The Challenges of Using Big Data in the Consumer Credit Sector
Vol. 2. , Springer, 2021
, , et al., , in: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy. .: ACM, 2018.. P. 60-71.
Distance-bounding (DB) protocols protect against relay attacks on proximity-based access control systems. In a DB protocol, the verifier computes an upper bound on the distance to the prover by measuring the time-of-flight of exchanged messages. DB protocols are, however, vulnerable to distance fraud, in which a dishonest prover is able to manipulate the distance bound ...
Added: November 10, 2018
, , et al., , in: Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age. .: NY: Association for Computing Machinery (ACM), 2018.. Ch. 123. P. 1-4.
In this panel, scholars discuss involving data, computational analysis, and information technology that has the potential to present ethical quandaries in the course of decision making related to digital government. More specifically, the presentations focus on algorithm-based decision making, personally identifiable information, and the manipulation of public opinion in social media channels. Discussion following the ...
Added: June 9, 2018
, , , , in: SPBPU IDE '19: Proceedings of the 2019 International SPBPU Scientific Conference on Innovations in Digital Economy. .: NY, United States of America: Association for Computing Machinery (ACM), 2019.. Ch. 21. P. 1-6.
The paper is dedicated to developing a system for identifying and assessing cyber-risks to support investment decision-making in a machine industry enterprise. It is designed for projects related to high-tech equipment development and introduction. The problem is acute because the existing methods of cyber-risk analysis have some drawbacks, which prevent them from being used at ...
Added: March 25, 2020
, М.: Московский институт государственного управления и права, 2017
Added: January 31, 2017
, , , Закон 2021 № Август С. 85-95
The article is devoted to the study of diverse ethical problems in the scope of development and deployment of the artificial intelligence as part of its growing importance and influence on different spheres of individuals’ lives and on society, especially on the moral sphere. Considering ethics as a product of the human and society evolution, the authors assume that at ...
Added: October 19, 2021
, , et al., Information and Computation 2014 No. 238 P. 233-261
In a collaborative system, the agents collaborate to achieve a common goal, but they are not willing to share some sensitive private information. The question is how much damage can be done by a malicious participant sitting inside the system. We assume that all the participants (including internal adversaries) have bounded memory – at any moment, they ...
Added: March 23, 2015
, , Journal of Digital Media & Policy 2021 Vol. 12 No. 1 P. 47-65
This article investigates how digital surveillance tools used by East Asian governments against COVID-19 affect privacy and personal data protection. It applies doctrinal legal analysis and case study to compare national regulations of these tools as well as their implementation in China, Hong Kong, Macau, Taiwan, Japan and South Korea. The approaches range considerably from ...
Added: October 23, 2020
, Cambridge Review of International Affairs 2017 Vol. 30 No. 2-3 P. 177-194
Conceptualizing the EU as a postmodern cooperative power that “transcends realism” provides ideological scaffolding for an exclusive conception of “Europe” and veils a zero-sum geopolitical project as “European integration”. Neoclassical realism considers assigning morally opposite political identities to the EU and Russia to be “rational” to the extent it strengthens internal cohesion and mobilizes resources ...
Added: October 2, 2018
, , Computer Law & Security Review 2018 Vol. 34 No. 3 P. 496-507
This paper presents an analysis of Russian data retention regulations. The most controversial point of the Russian data retention requirements is an obligation to keep the content of communications that is untypical for legislation of European and other countries. These regulations that oblige telecom operators and Internet communication services to store the content of communications ...
Added: December 15, 2017
Ethical Liberal Values vs. the Soviet Political and Administrative Heritage from the 1980s to the Present
, , in: Dimensions and Challenges of Russian Liberalism: Historical Drama and New Prospects. Vol. 8.: Cham: Springer, 2019.. P. 123-138.
The subject of this chapter is the ethical and sociological aspects of events during perestroika and after. At that time, Russia reached the zenith of liberal ethical values, of romantic hopes and expectations and public demands for justice and the accountability of public authorities. Unfortunately, substantial underestimation of the importance of non-economic factors—especially moral ones—in ...
Added: November 28, 2018
, The Russian Journal of Communication 2017 Vol. 9 No. 3 P. 297-298
But, the main thing is the ambiguous consequences of such marketization, including political communication and morality. This is a paradoxical situation. The growth of the amount and availability of information is accompanied by a divergence in society. Thanks to social networks, online self-sufficient communities are formed, the members of which are husking each other, fighting ...
Added: January 11, 2018
, , Мониторинг общественного мнения: Экономические и социальные перемены 2021 Т. 163 № 3 С. 4-20
This article is an Introduction to the special issue of the journal, which is focused on the recent transformations of professions and occupations. The main purpose of the article is to analyze the contemporary social, technological, and economic context, in which Russian professions and occupations are, and to review the latest research in this field conducted both in Russia and abroad. First, we identify key ...
Added: September 7, 2021
, , , Fighting Cyber-Attacks with Sanctions: New Threats, Old Responses / Высшая школа экономики. Series LAW "Law". 2020. No. 96.
This paper contributes to the understanding of why states resort to ‘good old’ sanctions to meet the relatively new threat of cyber intrusions and whether this type of response is a forced measure or an effective tool to halt, prevent and punish attacking states. The tools of analysis used in this paper are legal positivism, ...
Added: December 8, 2020
, В кн.: Трансцендентальный поворот в современной философии-5: трансцендентальный метод и современная наука (естествознание, математика, когнитивные науки, теология, этика): тезисы 5-го международного научного семинара «Трансцендентальный поворот в современной философии» (Москва, 23–25 апреля 2020 г.). .: М.: ГАУГН–Пресс, Фонд ЦГИ, 2020..
This volume presents the abstracts of the 5th annual Moscow international workshop «Transcendental Turn in Contemporary Philosophy: the transcendental method and modern science», devoted to the discussion of the transcendental method as a methodological and theoretical basis of transcendental philosophy in its Kantian, neo-Kantian and phenomenological modes, as well as applied transcendental modes in various ...
Added: September 17, 2020
Легализация «массовой слежки» Европейским Судом по правам человека: что стоит за постановлением по делу Биг Бразер Вотч и другие против Соединённого Королевства?
, Международное правосудие 2018 № 4 С. 3-20
On September 13, 2018, the European Court of Human Rights rendered a judgment in the case of Big Brother Watch and Others v. United Kingdom, in which it examined whether the legal acts of the UK on the mass interception of communications and its meta-data, as well as the intelligence sharing regime with foreign intelligence agencies, corresponds ...
Added: January 11, 2019
, The New York Times 2016
With thousands of refugees arriving in Europe each day and xenophobia clearly on display in many western countries, this short article reflects on the nature of exclusionary nationalism as well as the importance of hospitality for our human communities. ...
Added: December 18, 2017
It is our great pleasure to welcome you to the Fourth ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC) in conjunction with the 25th ACM Conference on Computer and Communications Security (CCS) in Toronto, Canada. Our increased dependency on cyber-physical systems (CPS) has amplified concerns of cyber attacks on these systems. These transformative attack methods ...
Added: November 10, 2018
Cham: Springer, 2021
Global health is a rapidly emerging discipline with a transformative potential for public policy and international development. Emphasizing transnational health issues, global health aims to improve health and achieve health equity for all people worldwide. Its multidisciplinary scope includes contributions from many disciplines within and beyond the health sciences, including clinical medicine, public health, social ...
Added: February 4, 2021
, В кн.: Философия. Язык. Культура (Вып.3). Вып. 3.: СПб.: Алетейя, 2012.. Гл. 13. С. 145-154.
The problem of free will remains one of the primary unsolved problems of John Sealre’s philosophy. In his book ‘Freedom and Neurobilology’ (2007) Searle proposes two alternative hypothesis that would allow one to make sense of the nature of freedom, but ultimately finds both of them unsatisfactory. In this paper we propose a modified version ...
Added: February 16, 2013
, , Вестник Института экономики РАН 2019 № 5 С. 43-61
The article analyses a new phenomenon in contemporary global world, namely, digital shadow economy. There given a theoretical analysis of this area, with description of its forms, main actors and other basic characteristics. A brief review of its quantitative indicators is submitted. The authors have elaborated an original fundamental approach to a digital shadow economy ...
Added: October 31, 2019
, , in: International Perspectives of Multiculturalism: The Ethical Challenges. .: Nova Science Publishers, 2015.. Ch. 1. P. 1-23.
There is much disagreement among scholars about the concepts of multiculturalism and assimilation. As a consequence, they are polysemic and in need of both differentiation and homogenisation. In this chapter, Mahama Tawat will seek to differentiate between the ethical considerations of Assimilation, Liberal Nationalism and Multiculturalism by examining the theoretical frameworks proposed by David Miller ...
Added: December 14, 2015
Громче скажешь — раньше выйдешь? Этические и тактические основания использования публичности как тактики судебной защиты в России
, Мониторинг общественного мнения: Экономические и социальные перемены 2021 № 3 С. 450-471
Russian mass media often cover court cases, certain circumstances of which may be of public importance. In several cases, such attention arises for a reason as a part of the tactics of one of the litigants. In this article, based on the materials of expert interviews with criminal defense lawyers and court journalists, we consider ...
Added: October 12, 2021
, Каз.: Изд-во Казанского инновационного ун-та им. В. Г. Тимирясова (ИЭУП), 2016
The boor develops a new approach to the study of social reality in its denamics based on the revealing of connections between social and anthropological phenomena. The fundament of the approach is synergic anthropology, in the frame work of which the apparatus for the description and analysis or the "colonization" of the interface of the ...
Added: September 20, 2017