Abstract
Internet became a common place to diffuse relevant values and opinions. Such a role should strengthen their primary objectives and commitments as eminently social institutions. Social media should balance the protection of freedom of expression and the need to curb online crimes, through appropriate regulation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Rudolph [1, p. 187].
- 2.
See Mcpeak [2, p. 847].
- 3.
Bailov and Sakhuta [3, p. 15].
- 4.
Rudolph [1, p. 188].
- 5.
Gervais [4, p. 388].
- 6.
In that sense, Gervais [4, p. 390].
- 7.
U.S. Const., amend I. Cornell Law School website, Legal Information Institute, in https://www.law.cornell.edu/constitution/first_amendment, accessed on August 2, 2018.
- 8.
1988 Brazilian Constitution, article 5, item IV. Government website, Planalto, http://www.planalto.gov.br/ccivil_03/constituicao/constituicao.htm, accessed on August 2, 2018.
- 9.
Harawa [5, pp. 367–368].
- 10.
Ibidem, p. 380.
- 11.
See Silver [6, pp. 144–145].
- 12.
In this way, Froomkin [7, p. 159].
- 13.
For instance, the US government used several electronic surveillance programs to monitor al-Qaeda’s Internet use. The government reportedly used Carnivore, a computer program that can read a suspect’s email and other electronic data on a real-time basis, and print or store the information for FBI agents to view or save as electronic evidence for prosecution. The government also used Echelon, a global eavesdropping system that links supercomputers throughout the world to automatically search through the millions of intercepted messages for ones containing pre-programmed keywords of fax, telex, and email addresses (see Sidhu [8, p. 388]).
- 14.
In this way, Siserman [9, p. 422].
- 15.
Prichard et al. [10, p. 218].
- 16.
See Browning [11].
- 17.
In this sense, see Waters [12, p. 4].
- 18.
See Yar [13, p. 217].
- 19.
Vanlandingham [14, p. 56].
- 20.
Also Klein and Flinn [15, p. 112].
- 21.
See Tsesis [16, p. 651].
- 22.
Roberts [17, p. 29].
- 23.
Ibidem, pp. 691–692.
- 24.
Ideas taken from Benjamin R. Davis (see Davis [18, pp. 177–184]).
References
Rudolph, C. (2013). Unleashing law reviews onto social media: Preventing mishaps with a social-media policy. Thomas M. Cooley Law Review, 30, 187–191.
Mcpeak, A. (2014). Social media snooping and its ethical bounds. Arizona State Law Journal, 46, 845–897.
Bailov, A. V., & Sakhuta, P. V. (2016). Mass media as crime determinants. The Journal of Eastern European Law, 24, 14–17.
Gervais, R. (2015). Authors, online. Columbia Journal of Law & The Arts, 38, 385–396.
Harawa, D. S. (2014). Social medial thought crimes. Pace Law Review, 35, 366–397.
Silver, D. (2011). Media censorship and access to terrorism trials: A social architecture analysis. Notre Dame Journal of Law, Ethics & Public Policy, 25, 143–186.
Froomkin, A. M. (2017). Lessons learned too well: Anonymity in a time of surveillance. Arizona Law Review, 59, 95–159.
Sidhu, D. S. (2007). The chilling effect of government surveillance programs on the use of the internet by Muslim-Americans. University of Maryland Law Journal of Race, Religion, Gender & Class, 7, 375–393.
Siserman, C. (2013). A global perspective on the protection of privacy and related human rights in countering the use of internet for terrorist purposes. Masaryk University Journal of Law and Technology, 7, 401–422.
Prichard, J., Watters, P., Krone, T., Spiranovic, C., & Cockburn, H. (2015). Social media sentiment analysis: A new empirical tool for assessing public opinion on crime. Current Issues in Criminal Justice, 27(2), 217–236.
Browning, J. G. (2016). Introducing social media evidence. Advocate Texas, Chapter 15, 21–22.
Waters, G. (2012). Social media and law enforcement: Potential risks. FBI Law Enforcement Bulletin, 1, 1–5.
Yar, M. (2012). E-Crime 2.0: The criminological landscape of new social media. Information & Communication Technology Law, 21(3), 207–219.
Vanlandingham, R. E. (2017). Jailing the Twitter bird: Social media, material support to terrorism, and muzzling the modern press. Cardozo Law Review, 39, 1–56.
Klein, S., & Flinn, C. (2017). Social media compliance programs and the war against terrorism. Harvard National Security Journal, 8, 53–112.
Tsesis, A. (2017). Terrorist speech on social media. Vanderbilt Law Review, 70, 651–708.
Roberts, W. (2016). Terrorists on social media. Washington Lawyer, 31, 26–29.
Davis, B. R. (2006). Ending the cyber jihad: Combatting terrorist exploitation of the internet with the rule of law and improved tools for cyber governance. CommLaw Conspectus, 15, 119–186.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
De Sanctis, F.M. (2019). Social Media. In: Technology-Enhanced Methods of Money Laundering. Springer, Cham. https://doi.org/10.1007/978-3-030-18330-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-18330-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-18329-5
Online ISBN: 978-3-030-18330-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)