[4] T. Dubovich, Modern problems of management
in the conditions of the information society.
Unity-Dana, Moscow (2012)
[5] W. Toke S Aidt, Facundo Albornoz, Esther
Hauk, Foreign in influence and domestic
policy: a survey, Cambridge Working Papers in
Economics: 1928, 14 March 2019.
[6] Markswebb Rank & Report. Internet Banking
Rank 2018,
https://markswebb.ru/report/internet-banking-
rank-2018/
[7] Zhong Dexing, Shao Huikai, Du Xuefeng, A
Hand-Based Multi-Biometrics via Deep
Hashing Network and Biometric Graph
Matching, IEEE Transactions on information
forensics and security, Volume: 14, Issue: 12,
2019, pp. 3140-3150
[8] Oliver Buckley, Jason R. C. Nurse, The
language of biometrics: Analyzing public
perceptions, Journal of information security
and applications, Volume: 47, 2019 pp. 112-
119
[9] Md. Khayrul Bashar, Integrated Biometrics for
Human Identification Integrated Biometrics,
2nd International Conference on Intelligent
Informatics and Biomedical Sciences
(ICIIBMS), Graduate Univ, Okinawa Inst Sci
& Technol, Okinawa, Japan, 2017, pp. 24-26
[10] J’son & Partners Consulting. World market of
biometric systems, 2015-2022. January 2017,
http://json.tv/en/ict_telecom_analytics_view
[11] Allied Market Research, Biometric Technology
Market by Type (Face recognition, Iris
recognition, Fingerprint recognition, Hand
geometry recognition, Signature recognition,
Voice recognition and Middleware
recognition) and End User (Public sector,
Banking & financial sector, Healthcare, IT &
telecommunication, and Others), Global
Opportunity Analysis and Industry Forecast,
2015 – 2022, 2016
[12] IBM Research. Foiling financial fraud (2018),
https://www.ibm.com/think/fintech/mastercard
-and-ibm-partner-to-make-big-data-work-for-
smaller-businesses/
[13] Cognitive computing with using IBM Watson
(2017)
https://www.ibm.com/systems/ru/power/solutio
ns/cognitive-computing.html
[14] Philip J. Smith, Robert R. Hoffman, Cognitive
Systems Engineering: The Future for a
Changing World (Expertise: Research and
Applications Series), CRC Press; 1 edition,
2017
[15] Krylov, SM, Formal technology and cognitive
processes. Volume: 24, Issue: 3, 1996, pp. 233-
243
[16] Min Chen, Francisco Herrera, Kai Hwang,
Cognitive Computing: Architecture,
Technologies, and Intelligent Applications,
IEEE ACCESS Volume: 6, 2018, pp. 19774-
19783
[17] Dem'Yanovich Y., Bich L.T.N., Discrete and
continuous wavelet expansions, WSEAS
Transactions on mathematics, Volume 21,
2022, pp. 58-67
[18] Romanchik T., Kitchenko O., Cherkashina M.,
Shapoval O., Heliarovska O., Security
management of innovation activity of an
enterprise based on a multiple-factor
approach, WSEAS Transactions on business
and economics, Volume 17, 2020, pp. 664-675
[19] Deloitte risk analysis review. Why cognitive
computing has become a turning point in risk
management 2019,
https://www2.deloitte.com/ru/ru/pages/risk/arti
cles/cognitive-computing.html
[20] Review of the international biometric
technologies market and their application in
the financial sector, Central Bank of the
Russian Federation. January 2018. Moscow.
[21] Ella Kolkowska, Annica Jk Kristofferson,
Privacy by Design Principles in Design of New
Generation Cognitive Assistive Technologies,
31st IFIP TC 11 International Conference
International Conference on ICT Systems
Security and Privacy Protection (SEC), Gent,
Belgium, 2016
[22] Marek R. Ogiela, Lidia Ogiela, Cognitive and
Biometric Approaches to Secure Service
Management in Cloud-Based Technologies,
IEEE cloud computing, Volume: 5, Issue: 4,
2018, pp.70-76
[23] Doyel Pal, Praveenkumar Khethavath, Tingting
Chen, Mobile payments in global markets
using biometrics and cloud, International
journal of communication systems Volume: 24,
Issue: 3, 2017 №: e3293.
WSEAS TRANSACTIONS on BUSINESS and ECONOMICS
DOI: 10.37394/23207.2023.20.35
Boris M. Fedorov, Svetlana V. Fedorova,
Huaming Zhang, Natalia A. Mamedova
Contribution of Individual Authors to the
Creation of a Scientific Article (Ghostwriting
Policy)
The authors equally contributed in the present
research, at all stages from the formulation of the
problem to the final findings and solution.
Sources of Funding for Research Presented in a
Scientific Article or Scientific Article Itself
No funding was received for conducting this study.
Conflict of Interest
The authors have no conflicts of interest to declare
that are relevant to the content of this article.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en
_US