0000000000600159
AUTHOR
Aki-mauri Huhtinen
Young People and the Dark Side of Social Media: Possible Threats to National Security
Social media is increasingly becoming a forum for criminality, misuse, and hate speech, as there are no filters or other controlling mechanisms to filter user-generated content.Furthermore, disinformation and propaganda are becoming more sophisticated and harder to track. Hence, this dark side of social media can pose a viable threat to national security. Future generations will be born into an environment of polluted and polarised online information networks. Consequently, young people, many of whom use social media on a daily basis, will have to find ways to survive in these circumstances,often without the help, knowledge, or experience of earlier generations. Thus, young people are at ri…
From influencee to influencer : the rhizomatic target audience of the cyber domain
The messages of an influence operation are interpreted in a variety of ways by their receivers. To increase the probability of success, these messages are typically tailored to affect a defined group, a target audience. Target audience analysis (TAA) is a process of finding suitable target audiences for influence operations. There are multiple ways of completing the task, ranging from fast and intuitive to complex multi-staged processes. These processes use the information available at the moment of making presumptions about the effectiveness of competing approaches in order to choose those with best end results. The internet presents a challenge to this type of sequential, linear process b…
Rhizomatic Target Audiences of the Cyber Domain
Target Audience Analysis (TAA) is a process of finding suitable target audiences for psychological operations (PSYOPS). Typically, a TAA is a one-way process with some kind of a feedback system. The cyber domain presents a challenge to this type of sequential, linear process by refusing to stay still while the process is being executed, possibly leading to results from yesterday’s data in an environment that no longer exists today. Another challenge is that identifiable human beings—the traditional targets of PSYOPS—are not the only inhabitants of the cyber domain. Physical devices, nicknames, IP addresses, networks, and a vast amount of data populate this environment, in which there are no…