Deception and the Strategy of Influence
- URL: http://arxiv.org/abs/2011.01331v1
- Date: Mon, 2 Nov 2020 21:39:00 GMT
- Title: Deception and the Strategy of Influence
- Authors: Brian B., William Fleshman, Kevin H., Ryan Kaliszewski, Shawn R
- Abstract summary: We explore how methods of deception including audience building, media hijacking, and community subversion inform the techniques and tradecraft of today's influence operators.
We then discuss how a properly equipped and informed public can diagnose and counter malign influence operations.
- Score: 0.7874708385247353
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Organizations have long used deception as a means to exert influence in
pursuit of their agendas. In particular, information operations such as
propaganda distribution, support of antigovernment protest, and revelation of
politically and socially damaging secrets were abundant during World War II and
the Cold War. A key component of each of these efforts is deceiving the targets
by obscuring intent and identity. Information from a trusted source is more
influential than information from an adversary and therefore more likely to
sway opinions. The ubiquitous adoption of social media, characterized by
user-generated and peer disseminated content, has notably increased the
frequency, scale, and efficacy of influence operations worldwide. In this
article, we explore how methods of deception including audience building, media
hijacking, and community subversion inform the techniques and tradecraft of
today's influence operators. We then discuss how a properly equipped and
informed public can diagnose and counter malign influence operations.
Related papers
- Detecting and Mitigating Bias in Algorithms Used to Disseminate Information in Social Networks [0.03883607294385062]
Social connections are a conduit through which individuals communicate, information propagates, and diseases spread.
Identifying individuals that are more likely to adopt ideas or technologies and spread them to others is essential in order to develop effective information campaigns, fight epidemics, and to maximize the reach of limited resources.
Here we show that seeding information using influence methods only benefits connected and central individuals, consistently leaving the most vulnerable behind.
Our work demonstrates how to find fairer influencer sets, highlighting that in our search for maximizing information, we do not need to compromise on information equality.
arXiv Detail & Related papers (2024-05-21T13:17:57Z) - Social Convos: Capturing Agendas and Emotions on Social Media [1.6385815610837167]
We present a novel approach to extract influence indicators from messages circulating among groups of users discussing particular topics.
We focus on two influence indicators: the (control of) agenda and the use of emotional language.
arXiv Detail & Related papers (2024-02-23T19:14:09Z) - News and Misinformation Consumption in Europe: A Longitudinal
Cross-Country Perspective [49.1574468325115]
This study investigated information consumption in four European countries.
It analyzed three years of Twitter activity from news outlet accounts in France, Germany, Italy, and the UK.
Results indicate that reliable sources dominate the information landscape, although unreliable content is still present across all countries.
arXiv Detail & Related papers (2023-11-09T16:22:10Z) - Adherence to Misinformation on Social Media Through Socio-Cognitive and
Group-Based Processes [79.79659145328856]
We argue that when misinformation proliferates, this happens because the social media environment enables adherence to misinformation.
We make the case that polarization and misinformation adherence are closely tied.
arXiv Detail & Related papers (2022-06-30T12:34:24Z) - Detection of Dangerous Events on Social Media: A Perspective Review [0.0]
A phenomenon occurs where people are fed information that motivates them to act on their behalf and carry out their agenda.
This paper introduces a concept of dangerous events to approach this problem and their three main types based on their characteristics.
arXiv Detail & Related papers (2022-04-04T09:48:32Z) - An Agenda for Disinformation Research [3.083055913556838]
Disinformation erodes trust in the socio-political institutions that are the fundamental fabric of democracy.
The distribution of false, misleading, or inaccurate information with the intent to deceive is an existential threat to the United States.
New tools and approaches must be developed to leverage these affordances to understand and address this growing challenge.
arXiv Detail & Related papers (2020-12-15T19:32:36Z) - Cross-Domain Learning for Classifying Propaganda in Online Contents [67.10699378370752]
We present an approach to leverage cross-domain learning, based on labeled documents and sentences from news and tweets, as well as political speeches with a clear difference in their degrees of being propagandistic.
Our experiments demonstrate the usefulness of this approach, and identify difficulties and limitations in various configurations of sources and targets for the transfer step.
arXiv Detail & Related papers (2020-11-13T10:19:13Z) - Causal Understanding of Fake News Dissemination on Social Media [50.4854427067898]
We argue that it is critical to understand what user attributes potentially cause users to share fake news.
In fake news dissemination, confounders can be characterized by fake news sharing behavior that inherently relates to user attributes and online activities.
We propose a principled approach to alleviating selection bias in fake news dissemination.
arXiv Detail & Related papers (2020-10-20T19:37:04Z) - Information Consumption and Social Response in a Segregated Environment:
the Case of Gab [74.5095691235917]
This work provides a characterization of the interaction patterns within Gab around the COVID-19 topic.
We find that there are no strong statistical differences in the social response to questionable and reliable content.
Our results provide insights toward the understanding of coordinated inauthentic behavior and on the early-warning of information operation.
arXiv Detail & Related papers (2020-06-03T11:34:25Z) - Quantifying the Vulnerabilities of the Online Public Square to Adversarial Manipulation Tactics [43.98568073610101]
We use a social media model to quantify the impacts of several adversarial manipulation tactics on the quality of content.
We find that the presence of influential accounts, a hallmark of social media, exacerbates the vulnerabilities of online communities to manipulation.
These insights suggest countermeasures that platforms could employ to increase the resilience of social media users to manipulation.
arXiv Detail & Related papers (2019-07-13T21:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.