Open Educational Resources
1. Security, asymmetric threats and communication
Types of Internet disinformation
Intention separates disinformation from misinformation, both terms referring to information that is inaccurate, incorrect, or misleading. It becomes obvious then that the question of whether the information is ‘true’ or ‘false’ is not enough to be able to distinguish ‘trustworthy’ news from ‘malicious’ news.
Security threats in the digital era
Analogue meets Digital
Current perceptions of threats (number of EU countries)
Information and influence operations in the cyberspace (video)
The general accepted definition of public opinion is that it can describe the attitudes held by a significant number of people on matters of government and politics, thus public opinion plays an important role in the political sphere. The novel Coronavirus emerged at the end of 2019, thus a general crisis has spread all over the world. This video explains the several consequences of COVID19 at the beginning of the pandemic due to a lack of information.
2. Strategic communication and public opinion
Wardle and Derakhshan’s Information disorder framework
Approach of concepts of public opinion, communication and information
Strategic communication as a process and strategic planning of communication
This strategic communication process is usually described as encompassing different steps captured by different acronyms such as RPIE (Research, Planning, Implementation, Evaluation). Key messages are also defined in the planning step. Strategic PR plans typically include the following sections, as described by Wilcox, Cameron and Xifra: Situation, objectives, publics, strategy, tactics, timetables, budget, evaluation (planned).
Power/interested grid
3. Adressing the challenge of fake news, disinformation and covert influence in the digital era
Harvest of the soldiers
Islamic State’s media effort has a number of aims that target both sympathetic and hostile audiences. One goal is to recruit supporters. A second goal is to generate fear among its opponents, which has very specific advantages on the battlefield. A third goal is to assert its legitimacy and gain acceptance of its status as a state.
When our message is failed we may reinforce disinformation
CONCEALING IDENTITIES AND MISLEADING THE NATURE OF COMMUNICATION: THE GRAYSCALE OF DENIABILITY
The complicated attibution problem
Complex data-driven disinformation and propaganda operations are performed as to replace aspirations with anger born from confusion and despair, to sow distrust and to distort or representations and understanding of reality via hostile narratives, ready to be “weaponised” for specific goals.In the past few years the technical possibilities of cyber forensics have developed rapidly, and indisputable attribution seems to become increasingly feasible.