по
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Editorial board > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Open access publishing costs > Article Identification Policy > Plagiarism check policy > Editorial collegium
Journals in science databases
About the Journal

В погоне за двумя зайцами поймай обоих сразу!
34 журнала издательства NOTA BENE входят одновременно и в ERIH PLUS, и в перечень изданий ВАК
При необходимости автору может быть предоставлена услуга срочной или сверхсрочной публикации!
MAIN PAGE > Back to contents
Social networks as an instrument of information warfare
Frolov Nikolai Vladimirovich

Post-graduate student, the department of Philosophy, Bauman Moscow State Technical University

105005, Russia, g. Moscow, ul. Baumanskaya 2-Ya, d. 5, str. 1

Nikolay.mgtu@gmail.com

Abstract.

Questions of the emergence and development of social networks, as well as their use as an instrument of conducting information warfare currently gain special relevance due to the global informatization of social life. The role of the social network participants in emergence and development of cyber-attacks is analyzed. The author provides particular examples of the significant material and reputational damage caused by them. Accent is made on the peculiarities of the use of social networks for the aforementioned purposes, and transformation of the role of its participants. Trough analyzing the various approaches towards understanding the information systems, social networks, information warfare and its structure considering the historical factor, an attempt is made to determine the key specificities of the modern use of social networks for conducting information warfare and develop the mechanism for counteracting cyber-attacks. The scientific novelty lies in identification of such type of social network users as the initiators. Practical importance of this research consists in suggesting a possible algorithm for counteracting cyber-attacks based on preventative measures against the potential cyber threats.

Keywords: slacktivist, information attack, information warfare, social networks, information security, state management, information management, information society, information, information security threat

DOI:

10.25136/2409-7144.2018.8.27128

Article was received:

13-08-2018


Review date:

14-08-2018


Publish date:

22-08-2018


This article written in Russian. You can find full text of article in Russian here .

References
1.
Barnes J. A. Class and Committees in a Norwegian Island Parish. 1954. Human Relations. Vol. 7. № 1. P. 39-58.
2.
Zinov'eva A. Istoriya sotsial'nykh setei: poyavlenie i razvitie [Elektronnyi resurs]. 2018. URL: https://sciencepop.ru/istoriya-sotsialnyh-setej-poyavlenie-i-razvitie/ (data obrashcheniya: 11.02.2018).
3.
Rastorguev S. P. Informatsionnaya voina. – M.: Radio i svyaz', 1999. – 416 s.
4.
Maruev A. Yu. Informatsionnaya bezopasnost' Rossii i osnovy organizatsii informatsionnogo protivoborstva // Problemnyi analiz i gosudarstvenno-upravlencheskoe proektirovanie. 2010. № 1. Tom 3. S. 47-54.
5.
Kuznetsov D. «Divannye voiska» priznali vazhnoi chast'yu protestov [Elektronnyi resurs]. 2015. URL: https://nplus1.ru/news/2015/12/08/slackers-strike-back (data obrashcheniya: 21.01.2018).
6.
Mogilevskaya G. I. Mobilizatsionnyi potentsial sotsial'nykh setei v sovremennykh informatsionnykh voinakh // Molodoi uchenyi. 2016. № 6 (110). S. 871-873.
7.
Barbera P., González-Bailón S., Bonneau R., Jost J. T., Nagler J., Tucker J., Wang N. Replication Data for: The Critical Periphery in the Growth of Social Protests [Elektronnyi resurs]. 2015. Harvard Dataverse. V1. DOI:10.7910/DVN/WCXK3Z. URL: https://dataverse.harvard.edu/dataset.xhtml?persistentId=doi:10.7910/DVN/WCXK3Z (data obrashcheniya: 22.01.2018).
8.
Morozov E. Internet kak illyuziya. Obratnaya storona seti [Elektronnyi resurs]. – M.: Izdatel'stvo AST, Izdatel'stvo CORPUS, 2014. URL: http://iknigi.net/avtor-evgeniy-morozov/84194-internet-kak-illyuziya-obratnaya-storona-seti-evgeniy-morozov/read/page-17.html (data obrashcheniya: 10.02.2018).
9.
Gromov A., Korotkin A. 18 smertnikov, vzorvavshikh Internet [Elektronnyi resurs] / GAZETA.RU. 2015. URL: https://www.gazeta.ru/social/2015/11/11/7886273.shtml (data obrashcheniya: 18.01.2018).
10.
Pravila s''ema v Sberbanke. V regionakh panicheski opustoshayut bankomaty [Elektronnyi resurs] / Medialeaks. 2014. URL: http://medialeaks.ru/1912msyt_panic/ (data obrashcheniya: 18.01.2018).
11.
Mogilevskaya G. I., Avdeeva T. G., Alekseenko Yu. V. Monitoring i analiz sotsial'nykh setei dlya predotvrashcheniya ugroz informatsionnoi bezopasnosti // Alleya nauki. 2017. № 14. Tom 1. S. 799-804.
12.
Remarchuk V. N. Informatsionnaya analitika kak instrument strategicheskogo upravleniya / Kontury budushchego: tekhnologii i innovatsii v kul'turnom kontekste. Kollektivnaya monografiya / Pod red. D. I. Kuznetsova, V. V. Sergeeva, N. I. Almazovoi, N. V. Nikiforovoi. – SPb.: Asterion, 2017. – S.121-126.
13.
Frolov N. V. Problemy realizatsii gosudarstvennoi politiki Rossii v sfere informatsionnoi bezopasnosti // Teorii i problemy politicheskikh issledovanii. 2016. № 4. S. 84-96.
Link to this article

You can simply select and copy link from below text field.


Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website