The Vulnerabilities of Trusted Notifier-Models in Russia: The Case of Netoscope

dc.contributor.authorSivetc Liudmila
dc.contributor.authorWijermars Mariëlle
dc.contributor.organizationfi=oikeustiede|en=Laws|
dc.contributor.organization-code1.2.246.10.2458963.20.53046050752
dc.converis.publication-id67495757
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/67495757
dc.date.accessioned2022-10-28T14:07:04Z
dc.date.available2022-10-28T14:07:04Z
dc.description.abstract<p>Current digital ecosystems are shaped by platformisation, algorithmic recommender systems, and news personalisation. These (algorithmic) infrastructures influence online news dissemination and therefore necessitate a reconceptualisation of how online media control is or may be exercised in states with restricted media freedom. Indeed, the degree of media plurality and journalistic independence becomes irrelevant when reporting is available but difficult to access; for example, if the websites of media outlets are not indexed or recommended by the search engines, news aggregators, or social media platforms that function as algorithmic gatekeepers. Research approaches to media control need to be broadened because authoritarian governments are increasingly adopting policies that govern the internet through its infrastructure; the power they leverage against private infrastructure owners yields more effective—and less easily perceptible—control over online content dissemination. Zooming in on the use of trusted notifier-models to counter online harms in Russia, we examine the Netoscope project (a database of Russian domain names suspected of malware, botnet, or phishing activities) in which federal censor Roskomnadzor cooperates with, e.g., Yandex (that downranks listed domains in search results), Kaspersky, and foreign partners. Based on publicly available reports, media coverage, and semi-structured interviews, the article analyses the degree of influence, control, and oversight of Netoscope’s participating partners over the database and its applications. We argue that, in the absence of effective legal safeguards and transparency requirements, the politicised nature of internet infrastructure makes the trusted notifier-model vulnerable to abuse in authoritarian states.</p>
dc.format.pagerange27
dc.format.pagerange38
dc.identifier.eissn2183-2439
dc.identifier.jour-issn2183-2439
dc.identifier.olddbid186363
dc.identifier.oldhandle10024/169457
dc.identifier.urihttps://www.utupub.fi/handle/11111/37856
dc.identifier.urlhttps://www.cogitatiopress.com/mediaandcommunication/article/view/4237
dc.identifier.urnURN:NBN:fi-fe2021102752688
dc.language.isoen
dc.okm.affiliatedauthorSivetc, Liudmila
dc.okm.discipline518 Media and communicationsen_GB
dc.okm.discipline518 Media- ja viestintätieteetfi_FI
dc.okm.internationalcopublicationinternational co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA1 ScientificArticle
dc.publisherCogitatio Press
dc.publisher.countryPortugalen_GB
dc.publisher.countryPortugalifi_FI
dc.publisher.country-codePT
dc.relation.doi10.17645/mac.v9i4.4237
dc.relation.ispartofjournalMedia and Communication
dc.relation.issue4
dc.relation.volume9
dc.source.identifierhttps://www.utupub.fi/handle/10024/169457
dc.titleThe Vulnerabilities of Trusted Notifier-Models in Russia: The Case of Netoscope
dc.year.issued2021

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
Sivetc&Wijermars_The Vulnerabilities of Trusted Notifier.pdf
Size:
498.81 KB
Format:
Adobe Portable Document Format
Description:
Publisher’s PDF