CHALLENGE OF THE ABUSE OF INFORMATION TECHNOLOGIES FOR PUBLIC INFORMATION
Journal Title: FBIM Transactions - Year 2019, Vol 0, Issue 1
Abstract
In this article, we view public information as a process of making available data and information through their distribution, primarily in cyberspace. Given that information is the fundamental right of every individual and obligation of public authority, the emergence of a phenomenon called "fake news" implies that, in contemporary conditions, public authorities fail to secure the right to objective and accurate information. The problem we are focusing on is the extent to which information technology can be instrumentalised to relativise the public information function. In this context, the goal of the work is to isolate the abuse mechanisms, so that they can be timely identified and harmful consequences counteracted in the realm. Methodologically, the work is based on the phenomenological distinction between the importance of the impression and the factual situation in order to reach the real value dimension of information. The indicators obtained in this way are analysed from the perspective of the potential structural and functional impact of systematic instrumentalisation of information technologies to impose opinions instead of informing. The results of the analysis point to the existence of a number of risks arising from the unregulated and uncontrolled mass application of information technologies, which stem from the unequal position of the participants in the cyberspace. Findngs provide a basis for the conclusion that potential risks include possible offensive action and require the organisation of the download and transmission of information and data in the national cyberspace. In this context, it seems that information technology evaluations cannot be left to autarchical initiatives, but must be subject to a systematic assessment by relevant forensic bodies.
Authors and Affiliations
Miroslav Stevanović
RELIABILITY MODELING OF COMPLEX TECHNICAL SYSTEMS IN INDUSTRY, SSA CONCEPT
The paper presents problems related to the modeling of complex technical systems in the industry but also odds to troubleshoot via Split System Approach concept. The aim is to show the benefits of applying the concept of...
THE IMPACT OF TRANSFORMATIONAL AND CHANGE LEADERSHIP ON CHANGE READINESS AND COMMITMENT TO CHANGE
Negative attitudes towards change are one of the main reasons why an organizational change fails. Initially, researchers focused on resistance to change, subsequently developing several constructs with research instrumen...
SOME ASPECTS OF AUTOMATIZATION OF THE SUPPLY CHAIN
There is a lot talk about Logistics 4.0, digital supply chain management, the blockchain, etc., but which technologies are considered under these general terms, how their development will continue to be, and what future...
SECURITY RISK MANAGEMENT MODEL
Worldwide there are many developed models for managing security risks. Within this thesis, the developed model with eight phases will be represented. The phase “Business System Identification” should identify all objects...
COMPUTER SABOTAGE
There is a growing interest among lawyers in computer crime, otherwise known as cyber-crime. Since it is increasingly developing together with the development of innovations in the field of information technologies, legi...