{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T19:34:00Z","timestamp":1775331240839,"version":"3.50.1"},"reference-count":110,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T00:00:00Z","timestamp":1746748800000},"content-version":"vor","delay-in-days":128,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Deepfakes are an increasingly recognized potent mean of disinformation, both in times of conflict and peace. This article examines their impact within the context of Russo\u2013Ukrainian war and applicable legal frameworks. Given the profound societal and individual harms that deepfakes have the potential to cause, more thorough than traditional means of propaganda, we evaluate existing legal norms and propose new regulatory solutions centered on protecting cognitive liberty of individuals. Using various legal methodologies and purposive and extending legal interpretation, we argue that existing regulatory approaches\u2014such as criminalization, transparency mandates, and obligations on service providers\u2014are insufficient and under some circumstances may encroach upon other fundamental rights and freedoms. Therefore, we advocate for future efforts to regulate deepfakes through the establishment of an international or regional right to cognitive liberty, acknowledging the challenges in achieving consensus amid current geopolitical tensions. Our study aligns with the scope of Journal of Cybersecurity as it addresses emerging technical challenges from a multidisciplinary perspective, with a primary focus on the legal aspects of information security. It also briefly touches upon strategic, international relations, and policy perspectives.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf008","type":"journal-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T07:54:36Z","timestamp":1746777276000},"source":"Crossref","is-referenced-by-count":4,"title":["Emerging need to regulate deepfakes in international law: the Russo\u2013Ukrainian war as an example"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8804-569X","authenticated-orcid":false,"given":"Dominika","family":"Ku\u017anicka-B\u0142aszkowska","sequence":"first","affiliation":[{"name":"School of Public Policy, Georgia Institute of Technology , 30332, Atlanta ,","place":["United States"]},{"name":"Digital Justice Centre, University of Wroc\u0142aw , 50137, Wroc\u0142aw ,","place":["Poland"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0596-5752","authenticated-orcid":false,"given":"Nadiya","family":"Kostyuk","sequence":"additional","affiliation":[{"name":"Institute for Strategy and Technology, Carnegie Mellon University , 15213, Pittsburgh ,","place":["United States"]}]}],"member":"286","published-online":{"date-parts":[[2025,5,9]]},"reference":[{"key":"2025050903543371300_bib1","article-title":"Deepfake footage purports to show Ukrainian President capitulating","author":"Pearson","year":"2022"},{"key":"2025050903543371300_bib2","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1177\/10776990211035395","article-title":"Visual mis- and disinformation, social media, and democracy","volume":"98","author":"Dan","year":"2021","journal-title":"Journalism Mass Commun Quart"},{"key":"2025050903543371300_bib3","doi-asserted-by":"crossref","first-page":"233","DOI":"10.23919\/CyCon49761.2020.9131716","article-title":"The next generation of cyber-enabled information warfare","volume-title":"Proceedings of the 2020 12th International Conference on Cyber Conflict (CyCon)","author":"Hartmann","year":"2020"},{"key":"2025050903543371300_bib4","first-page":"59","article-title":"Deepfakes: the evolution of hyper realistic media manipulation","volume":"1","author":"Shaji","year":"2023","journal-title":"Part Univ Innv Res Publ"},{"key":"2025050903543371300_bib5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425780","article-title":"The creation and detection of deepfakes: a survey","volume":"54","author":"Mirsky","year":"2022","journal-title":"ACM Comput Surv"},{"key":"2025050903543371300_bib6","doi-asserted-by":"publisher","first-page":"11295","DOI":"10.1007\/s00500-023-08605-y","article-title":"Deepfakes: evolution and trends","volume":"27","author":"Gil","year":"2023","journal-title":"Soft Comput"},{"key":"2025050903543371300_bib7","doi-asserted-by":"publisher","first-page":"128","DOI":"10.3390\/jimaging7080128","article-title":"Fighting deepfakes by detecting GAN DCT anomalies","volume":"7","author":"Giudice","year":"2021","journal-title":"J Imaging"},{"key":"2025050903543371300_bib8","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s11229-022-04033-x","article-title":"Deepfakes, fake barns, and knowledge from videos","volume":"201","author":"Matthews","year":"2023","journal-title":"Synthese"},{"key":"2025050903543371300_bib9","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1089\/cyber.2021.29208.jth","article-title":"The social impact of deepfakes","volume":"24","author":"Hancock","year":"2021","journal-title":"Cyberpsychol Behav Soc Network"},{"key":"2025050903543371300_bib10","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1177\/1940161220944364","article-title":"Do (Microtargeted) deepfakes have real effects on political attitudes?","volume":"26","author":"Dobber","year":"2021","journal-title":"Int J Press Polit"},{"key":"2025050903543371300_bib11","article-title":"Fake news and deepfakes: a dangerous threat for 21st century information security","volume-title":"Proceedings of the 15th International Conference on Cyber Warfare and Security","author":"Botha","year":"2020"},{"key":"2025050903543371300_bib12","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media forensics and DeepFakes: an overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J Sel Top Signal Process"},{"key":"2025050903543371300_bib13","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1108\/PAP-04-2019-0008","article-title":"The global rise of \u201cfake news\u201d and the threat to democratic elections in the USA","volume":"22","author":"Lee","year":"2019","journal-title":"PAP"},{"key":"2025050903543371300_bib14","article-title":"Deep dive into the deepfakes applicable (?) legal framework","author":"Krack","year":"2024"},{"key":"2025050903543371300_bib15","doi-asserted-by":"publisher","first-page":"e0291668","DOI":"10.1371\/journal.pone.0291668","article-title":"Do deepfake videos undermine our epistemic trust? A thematic analysis of tweets that discuss deepfakes in the Russian invasion of Ukraine; edited by Rashid Mehmood","volume":"18","author":"Twomey","year":"2023","journal-title":"PLoS One"},{"key":"2025050903543371300_bib16","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3958426","article-title":"Deepfake fight: AI-powered disinformation and perfidy under the Geneva Conventions","volume":"3","author":"Allen","year":"2021","journal-title":"SSRN J"},{"key":"2025050903543371300_bib17","first-page":"537","article-title":"The Geneva Convention relative to the treatment of prisoners of war 1949: its principles, innovations, and deficiencies","volume":"41","author":"Esgain","year":"1963","journal-title":"North Carolina Law Rev"},{"key":"2025050903543371300_bib18","volume-title":"The Legal Writing Handbook: Analysis, Research, and Writing","author":"Oates","year":"2010","edition":"5th edn"},{"key":"2025050903543371300_bib19","article-title":"Advanced legal research: process and practice","author":"Austin","year":"2024"},{"key":"2025050903543371300_bib20","article-title":"Understanding legal research: a comprehensive guide to methods, theories, and scope","author":"Sholehudin","year":"2024"},{"key":"2025050903543371300_bib21","volume-title":"Legal Research Methods Teaching Material","author":"Vibhute","year":"2009"},{"key":"2025050903543371300_bib22","article-title":"Analytical legal research Methodology\u2014RCL Adda"},{"key":"2025050903543371300_bib23","article-title":"Deepfakes from Gaza war increase fears about AI's power to mislead | AP News","author":"Klepper","year":"2024"},{"key":"2025050903543371300_bib24","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyae002","article-title":"Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce","volume":"10","author":"Black","year":"2024","journal-title":"J Cybersecur"},{"key":"2025050903543371300_bib25","doi-asserted-by":"publisher","DOI":"10.55540\/0031-1723.3256","article-title":"Was the Russian invasion of Ukraine a failure of western deterrence?","volume":"53","author":"Renz","year":"2023","journal-title":"The US Army War Coll Quart Param"},{"key":"2025050903543371300_bib26","article-title":"Ukraine: what\u2019s the global economic impact of Russia\u2019s invasion?","author":"Kilfoyle","year":"2024"},{"key":"2025050903543371300_bib27","article-title":"Global impact: 5 ways war in Ukraine has changed the world","author":"Lawless","year":"2024"},{"key":"2025050903543371300_bib28","article-title":"Impact of Russia\u2019s invasion of Ukraine on the markets: EU response","year":"2024"},{"key":"2025050903543371300_bib29","doi-asserted-by":"publisher","first-page":"108790","DOI":"10.1016\/j.sigpro.2022.108790","article-title":"Coherent adversarial deepfake video generation","volume":"203","author":"Liu","year":"2023","journal-title":"Signal Process"},{"key":"2025050903543371300_bib30","doi-asserted-by":"publisher","first-page":"e0251415","DOI":"10.1371\/journal.pone.0251415","article-title":"TweepFake: about detecting deepfake tweets","volume":"16","author":"Fagni","year":"2021","journal-title":"PLoS One"},{"key":"2025050903543371300_bib31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009","article-title":"FaceForensics++: learning to detect manipulated facial images","volume-title":"Conference: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Rossler","year":"2019"},{"key":"2025050903543371300_bib32","article-title":"A war beyond deepfake: benchmarking facial counterfeits and countermeasures","author":"Pham"},{"key":"2025050903543371300_bib33","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/3371409","article-title":"Will deepfakes do deep damage?","volume":"63","author":"Greengard","year":"2019","journal-title":"Commun ACM"},{"key":"2025050903543371300_bib34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2196\/26933","article-title":"Bots and misinformation spread on social Media: implications for COVID-19","volume":"23","author":"Himelein-Wachowiak","year":"2021","journal-title":"J Med Internet Res"},{"key":"2025050903543371300_bib35","doi-asserted-by":"publisher","first-page":"4787","DOI":"10.1038\/s41467-018-06930-7","article-title":"The spread of low-credibility content by social bots","volume":"9","author":"Shao","year":"2018","journal-title":"Nat Commun"},{"key":"2025050903543371300_bib36","article-title":"Truth or fake\u2014Pro-Russian accounts share images falsely suggesting Bucha massacre was staged","author":"Creedon","year":"2024"},{"key":"2025050903543371300_bib37","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s13347-020-00423-6","article-title":"The fight for digital sovereignty: what it is, and why it matters, especially for the EU","volume":"33","author":"Floridi","year":"2020","journal-title":"Philos Technol"},{"key":"2025050903543371300_bib38","article-title":"GEC Special Report: Russia\u2019s pillars of disinformation and propaganda","year":"2025"},{"key":"2025050903543371300_bib39","doi-asserted-by":"crossref","first-page":"73","DOI":"10.4467\/25442554.MBK.23.005.18028","article-title":"Rosyjska dezinformacja i wykorzystanie obraz\u00f3w generowanych przez sztuczn\u0105 inteligencj\u0119 (deepfake) w pierwszym roku inwazji na Ukrain\u0119","volume":"1","author":"Majchrzak","year":"2023","journal-title":"Media Biznes Kultura"},{"key":"2025050903543371300_bib40","doi-asserted-by":"publisher","first-page":"133","DOI":"10.15804\/rop2023307","article-title":"Operations of influence- the specifics of Russian propaganda and disinformation","volume":"25","author":"Orzechowski","year":"2023","journal-title":"Realty Polit"},{"key":"2025050903543371300_bib41","article-title":"Reuters fact checked, doctored video appears to show Putin announcing peace","year":"2024"},{"key":"2025050903543371300_bib42","article-title":"Be wary of deep fakes! an example of what the Ukraine government warning is about: putin announces result of peace talks (eng sub) [Internet].r\/ukraine","author":"Reddit (u\/reizuki)","year":"2024"},{"key":"2025050903543371300_bib43","article-title":"Russian \u2018pranksters\u2019 attempt to contact drone maker Haluk Bayraktar using deep fake image of Ukrainian PM","author":"Shcherbak","year":"2024"},{"key":"2025050903543371300_bib44","author":"Oltermann","year":"2024"},{"key":"2025050903543371300_bib45","article-title":"\u0420\u043e\u0441\u0456\u044f\u043d\u0438 \u0433\u043e\u0442\u0443\u044e\u0442\u044c\u0441\u044f \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u0438 \u043d\u043e\u0432\u0438\u0439 \u0434\u0456\u043f\u0444\u0435\u0439\u043a \u0456\u0437 \u0437\u0435\u043b\u0435\u043d\u0441\u044c\u043a\u0438\u043c: \u0449\u043e \u0446\u044c\u043e\u0433\u043e \u0440\u0430\u0437\u0443 \u0432\u0438\u0433\u0430\u0434\u0430\u043b\u0438 \u0443 \u043a\u0440\u0435\u043c\u043b\u0456","year":"2024"},{"key":"2025050903543371300_bib46","article-title":"\u0420\u043e\u0441\u0456\u044f \u043c\u043e\u0436\u0435 \u0441\u0442\u0432\u043e\u0440\u0438\u0442\u0438 \u0434\u0456\u043f\u0444\u0435\u0439\u043a \u0437 \u0437\u0435\u043b\u0435\u043d\u0441\u044c\u043a\u0438\u043c \u043f\u0440\u043e \u043a\u0430\u043f\u0456\u0442\u0443\u043b\u044f\u0446\u0456\u044e \u0443\u043a\u0440\u0430\u0457\u043d\u0438\u2014\u0426\u0435\u043d\u0442\u0440 \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0456\u0447\u043d\u0438\u0445 \u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439","author":"\u0421\u0432\u043e\u0431\u043e\u0434\u0430","year":"2024"},{"key":"2025050903543371300_bib47","article-title":"Keeping it real: how to spot a deepfake","author":"Clarke","year":"2024"},{"key":"2025050903543371300_bib48","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","article-title":"The spread of true and false news online","volume":"359","author":"Vosoughi","year":"2018","journal-title":"Science"},{"key":"2025050903543371300_bib49","first-page":"1","article-title":"Testing human ability to detect \u2018deepfake\u2019 images of human faces","volume":"9","author":"Bray","year":"2023","journal-title":"J Cybersecur"},{"key":"2025050903543371300_bib50","article-title":"Proving war crimes isn\u2019t simple\u2014a forensics expert explains what\u2019s involved with documenting Human rights violations during conflicts, from Afghanistan to Ukraine","author":"Schmitt","year":"2024"},{"key":"2025050903543371300_bib51","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1080\/17470919.2016.1253610","article-title":"Are eyewitness accounts biased? Evaluating false memories for crimes involving in-group or out-group conflict","volume":"13","author":"Carpenter","year":"2018","journal-title":"Social Neurosci"},{"key":"2025050903543371300_bib52","article-title":"The age of scepticism: from distrust to \u2018deepfake\u2019","author":"Kuper","year":"2018"},{"key":"2025050903543371300_bib53","article-title":"Kremlin says bucha is \u2018monstrous forgery\u2019 Aimed at smearing Russia","author":"Faulconbridge","year":"2024"},{"key":"2025050903543371300_bib54","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1038\/d41586-023-02990-y","article-title":"How to stop deepfakes from sinking the internet?","volume":"621","author":"Jones","year":"2023","journal-title":"Nature"},{"key":"2025050903543371300_bib55","article-title":"Information disorder: toward an interdisciplinary framework for research and policymaking","author":"Wardle","year":"2017"},{"key":"2025050903543371300_bib56","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.jarmac.2017.07.008","article-title":"Beyond misinformation: understanding and coping with the \u201cpost-truth\u201d era","volume":"6","author":"Lewandowsky","year":"2017","journal-title":"J Appl Res Mem Cognit"},{"key":"2025050903543371300_bib57","article-title":"Deepfakes and cheap fakes: the manipulation of audio and visual evidence","author":"Paris","year":"2019"},{"key":"2025050903543371300_bib58","volume-title":"S.3805 - A bill to amend title 18, United States Code, to prohibit certain fraudulent audiovisual records, and for other purposes.115th Congress (2017-2018)"},{"key":"2025050903543371300_bib59","volume-title":"H.R.5515 - John S. McCain National Defense Authorization Act for Fiscal Year 2019115th Congress (2017-2018)"},{"key":"2025050903543371300_bib60","first-page":"xx","article-title":"The high stakes of deepfakes: the growing necessity of federal legislation to regulate this rapidly evolving technology","volume":"xx","author":"Quirk","year":"2023","journal-title":"Princeton Legal Journal"},{"key":"2025050903543371300_bib61","volume-title":"H.R.5586 - DEEPFAKES Accountability Act118th Congress (2023-2024)"},{"key":"2025050903543371300_bib62","article-title":"States turn their attention to regulating AI and deepfakes as 2024 kicks off","author":"Edelman","year":"2024"},{"key":"2025050903543371300_bib63","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1038\/s42256-022-00513-4","article-title":"New deepfake regulations in China are a tool for social stability, but at what cost?","volume":"4","author":"Hine","year":"2022","journal-title":"Nat Mach Intell"},{"key":"2025050903543371300_bib64","article-title":"Combatting deepfakes: policies to address national security threats and rights violations","author":"Miotti"},{"key":"2025050903543371300_bib65","volume-title":"UK Online Safety Act 2023 c. 50"},{"key":"2025050903543371300_bib66","first-page":"1","article-title":"Regulation (EU) 2022\/2065 on a single market for digital services and amending Directive 2000\/31\/EC","volume":"277","author":"The Digital Services Act","year":"2022","journal-title":"OJ L"},{"key":"2025050903543371300_bib67","article-title":"Questions and answers on the Digital Services Act*","author":"European Commission\u2014European Commission","year":"2024"},{"key":"2025050903543371300_bib68","volume-title":"Regulation (EU) 2024\/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence and amending Regulations (EC) No 300\/2008, (EU) No 167\/2013, (EU) No 168\/2013, (EU) 2018\/858, (EU) 2018\/1139 and (EU) 2019\/2144 and Directives 2014\/90\/EU, (EU) 2016\/797 and (EU) 2020\/1828 OJ L 2024\/1689, 12.7.2024"},{"key":"2025050903543371300_bib69","article-title":"The AI Act vs. Deepfakes: a step forward, but is it enough?","author":"Vanberghen","year":"2024"},{"key":"2025050903543371300_bib70","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC","volume":"119","author":"General Data Protection Regulation","year":"2016","journal-title":"OJ L"},{"key":"2025050903543371300_bib71","first-page":"22","article-title":"Directive 2005\/29\/EC of the European Parliament and of the Council of 11 May 2005 concerning unfair business-to-consumer commercial practices in the internal market and amending Council Directive 84\/450\/EEC, Directives 97\/7\/EC, 98\/27\/EC and 2002\/65\/EC of the European Parliament and of the Council and Regulation (EC) No 2006\/2004 of the European Parliament and of the Council","volume":"149","author":"Unfair Commercial Practices Directive","year":"2005","journal-title":"OJ L"},{"key":"2025050903543371300_bib72","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1093\/idpl\/ipx019","article-title":"Why a right to legibility of automated decision-making exists in the general Data Protection Regulation","volume":"7","author":"Malgieri","year":"2017","journal-title":"Int Data Priv Law"},{"key":"2025050903543371300_bib73","first-page":"194","article-title":"Office of the Chairman of the Joint Chiefs of Staff, DOD Dictionary of Military and associated terms","author":"The Joint Staff","year":"2024"},{"key":"2025050903543371300_bib74","volume-title":"Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949","author":"Pilloud","year":"1987"},{"key":"2025050903543371300_bib75","article-title":"Foghorns of War: IHL and Information operations during armed conflict","author":"Rodenh\u00e4user","year":"2023"},{"key":"2025050903543371300_bib76","article-title":"Ukraine sypomosium\u2014deception and the law of armed conflict","author":"Biggerstaff","year":"2024"},{"key":"2025050903543371300_bib77","doi-asserted-by":"crossref","DOI":"10.1017\/9781316822524","volume-title":"Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations","author":"Schmitt","year":"2017"},{"key":"2025050903543371300_bib78","first-page":"687","article-title":"Global legalism: the illusion of effective international law","volume":"38","author":"Eby","year":"2010","journal-title":"Denver J Int Law Pol"},{"key":"2025050903543371300_bib79","first-page":"1","article-title":"Why international law and norms do little in preventing non-state cyber attacks","volume":"7","author":"Katagiri","year":"2021","journal-title":"J Cybersecur"},{"key":"2025050903543371300_bib80","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/cybsec\/tyab008","article-title":"Restraint under conditions of uncertainty: why the United States tolerates cyberattacks","volume":"7","author":"Kaminska","year":"2021","journal-title":"J Cybersecur"},{"key":"2025050903543371300_bib81","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1002\/9781118555927.ch34","article-title":"Freedom by design: transhumanist values and cognitive liberty","volume-title":"The Transhumanist Reader","author":"Sententia","year":"2013","edition":"1st edn."},{"key":"2025050903543371300_bib82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38840-9","article-title":"Cognitive liberty and Human rights","volume-title":"Neuroscience and Law: Complicated Crossings and New Perspectives","author":"D'Aloia","year":"2020"},{"key":"2025050903543371300_bib83","volume-title":"H.R.3106 - Preventing Deepfakes of Intimate Images Act 118th Congress (2023-2024) - Introduced in House"},{"key":"2025050903543371300_bib84","volume-title":"Russian Federal Law of 4 March 2022 No.32-FZ"},{"key":"2025050903543371300_bib85","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1177\/17480485231220141","article-title":"Russian bans on \u2018fake News\u2019 about the war in Ukraine: conditional truth and unconditional loyalty","volume":"86","author":"Sherestoboeva","year":"2024","journal-title":"Int Commun Gazette"},{"key":"2025050903543371300_bib86","first-page":"115","volume-title":"Wina w Odpowiedzialno\u015bci Administracyjnej w Aspekcie Prawa Do s\u0105du w Rozumieniu Art. 6 EKPC na Przyk\u0142adzie Administracyjnych Kar Pieni\u0119\u017cnych","author":"Wr\u00f3blewski","year":"2022"},{"key":"2025050903543371300_bib87","article-title":"Mitigation of fines by national data protection authorities\u2014the case study of Bisnode (III OSK 2538\/21)- forthcoming in 2025","author":"Ku\u017anicka-B\u0142aszkowska"},{"key":"2025050903543371300_bib88","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12737\/jrl.2020.118","article-title":"Algorithms and artificial intelligence in the human rights context","volume":"8","author":"Talapina","year":"2020","journal-title":"J Russ Law"},{"key":"2025050903543371300_bib89","doi-asserted-by":"publisher","DOI":"10.21202\/jdtl.2023.42","article-title":"Achieving algorithmic transparency and managing risks of data security when making decisions without Human interference: legal approaches","volume":"1","author":"Zharova","year":"2023","journal-title":"J Dig Technol Law"},{"key":"2025050903543371300_bib90","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1080\/13600834.2022.2146395","article-title":"Ensuring AI explainability in healthcare: problems and possible policy solutions","volume":"32","author":"Aranovich","year":"2023","journal-title":"Inf Commun Technol Law"},{"key":"2025050903543371300_bib91","article-title":"@ngleicher@infosec.Exchange on Twitter","author":"Gleicher","year":"2022"},{"key":"2025050903543371300_bib92","article-title":"Israel\/Palestine: facebook censors discussion of rights issues","author":"Human Rights Watch","year":"2021"},{"key":"2025050903543371300_bib93","volume-title":"The Filter Bubble: What The Internet Is Hiding from You","author":"Pariser","year":"2011"},{"key":"2025050903543371300_bib94","article-title":"More speech and fewer mistakes","author":"Kaplan","year":"2025"},{"key":"2025050903543371300_bib95","volume-title":"Decisions of Polish DPA from August 5th, 2024, no DS.523.4486.2024 and DS.523.4480.2024"},{"key":"2025050903543371300_bib96","article-title":"The role of GDPR in disseminating AI-powered deepfakes\u2014case note of The Polish DPA decision against Meta","volume-title":"J AI Law Regul","author":"Ku\u017anicka-B\u0142aszkowska"},{"key":"2025050903543371300_bib97","article-title":"Google halts AI tools for oil extraction","author":"Sandler","year":"2024"},{"key":"2025050903543371300_bib98","article-title":"Challenge against Clearview AI in Europe","year":"2024"},{"key":"2025050903543371300_bib99","article-title":"AI \u2018godfather\u2019 Geoffrey Hinton warns of dangers as he quits Google","author":"Kleinman","year":"2024"},{"key":"2025050903543371300_bib100","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511610325","volume-title":"Autonomy and the Challenges to Liberalism: New Essays","author":"Christman","year":"2005"},{"key":"2025050903543371300_bib101","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-6253-4","article-title":"My Mind Is mine!? Cognitive liberty as a legal concept","volume-title":"Cognitive Enhancement: An Interdisciplinary Perspective","author":"Bublitz","year":"2013"},{"key":"2025050903543371300_bib102","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3389\/frai.2019.00019","article-title":"The Autonomous Mind: the right to freedom of thought in the twenty-first century","volume":"2","author":"McCarthy-Jones","year":"2019","journal-title":"Front Artif Intell"},{"key":"2025050903543371300_bib103","first-page":"391","article-title":"Charter of Fundamental Rights of the European Union","volume":"326","year":"2012","journal-title":"OFF J Eur Commun"},{"key":"2025050903543371300_bib104","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-84494-3_5","article-title":"Why is it wrong to punish thought?","volume-title":"The Law and Ethics of Freedom of Thought","author":"Mendlow","year":"2021"},{"key":"2025050903543371300_bib105","article-title":"The 3rd of all EU-r rights: integrity and how the Charter contributes","author":"Toggenburg","year":"2024"},{"key":"2025050903543371300_bib106","article-title":"Submission to the Advisory Committee on the Questionnaire on \u201cNeurotechnology and Human Rights\u201d","author":"Farahany","year":"2024"},{"key":"2025050903543371300_bib107","first-page":"705","article-title":"Assessing the effectiveness of International courts: a goal-based approach","volume-title":"Am J Int Law","author":"Shany","year":"2012"},{"key":"2025050903543371300_bib108","first-page":"517","article-title":"A Jurisprudential Justification for Extraterritoriality in (Private) International Law","volume":"517","author":"Svantesson","year":"2015","journal-title":"Santa Clara J. Int\u2019l L."},{"key":"2025050903543371300_bib109","article-title":"AL-Skeini and others v. The United Kingdom, application no. 55721\/07","author":"ECHR","year":"2011"},{"key":"2025050903543371300_bib110","article-title":"See Executive Order of President Trump from Jan 20th 2025","year":"2025"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf008\/63133008\/tyaf008.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf008\/63133008\/tyaf008.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T07:54:45Z","timestamp":1746777285000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf008\/8127651"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":110,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf008","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf008"}}