<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Information Security Risks of Distance Learning Software in the Sphere of Education as an Element of Critical Information Infrastructure</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yuriy</forename><surname>Sosnovskiy</surname></persName>
							<email>sosnovskiy.yv@cfuv.ru</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Physics and Technical Sciences</orgName>
								<orgName type="institution">Crimean Federal V. Vernadsky University</orgName>
								<address>
									<postCode>265007</postCode>
									<country key="RU">Russian Federation</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Veronika</forename><surname>Ilyina</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Institute of Physics and Technical Sciences</orgName>
								<orgName type="institution">Crimean Federal V. Vernadsky University</orgName>
								<address>
									<postCode>265007</postCode>
									<country key="RU">Russian Federation</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Victor</forename><surname>Milyukov</surname></persName>
							<email>milyukov.vv@cfuv.ru</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Physics and Technical Sciences</orgName>
								<orgName type="institution">Crimean Federal V. Vernadsky University</orgName>
								<address>
									<postCode>265007</postCode>
									<country key="RU">Russian Federation</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Information Security Risks of Distance Learning Software in the Sphere of Education as an Element of Critical Information Infrastructure</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">822DFA5AA188E4878386F69DF02F08D1</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T13:40+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Information security</term>
					<term>a teacher&apos;s digital tools</term>
					<term>distance learning</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A number of software tools, that can be used in the organization of distance learning interaction via the Internet, has been studied in the paper. The tools have been analyzed against basic conditions of information security accreditation, such as a secure data transfer protocol, personal data transfer to a third party, cases of hacking, and sanctions restrictions to date. Information security risks of a teacher's digital tools have been evaluated taking into account the broad scope of the educational process and the number of its participants. The damage from the use of such tools has been related to the one from critical information infrastructure control objects.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The global economy is rapidly going digital. The patterns of interaction between economic and legal entities and, which is of utmost importance, educational institutions activities that can be converted into electronic format are also undergoing digital transformations. As a result, distance learning is becoming increasingly popular. Such distance form of educational interaction is cheaper for all the parties of the educational process, and there also appear more and more teacher's digital tools (TDT) that facilitate such interaction.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Purpose and objectives of the research</head><p>Today, the typical forms of interaction between an educational establishment and a student in the Russian Federation imply the following:</p><p>An educational organization must have an electronic information and educational environment (EIEE). Its main objectives are set out in the Federal state educational standards, and it should provide <ref type="bibr" target="#b0">[1]</ref>:</p><p> free access to the curricula, work programs of the modules, internship and courses, as well as to educational publications in the electronic form and educational resources on the Internet;  saving the student's completed assignments and the grades <ref type="bibr" target="#b0">[1]</ref>. If a training program is implemented using e-learning or distance learning (if it is licensed), the EIE should additionally provide <ref type="bibr" target="#b0">[1]</ref>:</p><formula xml:id="formula_0"></formula><p>recording of the educational process events and keeping track of the students' progress in the course of mastering the educational curriculum;  asynchronous and synchronous interaction between students and teachers. Federal state standards for secondary education <ref type="bibr" target="#b1">[2]</ref> contain more detailed requirements for the information and educational environment of the organization (IEE), which should provide:  information and methodological support for educational activities;  organization of various forms of individual and group activities;  monitoring and recording the progress and results of educational activities;  modern procedures and tools for creating, searching, collecting, analyzing, processing, storing and presenting information;  interaction between all the participants in the distance learning process. It should be noted that the requirement that the EIEE should ensure the interaction between the participants in the educational process is only stipulated for the educational programs that include electronic or distance learning forms of the educational process, which is not often common practice. But unfortunately, EIEE does not always have enough tools to meet all the needs of the educational process participants in terms of electronic interaction.</p><p>As practice shows, in a considerable number of cases, EIEE is implemented so as to meet the requirements of the regulatory authorities. At the same time, such limited tool set does not provide convenient instruments for communication and, as a result, progressive teachers have to look for their own methods of transmitting and distributing electronic educational materials, and to use the TDT that are more suitable for them.</p><p>Figure <ref type="figure">1</ref>: Typical electronic interaction between the educational establishment and the student Thus, the importance of a teacher's digital tools, used to ensure electronic interaction between the teacher and the student, significantly increases.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Digital tools of the teacher. Overview and analysis 3.1. BigBlueButton webinar platform</head><p>BigBlueButton platform (BBB) is a free software system for web conferences. The major problem with the system is that the BigBlueButton client works using the browser extension for Adobe Flash, official support for which ends in 2020. Another disadvantage is relatively high pressure on the server's computational capacity. The features of the BBB system are as follows <ref type="bibr" target="#b2">[3]</ref>:  supports working simultaneously with a large group of students, for example, up to 100 people or more;  provides video recording function. You can also save images and notes that were created on the electronic board during the lecture;</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>the BBB platform can be integrated with Moodle due to a special module. At the same time, the system is based on outdated technologies, and BBB does not work on Apple computers and smartphones with iOS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Discord messenger platform</head><p>Discord is a popular application that is used primarily for voice communication. It was experimentally established that the optimal number of participants is up to 25-30 people. The maximum number allowed by the system is 50 people.</p><p>The system has some features particularly useful for the educational process:  provides high-quality voice communication in the "General chat" mode. The minimum computer system requirements are reasonable, and there are modes both for automatically turning on the microphone and for using the dedicated button;  allows you to arrange a streaming broadcast of the desktop screen or selected windows on your computer;  it is possible to work both in the application and directly from the browser, which is convenient At the same time, as the practice of using this software tool during the distance learning process has shown, it is advisable to introduce a local administrator of virtual servers and platform channels to correctly organize the interaction between the participants. The platform enables you to work effectively when active oral interaction is required both individually and in small groupsfor practical work, collecting reports on laboratory work, and for lecturing in small groups.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">YouTube as a platform for hosting online lectures</head><p>For a teacher YouTube has the following advantages:  provides storage and seamless access to video contents;  has convenient tools for analyzing users' viewing, which allows you to identify fragments of lectures or videos that arouse the greatest interest in the audience;  video materials can be distributed among the students and also in the public domain.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Programs for remote computer management</head><p>Sometimes when working individually students can come across the problems which solutions require tutor's assistance. In this case, it is convenient to use programs that provide remote computer management. An example is the TeamViewer program.</p><p>The program provides not only computer management but also collaboration facilities. You can work collaboratively on documents online in real time, work effectively on software codes and other materials, and alsoin the areas that don't have ready-made solutions.</p><p>All major operating systems are supported: Windows, MacOS, Linux, iOS, and Android. Among the features of the program, there is also holding online conferences, which though has a limit of 25 participants. At the same time, it should be noted that this program poses a potential threat to the information security of the user's computer due to the potential vulnerabilities of both the program and the need to open port 5938 for external access via TCP/UDP protocols.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Online conference programs. ZOOM</head><p>ZOOM is one of the most popular programs for online conferencing. Unlike BigBlueButton and many similar systems that use Adobe Flash technology for video transmission, ZOOM has implemented a real-time video content transmission technology -WebRTC (Web Real-Time Communication). You can set a password for the conference, invite participants by URL or email, and broadcast audio and images from your computer. There is a 40-minute limit on the length of the session for a free account.</p><p>It is also worth noting that in some regions, the use of this program without additional software is simply impossible due to various political issues and related restrictions. In addition, there is a significant number of instances when critical vulnerabilities were discovered in Zoom: for example, the MacOS user has to join a Zoom call with an activated video camera, what is more, there is no request for the authorization of switching on the camera; unauthorized connections to the broadcasts of strange people, password leaks, etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6.">Programs for graphic illustrations. Online boards</head><p>In the process of distance learning, it is often essential to illustrate materials and get continuous feedbackб just as a teacher often does in a traditional classroom using a board or a smart-A teacher can arrange voice interaction via а convenient program, such as Discord, described above. And as to visualization, it can be effected through, for example, the AWWApp service. It does not require installation, you just need to go to the site, send your students an invitation to join the session, and work with the screen just as with a real board. In the graphics space you can make drawings, insert formulas, notes, etc. Due to the fact that the graphics space is shared, all participants can work in it at the same time. Accordingly, the teacher can give graphic tasks to the students and monitor their performance in the live mode.</p><p>The free version contains advertisements unlike the fee-based version. Also, with the paid version you can create multiple pages and upload files in .pdf format to the graphics space.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.7.">Video broadcasts in social networks</head><p>Today, the vast majority of the educational process participants have accounts on social networks. As an example, let us have a look at the Vkontakte network. It can be successfully used for distance learning under the condition that so-called "broadcasts" are arranged. The advantages of providing video content via social networks are the following:</p><p>• students just need to click on the link to the broadcast, there is no need to download any special application; • the broadcast record is saved on the author's page and can be viewed at any convenient time; • the record can be viewed by all those who take interest in the subject, which is both a disadvantage if you need to limit the number of viewers, and an advantage if you want to share the information with a vast number of people. At the same time, to organize broadcasting, the teacher needs to install video recorder software and follow a certain algorithm for generating a unique broadcast key and making the broadcast itself.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.8.">Conclusions on information security of using a teacher's digital tools</head><p>The basic criteria for evaluating the safety of using digital teacher's tools that can be useful to ordinary users are shown in table <ref type="table" target="#tab_0">1</ref>. The analysis of the table shows that the majority of the TDT have an extremely high vulnerability from external cyber threats, as well as from the international restrictions policy, which also applies to the software market, including access to information resources. * linking the account to the e-mail address is required. In this case, the user's data can be considered as personal data (PD) ** it is not explicitly stated in the user rules in VK that the requirements of the legislation of the Russian Federation for storing, transmitting and processing personal data are fulfilled (https://vk.com/privacy). The rules for protecting VK Connect user information are a part of the VK Ecosystem and contain links to 152-Federal Law.</p><p>Despite that, the number of users of these and similar services is estimated as tens and hundreds of thousands only in the Russian Federation. In the context of restrictions related to the spread of coronavirus, the requirements for the stability of services, as well as the requirements for compliance with Russian legislation in the field of personal data processing, become important <ref type="bibr" target="#b4">[5]</ref>.</p><p>Unfortunately, in most cases, these standards are not met. Table <ref type="table" target="#tab_1">2</ref> shows the technical features of storing and processing user data, which according to <ref type="bibr" target="#b4">[5]</ref> can be classified as personal data.Having analyzed the features of TDT in terms of storage and processing user data, and also the registration requirements, we selected some TDT that can be used by tutors and educational establishments at minimum cost and at low risk of violating the regulations of the Russian Federation relating to personal data processing: • BigBlueButton webinar system. It is possible to install the system on the organization's own server or even on a teacher's personal computer (as was performed at the Department of Computer Engineering and Modeling of the Institute of Physics and Technical Sciences, Crimean Federal V. I. Vernadsky University). Students are not required to register and submit their personal datato get connected they follow a link; • AWWApp-interactive online whiteboard. Basic functionality (free illustrations, selection of tools, background loading of images and pdf-files, etc.) does not require registration for both teachers and students;</p><p>• using the functionality of the social network Vkontakte. Registration and confirmation of the phone number are required. At the same time, Vkontakte places its servers on the territory of the Russian Federation and declares compliance with the norms of 152-FL. However, the TDT being under consideration, and many others are subject not only to the personal data information security threats but also to various other information security threats, which can occur any time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Information security risks and equivalent damages</head><p>If the upper segment of the TDT (servers), communication channels, or lower-level devices (user devices) are affected by information and technical interference, there can occur a disruption of the educational process for some time. The examples of real problems that the participants of the educational process face are:</p><p>• inability to connect to the broadcast streaming; • electronic services failure, lagging, etc.; • indirect threats related to the leakage or deliberate misuse of the user's personal data by the service. For an individual participant of the educational process, the above-mentioned issues may not be critical, but the number of people involved in the process can be substantial and can significantly (a hundredfold or even thousands of times) surpass the number of those people who are negatively affected by misfunctions of the automated control systems, classified as critical information infrastructure (in the commonly used meaning of this definition).</p><p>Some of the indicators for assessing the security of the automated systems are the probability (or frequency) of successful computer attacks (CA), that cause the transition of the system to a state of misfunction or failure (PCAi), and the notional value of damage from a single CA ( i  ), where i is the index of the CA kind and the damage corresponding to it. Risk is most often understood as the product of the following parameters:</p><formula xml:id="formula_1">      N i i i CA CA P R 1 ,  ,<label>(1)</label></formula><p>The regulatory documents -All-Union State Standard and IEC on riskscontain a list of methodology for assessing the risk, such as: RIA, HAZOP, HACCP, SWIFT, and others <ref type="bibr" target="#b5">[6]</ref>. A multidisciplinary approach can be applied to risk assessment, as risks can result from a wide range of causes and have a large number of consequences. However, in practice they are all qualitatively defined on the basis of brainstorming, expert experience, scenario analysis, etc.</p><p>As a result, in most cases in practice, the notion 'damage' is considered to be some notional value. At the same time, in jurisprudence, the damage is almost always assessed from both sides: material and moral, which, of course, have some financial equivalent <ref type="bibr" target="#b6">[7]</ref>.</p><p>To be able to compare risks, their characteristics should be comparable. First, we are going to consider automated control systems (ACS) and the impact that computer attacks have on them. We are going to deal with the risks that do not lead to human death (in order to avoid interference with the moral issue). All the same, such risks do damage to the health of the people involved in the critical information infrastructure functioning. Financial damage, in this case, can be expressed as the sum of the money paid off to each sufferer ( O N ) to cover the costs of treatment i c , temporary loss of labour capacity i d , moral, or non-pecuniary, damage i U , which, as has been said, can also be assessed in monetary terms, just as it happens in jurisprudence.</p><formula xml:id="formula_2">       0 1 0 N i i i i U d c  ,<label>(2)</label></formula><p>Non-pecuniary damage may be translated into a financial equivalent with some margin of error  .</p><p>Similarly, the harm done to the reputation and risks of the disruption of teacher's digital tools functioning lead to a "moral damage" for state bodies and the system of education, since the number of people affected is extremely large. Consequently, such reputational risks can also be assessed in financial terms. What is more, additional financial resources are required to organize explanatory and other corrective work with the population in order to maintain the overall level of satisfaction at a certain level. The formula (3) for calculating the financial equivalent of the damage IS  caused by the negative impact on the TDT is similar to (2):</p><formula xml:id="formula_3">       IS N i i i i IS U d c 1  ,<label>(3)</label></formula><p>where the majority of i: 0 ,  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>Based on the analysis of TDT, we can conclude that there is a wide range of such programs. At the same time, in terms of their compliance with Russian legislation on personal data protection and from the standpoint of so-called "digital sovereignty", the choice is significantly narrowed down to several programs. The basic parameters of a teacher's digital tools are presented in tables 1 and 2, but just a few of the products can be recommended.</p><p>The damage, expressed in the notional financial equivalent, done to a typical information system relating to objects of critical information infrastructure (CII) O  and the damage to an information system used for educational activitiesa teacher's digital tool IS  -are comparable in order of magnitude.</p><p>Consequently, it becomes obvious that it is important to pay particular attention to TDT that should be easy to use, have minimal system requirements and, at the same time, provide a high level of protection from computer attacks and sanctions pressure.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>, it is possible to note the main difference, which is the following: o IS N N  . This leads us to the conclusion that in case of computer attacks on the information infrastructure used for educational purposes, the damage values O  and IS  , expressed in notional financial equivalent, are comparable in order of magnitude.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="1,0.00,191.15,594.96,459.74" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="2,110.75,343.15,372.75,201.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 Basic</head><label>1</label><figDesc></figDesc><table><row><cell cols="3">criteria of TDT information security</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Teacher's</cell><cell>Secure</cell><cell>Personal data</cell><cell>Administration</cell><cell>Known</cell><cell>Restrictions</cell></row><row><cell>digital tool</cell><cell>protocol</cell><cell>transfer to a</cell><cell>difficulty</cell><cell>instances of</cell><cell>due to</cell></row><row><cell>(TDT)</cell><cell></cell><cell>third party</cell><cell></cell><cell>hacking</cell><cell>sanctions</cell></row><row><cell>BugBlueButton</cell><cell>TLS</cell><cell>No</cell><cell>High</cell><cell>Unlikely</cell><cell>No</cell></row><row><cell>(on your own</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>servers)</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc></figDesc><table><row><cell cols="2">Features of storing and processing user data</cell><cell></cell><cell></cell></row><row><cell>Teacher's</cell><cell>Compliance with regulatory</cell><cell>Use of cryptographic</cell><cell>Location of the</cell></row><row><cell>digital tools</cell><cell>documents on storage and</cell><cell>information security</cell><cell>hosting (the Russian</cell></row><row><cell></cell><cell>processing of personal data</cell><cell>tools (CIST) with up-to-</cell><cell>Federation / not the</cell></row><row><cell></cell><cell>in information systems</cell><cell>date Federal Security</cell><cell>Russian Federation)</cell></row><row><cell></cell><cell></cell><cell>Service (FSS)</cell><cell></cell></row><row><cell></cell><cell></cell><cell>certificates</cell><cell></cell></row><row><cell>BugBlueButton</cell><cell>Yes, no client registration is</cell><cell>Technically possible</cell><cell>RF (technically</cell></row><row><cell>(on your own</cell><cell>required.</cell><cell></cell><cell>possible)</cell></row><row><cell>servers)</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Discord</cell><cell>No, when registering a real</cell><cell>No</cell><cell>Not RF</cell></row><row><cell></cell><cell>full name</cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Federal State Educational Standard of Higher Education -Bachelor&apos;s degree in 09.03.01 Informatics and computer technology</title>
		<imprint>
			<date type="published" when="2017-09-19">September 19, 2017</date>
			<biblScope unit="page">929</biblScope>
		</imprint>
	</monogr>
	<note>Approved by order of the Ministry of Education and Science of the Russian Federation</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Ministry of Education and Science of the Russian Federation</title>
	</analytic>
	<monogr>
		<title level="m">On the approval and implementation of the Federal State Educational Standard for General Secondary Education</title>
				<imprint>
			<date type="published" when="2009-10">October. 2009</date>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page">413</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Experience of the Department of Computer Engineering and Modeling of the Physics and</title>
		<ptr target="https://cfuv.ru/news/cifrovye-instrumenty-prepodavatelya-opyt-kafedry-kompyuternojj-inzhenerii-i-modelirovaniya-fiziko-tekhnicheskogo-instituta" />
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
		<respStmt>
			<orgName>Technical Sciences Institute</orgName>
		</respStmt>
	</monogr>
	<note>Digital tools of the teacher</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<ptr target="https://www.vice.com/en_us/article/k7e95m/zoom-leaking-email-addresses-photos" />
		<title level="m">Zoom is Leaking Peoples&apos; Email Addresses and Photos to Strangers / Joseph Cox // Vice</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">On Personal Data</title>
		<imprint>
			<date type="published" when="2006-07-27">July 27, 2006</date>
			<biblScope unit="page">152</biblScope>
		</imprint>
	</monogr>
	<note>Federal Law</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">All-Union State Standard ISO / IEC 31010 -2011 Risk management Risk assessment methods Moscow Standardinform</title>
	</analytic>
	<monogr>
		<title level="j">Approved and put into effect by the Order of the Federal Agency for Technical Regulation and Metrology</title>
		<imprint>
			<biblScope unit="volume">680</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2011">2012. December 1, 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Ibragimovna Civil law essence and definition of the concepts of harm and loss // Problems of Economics and Legal Practice</title>
		<author>
			<persName><forename type="first">Ibragimova</forename><surname>Aminat</surname></persName>
		</author>
		<ptr target="https://cyberleninka.ru/article/n/grazhdansko-pravovaya-suschnost-i-opredelenie-ponyatiy-vreda-i-ubytkov" />
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
