<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2408-9338</journal-id><journal-title-group><journal-title>Research result. Sociology and Management</journal-title></journal-title-group><issn pub-type="epub">2408-9338</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2408-9338-2018-4-3-0-3</article-id><article-id pub-id-type="publisher-id">1482</article-id><article-categories><subj-group subj-group-type="heading"><subject>SOCIAL STRUCTURE, SOCIAL INSTITUTES AND PROCESSES</subject></subj-group></article-categories><title-group><article-title>REFLECTED RISKS OF NETWORK COMMUNICATIONS  (THE RUSSIAN YOUTH ONLINE SURVEY RESULTS)</article-title><trans-title-group xml:lang="en"><trans-title>REFLECTED RISKS OF NETWORK COMMUNICATIONS  (THE RUSSIAN YOUTH ONLINE SURVEY RESULTS)</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Berdnik</surname><given-names>Ekaterina Aleksandrovna</given-names></name><name xml:lang="en"><surname>Berdnik</surname><given-names>Ekaterina Aleksandrovna</given-names></name></name-alternatives><email>k_berdnik@inbox.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2018</year></pub-date><volume>4</volume><issue>3</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/sociology/2018/3/29-44_A39CIxK.pdf" /><abstract xml:lang="ru"><p>The author revises the latest risks and threats associated with technologization of the information and communication sphere, and presents the main directions of scientific theorization in this area. Special attention is paid to the new challenges, which have not yet been reflected as threats in the scientific community or in the political and legal documents of the Russian Federation, such as: Big Data analysis technologies, the transition from the &amp;quot;social Web&amp;quot; (Web 2.0) to the &amp;quot;cognitive Web&amp;quot;
(Web 3.0), the augmented reality technologies, and transmedia content delivery. It is concluded that the presence of identified risks in the young people network communication process necessitates their neutralization practices formation and negative impact minimization. In this regard, the article actualizes the empirical analysis of young people&amp;#39;s reflexive evaluation of their own safety in the network communications process. The article presents the results of the online survey involving young Russian users of the social network &amp;quot;Vkontakte&amp;quot;. The survey enabled to draw a conclusion that the majority of young people tend not to fix or to ignore risks and threats in the network communications process, noting that they rarely or almost never faced the latter. The author confirms the hypothesis of young people&amp;#39;s safety in the Network differentiated perception, which correlates with their socio-demographic indicators and values.</p></abstract><trans-abstract xml:lang="en"><p>The author revises the latest risks and threats associated with technologization of the information and communication sphere, and presents the main directions of scientific theorization in this area. Special attention is paid to the new challenges, which have not yet been reflected as threats in the scientific community or in the political and legal documents of the Russian Federation, such as: Big Data analysis technologies, the transition from the &amp;quot;social Web&amp;quot; (Web 2.0) to the &amp;quot;cognitive Web&amp;quot;
(Web 3.0), the augmented reality technologies, and transmedia content delivery. It is concluded that the presence of identified risks in the young people network communication process necessitates their neutralization practices formation and negative impact minimization. In this regard, the article actualizes the empirical analysis of young people&amp;#39;s reflexive evaluation of their own safety in the network communications process. The article presents the results of the online survey involving young Russian users of the social network &amp;quot;Vkontakte&amp;quot;. The survey enabled to draw a conclusion that the majority of young people tend not to fix or to ignore risks and threats in the network communications process, noting that they rarely or almost never faced the latter. The author confirms the hypothesis of young people&amp;#39;s safety in the Network differentiated perception, which correlates with their socio-demographic indicators and values.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>network communications</kwd><kwd>information and communication risks</kwd><kwd>information security</kwd><kwd>technologization of information and communication sphere</kwd><kwd>Big Data</kwd><kwd>cognitive Web</kwd><kwd>youth</kwd></kwd-group><kwd-group xml:lang="en"><kwd>network communications</kwd><kwd>information and communication risks</kwd><kwd>information security</kwd><kwd>technologization of information and communication sphere</kwd><kwd>Big Data</kwd><kwd>cognitive Web</kwd><kwd>youth</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Berdnik, E.&amp;nbsp;A. (2018), &amp;ldquo;Content risks in the field of youth network culture (on the example of &amp;ldquo;Vkontakte&amp;rdquo; communities analysis&amp;raquo;)&amp;rdquo;, Human. Society. Inclusion, 1 (33), 12-30. (In Russian).</mixed-citation></ref><ref id="B2"><mixed-citation>Bovdunov, A. (2017), Digital dragon: how China is building a total control society with the help of Internet technologies [Online], available at: https://russian.rt.com/world/article/466304-kitai-kontrol-internet-tehnologii (Accessed 15 September 2018). (In Russian).</mixed-citation></ref><ref id="B3"><mixed-citation>Bostrom, N. (2016), Iskusstvenny intellect. Etapy. Ugrozy. Strategii [Superintelligence: Paths, Dangers, Strategies], Translated by Filin S., Moscow, Russia. (In Russian).</mixed-citation></ref><ref id="B4"><mixed-citation>Wildavsky, A. and Dake, K. (1994), &amp;ldquo;Theories of risk perception: who fears what and why?&amp;rdquo;, Thesis, 5, 268-276. (In Russian).</mixed-citation></ref><ref id="B5"><mixed-citation>Vladimirova, T.&amp;nbsp;V. (2011), Setevye kommunikatsii kak istochnik informatsionnyh ugroz [Network communications as a source of information threats], The Federal educational portal &amp;ldquo;Economics. Sociology. Management&amp;rdquo; [Online], available at: http://ecsocman.hse.ru/ data/2011/09/20/1267451215/Vladimirova.pdf (Accessed 10 September 2018). (In Russian).</mixed-citation></ref><ref id="B6"><mixed-citation>The UN General Assembly adopted a resolution on information security (2016), [Online], available at: https://tass.ru/politika/3754890 (Accessed 11 September 2018). (In Russian).</mixed-citation></ref><ref id="B7"><mixed-citation>The Russian Federation information security doctrine (2016), [Online], available at: https:// rg.ru/ 2016/12/06/doktrina-infobezobasnost-site-dok.html (Accessed 6 September 2018). (In</mixed-citation></ref><ref id="B8"><mixed-citation>Russian).</mixed-citation></ref><ref id="B9"><mixed-citation>Drozhzhinov, V.&amp;nbsp;I. and Raikov, A.&amp;nbsp;N. (2017), &amp;ldquo;Web technologies, artificial intelligence and cognitive government&amp;rdquo;, Modern information technologies and IT education, 13 (2), 153-169. (In Russian).</mixed-citation></ref><ref id="B10"><mixed-citation>Douglas, M. (2000), Chistota i opasnost`: analiz predstavleniy ob oskvernenii i tabu [Purity and Danger. An Analysis of the Concepts of Defilement and Taboo], Kanon-Press-Cz: Kuchkovo pole, Moscow, Russia. (In Russian).</mixed-citation></ref><ref id="B11"><mixed-citation>International Congress on cybersecurity (2018), [Online], available at: https://icc.moscow/translyatsii.html (Accessed 12 September 2018). (In Russian).</mixed-citation></ref><ref id="B12"><mixed-citation>International sociological marathon &amp;ldquo;Researcher 2.0: transformation of the profession in the digital age&amp;rdquo; (2017), [Online], available at: https://www.youtube.com/watch?v=v7aWcvUFeBQ (Accessed 11 September 2018). (In Russian).</mixed-citation></ref><ref id="B13"><mixed-citation>Morozova, A.&amp;nbsp;A. (2016), &amp;ldquo;The main types of risks of media consumption in social networks on the example of &amp;ldquo;Vkontakte&amp;raquo;&amp;rdquo;, Zhurnalistika cifrovoj ehpohi: kak menyaetsya professiya: materialy mezhdunar. nauch.-prakt. konf.: k 80-letiyu zhurnalist. obrazovaniya na Urale i 75-letiyu fak. zhurnalistiki Ural. un-ta, Ekaterinburg, Russia, 117-120. (In Russian).</mixed-citation></ref><ref id="B14"><mixed-citation>Naberushkina, E.&amp;nbsp;K. and Berdnik, E.&amp;nbsp;A. (2016), &amp;ldquo;Socio-cultural aspects of information security in a network society&amp;rdquo;, Belgorod State University Scientific Bulletin: Philosophy. Sociology. Law, 17 (237), 90-99. (In Russian).</mixed-citation></ref><ref id="B15"><mixed-citation>Nagornaya, M. (2018), &amp;ldquo;The business community discussing the idea of creating an Info-communication code&amp;rdquo; [Online], available at: https://www.advgazeta.ru/novosti/biznes-soobshchestvo-obsuzhdaet-ideyu-sozdaniya-infokommunikatsionnogo-kodeksa/ (Accessed 10 September 2018).</mixed-citation></ref><ref id="B16"><mixed-citation>UN General Assembly Resolution (2009), [Online], available at: https://undocs.org/ru/A/RES/64/211 (Accessed 02 September 2018). (In Russian).</mixed-citation></ref><ref id="B17"><mixed-citation>Savel&amp;#39;ev, A.&amp;nbsp;I. (2015), &amp;ldquo;Personal data legislation application problems in the era of &amp;ldquo;Big data&amp;rdquo;, Law. Journal of the Higher School of Economics, 1, 43-66. (In Russian).</mixed-citation></ref><ref id="B18"><mixed-citation>What is Big data: we have collected the most important things about big data (2017), [Online], available at: https://rb.ru/howto/chto-takoe-big-data (Accessed 04 September 2018). (In Russian).</mixed-citation></ref><ref id="B19"><mixed-citation>Chuprov, V.&amp;nbsp;I., Zubok, Y.&amp;nbsp;A. and Uil&amp;#39;yams, K. (2003), Molodezh&amp;#39; v obshchestve riska [Youth at risk society], Nauka, Moscow, Russia. (In Russian).</mixed-citation></ref><ref id="B20"><mixed-citation>Yakovlev, K. (2018), Intelligent agents [Online], available at: https://postnauka.ru/video/88720 (Accessed 15 September 2018). (In Russian).</mixed-citation></ref><ref id="B21"><mixed-citation>Introne, J., Yildirim, I.&amp;nbsp;G., Iandoli, L., Decook, J., &amp;amp; Elzeini, S. (2018), &amp;ldquo;How people weave online information into pseudoknowledge&amp;ldquo;, Social Media+Society, 4&amp;nbsp;(3), [Online], available at: http://journals.sagepub.com/doi/full/10.1177/2056305118785639 (Accessed 15 September 2018). (In Russian).</mixed-citation></ref><ref id="B22"><mixed-citation>Jenkins, H. (2011), &amp;ldquo;Transmedia 202: Further Reflections&amp;rdquo;, Confessions of an Aca-Fan, Los Angeles, USA. [Online], available at: http://henryjenkins.org/blog/2011-/08/defining_transmedia_further_re.html (Accessed 15 September 2018)</mixed-citation></ref><ref id="B23"><mixed-citation>Legislative counsel&amp;#39;s digest: SB 1001, Hertzberg. Bots: disclosure, (2018). [Online], available at: https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180SB1001 (Accessed 15 September 2018).</mixed-citation></ref><ref id="B24"><mixed-citation>Leonhard, G. (2016), Technology vs. Humanity: The Coming Clash Between Man and Machine (Futurescapes), Fast Future Pablishing ltd., USA.</mixed-citation></ref><ref id="B25"><mixed-citation>Rosenberg, M. (2018), &amp;ldquo;Cambridge Analytica Suspends C.E.O. Amid Facebook Data Scandal&amp;rdquo;, The New York times, [Online], available at: https://www.nytimes.com/2018/03/20/world/europe/cambridge-analytica-ceo-suspended.html?action=click&amp;amp;module=Top%2520Stories&amp;amp;pgtype=Homepage (Accessed 12 September 2018).</mixed-citation></ref><ref id="B26"><mixed-citation>Starbird, K. (2017), &amp;ldquo;Examining the alternative media ecosystem through the production of alternative narratives of mass shooting events on Twitter&amp;rdquo;, in Proceedings of the International AAAI Conference on Web and Social Media, [Online], available at: https://www.aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15603 (Accessed 12 September 2018).</mixed-citation></ref><ref id="B27"><mixed-citation>Von Weizs&amp;auml;cker, E.&amp;nbsp;U. and Wijkman, A. (2018), Come On! Capitalism, Short-termism, Population, and the Destruction of the Planet, Springer, New York, USA.</mixed-citation></ref><ref id="B28"><mixed-citation>&amp;nbsp;</mixed-citation></ref></ref-list></back></article>