Cybercrime in social media of Bangladesh: an analysis of existing legal frameworks

Author(s):  
Kudrat E Khuda Babu ◽  
Md. Abu Bakar Siddik
2014 ◽  
Vol 4 (2) ◽  
pp. 35-45
Author(s):  
Margarita Jaitner

The increased adoption of social media has presented security and law enforcement authorities with significant new challenges. For example, the Swedish Security Service (SÄPO) asserts that a large proportion of radicalization takes place in open fora online. Still, approaches to contain social media-driven challenges to security, particularly in democratic societies, remain little explored. Nonetheless, this type of knowledge may become relevant in European countries in the near future: Amongst other factors, the challenging economic situation has resulted in increased public discontent leading to emergence or manifestation of groups that seek to challenge the existing policies by almost any means. Use of social media multiplies the number of vectors that need law enforcement attention. First, a high level of social media adaption allows groups to reach and attract a wider audience. Unlike previously, many groups today consist of a large but very loosely connected network. This lack of cohesion can present a challenge for authorities, to identify emerging key actors and assess threat levels. Second, a high level of mobile web penetration has allowed groups to ad-hoc organize, amend plans and redirect physical activities. Third, the tool social media is as not exclusive to potential perpetrators of unlawful action, but is as well available to law enforcement authorities. Yet, efficient utilization of social media requires a deep understanding of its nature and a well-crafted, comprehensive approach. Acknowledging the broad functionality of social media, as well as its current status in the society, this article describes a model process for security authorities and law enforcement work with social media in general and security services work in particular. The process is cyclic and largely modular. It provides a set of goals and tasks for each stage of a potential event, rather than fixed activities. This allows authorities to adapt the process to individual legal frameworks and organization setups. The approach behind the process is holistic where social media is regarded as both source and destination of information. Ultimately, the process aims at efficiently and effectively mitigating the risk of virtual and physical violence.


2019 ◽  
Author(s):  
◽  
Youssef Ramzi Mansour

Big data is a relatively new concept that refers to the enormous amount of data generated in a new era where people are selling, buying, paying dues, managing their health and communicating over the internet. It becomes natural that generated data will be analyzed for the purposes of smart advertising and social statistical studies. Social data analytics is the concept of micro-studying users interactions through data obtained often from social networking services, the concept also known as “social mining” offers tremendous opportunities to support decision making through recommendation systems widely used by e-commerce mainly. With these new opportunities comes the problematic of social media users privacy concerns as protecting personal information over the internet has become a controversial issue among social network providers and users. In this study we identify and describe various privacy concerns and related platforms as well as the legal frameworks governing the protection of personal information in different jurisdictions. Furthermore we discuss the Facebook and Cambridge Analytica Ltd incident as an example.


AJIL Unbound ◽  
2018 ◽  
Vol 112 ◽  
pp. 329-333
Author(s):  
Molly K. Land

Using the example of harmful speech online, this essay argues that duties to others—a core component of our humanness—require us to consider the impact our speech has on those who hear it. The widening availability of tools for sharing information and the rise of social media have opened up new avenues for individuals to communicate without the need for journalistic intermediaries. While this presents considerable opportunities for expression, it also means that there are fewer filters in place to manage the harmful effects of speech. Moreover, the structure of online spaces and the uneven legal frameworks that regulate them have exacerbated the effects of harmful speech, allowing mob behavior, harassment, and virtual violence, particularly against minority populations and other vulnerable groups.


2019 ◽  
Vol 46 (2_suppl) ◽  
pp. 124S-128S ◽  
Author(s):  
Robert S. Gold ◽  
M. Elaine Auld ◽  
Lorien C. Abroms ◽  
Joseph Smyser ◽  
Elad Yom-Tov ◽  
...  

Despite widespread use of the Internet and social media platforms by the public, there has been little organized exchange of information among the academic, government, and technology sectors about how digital communication technologies can be maximized to improve public health. The second Digital Health Promotion Executive Leadership Summit convened some of the world’s leading thinkers from across these sectors to revisit how communication technology and the evolving social media platforms can be utilized to improve both individual and population health. The Summit focused on digital intelligence, the spread of misinformation, online patient communities, censorship in social media, and emerging global legal frameworks. In addition, Summit participants had an opportunity to review the original “Common Agenda” that emerged and was published after the inaugural Summit and recommend updates regarding the uses of digital technology for advancing the goals of public health. This article reports the outcomes of the Summit discussions and presents the updates that were recommended by Summit participants as the Digital Health Communication Common Agenda 2.0. Several of the assertions underlying the original Common Agenda have been modified, and several new assertions have been added to reflect the recommendations. In addition, a corresponding set of principles and related actions—including a recommendation that an interagency panel of the U.S. Department of Health and Human Services be established to focus on digital health communication, with particular attention to social media—have been modified or supplemented.


Author(s):  
Kira Vrist Rønn ◽  
Bjørn K Rasmussen ◽  
Thomas Skou Roer ◽  
Christian Meng

Abstract The purpose of this article is to report from a qualitative Scandinavian study with the aim of shedding some light on how investigators in the Scandinavian police services perceive the use of information from social media in investigative police work. Based on 12 group interviews and 49 informants from Danish, Norwegian, and Swedish police services, we present three overarching themes mirroring the general perception amongst the interviewed investigators that: (1) information from social media is valuable in almost all types of crime investigation; (2) the use of social media information is fraught with technical pitfalls resulting in a general fear of making mistakes; (3) the legal frameworks governing digital investigative action are vague, leading to a feeling amongst the investigators of working in a grey zone. Overall, the informants express the view that this seemingly unregulated part of investigative work requires a major overhaul.


2021 ◽  
Vol 69 (6. ksz.) ◽  
pp. 26-38
Author(s):  
Boglárka Meggyesfalvi

Social media content moderation is an important area to explore, as the number of users and the amount of content are rapidly increasing every year. As an effect of the COVID19 pandemic, people of all ages around the world spend proportionately more time online. While the internet undeniably brings many benefits, the need for effective online policing is even greater now, as the risk of exposure to harmful content grows. In this paper, the aim is to understand the context of how harmful content - such as posts containing child sexual abuse material, terrorist propaganda or explicit violence - is policed online on social media platforms, and how it could be improved. It is intended in this assessment to outline the difficulties in defining and regulating the growing amount of harmful content online, which includes looking at relevant current legal frameworks at development. It is noted that the subjectivity and complexity in moderating content online will remain by the very nature of the subject. It is discussed and critically analysed whose responsibility managing toxic online content should be. It is argued that an environment in which all stakeholders (including supranational organisations, states, law enforcement agencies, companies and users) maximise their participation, and cooperation should be created in order to effectively ensure online safety. Acknowledging the critical role human content moderators play in keeping social media platforms safe online spaces, consideration about their working conditions are raised. They are essential stakeholders in policing (legal and illegal) harmful content; therefore, they have to be treated better for humanistic and practical reasons. Recommendations are outlined such as trying to prevent harmful content from entering social media platforms in the first place, providing moderators better access to mental health support, and using more available technological tools.


Author(s):  
Ronald M. Baecker

Politics and government are undergoing dramatic changes through the advent of new technology. The early developers of community networks (mentioned in Section 1.2) had hopeful visions of information technology (IT)-facilitating participatory democracy. Yet the most memorable visions have been literary dystopias, where surveillance is omnipresent and governments have absolute control. We shall begin by highlighting some of these important writings. We shall then consider a current and present topic—the cultural and legal frameworks governing free speech and other forms of expression on the internet. We review several kinds of ‘undesirable’ speech that test our commitment to free speech—messages that are viewed as obscene, hateful, seditious, or encouraging of terrorism. Next, we examine methods governments worldwide use to censor web content and prevent digital transmission of messages of which they disapprove, as well as a similar role for social media firms in what is now known as content moderation. We shall also mention one new form of rampant and very harmful internet speech— fake news. Fake news becomes especially troubling when it is released into and retransmitted widely into filter bubbles that select these messages and echo chambers that focus and sensationalize such points of view to the exclusion of other contradictory ideas. The prevalence and dangers of fake news became obvious during post facto analyses of the 2016 US presidential campaign. The internet and social media enable greater civic participation, which is usually called e-democracy or civic tech. Most such uses of social media are relatively benign, as in online deliberations about the desired size of a bond issue, or internet lobbying to get libraries to stay open longer during the summer. However, for more significant issues, such as violations of fundamental human rights, or unpopular political decisions that incite public unrest, social media communications may facilitate political protest that can lead to political change. IT also plays a role in elections—social media can be used to mobilize the electorate and build enthusiasm for a candidate. Correspondingly, surveys and big data are used to target potential voters during political campaigns and to tailor specific messages to key voters.


2020 ◽  
Vol 12 (2) ◽  
pp. 42-60
Author(s):  
Frank Makoza

Use of social media applications has become popular in the context of developing countries. Social media are transforming the way individuals and organisations communicate and interact in their social settings. This paper presents a critical analysis of discourses on use of WhatsApp among opposition party politicians. Using the case of Malawi, the study analysed media reports and government documents using critical social theory. The findings showed power relations issues related to domination, communication distortions, and conflict of interests in the social and political discourses. Further, the study highlighted the effects of absence and outdated laws and legal frameworks in dealing with emerging use of new technologies in political activities (e.g., use of WhatsApp) in the context of a developing country. The study makes recommendations for policymakers and law enforcement agencies in addressing challenges related to the use and regulation of new technologies.


2020 ◽  
Vol 28 ((S1)) ◽  
pp. 303-324
Author(s):  
Mahyuddin Daud

Malaysia had its 14th General Election on 9th May 2018 that resulted in a change of government from the Barisan Nasional (BN) who ruled since 1957’s independence to the Pakatan Harapan (PH) coalition. Acknowledging the power that social media had in influencing voters, The Communications and Multimedia Act 1998 (CMA) was mobilised to hunt dissenters, where some cases resulted in successful prosecution. Despite the drastic move taken to enact the Anti-Fake News Act 2018 one month before the election, the previous government failed to convince the public that fake news was grave threats to society. Instead, the above initiative may have contributed to BN’s painful defeat against the inexperienced PH. After the election, PH faced similar issues of having to deal with a plethora of fake news online and the ‘gun’ had now turned towards them. The PH Ministers had difficult times correcting misstatements issued through social media which was flooded with sarcastic trolls, some of which may amount to illegal content. Through a qualitative method, this article assesses how social media influenced the landscape of 14th GE. Consequently, international and national legal frameworks have been developed to combat the dissemination of fake news online, as analysed in the second part of this paper. The third part further examines how popular social media platforms provide countermeasures in dealing with fake news and how far legal frameworks correspond to the practices of service providers. It is hypothesised that in time, the PH coalition should have turned towards censoring the internet as done by the previous BN government due to the emerging threat of online fake news all over the world. 


Sign in / Sign up

Export Citation Format

Share Document