|

Protest potential of social networks: opportunities and risks

Authors: Bagdasaryan N.G., Titov R.V. Published: 09.07.2014
Published in issue: #4(18)/2014  
DOI: 10.18698/2306-8477-2014-4-193  
Category: The Humanities in Technical University | Chapter: Social sciences  
Keywords: Internet, information technology, communication, propaganda, protest, network structure, network communities, social groups, social networks, electronic technology

Virtual network structure: is it a path to the civil society or social risk factor? Answering this question, the authors attempted to understand social networks as a platform for real and virtual mobilization of citizens expressing protest activity; appreciated opportunities and risks of the platform; proposed some definite steps to solve the problem of illegal political organizations conducting propaganda activities on the Internet.


References
[1] Castells M. Informatsionnaya epokha: ekonomika, obshchestvo i kul’tura [The information age: economy, society and culture] (in Russian). Moscow, HSE Publ., 2000.
[2] Ivnitsky V.A. Teoriya setei massovogo obsluzhivaniya [Theory of queuing networks]. Moscow, 2004.
[3] Bondarenko S.V. Sotsial’naya struktura virtual’nykh setevykh soobshchestv [Social structure of virtual network communities]. Rostov-na-Donu, Rostov Univ. Publ., 2004, pp. 196-210.
[4] Voiskunsky A.E., ed. Gumanitarnye issledovaniya v Internete [Humanities research on the Internet]. Moscow, Mozhaisk-Terra Publ., 2000.
[5] Civil Movements: The Impact of Facebook and Twitter, 2011. Available at: http://www.dsg.ae/portals/3/DSG_Arab_Social_Media_Report_No_2.pdf
[6] Dannye oprosa naseleniya Rossii [The survey data of the Russian population]. Available at: http://gefter.ru/
[7] Opros Levada-tsentra: mitingovaya aktivnost’ 2013 goda [The Levada Center survey: rallies activity in 2013]. Available at: http://www.levada.ru/18-07-2013/protestnye-nastroeniya-rossiyan
[8] Panchenko E. Mitingi "Za chestnye vybory": Protestnaya aktivnost’ v sotsial’nykh setyakh [Rallies "For Fair Elections": Protest activity in social networks]. Available at: http://www.digitalicons.org/issue07/
[9] Kolata G. Veiled Messages of Terorists May Lurkin Cyberspace, The New York Times (20 October 2001). Available at: http://marc.info/?l=cryptography&m=100445684908223&w=
[10] Bagdasaryan N.G. Kul’turnye riski i problema otvetstvennosti v elektronnykh kommunikatsiyakh [Cultural risks and liability issue in electronic communications]. Internet-Kul’tura-Etika [Internet-Culture-Ethics]. Materials of VIII Engelmeyer readings. Moscow-Dubna, 2006. N.G. Bagdasaryan, V.L. Silaeva, eds. Moscow, 2006, pp. 210-2014.
[11] Barabanov A.V., Markov A.S., Tsirlov V.L. Spetstekhnika i sviaz’ - Special Equipment and Communication, 2011, no. 3, pp. 48-52.
[12] Basarab M.A., Vel’ts S.V. Inzhenernyi zhurnal: nauka i innovatsii - Engineering Journal: Science and Innovation, 2013, no. 2 (14), p. 24.
[13] Matveev V.A., Medvedev N.V., Troitsky I.I., Tsirlov V.L. Vestnik MGTU im. N.E. Baumana, Seriya Priborostroenie - Bulletin of Bauman Moscow State Technical University, Series "Engineering", special issue "Technical means and information security systems", 2011, pp. 3-6.
[14] Markov A.S., Fadin A.A. Sistematika uyazvimostei i defektov bezopasnosti programmnykh resursov [Systematics of vulnerabilities and security defects of program resources]. Zashchita informatsii. Insaid - Information Security. Inside, 2013, no. 3, pp. 56-61.
[15] Spisok ekstremistskikh organizatsii, publikuemyi Ministerstvom yustitsii Rossii [List of extremist organizations, published by the Ministry of Justice]. Available at: http://minjust.ru/ru/activity/databases