The Unlawful Utilization of Information and Communication Technologies in Rioting
https://doi.org/10.18384/2310-6794-2023-2-106-117
Abstract
Aim. Justification of the need for intermediary responsibility of Internet service providers in the context of global trends in information and communication technology (ICT) and digital population of the world based on the analysis of their impact on the organization, coordination, incitement and commission of riots.
Methodology. The work used general scientific methods of research - dialectical, logical, systematic, as well as private scientific methods - formal-legal, statistical, interpretative, etc.
Results. The trends in the use of ICTs in riots were outlined, leading to the conclusion that it is reasonable to hold internet service providers criminally liable for the intermediary if they have the organizational and technical capacity to intervene in the informational social relations of their users at any time.
Research implications. Measures to address the criminal liability issues of offenses perpetrated utilizing high technology are presented, along with the reconceptualization of the criminal policy.
About the Author
M. M. MadzhumayevRussian Federation
Murad M. Madzhumayev – Cand. Sci. (Law), Assistant, Department of Criminal Law, Criminal Procedure and Criminalistics, Law Institute
ul. Miklukho-Maklaya 6, Moscow 117198
References
1. Bavsun M. V.[The expediency of objective imputation].In: Nauchnyy vestnik Omskoy akademii MVD Rossii [Scientific Bulletin of Omsk Academy of the Ministry of Internal Affairs of Russia], 2005, no. 2, pp. 15–18.
2. Zharova A. K.[On the need for a legal classification of Internet operators].In: Biznes-informatika [Business Informatics], 2011, no. 3, pp. 60–65.
3. Ozhiganova E. M.[Application of the motivation system for temporary employees on the example of ER-Telecom Holding JSC].In: Biznes-obrazovaniye v sfere znaniy [Business education in the knowledge economy], 2016, no. 1, pp. 43–48.
4. Rassolov I. M.[Legal problems of ensuring information security: legal responsibility of telecom operators].In: Vestnik Moskovskogo universiteta MVD Rossii [Bulletin of Moscow University of the Ministry of Internal Affairs of Russia], 2013, no. 12, pp. 103–108.
5. Perchatkina S. A., Cheremisinova M. E., Tsirin A. M., Tsirina M. A., Tsomartova F. V.[Social Internet networks: legal aspects].In: Zhurnal rossiyskogo prava [Journal of Russian Law], 2012, no. 5, pp. 14–24.
6. Tsirina M. A.[Distribution of pro-drug information on the Internet: countermeasures].In: Zhurnal rossiyskogo prava [Journal of Russian law], 2012, no. 4, pp. 44–50.
7. Chubukova S. G.[Problems of the legal status of an information intermediary].In: Vestnik akademii prav i upravleniya [Bulletin of the Academy of Law and Management], 2017, no. 2, pp. 39–44.
8. Frank A. B., Posard M. N., Helmus T. C., Marcinek K., Grana J., Kahn O., Zutshi R.An Exploratory Examination of Agent-based Modeling for the Study of Social Movements.RAND Corporation, 2022.120 p.
9. Christensen D., Garfias F.Can You Hear Me Now?: How Communication Technology Affects Protest and Repression.In: Quarterly Journal of Political Science, 2018, vol. 13, iss. 1, pp. 89–117.
10. Cobb J., Guariglia M.The Essential Kerner Commission Report.Liveright Publ., 2021.320 p.
11. Duncan F.Collective Action and Digital information Communication Technologies: The Search for Explanatory Models of Social Movement Organizations’ Propensity to Use DICTS in Developed Democracies: Thesis Doctor of Philosophy (PhD) in Communication.Pennsylvania, 2015.208 p.
12. Fuchs C.Social media, riots, and revolutions.In: Capital & Class, 2012, vol. 36, iss. 3, pp. 383–391.
13. Gaudette T., Scrivens R., Venkatesh V.The role of the internet in facilitating violent extremism: insights from former right-wing extremists.In: Terrorism and Political Violence, 2022, vol. 34, iss. 7, pp. 1339–1356.
14. Ley S.High-risk participation: Demanding peace and justice amid criminal violence.In: Journal of Peace Research, 2022, vol. 59, iss. 6, pp. 794–809.
15. Schillinger F., Schindelhauer C.End-to-End Encryption Schemes for Online Social Networks.In: Security, Privacy, and Anonymity in Computation, Communication, and Storage: 12th International Conference, SpaCCS Atlanta, USA, July 14–17, 2019 Proceedings.Springer Nature Switzerland AG, 2019, pp. 133–146.
16. Shultziner D., Goldberg S.The stages of mass mobilization: separate phenomena and distinct causal mechanisms.In: Journal for the Theory of Social Behavior, 2019, vol. 49, iss. 1, pp. 2–23.