(сетевой с №3-2015)
(сетевой с №2-2015)
|Articles and journals | Tariffs | Payments | Your profile|
On the need to struggle against the key factors, promoting dissemination of extremist ideas in social networks, as an element of national security provision
Abstract.The article contains the analysis of the key factors, promoting the dissemination of extremist ideas on the Internet, and the measures, which could help struggle against them. Special attention is given to the study of the circumstances and consequences of use of information technologies by extremist criminal groups. The author studies the problems of use of social networks by extremist groups for revolutionary propaganda, recruiting, training, fundraising, communication and target-setting for a strike. The research methodology is based on the elements of social networks analysis. The author also uses various general scientific approaches and ways of logical cognition: analysis and synthesis, abstraction, modeling, the formal-logical approach, comparative and express analysis. The author concludes that extremists use social networks for various purposes: firstly, for communication with other criminal groups and individual supporters of such ideas; secondly, for dissemination of ideas through direct recruiting of potential participants of extremist activity or manipulation of collective consciousness. The scientific novelty of the study consists in the author’s conclusion that despite the active struggle against extremism on the Internet, the question of its effectiveness is still open. To successfully solve the task of struggle against extremism, the whole range of complex measures should be taken, including effective social policy, formation of a well-thought system of political education for young people, creation of a socio-oriented legal system. This study can be used as a theoretical source and as a guide for action. Its results can be used by law-enforcement agencies for the struggle against extremism in social networks.
Keywords: information security, harmful information, security, information technology, factors of crime, national security, extremism, personal data, mass media, prevention of extremism
Article was received:20-02-2017
This article written in Russian. You can find full text of article in Russian here .