[go: up one dir, main page]

Baker et al., 2020 - Google Patents

Artificial intelligence and the law: Cybercrime and Criminal Liability

Baker et al., 2020

Document ID
504296516888048187
Author
Baker D
Robinson P
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30817Information retrieval; Database structures therefor; File system structures therefor of video data using information manually generated or using information not derived from the video content, e.g. time and location information, usage information, user ratings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content

Similar Documents

Publication Publication Date Title
Baker et al. Artificial intelligence and the law: Cybercrime and Criminal Liability
Rawat et al. Organ trafficking on the dark web—The data security and privacy concern in healthcare systems
Monahan Surveillance in the Time of Insecurity
Britz Computer forensics and cyber crime: An introduction, 2/e
Mills Privacy: the lost right
Marcum et al. Cybercrime
Rieznik et al. Strategies and Challenges of Combating Cyber-Financial Fraud: An Analysis of Ukraine's Experience During the Military Conflict
Opderbeck Cybersecurity and Data Breach Harms: Theory and Reality
Wilson Collaborative justice and harm reduction in cyberspace: Policing indecent child images
Baker et al. Emerging technologies and the criminal law
Lipton Our data, ourselves: a personal guide to digital privacy
Pamplin Virtual currencies and the implications for US anti-money laundering regulations
Alhammadi The use of cryptocurrency as a legal tender: A legal assessment
Rieznik et al. Examining Ukraine's Approaches and Obstacles in Addressing Cyber-Financial Fraud Amid Armed Conflict
Chandra Examining the Contours and Challenges of National Cybercrime Reporting Portal in Countering Digital Financial Frauds
Imranuddin A study of cyber laws in the united arab emirates
Agina Efficacy of the Cyber Security Legal Framework in Addressing Cybercrime: A Focus on Kenya
LIJOKA ASSESSMENT OF THE RELATIONSHIP BETWEEN E-BANKING AND CYBER-CRIME IN NIGERIA (A CASE STUDY OF FIDELITY BANK PLC)
Hundt et al. SAVING PRIVACY.
Allen et al. Who’s watching who
Asta Guardians of the Galaxy of Personal Data: Assessing the Threat of Big Data and Examining Potential Corporate and Governmental Solutions
Kelly Facial recognition technology and the growing power of artificial intelligence
Sekgololo The state of cybersecurity in South Africa, 2010-2019
Fonseca Identity Theft In A Digital World
Mngadi An Analysis of Cybercrime Investigation by Directorate for Priority Crime Investigation