Abstract

The article analyzes the sociodynamics of student youth competences, in particular future lawyers, in the sphere of information technologies and security of network behavior in the conditions of activation of destructive network influences during the special military operation of Russia on the territory of Ukraine. The relevant competencies of students were analyzed in the framework of systematic, purposeful mastering of them according to the results of the entrance and final questionnaire in the form of self-analysis. In the process of the research the following tasks were solved: (1) study of the sociodynamics of network behavior of young users, their knowledge, competencies, attitudes, specific actions and deeds that affect the physical and psychological state in the conditions of interaction in the virtual environment and the use of digital technologies; (2) analyzing the knowledge about the risks of destructive effects of using various Internet resources and content, studying their readiness to counteract negative network influence in modern conditions; (3) analyzing the correlation of the obtained data with the analytics published on the Internet in 2020–2022 based on the results of sociological surveys on similar topics.As the surveys have shown, in order to form safe online behavior of young people on the Internet, minimize the risks of destructive network influence, and ensure information security, it is important to initially and systematically instill the skills of competent online behavior in children, adolescents and young users at all stages of their development and education. It is necessary to teach them to correctly define the boundaries of reliability and misinformation, to ensure the mastery of knowledge about the basics of information security, to form and consolidate skills and competencies to apply the acquired knowledge, including critical thinking, and to counteract destructive network influences. These tasks are especially relevant in the current socio-political environment of special military operation and intensification of information warfare.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call