VereshaR.Preventive measures against computer related crimes: approaching an individual. Informatologia2018; 51(3–4): 189–199.
2.
ParkJHAhamedSISusiloW, et al. Special issue of computer communications on information and future communication security. Comput Commun2011; 34(3): 223–225.
BilyalovaMAmandykovaSMusilimovaK, et al. Some questions of improvement of electoral legislation in the Republic of Kazakhstan. J Leg Ethical Regul Iss2019; 22(2): 1–10.
5.
FarrandBCarrapicoH.Networked governance and the regulation of expression on the internet: the blurring of the role of public and private actors as content regulators. J Inf Technol Polit2013; 10(4): 357–368.
6.
ZyryanovaEVBelovVM. Assessment of the quality of legal regulations to ensure integrated security of info communication. In: 2018 XIV international scientific-technical conference on actual problems of electronics instrument engineering (APEIE), Novosibirsk, 2–6 October 2018, pp. 231–233. New York: IEEE.
7.
BartaG.Challenges in the compliance with the general data protection regulation: anonymization of personally identifiable information and related information security concerns. In: UlmanPWołoszynP (eds) Knowledge Economy Society. Kraków: Cracow University of Economics, 2018, pp. 115–121.
8.
WeberMBobanM. Security challenges of the internet of things. In: 2016 39th international convention on information and communication technology, electronics and microelectronics (MIPRO), Opatija, 30 May–3 June 2016, pp. 638–643. New York: IEEE.
9.
MangazdarovnaAA.Legal regulation of e-government in foreign countries. Bull Inst Legislat Legal Inform Kazakhstan2020; 3(61): 207–214.
10.
FilonovaOPolyakovaEChelovechkovaA, et al. Legal regulation of transactions in the digital environment as a condition for effective business cooperation. In: FilonovaO (ed.) International scientific-practical Conference ‘Business cooperation as a resource of sustainable economic development and investment attraction’(ISPCBC 2019). Amsterdam: Atlantis Press, 2019, pp. 324–330.
11.
ShestakV. Foreign experience in the legal regulation to counter cybercrime. In: Criminal Law: Development Strategy in the XXI Century: Materials of the XVII international scientific-practical conference, Moscow, 23–24 January 2020, pp. 1–7. Moscow: Kutafin Moscow State Law University.
12.
FlowerdaySVTuyikezeT.Information security policy development and implementation: the what, how and who. Comput Secur2016; 61: 169–183.
NojeimGT.Cybersecurity and freedom on the Internet. J Nation Secur Law Policy2010; 4: 119–137.
15.
GolumbicMC.Fighting terror online the convergence of security, technology, and the law. New York: Springer, 2007.
16.
FarrandB. Chapter 15: The future of copyright enforcement online: intermediaries caught between formal and informal governance in the EU. In: StamatoudiI (ed.) New Developments in EU and International Copyright Law. Alphen aan den Rijn: Kluwer Law International, 2016.
17.
PonteSGibbonPVestergaardJ.Governing through standards: origins, drivers and limitations. London: Palgrave Macmillan, 2011.
18.
RaulAC.The privacy, data protection and cybersecurity law review. London: Law Business Research Ltd, 2017.
19.
GilardiF.Delegation in the regulatory state: independent regulatory agencies in Western Europe. Cheltenham: Edward Elgar Publishing Ltd, 2008.
20.
CohenE.Assessing the impact of the global financial crisis on transnational financial law and regulation. Finn Yearb Intern Law2011; 22: 51–84.
21.
Republic of Azerbaijan. Law of the Republic of Azerbaijan on Information, Informatisation and Protection of Information, https://www.legislationline.org/documents/id/6959 (1998, accessed 19 March 2020).
GuoMHLiawHTDengDJ, et al. An RFID secure authentication mechanism in WLAN. Comput Commun2011; 34(3): 236–240.
26.
MoonJSLeeIY.An AAA scheme using ID-based ticket with anonymity in future mobile communication. Comput Commun2011; 34(3): 295–304.
27.
SchjolbergSGhernaouti-HelieS.A global treaty on cybersecurity and cybercrime: Oslo: AiTOslo, 2011.
28.
AkimzhanovaMIlyassovaGNukushevaA, et al. Extending legislation of the Republic of Kazakhstan by anchoring international child rights. J Leg Ethical Regul Iss2018; 21(2): 1–17.
29.
Council of Europe. Uzun v. Germany. In: The Case Law of The European Court of Human Rights Concerning the Protection of Personal Data. Strasbourg: Directorate General Human Rights and Rule of Law, 2018, pp. 151–152.
ElinV.Comparative analysis of legal support of information security in Russia and abroad. Moscow: Moscow Institute of Public Administration and Law, 2016.
34.
KnowlesWPrinceDHutchisonD, et al. A survey of cyber security management in industrial control systems. Intern J Crit Infrastruct Prot2015; 9: 52–80.
35.
BambergerKMulliganD.Privacy on the books and on the ground. Stanford Law Rev2010; 63: 247–316.
36.
PicciottoS.Regulatory networks and global governance. London: University of London, Institute of Advanced Legal Studies, 2006.
37.
HagerEWDaskoC.Cybersecurity law overview. Stockholm: Mannheimer Swartling, 2017.
YakovetsE.Fundamentals of legal protection of information and intellectual property. Moscow: Yurlitinform, 2010.
40.
Roskomnadzor. Cases Nos. A56-6698/2016, A40-14902/16, A40-15242/2016, A40-15198/2016-145-129, A40-51869/2016-145-449 considered by Russian commercial (arbitration) courts. Moscow: Roskomnadzor, 2016.
41.
Ministry for Communications Mass Media. Letter of the Ministry for Communications and Mass Media No. P11-15054-OG as of 7July2017, https://www.garant.ru/products/ipo/prime/doc/71628404/ (2017, accessed 19 March 2020).
42.
MalyshevaOG. Revolutionary thought in Russia XIX – the beginning of the XX century: encyclopedia. Ed. ZhuravlevV.V.RosspenM.:, 2013, 613 p., Vestnik Russ Humanit Sci Found2014; 3(76) 266–269.
43.
MalyshevaOG.No needs to cross out all historiographic achievements of the past. Russian History2018; 6: 27–32.