Social and Existential Threats to Personal Security in Virtual Communities: “Groups of Death” and “Columbine Communities”

Social and Existential Threats to Personal Security in Virtual Communities: “Groups of Death” and “Columbine Communities”

Copyright: © 2020 |Pages: 16
DOI: 10.4018/IJT.2020010101
(Individual Articles)
No Current Special Offers


The article is devoted to the problem of destructive cyber influence. The objects of the study are “death groups” calling on young people to commit suicide, as well as the “Columbine communities,” which are associated with acts of aggression and murder in educational institutions. The problem of virtual youth communities of destructive type is presented from the positions of philosophical, anthropological, existential, and axiological analysis.
Article Preview

Literature Review

In the methodological aspect, two considerable groups of sources that relate to this research should be considered: theories related to issues of the information era and e-culture and research findings concerning the Internet impact and cyber threats to a person in the information environment.

Research centers in a number of countries have been studying the influence of IT penetration into social and cultural processes closely. In particular, issues of electronic culture development are studied by researchers of the University of Milan (A. Ronchi, 2009) and McLuhan Institute (Virtual Maastricht McLuhan Institute (VMMI)), the Netherlands (K. Veltman, 2004). Ethical and anthropological issues of the information era are considered by researchers of the International Centre for Innovation in Education (ICIE), Karlsruhe, Germany (R. Capurro, 2006); London School of Economics, Department of Media and Communication (Great Britain) (L. Haddon, 2004); Centre for Computing and Social Responsibility (De Montfort University, Great Britain) (S. Rogerson, 1998); Center for the Study of the Information Society of the University of Haifa, Israel (D.R. Raban, 2009). Ethical, political, and legal aspects of IT penetration have been analyzed by L. Rocci (2012); B. J. Kallenberg (2001), C.L. Chang (2011), et al.

Complete Article List

Search this Journal:
Volume 14: 1 Issue (2023)
Volume 13: 2 Issues (2022)
Volume 12: 2 Issues (2021)
Volume 11: 2 Issues (2020)
Volume 10: 2 Issues (2019)
Volume 9: 2 Issues (2018)
Volume 8: 2 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2015)
Volume 5: 2 Issues (2014)
Volume 4: 2 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing