<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE book PUBLIC "-//NLM//DTD BITS Book Interchange DTD v2.3 20210610//EN" "BITS-book2.3.dtd"> <book xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" book-type="conference-proceedings" dtd-version="2.3" xml:lang="ru"> <front> <book-meta>  <book-id book-id-type="isbn">978-5-908083-36-2</book-id>   <book-id pub-id-type="doi">10.31483/a-10823</book-id>   <title-group>  <book-title xml:lang="ru">Право, экономика и управление: теория и практика</book-title>   <trans-title-group xml:lang="en"> <trans-title>Strategies of Sustainable Development: Social, Law and External-economic Aspects</trans-title> </trans-title-group>  </title-group>  <description xml:lang="ru"> <p>В сборнике представлены научные публикации, посвященные вопросам развития экономической науки и права. В материалах сборника приведены результаты теоретических и прикладных изысканий представителей научного и образовательного сообщества в данной области. Предназначен для широкого круга читателей. Издание может быть полезно научным сотрудникам, преподавателям, студентам, аспирантам и всем, кто интересуется проблемами и перспективами социально-экономического развития и права России и зарубежья.
Ответственность за приведенные в исследовании экономические данные несут авторы. Статьи представлены в авторской редакции.</p> </description>   <contrib-group>  <contrib contrib-type="editor" id="editor1">    <name-alternatives>  <name name-style="eastern" xml:lang="ru"> <surname>Фомин</surname> <given-names>Эдуард Валентинович</given-names> </name>   <name name-style="western" xml:lang="en"> <surname>Fomin</surname> <given-names>Eduard Valentinovich</given-names> </name>  </name-alternatives>  <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6708-9909</contrib-id> <email xlink:type="simple">yeresen@yandex.ru</email> </contrib>  </contrib-group>   <contrib-group>  <contrib contrib-type="member-of-organizing-committee" id="orgcomm1">    <name-alternatives>  <name name-style="eastern" xml:lang="ru"> <surname>Баскакова</surname> <given-names>Наталья Ивановна</given-names> </name>   <name name-style="western" xml:lang="en"> <surname>Baskakova</surname> <given-names>Natalya Ivanovna</given-names> </name>  </name-alternatives>  <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4451-5909</contrib-id> </contrib>  <contrib contrib-type="member-of-organizing-committee" id="orgcomm2">    <name-alternatives>  <name name-style="eastern" xml:lang="ru"> <surname>Фомин</surname> <given-names>Эдуард Валентинович</given-names> </name>   <name name-style="western" xml:lang="en"> <surname>Fomin</surname> <given-names>Eduard Valentinovich</given-names> </name>  </name-alternatives>  <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6708-9909</contrib-id> </contrib>  <contrib contrib-type="member-of-organizing-committee" id="orgcomm3">    <name-alternatives>  <name name-style="eastern" xml:lang="ru"> <surname>Григорьева</surname> <given-names>Лариса Георгиевна</given-names> </name>   </name-alternatives>   </contrib>  <contrib contrib-type="member-of-organizing-committee" id="orgcomm4">    <name-alternatives>  <name name-style="eastern" xml:lang="ru"> <surname>Фомин</surname> <given-names>Эдуард Валентинович</given-names> </name>   <name name-style="western" xml:lang="en"> <surname>Fomin</surname> <given-names>Eduard Valentinovich</given-names> </name>  </name-alternatives>  <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6708-9909</contrib-id> </contrib>  </contrib-group>   <event>  <event-desc xml:lang="ru">Право, экономика и управление: теория и практика</event-desc>   <event-desc xml:lang="en">Strategies of Sustainable Development: Social, Law and External-economic Aspects</event-desc>   <conf-date> <day>17</day> <month>12</month> <year>2025</year> </conf-date>    <conf-loc xml:lang="ru">Чебоксары</conf-loc>  </event>   <publisher> <publisher-name>ИД «Среда»</publisher-name> </publisher>    <pub-date date-type="collection" publication-format="electronic" iso-8601-date="1900"> <year>1900</year> </pub-date>    <permissions>  <copyright-statement xml:lang="en">© 2025 Sofiia A. Naidenko, Kristina V. Kuzmina</copyright-statement>   <copyright-statement xml:lang="ru">© 2025 Найденко С. А., Кузьмина К. В.</copyright-statement>   <copyright-year>2025</copyright-year>  <copyright-holder xml:lang="ru">Найденко С. А., Кузьмина К. В.</copyright-holder>   <copyright-holder xml:lang="en">Sofiia A. Naidenko, Kristina V. Kuzmina</copyright-holder>    <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/" xml:lang="en" xlink:type="simple"> <license-p>This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0)</license-p> </license>   <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/" xml:lang="ru" xlink:type="simple"> <license-p>Это произведение доступно по лицензии Creative Commons Attribution 4.0 International (CC BY 4.0)</license-p> </license>   </permissions>  </book-meta> <book-part book-part-type="conference-paper"> <book-part-meta>   <book-id custom-type="publisher-id" pub-id-type="custom">152661</book-id> <title-group>  <chapter-title xml:lang="ru">Роль хактивизма в современных информационных войнах: на примере Anonymous</chapter-title>   <trans-title-group xml:lang="en"> <trans-title>Rol&#039; khaktivizma v sovremennykh informatsionnykh voinakh: na primere Anonymous</trans-title> </trans-title-group>  </title-group>  <contrib-group>   <contrib contrib-type="author" id="author1">   <name-alternatives>  <name name-style="eastern" xml:lang="ru"> <surname>Найденко</surname> <given-names>София Андреевна</given-names> </name>   <name name-style="western" xml:lang="en"> <surname>Naidenko</surname> <given-names>Sofiia Andreevna</given-names> </name>   </name-alternatives>  <email xlink:type="simple">sofia_naidenko@mail.ru</email> <xref ref-type="aff" rid="aff1"/> </contrib>   <contrib contrib-type="author" id="author2">   <name-alternatives>  <name name-style="eastern" xml:lang="ru"> <surname>Кузьмина</surname> <given-names>Кристина Владимировна</given-names> </name>   <name name-style="western" xml:lang="en"> <surname>Kuzmina</surname> <given-names>Kristina Vladimirovna</given-names> </name>   </name-alternatives>  <email xlink:type="simple">krestime@gmail.com</email> <xref ref-type="aff" rid="aff1"/> </contrib>    <aff-alternatives id="aff1">   <aff xml:lang="ru">  <institution-wrap> <institution-id institution-id-type="ror">058jafb94</institution-id> <institution>Кубанский государственный аграрный университет им. И.Т. Трубилина</institution> </institution-wrap>   <country>Россия</country> </aff>    <aff xml:lang="en">  <institution-wrap> <institution-id institution-id-type="ror">058jafb94</institution-id> <institution>the Kuban State Agrarian University</institution> </institution-wrap>   <country>Russia</country> </aff>   </aff-alternatives>  </contrib-group>   <fpage>148</fpage> <lpage>150</lpage>   <abstract xml:lang="ru"> <p>в статье проведен анализ роли цифрового активизма в современных информационных баталиях. Изучены методы и практики, характерных для движения Anonymous. Приведена классификация цифрового хактивизма и методы его осуществления. Анализ опыта Anonymous позволяет понять, как коллективное взаимодействие в цифровой среде превращается в средство киберсопротивления, и отражает современные тенденции в информационных конфликтах.</p> </abstract>      <trans-abstract xml:lang="en"> <p>This article analyzes the role of digital activism in contemporary information warfare. It also examines the methods and practices characteristic of the Anonymous movement. A classification of digital hacktivism and its methods are presented. An analysis of Anonymous&#039;s experience allows us to understand how collective interaction in the digital environment is becoming a means of cyberresistance and reflects contemporary trends in information conflicts.</p> </trans-abstract>       <kwd-group xml:lang="ru">  <kwd>конфиденциальность</kwd>  <kwd>доксинг</kwd>  <kwd>хактивизм</kwd>  <kwd>дефейс</kwd>  <kwd>DDoS-фтаки</kwd>  <kwd>Anonymous</kwd>  <kwd>маска Гая Фокса</kwd>  </kwd-group>    <kwd-group xml:lang="en">  <kwd>Privacy</kwd>  <kwd>Anonymous</kwd>  <kwd>Hacktivism</kwd>  <kwd>defacement</kwd>  <kwd>doxxing</kwd>  <kwd>DDoS attacks</kwd>  <kwd>Guy Fawkes mask</kwd>  </kwd-group>      </book-part-meta> </book-part> </front>  <back> <ref-list> <title>References</title>  <ref id="ref1"> <label>1</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Jordan T., Taylor P. Hacktivism and Cyberwars: Rebels with a Cause? London: Routledge, 2004. 192 p.</mixed-citation>    </citation-alternatives> <element-citation publication-type="other">  <person-group person-group-type="author">  <name> <surname>Jordan</surname> <given-names>T.</given-names> </name>  <name> <surname>Taylor</surname> <given-names>P.</given-names> </name>  </person-group>   <article-title>Hacktivism and Cyberwars: Rebels with a Cause? </article-title>               </element-citation> </ref>  <ref id="ref2"> <label>2</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Coleman G. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. NY: Books, 2014. 465 p.</mixed-citation>    </citation-alternatives> <element-citation publication-type="other">  <person-group person-group-type="author">  <name> <surname>Coleman</surname> <given-names>G.</given-names> </name>  </person-group>   <article-title>Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous</article-title>               </element-citation> </ref>  <ref id="ref3"> <label>3</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Denning D. Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy [Electronic resource]. – Access mode:  https://www.academia.edu/8674492/Activism_Hacktivism_and_Cyberterrorism_The_Internet_as_a_Tool_for_Influencing_Foreign_Policy (date of request: 10.12.2025).</mixed-citation>    </citation-alternatives> <element-citation publication-type="web">  <person-group person-group-type="author">  <name> <surname>Denning</surname> <given-names>D.</given-names> </name>  </person-group>   <article-title>Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy</article-title>         <ext-link ext-link-type="uri" xlink:href="https://www.academia.edu/8674492/Activism_Hacktivism_and_Cyberterrorism_The_Internet_as_a_Tool_for_Influencing_Foreign_Policy">https://www.academia.edu/8674492/Activism_Hacktivism_and_Cyberterrorism_The_Internet_as_a_Tool_for_Influencing_Foreign_Policy</ext-link>      </element-citation> </ref>  <ref id="ref4"> <label>4</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Якоби Д. Массовые дефейсы: инструменты и методы, используемые злоумышленниками / Д. Якоби [Электронный ресурс]. – Режим доступа: https://securelist.ru/massovy-e-defejsy-instrumenty-i-metod/1418 (дата обращения: 10.12.2025).</mixed-citation>    </citation-alternatives> <element-citation publication-type="web">  <person-group person-group-type="author">  <name> <surname>Якоби</surname> <given-names>Д.</given-names> </name>  </person-group>   <article-title>Массовые дефейсы: инструменты и методы, используемые злоумышленниками</article-title>         <ext-link ext-link-type="uri" xlink:href="https://securelist.ru/massovy-e-defejsy-instrumenty-i-metod/1418">https://securelist.ru/massovy-e-defejsy-instrumenty-i-metod/1418</ext-link>      </element-citation> </ref>  <ref id="ref5"> <label>5</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Olson P. We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency. N.Y.: Back Bay Books, 2013. 510 p.</mixed-citation>    </citation-alternatives> <element-citation publication-type="other">  <person-group person-group-type="author">  <name> <surname>Olson</surname> <given-names>P.</given-names> </name>  </person-group>   <article-title>We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency</article-title>               </element-citation> </ref>  <ref id="ref6"> <label>6</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Mirkovic J., Dietrich S., Dietrich D., Reiher P. Internet denial of service: attack and defense mechanisms. Upper Saddle River, N.J., 2005. 372 p.</mixed-citation>    </citation-alternatives> <element-citation publication-type="other">  <person-group person-group-type="author">  <name> <surname>Mirkovic</surname> <given-names>J.</given-names> </name>  <name> <surname>Dietrich</surname> <given-names>S.</given-names> </name>  <name> <surname>Dietrich</surname> <given-names>D.</given-names> </name>  <name> <surname>Reiher</surname> <given-names>P.</given-names> </name>  </person-group>   <article-title>Internet denial of service: attack and defense mechanisms</article-title>               </element-citation> </ref>  <ref id="ref7"> <label>7</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Assange J., Appelbaum J. etc. Cypherpunks: Freedom and the Future of the Internet. Times Group Books, 2012. 186 p.</mixed-citation>    </citation-alternatives> <element-citation publication-type="other">  <person-group person-group-type="author">  <name> <surname>Assange</surname> <given-names>J.</given-names> </name>  <name> <surname>Appelbaum</surname> <given-names>J.</given-names> </name>  </person-group>   <article-title>Cypherpunks: Freedom and the Future of the Internet</article-title>               </element-citation> </ref>  <ref id="ref8"> <label>8</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Sterling B. The Hacker Crackdown. N.Y.: Bantam Books, 1992. 323 p.</mixed-citation>    </citation-alternatives> <element-citation publication-type="other">  <person-group person-group-type="author">  <name> <surname>Sterling</surname> <given-names>B.</given-names> </name>  </person-group>   <article-title>The Hacker Crackdown</article-title>               </element-citation> </ref>  <ref id="ref9"> <label>9</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Samuel A. Hacktivism and the Future of Political Participation. Harvard University, Cambridge, Massachusetts 2004 [Electronic resource]. – Access mode: https://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivism-entire.pdf (date of request: 10.12.2025).</mixed-citation>    </citation-alternatives> <element-citation publication-type="web">  <person-group person-group-type="author">  <name> <surname>Samuel</surname> <given-names>A.</given-names> </name>  </person-group>   <article-title>Hacktivism and the Future of Political Participation</article-title>         <ext-link ext-link-type="uri" xlink:href="https://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivism-entire.pdf ">https://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivism-entire.pdf </ext-link>      </element-citation> </ref>  <ref id="ref10"> <label>10</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Castells M. Networks of outrage and hope: social movements in the Internet age. Cambridge, UK; Malden, MA: Polity Press, 2015. 318 p.</mixed-citation>    </citation-alternatives> <element-citation publication-type="other">  <person-group person-group-type="author">  <name> <surname>Castells</surname> <given-names>M.</given-names> </name>  </person-group>   <article-title>Networks of outrage and hope: social movements in the Internet age</article-title>               <publisher-loc>MA</publisher-loc> <publisher-name>Polity Press</publisher-name>  </element-citation> </ref>  <ref id="ref11"> <label>11</label> <citation-alternatives>  <mixed-citation xml:lang="ru">4 han – Cultural History of the Internet [Electronic resource]. – Access mode: https://internet.medialities.org/student-projects/fall-2020/4chan (date of request: 10.12.2025).</mixed-citation>    </citation-alternatives> <element-citation publication-type="web">   <article-title>4 han – Cultural History of the Internet </article-title>         <ext-link ext-link-type="uri" xlink:href="https://internet.medialities.org/">https://internet.medialities.org/</ext-link>      </element-citation> </ref>  <ref id="ref12"> <label>12</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Shifman L. Memes in in digital culture. Cambridge, Massachusetts: The MIT Press, 2014. 200 p.</mixed-citation>    </citation-alternatives> <element-citation publication-type="other">  <person-group person-group-type="author">  <name> <surname>Shifman</surname> <given-names>L.</given-names> </name>  </person-group>   <article-title>Memes in in digital culture</article-title>               <publisher-loc>Massachusetts</publisher-loc> <publisher-name>The MIT Press</publisher-name>  </element-citation> </ref>  <ref id="ref13"> <label>13</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Джордан Т. Генеалогия хакерства / Т. Джордан // Конвергенция: Международный журнал исследований новых медиатехнологий. – 2016. – Т. 23. №5. – С. 528–544.</mixed-citation>    </citation-alternatives> <element-citation publication-type="other">  <person-group person-group-type="author">  <name> <surname>Джордан</surname> <given-names>Т.</given-names> </name>  </person-group>   <article-title>Генеалогия хакерства</article-title> <source>Конвергенция: Международный журнал исследований новых медиатехнологий</source> <year>2016</year> <volume>23</volume> <issue>5</issue> <fpage>528</fpage> <lpage>544</lpage>         </element-citation> </ref>  <ref id="ref14"> <label>14</label> <citation-alternatives>  <mixed-citation xml:lang="ru">Анонимус [Электронный ресурс]. – Режим доступа: https://znanierussia.ru/articles/Анонимус#cite_ref-:0_1-0 (дата обращения: 10.12.2025).</mixed-citation>    </citation-alternatives> <element-citation publication-type="web">   <article-title>Анонимус</article-title>         <ext-link ext-link-type="uri" xlink:href="https://znanierussia.ru/articles/Анонимус#cite_ref-">https://znanierussia.ru/articles/Анонимус#cite_ref-</ext-link>      </element-citation> </ref>  </ref-list> </back>  </book>