scholarly journals Incitement to riot: intermediary liability of ISP`S

2021 ◽  
Vol 7 (3) ◽  
pp. 111-118
Author(s):  
Murad Madzhumayev

Collective actions, particularly organization, promotion, encouragement, and incitement to civil disturbances, are hard to imagine without use of information and communication technologies (ICTs). Recent events such as the Arab Spring, the colour revolutions (e.g. in former Eastern Bloc and the Balkan countries), the unrest in Minneapolis in 2020 which subsequently spread to other US cities, and the US Capitol riots 2021 present significant evidence in this regard. The dissemination of information online inciting to riots involves internet service providers (ISPs) alongside the author. The aim of the paper is to specify the actors in accordance with their functions and determine their eligibility to be prosecuted in cases of incitement to riots using ICTs. Formulated a conclusion about the onset of intermediary liability of ISPs, holding the organizational and technical capacity to influence the information social relations of their users at any time.

2015 ◽  
Vol 6 (2) ◽  
pp. 263-270 ◽  
Author(s):  
Eric Luiijf ◽  
Marieke Klaver

With respect to critical information and communication technologies (ICT), nations most often declare their national critical infrastructure to include telecommunication services and in some cases critical services offered by key Internet Service Providers (ISP). This paper debates whether nations, their policy-makers, legislation and regulation largely overlook and fail to properly govern the full set of ICT elements and services critical to the functioning of their nation. The related societal and economical risk, however, needs to be closely mitigated, managed and governed. Legal and regulatory obligations to increase the ICT resilience may sometimes encourage this process.


Author(s):  
Louise Barkhuus

This chapter introduces a qualitative study of the use of mobile text messaging (SMS) and re?ects on how SMS in?uences social interaction. It describes how this new communication technology is used to maintain social relations and how it generally assists users in their everyday activities. Three issues are highlighted: how users use SMS to overcome shyness, how they use it for micro-grooming, and how they are able to control messages to their advantage. It is argued that SMS facilitates users in their everyday life through the ways it supports awareness and accountability. These characteristics make the communication channel a “social translucent” technology, contributing to its popularity. It is suggested that simple information and communication technologies such as SMS can provide powerful tools in new designs of information and communication technologies.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jelisaveta Blagojević ◽  
Radenko Scekic

PurposeThe purpose of this research paper is to address the main research gap related to the lack of sufficient information regarding the role of information and communication technologies (ICTs) in second Arab Spring wave in comparison to the first one. The authors analysed the role of ICTs via data regarding the access to ICTs and its influence on organization and spread of the anti-regime protests, i.e. regime change.Design/methodology/approachCrisis situations are unpredictable, complex and unexpected. The consequences produced by the crisis situations or events may be negative for an individual, community, organization or society as a whole. In the new millennium, ICTs have an important role in deep social crises. The new technologies enable not only the rapid spread of certain political ideas, spin information, but also the spread of misinformation. The control over ICTs in the crisis situations is crucial. The aim of this paper is to indicate effect of the use of ICTs in the crisis situations, i.e. political upheavals in 11 countries of the “Arab Spring”. The contribution of this paper is based on the development of a special theoretical model of analysis that represents the combination of the theoretical considerations in the field of ICTs, as well as the analysis in the field of transitology, i.e. democratization. The first part of the paper is focussed on the development of ICT transition theory of ICTs’ impact on the process of political change, setting the hypotheses and the explanation of methodological approach of the paper. The second part is related to the review and description of data regarding ICTs use, while the third one discusses the impact of the use of ICTs in organizing and spreading protests in the Arab world, in line with the defined theoretical framework. Finally, there are given the research results in terms of confirming or refuting the hypotheses through the analysis of Arab transition cases.FindingsThe authors confirmed the main hypothesis of the paper that the factors that determined the role of ICTs in first Spring, also, have determined the role of ICTs in second Spring wave. These factors include high access to ICT tools, weak regime's control over ICTs’ use and important cross-border networking with regional and international audience. All that formed the promotional role of ICTs in regime change in 8 of the 11 countries mentioned in the paper.Originality/valueApart from the developed special theoretical model and the analysis of new wave Arab Spring cases, the significance and originality of this paper is reflected in a comprehensive and multidisciplinary approach that connects political changes and the use of ICTs in disseminating certain policies and ideas.


2007 ◽  
Vol 39 (10) ◽  
pp. 2405-2422 ◽  
Author(s):  
Michael Crang ◽  
Tracie Crosbie ◽  
Stephen Graham

Much theoretical commentary over the last decade addressed the likely impacts of information and communication technologies (ICTs) on urban life works by opposing ‘virtual’ spaces and mediated activities to ‘real’ places. Drawing on recent theorising in media studies about ‘remediation’, this paper attempts to move beyond a reliance on such unhelpful real–virtual conceptual binaries. The paper uses such conceptual discussions to consider more fully the multiple, subtle, and interdependent spatiotemporalities which together work to constitute ICT-based urban change. While innovative work has traced the emergence of various online spaces and communities, our interest here is on the intersection of online and offline practices. Through a case study of two contrasting neighbourhoods in Newcastle upon Tyne, the paper explores in detail how social relations and grocery shopping are being affected by ICT use. It suggests that the remediation of everyday urban life through ICTs involves subtle shifts in the spatial, temporal, scalar, and material processes which together help to constitute urban change, and which are all too often overlooked in conventional and binary approaches opposing the ‘virtual’ realm of new technologies to ‘real’ urban places.


2017 ◽  
Vol 15 (3) ◽  
pp. 306-320 ◽  
Author(s):  
Tammy Harel Ben Shahar

This article examines the effects of incorporating information and communication technologies in schools in terms of distributive justice. To do so, four issues that are central to educational justice are discussed: scarcity of resources, the positional nature of education, peer effects, and biases in educational decision-making. The discussion exposes a complicated picture of possible benefits and challenges associated with incorporating data-rich technologies in education. While technology may potentially promote educational justice – by widening access to quality teaching, decreasing biases, and facilitating mixed ability classes – it also creates concerns, related to ensuring equal distribution of technology, preventing biases in educational data mining, and fostering the kind of social relations between students necessary for democratic equality. The article concludes that whether or not information and communication technologies will have a positive impact on educational justice depends, largely, on the way it is developed, designed, and implemented in schools.


2020 ◽  
Vol 11 (87) ◽  
Author(s):  
Lіudmyla Romanenko ◽  
◽  
Anna Vasiuk ◽  

The question of "How to teach?" especially relevant now, when our society has already begun to be called informational. Psychologists and educators in their research show that low learning performance, deteriorating performance of many students is usually due to the use of ineffective tools and methods of learning. Today the teacher has the opportunity to freely focus on a creative approach to the organization of the educational process. The rather rapid development of modern education requires new forms, methods and means of organizing learning. Modernity dictates the need for such an education that could prepare students for a full life with the ability to quickly adapt to new conditions, think critically, be active and multifaceted personality. Accordingly, the modern teacher must also respond to changes in the world, must be able to apply innovative information and communication technologies and convey information to children. The Internet provides many opportunities to use available and free tools, services and resources that can restructure the learning process, make it interesting, creative and creative, meaningfully and instrumentally enrich learning. The article considers the concepts of "Internet service", "interactive multimedia educational content", the concept of organizational and methodological support for the use of Internet service H5P in mathematics lessons in primary school and its advantages over other forms of methodical work. Diagnosis of the advantages and possibilities of using the H5P service in mathematics lessons in primary school and methodical recommendations for the organization of work with the use of the H5P service in mathematics lessons in the 2nd grade. Criteria have been developed and the levels of readiness of the teacher to use the H5P Internet service in mathematics lessons have been described. The use of the H5P online service in math lessons provides a feedback process between teacher and students; to increase the level of visualization of the submitted educational material; provide an individual approach to each student; provide the ability to model the studied processes or phenomena; organize frontal, collective and group work; to carry out constant control and assessment of students' achievements.


Author(s):  
Oleh Poplavskyy ◽  
Volodymyr Sarychev ◽  
Oleh Levin

In the article the author examines the features of the information confrontation between Azerbaijan and Armenia during the "second Karabakh war", identifies the correlation between the socioeconomic potential of countries and the possibilities of application of information and communication technologies as a strategic resource for each of the parties to the military conflict. For comparison, we also used facts about Ukraine, Belarus and the Russian Federation, as countries of Eastern Europe region, which are in a similar state of military-political and socio-economic instability. The content and forms of information confrontation as a rivalry between countries in the information and communication sphere due to the desire to influence the formation of public opinion of the population, the level of national identity, the nature of social relations in the adjacent territory are revealed. Against the backdrop of the dynamics of the armed confrontation between the countries, specific forms of using information and communication technologies as one of the most effective means of warfare were analyzed, and the effectiveness of information and psychological operations in solving and escalating a military conflict was determined. The features of information war with using communication technologies as the aim of strenothening morale of their army and consolidation the moral and political potential of the people are characterized. Based on the analysis of the armed confrontation, we made conclusions that, in modern conditions, each of the countries, which are in a state of military, political and social instability must develop their own strategies for preventing military conflicts. Such strategies should take into consideration external threats, the existing economic potential, the possibilities of storing and disseminating of official information in peacetime, as well as the experience of effective government regulation of the practice of using the media and network technologies during an aggravation of the military situation. Based on the results of our research, a number of practical recommendations were formulated regarding the directions of the formation and development of information and communication technologies, which are used to protect the information space of the country and counteraction the unwanted influence of the enemy. The importance of the results obtained is substantiated for understanding the nature, tools and methods of modern information and psychological wars, as well as for the implementation of an effective state policy of countering the negative propaganda influence of the enemy in situation of active and large-scale information confrontation.


Author(s):  
Khaoula Azzouz ◽  
Jabir Arif ◽  
Mohamed Badr Benboubker

The paper focuses on Information and communication technologies (ICT) deployed by Logistics service providers (LSP), particularly for the monitoring and companies. Indeed, nowadays ICT are essential for any implementation of efficient traceability, notably for the outsourcing of logistics activities. This paper is structured around two parts: the first part presenting the state of the art in terms of outsourcing logistics activities and traceability. The second part concerns a comparative study combining a set of LSP operating in Morocco and those operating abroad through several criteria. These criteria include the services offered and the technology deployed for rigorous traceability. The comparative study will determine the profile of the LSP operating in Morocco and adopting an effective and efficient traceability strategy based on innovative technology.


Author(s):  
Yeşim Yurdakul ◽  
Utku Beyazıt ◽  
Aynur Bütün Ayhan

Technological developments enable adolescents to establish crowded peer groups through communication over extensive social networks that are difficult to supervise. However, inappropriate and unsupervised use of information and communication technologies can make adolescents the target of behaviors related to cyberbullying. Cyberbullying and victimization have severe negative effects on individuals' social, academic, and emotional lives. The negative effects of cyberbullying can be experienced more intensely during adolescence as a result of the changes occurring in the cognitive developmental field. The cyberbullying experienced in adolescence is also a predictor of bullying behaviors in social relations and professional lives as adults. The effects of bullying behaviors in adulthood can be an indication of the long-term effects of cyberbullying. Taking this as the starting point, this chapter aims to examine the types, prevalence, short and long-term effects of cyberbullying behaviors during adolescence.


Author(s):  
Pedro Pereira Neto

Information and Communication Technologies, considered both as a technological resource and as a social technology, play an important role in the shaping of existing social relations and in the creation of new modes of interaction and social organization (AA. VV., 2000). However, traditional approaches of political action frequently misstate just how politically active citizens are by underrating changes occurred in the realm of political mediation (Norris, 2002, p. 2; Epstein, 1991, p. 230). The changes in the organizational and action repertoires go hand in hand with the specificities of each NGO's cultural interpretative devices, which are influenced by technological change (Zald, 1996, p. 266-270). On the other hand, frames are also subject to internal debate, a process in which ICTs also take part (Webster, 2001, p. 7). Hence, this paper focuses on clarifying the ways in which NGOs have their structure and action repertoires changed by the use of ICTs.


Sign in / Sign up

Export Citation Format

Share Document