Baker et al., 2020 - Google Patents
Artificial intelligence and the law: Cybercrime and Criminal LiabilityBaker et al., 2020
- Document ID
- 504296516888048187
- Author
- Baker D
- Robinson P
- Publication year
External Links
- 238000005516 engineering process 0 abstract description 92
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30817—Information retrieval; Database structures therefor; File system structures therefor of video data using information manually generated or using information not derived from the video content, e.g. time and location information, usage information, user ratings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Baker et al. | Artificial intelligence and the law: Cybercrime and Criminal Liability | |
Rawat et al. | Organ trafficking on the dark web—The data security and privacy concern in healthcare systems | |
Monahan | Surveillance in the Time of Insecurity | |
Britz | Computer forensics and cyber crime: An introduction, 2/e | |
Mills | Privacy: the lost right | |
Marcum et al. | Cybercrime | |
Rieznik et al. | Strategies and Challenges of Combating Cyber-Financial Fraud: An Analysis of Ukraine's Experience During the Military Conflict | |
Opderbeck | Cybersecurity and Data Breach Harms: Theory and Reality | |
Wilson | Collaborative justice and harm reduction in cyberspace: Policing indecent child images | |
Baker et al. | Emerging technologies and the criminal law | |
Lipton | Our data, ourselves: a personal guide to digital privacy | |
Pamplin | Virtual currencies and the implications for US anti-money laundering regulations | |
Alhammadi | The use of cryptocurrency as a legal tender: A legal assessment | |
Rieznik et al. | Examining Ukraine's Approaches and Obstacles in Addressing Cyber-Financial Fraud Amid Armed Conflict | |
Chandra | Examining the Contours and Challenges of National Cybercrime Reporting Portal in Countering Digital Financial Frauds | |
Imranuddin | A study of cyber laws in the united arab emirates | |
Agina | Efficacy of the Cyber Security Legal Framework in Addressing Cybercrime: A Focus on Kenya | |
LIJOKA | ASSESSMENT OF THE RELATIONSHIP BETWEEN E-BANKING AND CYBER-CRIME IN NIGERIA (A CASE STUDY OF FIDELITY BANK PLC) | |
Hundt et al. | SAVING PRIVACY. | |
Allen et al. | Who’s watching who | |
Asta | Guardians of the Galaxy of Personal Data: Assessing the Threat of Big Data and Examining Potential Corporate and Governmental Solutions | |
Kelly | Facial recognition technology and the growing power of artificial intelligence | |
Sekgololo | The state of cybersecurity in South Africa, 2010-2019 | |
Fonseca | Identity Theft In A Digital World | |
Mngadi | An Analysis of Cybercrime Investigation by Directorate for Priority Crime Investigation |