SlideShare a Scribd company logo
© 2020 LAC Co., Ltd.
Is Dis-information more attractive than True-information?
Reduce the spread of Dis-information in social media
October 29, 2020
LAC CO., LTD.
Senior Researcher Haruka Suzuki
2 © 2020 LAC Co., Ltd.
This session includes
l Disinformation spreads more than True-information
l It's the "people" who are spreading
l Why do people believe and spread disinformation?
l Will be explained from the perspective of social psychology
3 © 2020 LAC Co., Ltd.
Bio
l Studied social psychology at university
l Joined LAC Corporation Ltd. in 2006
l Analyzing of spear phishing email as a hobby
• Technical analysis
• Analysis of political context and intent
• Attackersʼ persuasion and elicitation methodology
• Attitude change in email receiver
l Senior Researcher since 2018
Ÿ Research topic: Security psychology, Social engineering,
Cyber propaganda, Cyber influence operations etc…
4 © 2020 LAC Co., Ltd.
Agenda
1. Relationship between cyberspace & people
2. History of persuasion and similarities
3. Background of disinformation spreads
4. How disinformation spreads?
5. Proposed solutions
6. Summary
5 © 2020 LAC Co., Ltd.
1. Relationship between cyberspace & people
Cyber
space
Physical
space
System
Data
Procedure People
Organization
Things
① Cyber & Physical space via People
<Techniques>
・Spear phishing
・BEC
・USB baiting
・Scareware
<Objective>
・Steal data
・Steal money
・System crash
② People via Cyberspace
<Techniques>
・Cyber propaganda
・Cyber influence
operations(CyIO)
<Objective>
・Public opinion manipulation
・Fostering distrust of the
current government
・ Social disorder
6 © 2020 LAC Co., Ltd.
1. Relationship between cyberspace & people
l “Attitude and behavior” in psychology
Ÿ Attitude(Allport, 1935)
A mindset or attitude towards things as a state of readiness for action.
Ÿ Attitude change(Hovland, 1957)
Forming new attitudes under the social influence.
ActionAttitude
Approach to promote attitude change
① Learning (Lott & Lott, 1968) ② Persuasion (Hovland et al., 1953)
7 © 2020 LAC Co., Ltd.
1. Relationship between cyberspace & people
l Social media relays the persuasion
Service infrastructure
• Content creation
• Deep fake, Photo edit
• Targeted advertising
• Click agency
• Posting / Retweet BOT
Use
Post
Request for
publication
Press
Ads
Social
media
Direct persuasion
in cyberspace
• Interest in information
• Trust in sources and
quantities
Troll farm
Cross
Platform
Receiver
Creator
8 © 2020 LAC Co., Ltd.
2. History of persuasion and similarities
l Propaganda
Ÿ 1620 : Religious
Ÿ 1880 : Cultural
Ÿ 1918 : War-time
Ÿ 1920 : Political
l Brainwashing in war-time(Edward, 1956)
Ÿ Create a state of dissatisfaction
Ÿ Abandonment of mind
Ÿ Projecting hatred onto the target
9 © 2020 LAC Co., Ltd.
2. History of persuasion and similarities
l Case:U.S. Presidential Election 2016
Ÿ Allegations of cyber election interference by IRA
Ÿ Posting “disinformation” on multiple social media
Ÿ Promoting division and conflict among U.S. citizens
<Techniques>
① Incite social issues and provoke dissatisfaction with distrust
② Anger erupting from dissatisfaction and promotes shared
③ Anger emotion is contagious in community
④ Conflicts with out-groups
⑤ Protests and Riots
→ Disrupt the society to create a favorable situation
10 © 2020 LAC Co., Ltd.
2. History of persuasion and similarities
l Expand into cyber space
Cyber propaganda Influence operations
Objective
Persuasion efforts to instill ideology
→ Demanding trust
Create an environment of smooth
achievement of the real goal
→ Demanding disorder
Tools Press / Social media ads Social media post & ads
Source Disclose Vague
Accuracy Exaggerated true / Disinformation Disinformation
Contents Impression manipulation Amplifies dissatisfaction & anger
Receiver Passive Proactive
11 © 2020 LAC Co., Ltd.
3. Background of disinformation spreads
l What is disinformation?
Disinformation: the deliberate creation and sharing of false and/or manipulated
information that is intended to deceive and mislead audiences, either for the
purposes of causing harm, or for political, personal or financial gain.
Misinformation: the inadvertent sharing of false information.
(DCMS, 2018)
Information disorder (Council of Europe, 2017)
Mis-information : when false information is
shared, but no harm is meant.
Dis-information : when false information is
knowingly shared to cause harm.
Mal-information : when genuine
information is shared to cause harm
12 © 2020 LAC Co., Ltd.
3. Background of disinformation spreads
l Case:Cambridge Analytica in Brexit 2016
Ÿ Use personality data collected by social media
Ÿ Predicting an individual's ethnicity and political
Ÿ It was used for micro targeted advertising
Ÿ CEO “We had identified voters who could be persuaded to vote”
Openness Conscientiousness Extraversion Agreeableness Neuroticism
High Low High Low High Low High Low High Low
Openness
High … … … … … … … …
Low … … … … … … … …
< Use the "Big Five" for personality assessment apps>
13 © 2020 LAC Co., Ltd.
3. Background of disinformation spreads
l Case:Tweet spoofing Japan's Minister of Defense
(Taiwan FactCheck Center, 2020)
Spoofing disinformation
March 13, 2020
• Japanese defense minister's tweets flaming in Taiwan
• "Half a million masks from Taiwan have arrived"
• There were not enough masks in Taiwan
• Criticism of tweet image had spread
→ @handle and post time were tampered.
14 © 2020 LAC Co., Ltd.
4. How disinformation spreads?
l 3 Factors
Factor #1: Service infrastructure
Ÿ Advertising support services are abused
Ÿ Spread by bots
“Bots accelerated the spread of both true and false news.”(Vosoughi et al., 2018)
Factor #2: Social media motivations
Ÿ Generate revenue from ads placements
Ÿ Connect users to as many people as possible
Ÿ Increase active users and posts
“As exposure to other people's emotions decreases, users post less.”(Kramer, 2014)
15 © 2020 LAC Co., Ltd.
4. How disinformation spreads?
Factor #3:Human
disinformation follow
retweet
share conflict
echo
chamber
Emotional contagion→think back
→Regulation needs→Social sharing Out-group
homogeneity bias
In-group bias and
False consensus effect
Phase1.
Disclosure
Phase2.
Sharing
Phase3.
Collectivization
Phase4.
Promoting conflict
16 © 2020 LAC Co., Ltd.
4. How disinformation spreads?
l Phase 1. Disclosure
Ÿ No difference in trust between media & individuals(Hameleers et al., 2020)
Ÿ Information that is consistent with beliefs as true(Lewardwsky, 2012)
Ÿ Information shared by friends is ʻsafe content'(Redmiles, 2018)
Ÿ False news spreads more than true news(Vosoughi et al., 2018)
Ÿ Anger is more likely to appear in fake news(Guo et al., 2019)
The reliability of source is irrelevant.
Disinformation triggers feelings of anger.
17 © 2020 LAC Co., Ltd.
l Phase 2. Sharing
Ÿ Joy and anger are both highly contagious
Ÿ Anger spreads easily along weaker ties than joy(Fan et al., 2018)
Ÿ Negative emotion promotes social sharing(Endo & Fuji, 2015)
4. How disinformation spreads?
joy anger
Anger is easily shared and spreads widely.
1
7 3
5
8 2
6 4
5
6
3
1 2
8
7
4
18 © 2020 LAC Co., Ltd.
4. How disinformation spreads?
l Phase 3. Collectivization
Ÿ We select information that adhere to beliefs: Confirmation bias
Ÿ Easy to group with people who share the same beliefs (Vicario, 2016)
Ÿ Emotions are contagious within group (Rimé, 2009)
Ÿ Group make individual feelings stronger(Goldenberg et al., 2019)
Ÿ Emotions diffuse and lead to action(Goldenberg et al., 2019)
Echo chamber effect amplifies anger in group.
Emotional amplification can lead to collective action.
19 © 2020 LAC Co., Ltd.
4. How disinformation spreads?
l Phase 4. Promoting conflict
Ÿ Assume that own beliefs are majority: False consensus effect
Ÿ In-group is better than out-groups: In-group bias(Desteno et al., 2004)
Ÿ Believe that in-group are diverse, while out-groups are simple:
Out-group homogeneity effect(Quattrone & Jones, 1980)
Become convinced that anger is the social majority and normal.
Attribute the cause to the out-groups.
in-group out-groupconflict
20 © 2020 LAC Co., Ltd.
5. Proposed solutions
l Examples of overseas initiatives
Ÿ Establishment of the task force
Ÿ Enactment of laws
Ÿ Increased transparency of sources and media outlets
Ÿ Enhanced fact checking
Ÿ Improve information literacy
Ÿ Identify and suspend accounts
Ÿ Request for cooperation to platformer
Ÿ Obligation to disclose information to foreign media (FARA)
Ÿ Sanctions against election interference(Economic statecraft)
21 © 2020 LAC Co., Ltd.
5. Proposed solutions
l Target example in Japan
Ÿ Intervention in the referendum
Ÿ Spread of disinformation intended to disrupt economic
Ÿ The incitement of emotions aimed at fissures with our allies
Ÿ Manipulation of impressions to diminish Japan's presence
l Issues in countermeasures
Ÿ Freedom of expression
Ÿ Major social media platformers are foreign companies
Ÿ Development of laws
Ÿ Policy and cooperation framework of response to disinformation
22 © 2020 LAC Co., Ltd.
5. Proposed solutions
l Measures for Japan
disinformation follow
retweet
share
conflict
Anti-disinformation
・ Detection of disinformation
・ Early warning or correction
Restraint of sharing
・ Improving information literacy
・ Research and use of “Nudge”
Mitigating group conflict
・Understand intergroup relations
・Re-categorization of the group
23 © 2020 LAC Co., Ltd.
5. Proposed solutions
l Measures for Japan
Anti-disinformation
(1) Detection of disinformation
• Build a fact-check system with Japanese high-context cultures
• Focus on negative emotional words and critical phrases
(2) Early warning or correction
• Advance warning increases vigilance(Fukada et al., 2010 : Lewardwsky, 2012)
• Simultaneous dissemination from trusted institutions and
multiple media outlets
• The correction does not reuse the content of the disinformation
24 © 2020 LAC Co., Ltd.
5. Proposed solutions
l Measures for Japan
Restraint of sharing
(1) Improving information literacy
• Sharing is not conducive to emotional recovery(Endo & Fuji, 2015)
• Know that your anger reaches outside of your followers
• Respond to the strong emotions of others with weak emotions
(Goldenberg et al., 2019)
(2) Research and use of “Nudge”
• Consider a system for giving people motivation to check the
authenticity of information
25 © 2020 LAC Co., Ltd.
5. Proposed solutions
l Measures for Japan
Mitigating group conflict
(1) Understand intergroup relations
• Prejudice is due to a lack of knowledge of the other
• Knowing that your friends on friendly terms with the out-group
makes a good impression: Extended contact hypothesis
(2) Re-categorization of the group
• Re-categorizing them in the higher categories to create a
cooperative relationship: Common in-group identity model
26 © 2020 LAC Co., Ltd.
6. Summary
l Is this cyber security?
Ÿ The realm of cyber security is expanding
→ Security is no longer limited to information systems
Ÿ Social media crosses borders and speaks directly to human mind
→ Social media may lead to internal destruction from a remote
Ÿ Social media is easily used as an outlet for frustration
→ But that does not lead to emotional recovery
The human mind is spreading DISINFORMATION...
Encourage the use of cyberspace as a place to share joy!
© 2020 LAC Co., Ltd.
Thank you. Any Questions ?
LAC Co., Ltd.
Hirakawacho Mori Tower
2-16-1 Hirakawacho, Chiyoda-ku, Tokyo
Japan 102-0093
Tel +81-3-6757-0113
sales@lac.co.jp
www.lac.co.jp

More Related Content

What's hot

Security Council Study Guide
Security Council Study GuideSecurity Council Study Guide
Security Council Study Guide
dudasings
 
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Bernard Marr
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: Media
Karin Wahl-Jorgensen
 
Government 2.0 Defined
Government 2.0 DefinedGovernment 2.0 Defined
Government 2.0 Defined
Walter Schwabe
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi
 
Case Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachCase Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data Breach
Siddhesh Shah
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Jonathan Meyer
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013Gluu
 
Security and social media
Security and social mediaSecurity and social media
Security and social media
JP Rains, MBA
 
The NewGov utility for managing politics
The NewGov utility for managing politicsThe NewGov utility for managing politics
The NewGov utility for managing politicsBritt Blaser
 
The Social Media Privacy Flap
The Social Media Privacy FlapThe Social Media Privacy Flap
The Social Media Privacy FlapAnn Shea
 
HackPack
HackPackHackPack
HackPack
Justin Varilek
 
Activism
ActivismActivism
Activismsunnyuf
 
Trust Us, Again? Twitter Campaigning Strategies in the 2019 Australian Federa...
Trust Us, Again? Twitter Campaigning Strategies in the 2019 Australian Federa...Trust Us, Again? Twitter Campaigning Strategies in the 2019 Australian Federa...
Trust Us, Again? Twitter Campaigning Strategies in the 2019 Australian Federa...
Axel Bruns
 

What's hot (15)

Security Council Study Guide
Security Council Study GuideSecurity Council Study Guide
Security Council Study Guide
 
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: Media
 
Government 2.0 Defined
Government 2.0 DefinedGovernment 2.0 Defined
Government 2.0 Defined
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Case Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachCase Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data Breach
 
Russia briefing sanctions_international_business
Russia briefing sanctions_international_businessRussia briefing sanctions_international_business
Russia briefing sanctions_international_business
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
 
Security and social media
Security and social mediaSecurity and social media
Security and social media
 
The NewGov utility for managing politics
The NewGov utility for managing politicsThe NewGov utility for managing politics
The NewGov utility for managing politics
 
The Social Media Privacy Flap
The Social Media Privacy FlapThe Social Media Privacy Flap
The Social Media Privacy Flap
 
HackPack
HackPackHackPack
HackPack
 
Activism
ActivismActivism
Activism
 
Trust Us, Again? Twitter Campaigning Strategies in the 2019 Australian Federa...
Trust Us, Again? Twitter Campaigning Strategies in the 2019 Australian Federa...Trust Us, Again? Twitter Campaigning Strategies in the 2019 Australian Federa...
Trust Us, Again? Twitter Campaigning Strategies in the 2019 Australian Federa...
 

Similar to [CB20] Is Dis-information more attractive than True-information? : Reduce the spread of Dis-information in social media by Haruka Suzuki

Leadership communication: creating image, protecting reputation, dealing with...
Leadership communication: creating image, protecting reputation, dealing with...Leadership communication: creating image, protecting reputation, dealing with...
Leadership communication: creating image, protecting reputation, dealing with...
Bob Pickard
 
Where's Philanthropy's Fight Against Fake News Headed Next?
Where's Philanthropy's Fight Against Fake News Headed Next?Where's Philanthropy's Fight Against Fake News Headed Next?
Where's Philanthropy's Fight Against Fake News Headed Next?
Larry Polhill
 
Fake News.pptx
Fake News.pptxFake News.pptx
Fake News.pptx
KevinDaveNapone
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
archiejones4
 
Top 14 Public Relations Insights of 2019
Top 14 Public Relations Insights of 2019Top 14 Public Relations Insights of 2019
Top 14 Public Relations Insights of 2019
Sarah Jackson
 
Promoting & Protecting In Today’s Social Currency
Promoting & Protecting In Today’s Social CurrencyPromoting & Protecting In Today’s Social Currency
Promoting & Protecting In Today’s Social Currency
Digital Next Australia
 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product Vision
Carina Ngai
 
What's Next: The World of Fake News
What's Next: The World of Fake NewsWhat's Next: The World of Fake News
What's Next: The World of Fake News
Ogilvy Consulting
 
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Gab Billones
 
Whatever next? | The future of public engagement | Conference | 23 Feb 2017
Whatever next? | The future of public engagement | Conference | 23 Feb 2017Whatever next? | The future of public engagement | Conference | 23 Feb 2017
Whatever next? | The future of public engagement | Conference | 23 Feb 2017
CharityComms
 
The Future Of Advertising
The Future Of Advertising The Future Of Advertising
The Future Of Advertising
Parker Mason
 
Putting Social Media to Work For Non-Profit Organizations
Putting Social Media to Work For Non-Profit OrganizationsPutting Social Media to Work For Non-Profit Organizations
Putting Social Media to Work For Non-Profit Organizations
Gary Moneysmith
 
Public relations in 2017
Public relations in 2017Public relations in 2017
Public relations in 2017
Stephen Waddington
 
Tribes And Viruses: Communications 2.0 Explored
Tribes And Viruses: Communications 2.0 ExploredTribes And Viruses: Communications 2.0 Explored
Tribes And Viruses: Communications 2.0 Explored
ITDogadjaji.com
 
Top 14 booklet 2019
Top 14 booklet 2019 Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Top 14 booklet 2019
Top 14 booklet 2019 Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...
Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...
Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...
Digital Heretix
 
In mitigating Fake News and Hate-speech: Are we winning?
In mitigating Fake News and Hate-speech: Are we winning?In mitigating Fake News and Hate-speech: Are we winning?
In mitigating Fake News and Hate-speech: Are we winning?
Demetris Paschalides
 

Similar to [CB20] Is Dis-information more attractive than True-information? : Reduce the spread of Dis-information in social media by Haruka Suzuki (20)

Leadership communication: creating image, protecting reputation, dealing with...
Leadership communication: creating image, protecting reputation, dealing with...Leadership communication: creating image, protecting reputation, dealing with...
Leadership communication: creating image, protecting reputation, dealing with...
 
Where's Philanthropy's Fight Against Fake News Headed Next?
Where's Philanthropy's Fight Against Fake News Headed Next?Where's Philanthropy's Fight Against Fake News Headed Next?
Where's Philanthropy's Fight Against Fake News Headed Next?
 
Fake News.pptx
Fake News.pptxFake News.pptx
Fake News.pptx
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
 
Top 14 Public Relations Insights of 2019
Top 14 Public Relations Insights of 2019Top 14 Public Relations Insights of 2019
Top 14 Public Relations Insights of 2019
 
Promoting & Protecting In Today’s Social Currency
Promoting & Protecting In Today’s Social CurrencyPromoting & Protecting In Today’s Social Currency
Promoting & Protecting In Today’s Social Currency
 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product Vision
 
What's Next: The World of Fake News
What's Next: The World of Fake NewsWhat's Next: The World of Fake News
What's Next: The World of Fake News
 
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
 
Whatever next? | The future of public engagement | Conference | 23 Feb 2017
Whatever next? | The future of public engagement | Conference | 23 Feb 2017Whatever next? | The future of public engagement | Conference | 23 Feb 2017
Whatever next? | The future of public engagement | Conference | 23 Feb 2017
 
The Future Of Advertising
The Future Of Advertising The Future Of Advertising
The Future Of Advertising
 
Putting Social Media to Work For Non-Profit Organizations
Putting Social Media to Work For Non-Profit OrganizationsPutting Social Media to Work For Non-Profit Organizations
Putting Social Media to Work For Non-Profit Organizations
 
Public relations in 2017
Public relations in 2017Public relations in 2017
Public relations in 2017
 
Tribes And Viruses: Communications 2.0 Explored
Tribes And Viruses: Communications 2.0 ExploredTribes And Viruses: Communications 2.0 Explored
Tribes And Viruses: Communications 2.0 Explored
 
Top 14 booklet 2019
Top 14 booklet 2019 Top 14 booklet 2019
Top 14 booklet 2019
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
 
Top 14 booklet 2019
Top 14 booklet 2019 Top 14 booklet 2019
Top 14 booklet 2019
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
 
Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...
Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...
Dark Influence: Winning Wars, Ruining Reputations, Fixing Elections, and Maki...
 
In mitigating Fake News and Hate-speech: Are we winning?
In mitigating Fake News and Hate-speech: Are we winning?In mitigating Fake News and Hate-speech: Are we winning?
In mitigating Fake News and Hate-speech: Are we winning?
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 

Recently uploaded (20)

Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 

[CB20] Is Dis-information more attractive than True-information? : Reduce the spread of Dis-information in social media by Haruka Suzuki

  • 1. © 2020 LAC Co., Ltd. Is Dis-information more attractive than True-information? Reduce the spread of Dis-information in social media October 29, 2020 LAC CO., LTD. Senior Researcher Haruka Suzuki
  • 2. 2 © 2020 LAC Co., Ltd. This session includes l Disinformation spreads more than True-information l It's the "people" who are spreading l Why do people believe and spread disinformation? l Will be explained from the perspective of social psychology
  • 3. 3 © 2020 LAC Co., Ltd. Bio l Studied social psychology at university l Joined LAC Corporation Ltd. in 2006 l Analyzing of spear phishing email as a hobby • Technical analysis • Analysis of political context and intent • Attackersʼ persuasion and elicitation methodology • Attitude change in email receiver l Senior Researcher since 2018 Ÿ Research topic: Security psychology, Social engineering, Cyber propaganda, Cyber influence operations etc…
  • 4. 4 © 2020 LAC Co., Ltd. Agenda 1. Relationship between cyberspace & people 2. History of persuasion and similarities 3. Background of disinformation spreads 4. How disinformation spreads? 5. Proposed solutions 6. Summary
  • 5. 5 © 2020 LAC Co., Ltd. 1. Relationship between cyberspace & people Cyber space Physical space System Data Procedure People Organization Things ① Cyber & Physical space via People <Techniques> ・Spear phishing ・BEC ・USB baiting ・Scareware <Objective> ・Steal data ・Steal money ・System crash ② People via Cyberspace <Techniques> ・Cyber propaganda ・Cyber influence operations(CyIO) <Objective> ・Public opinion manipulation ・Fostering distrust of the current government ・ Social disorder
  • 6. 6 © 2020 LAC Co., Ltd. 1. Relationship between cyberspace & people l “Attitude and behavior” in psychology Ÿ Attitude(Allport, 1935) A mindset or attitude towards things as a state of readiness for action. Ÿ Attitude change(Hovland, 1957) Forming new attitudes under the social influence. ActionAttitude Approach to promote attitude change ① Learning (Lott & Lott, 1968) ② Persuasion (Hovland et al., 1953)
  • 7. 7 © 2020 LAC Co., Ltd. 1. Relationship between cyberspace & people l Social media relays the persuasion Service infrastructure • Content creation • Deep fake, Photo edit • Targeted advertising • Click agency • Posting / Retweet BOT Use Post Request for publication Press Ads Social media Direct persuasion in cyberspace • Interest in information • Trust in sources and quantities Troll farm Cross Platform Receiver Creator
  • 8. 8 © 2020 LAC Co., Ltd. 2. History of persuasion and similarities l Propaganda Ÿ 1620 : Religious Ÿ 1880 : Cultural Ÿ 1918 : War-time Ÿ 1920 : Political l Brainwashing in war-time(Edward, 1956) Ÿ Create a state of dissatisfaction Ÿ Abandonment of mind Ÿ Projecting hatred onto the target
  • 9. 9 © 2020 LAC Co., Ltd. 2. History of persuasion and similarities l Case:U.S. Presidential Election 2016 Ÿ Allegations of cyber election interference by IRA Ÿ Posting “disinformation” on multiple social media Ÿ Promoting division and conflict among U.S. citizens <Techniques> ① Incite social issues and provoke dissatisfaction with distrust ② Anger erupting from dissatisfaction and promotes shared ③ Anger emotion is contagious in community ④ Conflicts with out-groups ⑤ Protests and Riots → Disrupt the society to create a favorable situation
  • 10. 10 © 2020 LAC Co., Ltd. 2. History of persuasion and similarities l Expand into cyber space Cyber propaganda Influence operations Objective Persuasion efforts to instill ideology → Demanding trust Create an environment of smooth achievement of the real goal → Demanding disorder Tools Press / Social media ads Social media post & ads Source Disclose Vague Accuracy Exaggerated true / Disinformation Disinformation Contents Impression manipulation Amplifies dissatisfaction & anger Receiver Passive Proactive
  • 11. 11 © 2020 LAC Co., Ltd. 3. Background of disinformation spreads l What is disinformation? Disinformation: the deliberate creation and sharing of false and/or manipulated information that is intended to deceive and mislead audiences, either for the purposes of causing harm, or for political, personal or financial gain. Misinformation: the inadvertent sharing of false information. (DCMS, 2018) Information disorder (Council of Europe, 2017) Mis-information : when false information is shared, but no harm is meant. Dis-information : when false information is knowingly shared to cause harm. Mal-information : when genuine information is shared to cause harm
  • 12. 12 © 2020 LAC Co., Ltd. 3. Background of disinformation spreads l Case:Cambridge Analytica in Brexit 2016 Ÿ Use personality data collected by social media Ÿ Predicting an individual's ethnicity and political Ÿ It was used for micro targeted advertising Ÿ CEO “We had identified voters who could be persuaded to vote” Openness Conscientiousness Extraversion Agreeableness Neuroticism High Low High Low High Low High Low High Low Openness High … … … … … … … … Low … … … … … … … … < Use the "Big Five" for personality assessment apps>
  • 13. 13 © 2020 LAC Co., Ltd. 3. Background of disinformation spreads l Case:Tweet spoofing Japan's Minister of Defense (Taiwan FactCheck Center, 2020) Spoofing disinformation March 13, 2020 • Japanese defense minister's tweets flaming in Taiwan • "Half a million masks from Taiwan have arrived" • There were not enough masks in Taiwan • Criticism of tweet image had spread → @handle and post time were tampered.
  • 14. 14 © 2020 LAC Co., Ltd. 4. How disinformation spreads? l 3 Factors Factor #1: Service infrastructure Ÿ Advertising support services are abused Ÿ Spread by bots “Bots accelerated the spread of both true and false news.”(Vosoughi et al., 2018) Factor #2: Social media motivations Ÿ Generate revenue from ads placements Ÿ Connect users to as many people as possible Ÿ Increase active users and posts “As exposure to other people's emotions decreases, users post less.”(Kramer, 2014)
  • 15. 15 © 2020 LAC Co., Ltd. 4. How disinformation spreads? Factor #3:Human disinformation follow retweet share conflict echo chamber Emotional contagion→think back →Regulation needs→Social sharing Out-group homogeneity bias In-group bias and False consensus effect Phase1. Disclosure Phase2. Sharing Phase3. Collectivization Phase4. Promoting conflict
  • 16. 16 © 2020 LAC Co., Ltd. 4. How disinformation spreads? l Phase 1. Disclosure Ÿ No difference in trust between media & individuals(Hameleers et al., 2020) Ÿ Information that is consistent with beliefs as true(Lewardwsky, 2012) Ÿ Information shared by friends is ʻsafe content'(Redmiles, 2018) Ÿ False news spreads more than true news(Vosoughi et al., 2018) Ÿ Anger is more likely to appear in fake news(Guo et al., 2019) The reliability of source is irrelevant. Disinformation triggers feelings of anger.
  • 17. 17 © 2020 LAC Co., Ltd. l Phase 2. Sharing Ÿ Joy and anger are both highly contagious Ÿ Anger spreads easily along weaker ties than joy(Fan et al., 2018) Ÿ Negative emotion promotes social sharing(Endo & Fuji, 2015) 4. How disinformation spreads? joy anger Anger is easily shared and spreads widely. 1 7 3 5 8 2 6 4 5 6 3 1 2 8 7 4
  • 18. 18 © 2020 LAC Co., Ltd. 4. How disinformation spreads? l Phase 3. Collectivization Ÿ We select information that adhere to beliefs: Confirmation bias Ÿ Easy to group with people who share the same beliefs (Vicario, 2016) Ÿ Emotions are contagious within group (Rimé, 2009) Ÿ Group make individual feelings stronger(Goldenberg et al., 2019) Ÿ Emotions diffuse and lead to action(Goldenberg et al., 2019) Echo chamber effect amplifies anger in group. Emotional amplification can lead to collective action.
  • 19. 19 © 2020 LAC Co., Ltd. 4. How disinformation spreads? l Phase 4. Promoting conflict Ÿ Assume that own beliefs are majority: False consensus effect Ÿ In-group is better than out-groups: In-group bias(Desteno et al., 2004) Ÿ Believe that in-group are diverse, while out-groups are simple: Out-group homogeneity effect(Quattrone & Jones, 1980) Become convinced that anger is the social majority and normal. Attribute the cause to the out-groups. in-group out-groupconflict
  • 20. 20 © 2020 LAC Co., Ltd. 5. Proposed solutions l Examples of overseas initiatives Ÿ Establishment of the task force Ÿ Enactment of laws Ÿ Increased transparency of sources and media outlets Ÿ Enhanced fact checking Ÿ Improve information literacy Ÿ Identify and suspend accounts Ÿ Request for cooperation to platformer Ÿ Obligation to disclose information to foreign media (FARA) Ÿ Sanctions against election interference(Economic statecraft)
  • 21. 21 © 2020 LAC Co., Ltd. 5. Proposed solutions l Target example in Japan Ÿ Intervention in the referendum Ÿ Spread of disinformation intended to disrupt economic Ÿ The incitement of emotions aimed at fissures with our allies Ÿ Manipulation of impressions to diminish Japan's presence l Issues in countermeasures Ÿ Freedom of expression Ÿ Major social media platformers are foreign companies Ÿ Development of laws Ÿ Policy and cooperation framework of response to disinformation
  • 22. 22 © 2020 LAC Co., Ltd. 5. Proposed solutions l Measures for Japan disinformation follow retweet share conflict Anti-disinformation ・ Detection of disinformation ・ Early warning or correction Restraint of sharing ・ Improving information literacy ・ Research and use of “Nudge” Mitigating group conflict ・Understand intergroup relations ・Re-categorization of the group
  • 23. 23 © 2020 LAC Co., Ltd. 5. Proposed solutions l Measures for Japan Anti-disinformation (1) Detection of disinformation • Build a fact-check system with Japanese high-context cultures • Focus on negative emotional words and critical phrases (2) Early warning or correction • Advance warning increases vigilance(Fukada et al., 2010 : Lewardwsky, 2012) • Simultaneous dissemination from trusted institutions and multiple media outlets • The correction does not reuse the content of the disinformation
  • 24. 24 © 2020 LAC Co., Ltd. 5. Proposed solutions l Measures for Japan Restraint of sharing (1) Improving information literacy • Sharing is not conducive to emotional recovery(Endo & Fuji, 2015) • Know that your anger reaches outside of your followers • Respond to the strong emotions of others with weak emotions (Goldenberg et al., 2019) (2) Research and use of “Nudge” • Consider a system for giving people motivation to check the authenticity of information
  • 25. 25 © 2020 LAC Co., Ltd. 5. Proposed solutions l Measures for Japan Mitigating group conflict (1) Understand intergroup relations • Prejudice is due to a lack of knowledge of the other • Knowing that your friends on friendly terms with the out-group makes a good impression: Extended contact hypothesis (2) Re-categorization of the group • Re-categorizing them in the higher categories to create a cooperative relationship: Common in-group identity model
  • 26. 26 © 2020 LAC Co., Ltd. 6. Summary l Is this cyber security? Ÿ The realm of cyber security is expanding → Security is no longer limited to information systems Ÿ Social media crosses borders and speaks directly to human mind → Social media may lead to internal destruction from a remote Ÿ Social media is easily used as an outlet for frustration → But that does not lead to emotional recovery The human mind is spreading DISINFORMATION... Encourage the use of cyberspace as a place to share joy!
  • 27. © 2020 LAC Co., Ltd. Thank you. Any Questions ? LAC Co., Ltd. Hirakawacho Mori Tower 2-16-1 Hirakawacho, Chiyoda-ku, Tokyo Japan 102-0093 Tel +81-3-6757-0113 sales@lac.co.jp www.lac.co.jp