Skip to main content
  • 525 Accesses

Abstract

Internet became a common place to diffuse relevant values and opinions. Such a role should strengthen their primary objectives and commitments as eminently social institutions. Social media should balance the protection of freedom of expression and the need to curb online crimes, through appropriate regulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Rudolph [1, p. 187].

  2. 2.

    See Mcpeak [2, p. 847].

  3. 3.

    Bailov and Sakhuta [3, p. 15].

  4. 4.

    Rudolph [1, p. 188].

  5. 5.

    Gervais [4, p. 388].

  6. 6.

    In that sense, Gervais [4, p. 390].

  7. 7.

    U.S. Const., amend I. Cornell Law School website, Legal Information Institute, in https://www.law.cornell.edu/constitution/first_amendment, accessed on August 2, 2018.

  8. 8.

    1988 Brazilian Constitution, article 5, item IV. Government website, Planalto, http://www.planalto.gov.br/ccivil_03/constituicao/constituicao.htm, accessed on August 2, 2018.

  9. 9.

    Harawa [5, pp. 367–368].

  10. 10.

    Ibidem, p. 380.

  11. 11.

    See Silver [6, pp. 144–145].

  12. 12.

    In this way, Froomkin [7, p. 159].

  13. 13.

    For instance, the US government used several electronic surveillance programs to monitor al-Qaeda’s Internet use. The government reportedly used Carnivore, a computer program that can read a suspect’s email and other electronic data on a real-time basis, and print or store the information for FBI agents to view or save as electronic evidence for prosecution. The government also used Echelon, a global eavesdropping system that links supercomputers throughout the world to automatically search through the millions of intercepted messages for ones containing pre-programmed keywords of fax, telex, and email addresses (see Sidhu [8, p. 388]).

  14. 14.

    In this way, Siserman [9, p. 422].

  15. 15.

    Prichard et al. [10, p. 218].

  16. 16.

    See Browning [11].

  17. 17.

    In this sense, see Waters [12, p. 4].

  18. 18.

    See Yar [13, p. 217].

  19. 19.

    Vanlandingham [14, p. 56].

  20. 20.

    Also Klein and Flinn [15, p. 112].

  21. 21.

    See Tsesis [16, p. 651].

  22. 22.

    Roberts [17, p. 29].

  23. 23.

    Ibidem, pp. 691–692.

  24. 24.

    Ideas taken from Benjamin R. Davis (see Davis [18, pp. 177–184]).

References

  1. Rudolph, C. (2013). Unleashing law reviews onto social media: Preventing mishaps with a social-media policy. Thomas M. Cooley Law Review, 30, 187–191.

    Google Scholar 

  2. Mcpeak, A. (2014). Social media snooping and its ethical bounds. Arizona State Law Journal, 46, 845–897.

    Google Scholar 

  3. Bailov, A. V., & Sakhuta, P. V. (2016). Mass media as crime determinants. The Journal of Eastern European Law, 24, 14–17.

    Google Scholar 

  4. Gervais, R. (2015). Authors, online. Columbia Journal of Law & The Arts, 38, 385–396.

    Google Scholar 

  5. Harawa, D. S. (2014). Social medial thought crimes. Pace Law Review, 35, 366–397.

    Google Scholar 

  6. Silver, D. (2011). Media censorship and access to terrorism trials: A social architecture analysis. Notre Dame Journal of Law, Ethics & Public Policy, 25, 143–186.

    Google Scholar 

  7. Froomkin, A. M. (2017). Lessons learned too well: Anonymity in a time of surveillance. Arizona Law Review, 59, 95–159.

    Google Scholar 

  8. Sidhu, D. S. (2007). The chilling effect of government surveillance programs on the use of the internet by Muslim-Americans. University of Maryland Law Journal of Race, Religion, Gender & Class, 7, 375–393.

    Google Scholar 

  9. Siserman, C. (2013). A global perspective on the protection of privacy and related human rights in countering the use of internet for terrorist purposes. Masaryk University Journal of Law and Technology, 7, 401–422.

    Google Scholar 

  10. Prichard, J., Watters, P., Krone, T., Spiranovic, C., & Cockburn, H. (2015). Social media sentiment analysis: A new empirical tool for assessing public opinion on crime. Current Issues in Criminal Justice, 27(2), 217–236.

    Article  Google Scholar 

  11. Browning, J. G. (2016). Introducing social media evidence. Advocate Texas, Chapter 15, 21–22.

    Google Scholar 

  12. Waters, G. (2012). Social media and law enforcement: Potential risks. FBI Law Enforcement Bulletin, 1, 1–5.

    Google Scholar 

  13. Yar, M. (2012). E-Crime 2.0: The criminological landscape of new social media. Information & Communication Technology Law, 21(3), 207–219.

    Article  Google Scholar 

  14. Vanlandingham, R. E. (2017). Jailing the Twitter bird: Social media, material support to terrorism, and muzzling the modern press. Cardozo Law Review, 39, 1–56.

    Google Scholar 

  15. Klein, S., & Flinn, C. (2017). Social media compliance programs and the war against terrorism. Harvard National Security Journal, 8, 53–112.

    Google Scholar 

  16. Tsesis, A. (2017). Terrorist speech on social media. Vanderbilt Law Review, 70, 651–708.

    Google Scholar 

  17. Roberts, W. (2016). Terrorists on social media. Washington Lawyer, 31, 26–29.

    Google Scholar 

  18. Davis, B. R. (2006). Ending the cyber jihad: Combatting terrorist exploitation of the internet with the rule of law and improved tools for cyber governance. CommLaw Conspectus, 15, 119–186.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

De Sanctis, F.M. (2019). Social Media. In: Technology-Enhanced Methods of Money Laundering. Springer, Cham. https://doi.org/10.1007/978-3-030-18330-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-18330-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-18329-5

  • Online ISBN: 978-3-030-18330-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics