Legal Mechanism of Counteracting Information Aggression in Social Networks: from Theory to Practice

An open public discourse is one of the basic conditions of democracy, because this is how citizens can discuss their common matters, form political opinions and ultimately reach a decision for themselves. To have a lively and rational discourse, media freedom, individual freedom of expression and the right to receive information are equally needed. Today’s media environment gives individuals the chance to express their ideas at every possible instance – in this respect, the pluralism of ideas is overwhelming. This overwhelming volume of information makes navigation and access to trustworthy information a hard task. Today social networks created a new public space that can be flexibly utilized to get any message to selected parts of the audience. It has no national boundaries, a feature that can be used not only for good purposes, but often for bad ones such such as slander. The article is noted that social networks act as a separate sphere for the emergence, change or termination of civil legal relations, therefore the urgent question is to clarify the application of the legal mechanism in the fight against information aggression, which includes the following components: the discovery of inaccurate information, which is not just an appraisal judgments, but frankly slander outlining the range of probable defendants; making an application to the court in accordance with the requirements of national legislation; proving the fact of unreliability by providing evidence.

[1]  Yuriy Syerov,et al.  The cataloging of virtual communities of educational thematic , 2014, Webology.

[2]  Yuriy Syerov,et al.  Protection of University Information Image from Focused Aggressive Actions , 2016, ICONS 2016.

[3]  Deborah R. Eltgroth Best Evidence and the Wayback Machine: Toward a Workable Authentication Standard for Archived Internet Evidence , 2009 .

[4]  Satoshi Fujita,et al.  Effective Suppression of False Rumors in Social Network Service , 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR).

[5]  John Ng'ang'a Gathegi Social Media Networking Literacy: Rebalancing Sharing, Privacy, and Legal Observance , 2014, ECIL.

[6]  Minghua Song,et al.  Effects of aggressive traits on cyberbullying: Mediated moderation or moderated mediation? , 2019, Comput. Hum. Behav..

[7]  Solomia Fedushko,et al.  Methods for forming an informational image of a higher education institution , 2015, Webology.

[8]  Socio-political perspectives on surveillance and censorship: Implications for on-line privacy in the age of cloud computing , 2017, 2017 Computing Conference.

[9]  Yuriy Syerov,et al.  Methods of Determining Information Support of Web Community User Personal Data Verification System , 2017, AUTOMATION.

[10]  Daxton R. Stewart Social Media and the Law: A Guidebook for Communication Students and Professionals , 2012 .

[11]  Andriy Peleshchyshyn,et al.  Identifying Specific Roles of Users of Social Networks and Their Influence Methods , 2018, 2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).