Legal Framework for Counter-Terrorism in Social Networks in Russia and Abroad
نویسندگان
چکیده
The article discusses measures to counter terrorist threats in social networks and instant messengers. It is emphasized that the modern form of communication using digital technologies has started be actively used by organizations for recruiting supporters, raising funds, preparing attacks. analyzes German (Act on Improving Law Enforcement Social Networks) Chinese (Chinese Great Firewall) experience introducing restrictions prohibitions framework regulating activities companies moderating information through applications networks. shown implementing requirements legal regime not only a legal, but also technological aspect. peculiarities Internet functioning contribute free implementation information, including illegal information. This circumstance significantly complicates tasks law enforcement agencies countering threats.
منابع مشابه
a framework for identifying and prioritizing factors affecting customers’ online shopping behavior in iran
the purpose of this study is identifying effective factors which make customers shop online in iran and investigating the importance of discovered factors in online customers’ decision. in the identifying phase, to discover the factors affecting online shopping behavior of customers in iran, the derived reference model summarizing antecedents of online shopping proposed by change et al. was us...
15 صفحه اولpassivity in waiting for godot and endgame: a psychoanalytic reading
this study intends to investigate samuel beckett’s waiting for godot and endgame under the lacanian psychoanalysis. it begins by explaining the most important concepts of lacanian psychoanalysis. the beckettian characters are studied regarding their state of unconscious, and not the state of consciousness as is common in most beckett studies. according to lacan, language plays the sole role in ...
Hidden Markov Models and Bayesian Networks for Counter-Terrorism
Introduction Information concerning the potential whereabouts and activities of terrorists can be extrapolated from the massive amount of intelligence reported daily to US intelligence agencies. The events encapsulated in these reports, and, in particular, the sequence of these events, can be used to probabilistically infer the activities of terrorists. In this chapter, we are particularly inte...
متن کاملAn optimization-based framework for modelling counter-terrorism strategies
This article introduces the subject of terrorism and counter-terrorism by means of a two-person bimatrix game that provides some insight into the behaviour of the two players. We then examine three important areas in counter-terrorism tasks: the detection of terrorist cells and how to render them inoperable, the fortification of assets in order to protect them from terrorist attacks and the opt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SHS web of conferences
سال: 2022
ISSN: ['2261-2424', '2416-5182']
DOI: https://doi.org/10.1051/shsconf/202213400031