Search Results

You are looking at 1 - 10 of 89 items for :

  • "information society" x
  • All content x
Clear All

One of the most apparent features of information society is the increasing number, diversity and complexity as well as the continuous and fast change of technical tools surrounding everything and everyone. In an interaction with the adoption of new technologies, the receptive medium, the society does also change, while the environmental changes require adaptation. The change, as the new tools and the additional services are becoming a part of the citizens’ everyday life at an extent never seen before, develops new deviances. However, the role of law in this change is constant: it has to regulate the social relations in a way that it could ensure social collaboration and prevent, punish any offence against it. Several branches of law within this complex legal system have a different role, where criminal law means the sanction keystone and stands guard. However, to be able to understand the role of criminal law, we have to discover the environment that needs to be regulated and to understand the incentives of deviant behaviours within this change.

Restricted access

Webster, F. 2006a. The Information Society Revisited. In: Lievrouw, L. A. Livingstone, S. M. (eds) Handbook of New Media: Social Shaping and Social Consequences of ICTs . London: Sage. 443–457. Webster F

Restricted access

-economy] IHM (2003a): Magyar Információs Társadalom Stratégia [Hungarian Information Society Strategy]. Downloadable also in English from the website of the Ministry of Informatics and Telecommunication: Vámos

Restricted access

Deviances of information society

About harassment and cyber-stalking

Acta Juridica Hungarica
Author: Zoltán Szathmáry

The fact of harassment is a remarkable step in the complex protection of private sphere, but due to its novelty it is still difficult to adopt in practice. Among the most typical behaviours of harassment, the Criminal Code itself names the commitment through telecommunication tools that-referring to the title-means harassment through internet as an infocommunication system. The modern, digital communication facilities enable an informal communication among participants that hides reality. The single ways of communication (e-mail, chat) only have written basis, other sensors of cognition, perception do not play any role. As a result of the lack of social controll, one of the most significant hurdles of aggression, the social distress does not exist. Therefore some emotions (anger, jealousy) or aggression can be directed straight towards the target of the harassor. The internet can be a tool as well that the principal can use in order to gather personal information about the victim to make the subsequent harassment easier. These circumstances provide different opportunities to the harassor, therefore it is worth to deal detailed with this way of commitment. The suggestions and highlights of the study aim to eliminate the difficulties of law interpretation, to define the enforceable concept of private life, and to enable the possible realisation of the facts.

Restricted access


A detailed quantitative, citation study is made on the concepts of Bell, Machlup, and Drucker related to the economic and social effects of the growth of information-based industries.

Restricted access