Mikolasa Romerisa. Kaunas, 2019. S. 256-272.
Perepechina I.O., Smirnova D.V., Kupryashina N.A., Perepechin D.V. Sovremennoe sostoyanie problemy razrabotki kriminalisticheskoy kharakteristiki prestupleniy, sovershennykh meditsinskimi rabotnikami protiv zhizni i zdorov ya / V sb.: Problemy vyyavleniya i rassledovaniya prestupleniy v sfere okazaniya meditsinskikh uslug: materialy Vserossiyskogo nauchno-prakticheskogo kruglogo stola , g. Sankt-Peterburg, 15 aprelya 2016 g. Pod obshch. red. A.M. Bagmeta. M.: Akademiya Sledstvennogo komiteta Rossiyskoy Federatsii, 2016. S. 81-90.
Prizova E. V Tyumeni khakery atakovali tsentr neyrokhirurgii vo vremya operatsii // Rossiyskaya gazeta. 06.07.2018. URL: https://rg.ru/2018/07/06/reg-urfo/centr-nejrohirurgii-v-tiumeni-podvergsia-hakerskoj-atake.html (data obrashcheniya: 01.08.2020).
Smirnov I.S. Opyt postroeniya sluzhby telemeditsinskikh konsul tatsiy soglasno Reglamentu Ministerstva zdravookhraneniya Rossiyskoy Federatsii. Doklad na XXIII Ezhegodnoy Sessii NMITS SSKH im. A.N. Bakuleva 10 maya 2019 g.
Sundiev I.YU., Smirnov A.A. Mediaresursy v ekstremistskoy i terroristicheskoy deyatel nosti: funktsional nyy analiz. URL: http://spkurdyumov.ru/net-works/mediaresursy-v-ekstremistskoj-i-terroristicheskoj-deyatelnosti (data obrashcheniya: 01.06.2020).
Sukhorukov R.A., Terekhov A.M. Obosnovanie vzaimosvyazi prestupnosti i kachestva zhizni naseleniya // Territoriya nauki. 2018. № 1. S. 152 - 160.
KHanipov R.A. Ukorenennost tyuremnykh i kriminal nykh praktik v kul ture sovremennogo rossiyskogo obshchestva // Mir. 2008. № 3. S. 132-148.
Camara S., Peris-Lopez P., Tapiador J.E. Security and privacy issues in implantable medical devices: A comprehensive survey // Journal of Biomedical Informatics. 2015. № 55. Rp. 272-289.
Chunxiao L., Raghunathan A., Jha N. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system // 13th IEEE International Conference on e-Health Networking Applications and Services, 2011. Pp. 150-156.
Costa S.A., Pasluosta C.F., Eskofier B., et al. Internet of Health Things: Toward intelligent vital signs monitoring in hospital wards // Artificial Intelligence in Medicine. 2018. № 89. Pp. 61-69.
de Sousa M., Klein G., Korte T., Niehaus M. Electromagnetic interference in patients with implanted cardioverter-defibrillators and implantable loop recorders // Indian Pac. Electrophys. Journal. 2002. № 2. Pp. 79-84.
Fu K. Inside risks: reducing risks of implantable medical devices // ACM Commun. 2009. № 52. Rp. 25-27.
Gregg M. Why Your Medical Records Are No Longer Safe // HuffPost. 01/17/2013. URL: https://www.huffpost.com/entry/privacy-medical-records b 2473458, accessed 01.08.2020.
Halperin D., Heydt-Benjamin T.S., Ransford B., et. al. Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses / In: Proc. of the 29th Annual IEEE Symposium on Security and Privacy. 2008. Rp. 129-142.
Hansen J.A., Hansen N.M. A taxonomy of vulnerabilities in implantable medical devices / Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems, SPIMACS 10, ACM, New York, USA, 2010. Pp. 13-20.
Hei X., Du X., Wu J., Hu F. Defending resource depletion attacks on implantable medical devices / In: Proc. of IEEE Global Telecommunications Conference (GLOBECOM). 2020. Rp. 1-5.
Levin A. Physician Heal Thyself: Are Your Medical Records Safe // HuffPost. 2016. Karev A.A. Op.cit.
Li C., Raghunathan A., Jha N.K., Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: 13th IEEE International Conference on e-Health Networking Applications and Services (Healthcom). June 2011. Rp. 150-156.
Marin E., Singel e D., Garcia F., et. al. On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them // Proceedings of the 32nd Annual Conference on Computer Security Applications. 2016. P. 226-236. DOI.10.1145/2991079.2991094. URL: https://www.researchgate.net/publication/311491860 On the insecurity of the latest generation implantable cardiac defibrillators and how to secure them, accessed 01.08.2020.
Mohamad A.A. Is Your Company Ready for a Ransomware Attack // Harvard Business Review (Digital). 2016. TSit. po: Karev A.A. Ukaz. soch. Karev A.A. Op.cit.
Nacos B.L. Terrorism and media: from Iran Hostage to the World Trade Center Bombing. N.Y., 1994. Pp. 7-8. TSitir. po: Sundiev I.YU., Smirnov A.A. Ukaz. soch. Sundiev I.Yu., Smirnov A.A. Op.cit.
Rathore H., Fu C., Mohamed A., et al. Multi-layer security scheme for implantable medical devices // Neural Computing and Applications. 2018 (30). Rp. 1-14. DOI: 10.1007/s00521-018-3819-0
Rathore H., Mohamed A., Al-Ali A.K., et al. A review of security challenges, attacks and resolutions for wireless medical devices // 13th International Wireless Communications and Mobile Computing Conference (IWCMC) IEEE 26-30 June 2017 DOI:10.1109/IWCMC.2017.7986505
Rostami M., Burleson W., Koushanfa F., Juels A. Balancing security and utility in medical devices / The 50th Annual Design Automation Conference, DAC 13, Austin, TX, USA (2013), 13:1-13:6.
Weintraub R., Borenstein J. 11 Things the Health Care Sector Must Do to Improve Cybersecurity // Harvard Business Review. June 01, 2017. URL: https://hbr.org/2017/06/ 11-things-the-health-care-sector-must-do-to-improve-cybersecurity, accessed 01.08.2020. 31
Bevza D. Skrytaya ugroza: internet veshchey. URL: https://www.gazeta.ru/tech/2018/01/06/11573180/iot is not safe.shtml (data obrashcheniya: 01.08.2020).
Butorina E. Kibermeditsinskiy detektiv // Profil . 2020. № 2. S. 24-27.
Enikolopov S.N., Mkrtchyan A.A. Psikhologicheskie posledstviya terrorizma i rol SMI v protsesse ikh formirovaniya // Natsional nyy psikhologicheskiy zhurnal. 2010. № 2(4). C. 41-46.
Kazarnovskiy P., Gubernatorov E. Dannye o voennykh bazakh SSHA stali dostupny blagodarya fitnes-trekeram. 29 yanvarya 2018 g. URL: https://www.rbc.ru/politics/ 29/01/2018/5a6e92369a7947613df97252 (Data obrashcheniya: 01.08.2020).
Karev A.A. Bol shoy FAQ po kiberbezopasnosti meditsinskikh informatsionnykh sistem (17 iyulya 2019). URL: https://habr.com/ru/post/460361 (data obrashcheniya: 01.08.2020).
Kondrashova N., Istomina M. KHakery potrebovali vykup posle ataki na bol nitsy po vsey Velikobritanii. 12 maya 2017. URL: https://www.rbc.ru/society/12/05/ 2017/5915cb609a794752f6b24e9d (Data obr.: 01.08.20).
Lebedev G.S., SHaderkin I.A., Fomina I.V. i dr. Internet meditsinskikh veshchey: pervye shagi po sistematizatsii // ZHurnal telemeditsiny i elektronnogo zdravookhraneniya. 2017. № 3. URL: http://jtelemed.ru/article/inter-net-medicinskih-veshhej-pervye-shagi-po-sistematizacii (data obrashcheniya: 01.08.2020).
Lyapin D. Kiberbezopasnost dlya sistem videonablyudeniya: ugrozy i riski. 22 noyabrya 2017 g. URL: https://ru-bezh.ru/svoimi-slovami/19192-kiberbezopasnost-dlya-sistem-videonablyudeniya-ugrozyi-i-riski (data obrashcheniya: 01.08.2020).
Mal tseva D. Resheniya IoT v zdravookhranenii. Internet meditsinskikh veshchey. 22 oktyabrya 2018. URL: https://blak-it.com/ru/blog/iot-applications-in-healthcare-internet-of-medical-things (data obrashcheniya: 01.08.2020).
Makhtaev M.SH. Tekhniko-kriminalisticheskoe obespechenie preduprezhdeniya prestupleniy / V kn.: Teoreticheskie i prikladnye problemy kriminalisticheskoy tekhniki: nauch.-prakt. posobie / pod red. N.N. Egorova. Gl. 4. M.: YUrlitinform, 2018. S. 54.
Perepechina I.O., Perepechin D.V. Vrachebnaya tayna v realiyakh sovremennoy meditsiny: kriminalisticheskie aspekty. V sb.: Kriminalistika i sudebnaya meditsina: voprosy teorii i praktiki: sbornik nauchnykh trudov. Pod red. I.O. Perepechinoy i A.M. Bagmeta. - M.: OOO Buki Vedi , 2018. S. 194-204.
Perepechina I.O., Perepechin D.V. Ispol zovanie innovatsionnykh tsifrovykh tekhnologiy v meditsine: kriminalisticheskie aspekty // Kriminalistika i sudebnaya ekspertologiya: nauka, obuchenie, praktika XV. Tom I. Sostavitel : G. YUodkayte-Granskiene. TSentr sudebnoy ekspertizy Litvy, Litovskoe obshchestvo kriminalistov, Universitet Mikolasa Romerisa. Kaunas, 2019. S. 256-272.
Perepechina I.O., Smirnova D.V., Kupryashina N.A., Perepechin D.V. Sovremennoe sostoyanie problemy razrabotki kriminalisticheskoy kharakteristiki prestupleniy, sovershennykh meditsinskimi rabotnikami protiv zhizni i zdorov ya / V sb.: Problemy vyyavleniya i rassledovaniya prestupleniy v sfere okazaniya meditsinskikh uslug: materialy Vserossiyskogo nauchno-prakticheskogo kruglogo stola , g. Sankt-Peterburg, 15 aprelya 2016 g. Pod obshch. red. A.M. Bagmeta. M.: Akademiya Sledstvennogo komiteta Rossiyskoy Federatsii, 2016. S. 81-90.
Prizova E. V Tyumeni khakery atakovali tsentr neyrokhirurgii vo vremya operatsii // Rossiyskaya gazeta. 06.07.2018. URL: https://rg.ru/2018/07/06/reg-urfo/centr-nejrohirurgii-v-tiumeni-podvergsia-hakerskoj-atake.html (data obrashcheniya: 01.08.2020).
Smirnov I.S. Opyt postroeniya sluzhby telemeditsinskikh konsul tatsiy soglasno Reglamentu Ministerstva zdravookhraneniya Rossiyskoy Federatsii. Doklad na XXIII Ezhegodnoy Sessii NMITS SSKH im. A.N. Bakuleva 10 maya 2019 g.
Sundiev I.YU., Smirnov A.A. Mediaresursy v ekstremistskoy i terroristicheskoy deyatel nosti: funktsional nyy analiz. URL: http://spkurdyumov.ru/net-works/mediaresursy-v-ekstremistskoj-i-terroristicheskoj-deyatelnosti (data obrashcheniya: 01.06.2020).
Sukhorukov R.A., Terekhov A.M. Obosnovanie vzaimosvyazi prestupnosti i kachestva zhizni naseleniya // Territoriya nauki. 2018. № 1. S. 152 - 160.
KHanipov R.A. Ukorenennost tyuremnykh i kriminal nykh praktik v kul ture sovremennogo rossiyskogo obshchestva // Mir. 2008. № 3. S. 132-148.
Camara S., Peris-Lopez P., Tapiador J.E. Security and privacy issues in implantable medical devices: A comprehensive survey // Journal of Biomedical Informatics. 2015. № 55. Rp. 272-289.
Chunxiao L., Raghunathan A., Jha N. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system // 13th IEEE International Conference on e-Health Networking Applications and Services, 2011. Pp. 150-156.
Costa S.A., Pasluosta C.F., Eskofier B., et al. Internet of Health Things: Toward intelligent vital signs monitoring in hospital wards // Artificial Intelligence in Medicine. 2018. № 89. Pp. 61-69.
de Sousa M., Klein G., Korte T., Niehaus M. Electromagnetic interference in patients with implanted cardioverter-defibrillators and implantable loop recorders // Indian Pac. Electrophys. Journal. 2002. № 2. Pp. 79-84.
Fu K. Inside risks: reducing risks of implantable medical devices // ACM Commun. 2009. № 52. Rp. 25-27.
Gregg M. Why Your Medical Records Are No Longer Safe // HuffPost. 01/17/2013. URL: https://www.huffpost.com/entry/privacy-medical-records b 2473458, accessed 01.08.2020.
Halperin D., Heydt-Benjamin T.S., Ransford B., et. al. Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses / In: Proc. of the 29th Annual IEEE Symposium on Security and Privacy. 2008. Rp. 129-142.
Hansen J.A., Hansen N.M. A taxonomy of vulnerabilities in implantable medical devices / Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems, SPIMACS 10, ACM, New York, USA, 2010. Pp. 13-20.
Hei X., Du X., Wu J., Hu F. Defending resource depletion attacks on implantable medical devices / In: Proc. of IEEE Global Telecommunications Conference (GLOBECOM). 2020. Rp. 1-5.
Levin A. Physician Heal Thyself: Are Your Medical Records Safe // HuffPost. 2016. Karev A.A. Op.cit.
Li C., Raghunathan A., Jha N.K., Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: 13th IEEE International Conference on e-Health Networking Applications and Services (Healthcom). June 2011. Rp. 150-156.
Marin E., Singel e D., Garcia F., et. al. On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them // Proceedings of the 32nd Annual Conference on Computer Security Applications. 2016. P. 226-236. DOI.10.1145/2991079.2991094. URL: https://www.researchgate.net/publication/311491860 On the insecurity of the latest generation implantable cardiac defibrillators and how to secure them, accessed 01.08.2020.
Mohamad A.A. Is Your Company Ready for a Ransomware Attack // Harvard Business Review (Digital). 2016. TSit. po: Karev A.A. Ukaz. soch. Karev A.A. Op.cit.
Nacos B.L. Terrorism and media: from Iran Hostage to the World Trade Center Bombing. N.Y., 1994. Pp. 7-8. TSitir. po: Sundiev I.YU., Smirnov A.A. Ukaz. soch. Sundiev I.Yu., Smirnov A.A. Op.cit.
Rathore H., Fu C., Mohamed A., et al. Multi-layer security scheme for implantable medical devices // Neural Computing and Applications. 2018 (30). Rp. 1-14. DOI: 10.1007/s00521-018-3819-0
Rathore H., Mohamed A., Al-Ali A.K., et al. A review of security challenges, attacks and resolutions for wireless medical devices // 13th International Wireless Communications and Mobile Computing Conference (IWCMC) IEEE 26-30 June 2017 DOI:10.1109/IWCMC.2017.7986505
Rostami M., Burleson W., Koushanfa F., Juels A. Balancing security and utility in medical devices / The 50th Annual Design Automation Conference, DAC 13, Austin, TX, USA (2013), 13:1-13:6.
Weintraub R., Borenstein J. 11 Things the Health Care Sector Must Do to Improve Cybersecurity // Harvard Business Review. June 01, 2017. URL: https://hbr.org/2017/06/ 11-things-the-health-care-sector-must-do-to-improve-cybersecurity, accessed 01.08.2020. 31
Keywords:
COVID-19, cybersecurity, cyberthreat, cyberattack, COVID-19, patient confidentiality, medical information systems, Internet of medical things, artificial intelligence, telemedicine.
Related Articles
History and Theory of Politics Pages: 15-23 DOI: 10.33693/2223-0092-2024-14-5-15-23 Issue №152162
Some United States of America Approaches to Cyber Deterrence
cybernetic space
information space
security of cybernetic space
cybersecurity
cyberattack
Show more
3. PRIVATE LAW (CIVIL) DISCIPLINES Pages: 142-150 Issue №19964
Modern Military Technologies and the Responsibility of a Scientist, Creator, Operator, etc.: Some Approaches of the BRICS Countries
BRICS countries
Russia
China
new military technologies
unmanned vehicles
Show more
9. CRIMINAL LAW AND CRIMINOLOGY; CRIMINAL ENFORCEMENT LAW 12.00.08 Pages: 180-183 Issue №19457
The Problem of Regulatory Imputation of Liability for Damage Caused by Autonomous Robotic Systems
robot
robotics
artificial intelligence
harm
legal regulation
Show more
4. CRIMINAL LAW (5.1.4.) Pages: 183-189 Issue №22457
State and Trends of Cybercrime in Russia and Foreign Countries
cybercrime
counteraction
cyber threat
public-private partnership
cybersecurity
Show more
SPECIALTY 12.00.03 Pages: 135-139 Issue №14694
ARTIFICIAL INTELLIGENCE: LEGAL STATUS, PROBLEMS OF DEFINING AND PROSPECTS OF USAGE IN LAW
artificial intelligence
robots
digital legal person
rights of artificial intelligence
Show more
8. CIVIL LAW; ENTREPRENEURIAL LAW; FAMILY LAW; INTERNATIONAL PRIVATE LAW Pages: 152-156 Issue №14823
COPYRIGHT FOR SCIENTIFIC DEVELOPMENTS IN ARTIFICIAL INTELLIGENCE IN CHINA: LAW AND ENFORCEMENT PRACTICE
artificial intelligence
author's right
originality
work
creativity
Show more
Ontology and Theory of Cognition Pages: 211-215 DOI: 10.33693/2223-0092-2024-14-2-211-215 Issue №100812
The Teaching of Double Effect and Artificial Intelligence
ethics
artificial intelligence
virtual reality
doctrine of double consequence
internalism
Show more
5. CIVIL LAW, BUSINESS LAW, FAMILY LAW; PRIVATE INTERNATIONAL LAW 12.00.03 Pages: 165-171 Issue №17852
Features and prospects of the reform of the Russian legislation in the sphere of digitalization
digitalization
information and analytical systems
legal regulation
personal data protection
information security
Show more
REGIONAL AND SECTORAL ECONOMICS Pages: 185-191 Issue №24067
Risks of Artificial Intelligence Development in Selected Branches of Russian Economy
risks
artificial intelligence
investment climate
development programmes and projects.
Show more
Social and Political Philosophy Pages: 202-206 DOI: 10.33693/2223-0092-2024-14-4-202-206 Issue №131736
Artificial Intelligence vs Human Mind
philosophical knowledge
artificial intelligence
social and philosophical understanding
ethical problems
philosophy
Show more