PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2016 | Vol. 14, z. 2 InfoSec in East-Central Europe: information in security - challenges, implications, responses | 61--74
Tytuł artykułu

A Strategy to Counter Propaganda in the Digital Era

Autorzy
Treść / Zawartość
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Until recently, the concept of Information Security (InfoSec) had been thought to apply primarily to threats against the information systems which monitor and control key aspects of public life. It is now clear that InfoSec also involves defending societies against efforts to distort and pervert public opinion. The ability of state and non-state actors to affect public opinion in open societies has been greatly enhanced by advances in the communications technologies of the 21st century. Social media in particular have proven to be effective in this regard, as has been demonstrated by the success of Islamic terrorist groups in recruiting unwitting citizens in the US and Europe. Traditional responses to propaganda such as refuting it or creating counter-narratives have proven thus far to be ineffective. Instead, this paper argues that open societies must inoculate their citizens against misinformation and disinformation by encouraging the development of their critical thinking skills.(original abstract)
Twórcy
  • Stony Brook University, New York, U.S.
Bibliografia
  • Bernays, E.L., Propaganda, New York: Horace Liverwright, 1928.
  • Creel, G., How We Advertised America, New York: Harper & Brothers, 1920.
  • Fleming, J., 'Media Literacy, News Literacy, or News Appreciation? A Case Study of the News Literacy Program at Stony Brook University', Journalism & Mass Communication Educator, vol. XX, no. X, 2014, pp. 1-20.
  • Fleming, J., 'What Do Facts Have to Do with It? A Case Study of News Literacy at Stony Brook University', Doctoral dissertation, Doctor of Philosophy in Education, Los Angeles: University of California, 2012.
  • Frenkel, S., 'Inside the Obama Administration's Attempt to Bring Tech Companies into the Fight Against ISIS', BuzzFeedNews, February 25, 2016, http://www.buzzfeed.com/sheerafrenkel/inside-the-obama-administra-tions-attempt-to-bring-tech-compa (2016-10-19).
  • Hayes, M.D., Wheatley, G.F. (eds), Interagency and Political-Military Dimensions of Peace Operations: Haiti - A Case Study, Washington D.C.: Institute for National Strategic Studies, National Defense University, 1996, p. 3.
  • Hitler, A., Mein Kampf, translated by J. Murphy, London, New York, Melbourne: Hurst & Blackett, 1939.
  • Kang, C., Apuzzo, M., 'U.S. Asks Tech and Entertainment Industries Help in Fighting Terrorism', New York Times, February 24, 2016, http://www. nytimes.com/2016/02/25/technology/tech-and-media-firms-called-to-white-house-for-terrorism-meeting.html?_r=0 (2016-10-23).
  • Lane, A., Encounter with Martin Buber, London: Aubrey Hodes, 1972.
  • Lippmann, W., 'Why Did Hanoi Grant a Visa to Salisbury?', The Deseret News, January 12, 1967.
  • Macdonald, S., Propaganda and Information Warfare in the Twenty-First Century: Altered Images and Deception Operations, New York: Routledge, 2007.
  • Miller, C.S., 'Introduction', in: E.L. Bernays (ed.), Propaganda, New York: Ig Publishing, 2004.
  • Molander, R.C., Riddile, A., Wilson, P.A., Williamson, S., Strategic Information Warfare: A New Face of War, Santa Monica, CA: Rand Corporation, 1996.
  • Roser, M., Ortiz-Ospina, E., 'Literacy', OurWorldInData.org, http://ourworldindata.org/data/education-knowledge/literacy/ (2016-10-19).
  • Shin, J., Jian, L., Driscoll, K., Bar, F., 'Political rumoring on Twitter during the 2012 US presidential election: Rumor diffusion and correction', New Media & Society, March 8, 2016.
  • Sunstein, C.R., On Rumors: How Falsehoods Spread, Why We Believe Them, and What Can Be Done, Princeton: Princeton University Press, 2014.
  • Szafranski, R., 'A Theory of Information Warfare: Preparing For 2020', Airpower Journal, Spring 1995, http://www.airpower.maxwell.af.mil/airchronicles/apj/apj95/spr95_files/szfran.htm (2016-03-15).
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171500038

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.