2,541 research outputs found

    Publishing Fake Information Online-Case of Online Vietnam Magazines (Thanhnien Newspaper, Tuoi tre newspaper, Vietnamnet.vn, dantri.com.vn, giaoduc.edu.vn, sctv.com.vn, etc.) From an Approach of German and EU Laws and Cybersecurity Regulations

    Get PDF
    Publishing fake information have at least three bad effects on the community: creating disinformation, anxiety, and disorder in society. Still using qualitative analytical methods with synthesis and inductive methods, the authors will address 2 cases of Vietnam magazines: thanhnien. vn and tuoitre.vn, vietnamnet. vn, giaoduc.edu.vn, dantri.com.vn, (online newspapers) and recently sctv.com.vn with their issue of publishing fake news online, which increasing as a problem in recent years 2015-2020. In this paper, we also use the European approach and laws on exploring the issue of publishing and delivering false information via the internet and social media. Last but not least, the views and ideologies of V.I Lenin and Ho Chi Minh on journalism and journalists are mentioned for educating the young generation

    Crime in the time of the plague: fake news pandemic and the challenges to law-enforcement and intelligence community

    Get PDF
    The Paper explores the problem of fake news and disinformation campaigns in the turmoil era of the COVID-19 coronavirus pandemic. The Author addresses the problem from the perspective of Crime Science, identifying the actual and potential impact of fake news propagation on both the social fabric and the work of the law-enforcement and security services. The Author covers various vectors of disinformation campaigns and offers the overview of challenges associated with the use of deep fakes and the abuse of Artificial Intelligence, Machine-, Deep- and Reinforcement-Learning technologies. The Paper provides the outline of preventive strategies that might be used to mitigate the consequences of fake news proliferation, including the introduction of counter-narratives and the use of AI as countermeasure available to the law-enforcement and public safety agencies. The Author also highlights other threats and forms of crime leveraging the pandemic crisis. As the Paper deals with the current and rapidly evolving phenomenon, it is based on qualitative research and uses the most up-to-date, reliable open-source information, including the Web-based material

    The Evolution of Cyber Risk and the Cyber Insurance Market

    Get PDF
    Insurance and hedging instruments can help corporations manage many of the operational and financial risks they face. Yet, additional complexities are introduced now that many risks are increasingly interdependent and thus strongly correlated, making them more challenging to manage. Few risks illustrate this challenge better than cyber risk. This thesis will focus on the increasing attention that the management of cyber risks receives in corporations, institutions and industries, and the role that insurance and risk management strategies play in mitigating this risk. The decision to focus on cyber risks—and the financing and management of those risks—is directly related to the exponential increase in cyber threats throughout the global economy. Thirty years ago, few would have predicted the magnitude of damage that cyber-attacks would routinely inflict upon organizations of all sizes—with the potential for far more severe losses looming ever larger. The rapid evolution and escalation of cyber threats—along with their ubiquitous nature—has led to a comprehensive reassessment of how organizations manage risks of all types. Insurers have been meeting the changing risk management needs of these organizations through innovations in product design, which now commonly include elements of loss control and post-event mitigation—in addition to traditional loss financing. This thesis begins with a historical review of cyber threats and proceeds to examine the varied nature of cyber threats impacting several key industries. Data on major attacks for each industry examined in this thesis were researched, collected and analyzed, and are displayed in the database included in the appendix to this paper. For the discussion of early-stage cyber threats, I will trace the evolution of cyber threats from relatively simplistic denial-of-service attacks, to early computer viruses, to phishing emails, and to the multiplicity of sophisticated threats seen today, such as ransomware. The objective is to provide those who are unfamiliar with cyber risk (i.e., students or other professionals) with an increased awareness of the threats, as well as an understanding of how organizations can mitigate such threats

    The Chilling: A Global Study of Online Violence Against Women Journalists

    Get PDF
    With the support of UNESCO, the International Center for Journalists (ICFJ) has published a groundbreaking, book-length global study on online violence against women journalists, documenting alarming trends and offering solutions to this pernicious problem. The Chilling: A global study of online violence against women journalists is the most geographically, linguistically and ethnically diverse research ever published on the theme. Publication of the 300-page book, concludes a three-year research project originally commissioned by UNESCO in 2019

    Elections in digital times: a guide for electoral practitioners

    Get PDF
    Strengthening democracy and electoral processes in the era of social media and Artificial Intelligence Democracy requires free, periodic, transparent, and inclusive elections. Freedom of expression, freedom of the press, and the right to political participation are also critical to societies ruled by the respect of human rights. In today’s rapidly evolving digital environment, opportunities for communication between citizens, politicians and political parties are unprecedented –– with information related to elections flowing faster and easier than ever, coupled with expanded opportunities for its verification and correction by a growing number of stakeholders. However, with billions of human beings connected, and disinformation and misinformation circulating unhinged around the networks, democratic processes and access to reliable information are at risk. With an estimated 56.8% of the world’s population active on social media and an estimate of 4 billion eligible voters, the ubiquity of social networks and the impact of Artificial Intelligence can intentionally or unintentionally undermine electoral processes, thereby delegitimizing democracies worldwide. In this context, all actors involved in electoral processes have an essential role to play. Electoral management bodies, electoral practitioners, the media, voters, political parties, and civil society organizations must understand the scope and impact of social media and Artificial Intelligence in the electoral cycle. They also need to have access to the tools to identify who instigates and spreads disinformation and misinformation, and the tools and strategies to combat it. This handbook aims to be a toolbox that helps better understand the current scenario and share experiences of good practices in different electoral settings and equip electoral practitioners and other key actors from all over the world to ensure the credibility of the democratic system in times of profound transformations

    Information Hacking

    Get PDF
    The 2016 U.S. presidential election is seen as a masterpiece of effective disinformation tactics. Commentators credit the Russian Federation with a set of targeted, effective information interventions that led to the surprise election of Republican candidate Donald Trump. On this account, Russia hacked not only America’s voting systems, but also American voters, plying them with inaccurate data—especially on Internet platforms—that changed political views. This Essay examines the 2016 election narrative through the lens of cybersecurity; it treats foreign efforts to influence the outcome as information hacking. It critically assesses unstated assumptions of the narrative, including whether these attacks can be replicated; the size of their effect; the role of key influencers in targeted groups; and the normative claim that citizens voted against their preferences. Next, the Essay offers examples of other successful information hacks and argues that these attacks have multiple, occasionally conflicting goals. It uses lessons from cybersecurity to analyze possible responses, including prevention, remediation, and education. Finally, it draws upon the security literature to propose quarantines for suspect information, protection of critical human infrastructure, and whitelists as tactics that defenders might usefully employ to counteract political disinformation efforts

    Techniques of disinformation: constructing and communicating "soft facts" after terrorism

    Get PDF
    Informed by social media data collected following four terror attacks in the UK in 2017, this article delineates a series of “techniques of disinformation” used by different actors to try and influence how the events were publicly defined and understood. By studying the causes and consequences of misleading information following terror attacks, the article contributes empirically to the neglected topic of social reactions to terrorism. It also advances scholarship on the workings of disinforming communications, by focusing on a domain other than political elections, which has been the empirical focus for most studies of disinformation to date. Theoretically, the analysis is framed by drawing an analogy with Gresham Sykes and David Matza's (1957) account of the role of “techniques of neutralization” originally published in the American Sociological Review. The connection being that where they studied deviant behaviour, a similar analytic lens can usefully be applied to disinformation cast as “deviant” information
    • …
    corecore