Criminological Analysis and Filtering of Sites with Aggressive Content
The work carried out a study of the current problem of minimizing risks and damage from aggressive impacts on the Internet, in social networks. The methodology of system and forensic analysis has been used. Using methods of mathematical and information-logical analysis, comparative and cognitive analysis of counteraction to aggressive impact on the visitor or owner of the site (moderator of the forum) is carried out. Methods of aggressive behavior (disinhibition, trolling, cyber-bullying and astroturfing), their local and global goals - up to the capture and management of communicative resources for the purpose of affecting the user - have been analyzed. Aggressiveness on the site has become a public problem, legally not only in Vietnam, but also in many countries, including Russia, France, South Korea, etc. Hosting distances itself from an important problem for it as well. The aggressiveness of a site is classified by the site's aggressiveness scale. Criminological identification of aggression and aggressor is a complex and multidimensional problem. Was carried out systemic and practical, criminological analysis of aggressive behavior on sites. Was possible to formulate and propose measures, approaches to filtering and combating aggressive behavior on the site, as well as to formalize it mathematically, for subsequent research. The analysis will help to counter the aggressor and support the victim.
Buz, S.I. (2017) Concept and main criminological characteristics of violent crimes in modern Russia // Journal of the Krasnodar University of the Ministry of Internal Affairs of the Russian Federation. №3(37). -pp.8–11.
Bulatova, E.I. (2017) Networking communication strategies: Trolling // Journal of the St. Petersburg State University of Culture and Arts. №2(31), pp. 75-78. Retrieved from: https://cyberleninka.ru/article/n/setevyekommunikativnye-strategii-trolling (date of appeal: 20.02.2020).
Bochaver, A., Hills, K. (2014) Cyberbullying: Harassment in the space of modern technology // Psychology. Journal of the Higher School of Economics. Vol.11, N3. –pp. 177-191.
Civisec. (2007) Guide to Bypass Internet Censorship for All. The Citizen Lab, University of Toronto. Retrieved from: http://www.civisec.org/sites/all/themes/civisec/guides/everyone's-guide-rustian.pdf (date of appeal: 10.02.2020).
Cochegurov, E.A., Martynova Yu. A (2020) Aspects of continuous user identification based on free texts and hidden monitoring // Programming and Computer Software, Vol. 46, No.1, pp. 12-24.
Ignatov, A.N., Višneviecki, K.V., Kashkarov, A.A. (2018) Conceptual bases, directions and measures to counter criminal violence // Legal science and practice: Journal of the Nizhny Novgorod Academy of the Ministry of Internal Affairs of the Russian Federation. №2 (42). pp. 133-141.
Kaziev, V.M. (2007) Introduction to analysis, synthesis and modeling of systems. –M.: Binom. Laboratory of knowledge. Intuit. – 244 p. ISBN 5-94774-511-9. Retrieved from: https://www.intuit.ru/studies/courses/83/83/info (date of the address: 20.02.2020).
Kaziev, V.M., Kazieva, B.V., Kaziev, K.V. (2017) Foundations of legal informatics and informatization of legal systems, 2nd ed. -M.: INFRA-M, 336 pp. ISBN-online: 978-5-16-104376-9. Retrieved from: http://znanium.com/catalog/product/545154.
Kalafati, Y.D., Moiseyev, K.V., Starkov, S.O., Shushkova, S.A. (2008) Technology of Storage and Processing of Electronic Documents with Intellectual Search Properties // International J. Information Theories and Appl. (IJITA), Vol.15, 184.
Khodusov, A. (2020). Social legal state as a constitutional value // Amazonia Investiga, 9(25), pp.471-478. URL: https://amazoniainvestiga.info/index.php/amazonia/article/view/1096
Luneev, V.V. (2015) Course of world and Russian criminology. In 2 volumes, vol. I. General part / V.V. Luneev. -M.: Jurayt, -1003 p. ISBN 978-5-9916-1751-2.
Olejnik, L., Castelluccia, C. (2013) Towards Web-Based Biometric Systems Using Personal Browsing Interests. International Conference on Availability, Reliability and Security. –Regensburg. - рр.274-280. DOI: 10.1109/ARES.2013.362.
Olinder, N.V., Gamburov, E.A. (2017) On the Results of the Experiment "Search and Perception of Identity Information on the Internet" and its Use in Crime Investigation // Forensic Expert, No.4, pp.29-31.
State register of prohibited sites (2020). Retrieved from: https://eais.rkn.gov.ru/ (date of appeal 23.03.2020).
Ugolnicki G.A., Usov A.B. (2020) Dynamic models of coordination of private and public interests in the sphere of economic corruption. J. Comput. Syst. Sci. Int. 59, pp.39–48. https://doi.org/10.1134/S1064230720010128
Višniewski, A.S. (2018) Deceptive system for detection of hacking, based on analysis of website visitors behavior // Cybersecurity issues, №3(27), pp.54-58. DOI:10.21681/2311-3456-2018-3-54-62.
Vorontsova, T.A. (2016) Trolling and Fleiming: Speech Aggression in Internet Communications // Journal of Udmurt University. History and philology. Vol.26, N2 - pp.109-116.
Yaseen Al-Shwani, N.A.; Shaker Mahmood, I. (2019). The crime of exploiting children in prostitution via internet (legal study), Revista de la Universidad del Zulia, 10 (28), 315-330. https://produccioncientificaluz.org/index.php/rluz/article/view/30813/31853
Yuzhanin, M.A. (2020). The specifics of manipulative influence in contemporary social interactions and communications // Amazonia Investiga, vol.9 (26), pp.125-133. https://doi.org/10.34069/AI/2020.26.02.14.
Zhong, J., Yan, C., Yu, W., Zhao, P., Wang, M. (2014) A Kind of Identity Authentication Method Based on Browsing Behaviors. Seventh International Symposium on Computational Intelligence and Design. -Hangzhou. pp. 279-284. DOI: 10.1109/ISCID.2014.205.