Legal Framework for Counter-Terrorism in Social Networks in Russia and Abroad

نویسندگان

چکیده

The article discusses measures to counter terrorist threats in social networks and instant messengers. It is emphasized that the modern form of communication using digital technologies has started be actively used by organizations for recruiting supporters, raising funds, preparing attacks. analyzes German (Act on Improving Law Enforcement Social Networks) Chinese (Chinese Great Firewall) experience introducing restrictions prohibitions framework regulating activities companies moderating information through applications networks. shown implementing requirements legal regime not only a legal, but also technological aspect. peculiarities Internet functioning contribute free implementation information, including illegal information. This circumstance significantly complicates tasks law enforcement agencies countering threats.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a framework for identifying and prioritizing factors affecting customers’ online shopping behavior in iran

the purpose of this study is identifying effective factors which make customers shop online in iran and investigating the importance of discovered factors in online customers’ decision. in the identifying phase, to discover the factors affecting online shopping behavior of customers in iran, the derived reference model summarizing antecedents of online shopping proposed by change et al. was us...

15 صفحه اول

passivity in waiting for godot and endgame: a psychoanalytic reading

this study intends to investigate samuel beckett’s waiting for godot and endgame under the lacanian psychoanalysis. it begins by explaining the most important concepts of lacanian psychoanalysis. the beckettian characters are studied regarding their state of unconscious, and not the state of consciousness as is common in most beckett studies. according to lacan, language plays the sole role in ...

Hidden Markov Models and Bayesian Networks for Counter-Terrorism

Introduction Information concerning the potential whereabouts and activities of terrorists can be extrapolated from the massive amount of intelligence reported daily to US intelligence agencies. The events encapsulated in these reports, and, in particular, the sequence of these events, can be used to probabilistically infer the activities of terrorists. In this chapter, we are particularly inte...

متن کامل

An optimization-based framework for modelling counter-terrorism strategies

This article introduces the subject of terrorism and counter-terrorism by means of a two-person bimatrix game that provides some insight into the behaviour of the two players. We then examine three important areas in counter-terrorism tasks: the detection of terrorist cells and how to render them inoperable, the fortification of assets in order to protect them from terrorist attacks and the opt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SHS web of conferences

سال: 2022

ISSN: ['2261-2424', '2416-5182']

DOI: https://doi.org/10.1051/shsconf/202213400031