0000000000898713

AUTHOR

Aki-mauri Huhtinen

Young People and the Dark Side of Social Media: Possible Threats to National Security

Social media is increasingly becoming a forum for criminality, misuse, and hate speech, as there are no filters or other controlling mechanisms to filter user-generated content.Furthermore, disinformation and propaganda are becoming more sophisticated and harder to track. Hence, this dark side of social media can pose a viable threat to national security. Future generations will be born into an environment of polluted and polarised online information networks. Consequently, young people, many of whom use social media on a daily basis, will have to find ways to survive in these circumstances,often without the help, knowledge, or experience of earlier generations. Thus, young people are at ri…

research product

From influencee to influencer : the rhizomatic target audience of the cyber domain

The messages of an influence operation are interpreted in a variety of ways by their receivers. To increase the probability of success, these messages are typically tailored to affect a defined group, a target audience. Target audience analysis (TAA) is a process of finding suitable target audiences for influence operations. There are multiple ways of completing the task, ranging from fast and intuitive to complex multi-staged processes. These processes use the information available at the moment of making presumptions about the effectiveness of competing approaches in order to choose those with best end results. The internet presents a challenge to this type of sequential, linear process b…

research product

Rhizomatic Target Audiences of the Cyber Domain

Target Audience Analysis (TAA) is a process of finding suitable target audiences for psychological operations (PSYOPS). Typically, a TAA is a one-way process with some kind of a feedback system. The cyber domain presents a challenge to this type of sequential, linear process by refusing to stay still while the process is being executed, possibly leading to results from yesterday’s data in an environment that no longer exists today. Another challenge is that identifiable human beings—the traditional targets of PSYOPS—are not the only inhabitants of the cyber domain. Physical devices, nicknames, IP addresses, networks, and a vast amount of data populate this environment, in which there are no…

research product