{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:02Z","timestamp":1750221122004,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316627","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"343-346","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Artificial Intelligence Legal Policy"],"prefix":"10.1145","author":[{"given":"Dremliuga","family":"Roman","sequence":"first","affiliation":[{"name":"Far Eastern Federal University, Russia"}]},{"given":"Prisekina","family":"Natalia","sequence":"additional","affiliation":[{"name":"Far Eastern Federal University, Russia"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654977"},{"key":"e_1_3_2_1_2_1","unstructured":"Corruption drug trafficking and other serious crimes (confiscation of benefits) act (Chapter 65a) Singapore https:\/\/sso.agc.gov.sg\/Act\/CDTOSCCBA1992  Corruption drug trafficking and other serious crimes (confiscation of benefits) act (Chapter 65a) Singapore https:\/\/sso.agc.gov.sg\/Act\/CDTOSCCBA1992"},{"key":"e_1_3_2_1_3_1","unstructured":"Criminal Law of the People's Republic of China Section 7: crimes of smuggling trafficking in transporting and manufacturing narcotic drugs http:\/\/www.fmprc.gov.cn\/ce\/cgvienna\/eng\/dbtyw\/jdwt\/crimelaw\/t209043.htm.  Criminal Law of the People's Republic of China Section 7: crimes of smuggling trafficking in transporting and manufacturing narcotic drugs http:\/\/www.fmprc.gov.cn\/ce\/cgvienna\/eng\/dbtyw\/jdwt\/crimelaw\/t209043.htm."},{"key":"e_1_3_2_1_4_1","unstructured":"Criminal Code of the Russian Federation Articles 228--234 http:\/\/www.wipo.int\/edocs\/lexdocs\/laws\/en\/ru\/ru080en.pdf.  Criminal Code of the Russian Federation Articles 228--234 http:\/\/www.wipo.int\/edocs\/lexdocs\/laws\/en\/ru\/ru080en.pdf."},{"key":"e_1_3_2_1_5_1","volume-title":"2017 7th International Conference on Affective Computing and Intelligent Interaction, ACII 2017","volume":"29","author":"Kaur A.","year":"2018"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2018.8.3.687"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2017.7.6.646"},{"key":"e_1_3_2_1_8_1","article-title":"Deep neural networks are more accurate than humans at detecting sexual orientation from facial images","volume":"2018","author":"Kosinski M.","year":"2018","journal-title":"Journal of Personality and Social Psychology"},{"key":"e_1_3_2_1_9_1","volume-title":"CEUR Workshop Proceedings","volume":"2068","author":"Lay A.","year":"2018"},{"volume-title":"MIT Press","year":"2012","author":"Sharkey N.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","article-title":"A new approach to the right to privacy, or how the European Court of Human Rights embraced the non-domination principle","volume":"2018","author":"Van der Sloot B.","year":"2018","journal-title":"Computer Law and Security Review"},{"key":"e_1_3_2_1_12_1","article-title":"Carrying Guns in Public: Legal and Public Health Implications","volume":"2013","author":"Vernick J.S.","year":"2013","journal-title":"Journal of Law, Medicine and Ethics"},{"key":"e_1_3_2_1_13_1","unstructured":"Violent Crime Control and Law Enforcement Act of 1994 of the United States http:\/\/legisworks.org\/GPO\/STATUTE-108-Pg1796.pdf  Violent Crime Control and Law Enforcement Act of 1994 of the United States http:\/\/legisworks.org\/GPO\/STATUTE-108-Pg1796.pdf"},{"key":"e_1_3_2_1_14_1","unstructured":"U.S. Code Title 18 Chapter 40 ---- \u00abImportation manufacture distribution and storage of explosive materials\u00bb https:\/\/www.law.cornell.edu\/uscode\/text\/18\/part-I\/chapter-40.  U.S. Code Title 18 Chapter 40 ---- \u00abImportation manufacture distribution and storage of explosive materials\u00bb https:\/\/www.law.cornell.edu\/uscode\/text\/18\/part-I\/chapter-40."},{"volume-title":"4th IFIP TC 12 International Conference on Artificial Intelligence, IFIP AI 2015, Held as Part of WCC 2015, Daejeon, South Korea, October 4-7, 2015, Proceedings. 26--35","year":"2015","author":"Zhao L","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Zhao L. Li Q. Xue Y. 2017. Correlating stressor events for social network based adolescent stress prediction. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10177 LNCS 642--658.  Zhao L. Li Q. Xue Y. 2017. Correlating stressor events for social network based adolescent stress prediction. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10177 LNCS 642--658.","DOI":"10.1007\/978-3-319-55753-3_40"}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:11Z","timestamp":1750208531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316627"}},"subtitle":["Limits of Use of Some Kinds of AI"],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":16,"alternative-id":["10.1145\/3316615.3316627","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316627","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}