The document discusses risk measurement in the context of disinformation and malign influence training. It begins by outlining why and what organizations aim to measure, such as the effectiveness and value of cognitive security programs. Existing monitoring and evaluation approaches are examined, including logframes commonly used to track outputs and outcomes. The document then reviews existing cognitive security measures like the UK government's RESIST framework and UNICEF's infodemic metrics. It concludes by providing suggestions for different types of performance and effectiveness metrics that can be used, as well as tools for gathering metrics like data analysis, surveys and chatbots.
An overview of potential privacy, legal and ethical risks for the Privacy Impact Assessment (PIA+) of the DEVELOP project’s career development tool, based on the initial user requirements.
An overview of potential privacy, legal and ethical risks for the Privacy Impact Assessment (PIA+) of the DEVELOP project’s career development tool, based on the initial user requirements.
Communication Methodology, Framework, Mistakes, and ResourcesGranicus
Joseph Porcelli, Director of Professional Services at GovDelivery, shares his view of digital communications, using the analogy of barn-raising. He offers a strategic communication framework and some common mistakes to avoid when implementing a strategic communications program.
Social Impact Accelerator Accessing and Accelerating Community Impact in the ...TechSoup
In this webinar Joseph DiGiovanni, Co-Founder Tapp Networks, LLC and Peggy M. Geisler, Senior Strategic Consultant PMG Consulting LLC shared how nonprofits can learn leading practices to accelerate social impact in the communities you serve through the latest digital communication tools and technology.
This material gives you the secret sauce for creating a pitch video to submit to any hackathon + CodeTheCurve hackathon that closes its application process on April 15th.
Storytelling with Data (Global Engagement Summit at Northwestern University 2...Sara Hooker
Delta Analytics facilitated a workshop aimed at nonprofits in the initial stages of data collection. This workshop was hosted at the 2017 Global Engagement Summit at Northwestern.
The goal of the workshop is to equip social impact organizations with the tools necessary to start telling their story using data. This workshop was led by Sara Hooker and Jonathan Wang.
Delta Analytics is a 501(c)3 nonprofit that collaborates with non-profits all over the to generate positive social impact through key data insights and management services. Driven by a passion for numbers and dedication to community engagement, we help public service organizations with all their data-driven needs. Our mission, quite simply, is data for change.
Go Global: 7 steps to integrating digital & social for a live eventHeather Read
Have you wondered how to integrate your digital web properties and assets with your social media program to support a live event? Take a look at this case study from DuPont on the launch of the Global Food Security Index.
Why aren't Evaluators using Digital Media Analytics?CesToronto
Whether it’s through blogs, tweets, or even the comments section of an online newspaper, the world is increasingly talking online. However, the potential uses for the massive amounts of information available on the internet remain largely untapped in the sphere of evaluation.
This presentation will explore innovative methods to extract these insights from the large and complex collections of digital data publicly available online. In particular, we will examine the unprecedented uses, and potential limitations, of digital media analytics to:
• Measure the outcomes of public outreach, advocacy, communications, and information sharing programs;
• Establish current and retroactive baselines;
• Conduct “borderless” data collection to gain insights from other countries, as well as disapora communities in Canada;
• Identify unknown stakeholder groups and create detailed stakeholder maps; and,
• Provide context and insight to inform further data collection.
Towards data responsibility - how to put ideals into actionMindtrek
Track | Sustainable and Future-proof Tech
Mikko Eloholma Accelerator of Digital skills, TIEKE
Mindtrek Conference
3rd of October 2023.
Tampere, Finland
www.mindtrek.org
Guidance note: Advancing Infodemic Management within Risk Communication and C...SaraJayneTerp
Summary of WHO report "Guidance note: Advancing Infodemic Management within Risk Communication and Community Engagement in the WHO European Region", to be released November 2022
Communication Methodology, Framework, Mistakes, and ResourcesGranicus
Joseph Porcelli, Director of Professional Services at GovDelivery, shares his view of digital communications, using the analogy of barn-raising. He offers a strategic communication framework and some common mistakes to avoid when implementing a strategic communications program.
Social Impact Accelerator Accessing and Accelerating Community Impact in the ...TechSoup
In this webinar Joseph DiGiovanni, Co-Founder Tapp Networks, LLC and Peggy M. Geisler, Senior Strategic Consultant PMG Consulting LLC shared how nonprofits can learn leading practices to accelerate social impact in the communities you serve through the latest digital communication tools and technology.
This material gives you the secret sauce for creating a pitch video to submit to any hackathon + CodeTheCurve hackathon that closes its application process on April 15th.
Storytelling with Data (Global Engagement Summit at Northwestern University 2...Sara Hooker
Delta Analytics facilitated a workshop aimed at nonprofits in the initial stages of data collection. This workshop was hosted at the 2017 Global Engagement Summit at Northwestern.
The goal of the workshop is to equip social impact organizations with the tools necessary to start telling their story using data. This workshop was led by Sara Hooker and Jonathan Wang.
Delta Analytics is a 501(c)3 nonprofit that collaborates with non-profits all over the to generate positive social impact through key data insights and management services. Driven by a passion for numbers and dedication to community engagement, we help public service organizations with all their data-driven needs. Our mission, quite simply, is data for change.
Go Global: 7 steps to integrating digital & social for a live eventHeather Read
Have you wondered how to integrate your digital web properties and assets with your social media program to support a live event? Take a look at this case study from DuPont on the launch of the Global Food Security Index.
Why aren't Evaluators using Digital Media Analytics?CesToronto
Whether it’s through blogs, tweets, or even the comments section of an online newspaper, the world is increasingly talking online. However, the potential uses for the massive amounts of information available on the internet remain largely untapped in the sphere of evaluation.
This presentation will explore innovative methods to extract these insights from the large and complex collections of digital data publicly available online. In particular, we will examine the unprecedented uses, and potential limitations, of digital media analytics to:
• Measure the outcomes of public outreach, advocacy, communications, and information sharing programs;
• Establish current and retroactive baselines;
• Conduct “borderless” data collection to gain insights from other countries, as well as disapora communities in Canada;
• Identify unknown stakeholder groups and create detailed stakeholder maps; and,
• Provide context and insight to inform further data collection.
Towards data responsibility - how to put ideals into actionMindtrek
Track | Sustainable and Future-proof Tech
Mikko Eloholma Accelerator of Digital skills, TIEKE
Mindtrek Conference
3rd of October 2023.
Tampere, Finland
www.mindtrek.org
Guidance note: Advancing Infodemic Management within Risk Communication and C...SaraJayneTerp
Summary of WHO report "Guidance note: Advancing Infodemic Management within Risk Communication and Community Engagement in the WHO European Region", to be released November 2022
Talk given to the Vanguards on 2022-02-25. Covers cognitive security definitions, ecoystem, main activities (disinformation risk assessment, detection/response coordination), and scaling.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
4. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Why measure? Some use cases
● Programme
○ Is this cognitive security program delivering value?
○ What value? How and to whom?
● Strategic
○ Is this information space healthy?
■ Is reliable information available in the places that people look for it?
■ Is the human information space fractured or coherent?
○ Does this ecosystem have reasonable immunity to disinformation moves?
○ Is the response plan adequate for the environment it’s in?
● Tactical
○ Information: What effect is an information artifact, behaviour or narrative having on
the information space, and people within it?
○ Harms: What effects is a rumour, misinformation, conspiracy, disinformation
artifact, behaviour or narrative having on the information space, and people within it?
○ Response: What effects (positive and negative) is a control (response) having?
4
5. INST409C:
Cognitive
Security
|
Fall
2021
|
SJ
Terp
How do you know if this is working?
Strategic: Assess overall effectiveness
● Creators
○ social share of voice
○ brand awareness
○ community fractures
● Responders
○ social share of voice
○ how well are we reducing cognitive
security risk?
○ community repairs
Tactical: Assess incident response
● Creators
○ message reach, amplification rate
○ applause rate, engagement rate etc
○ Knowledge-based: what is being discussed
○ Social network-based: who is discussing
● Responders
○ Knowledge based: how accessible (and
shared) is trusted information
○ Network based: did the disinformation
sharing slow down?
5
6. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Issues
Highly connected environment
● No isolation of actions and effects
○ (people are receiving information and disinformation from media, word of mouth etc,
○ with often very different responses to the same types of information),
● No isolation of responses
○ (rare to have just one team responding to information harms around an event like an election etc.,)
Partial visibility
● No one team has visibility
○ of all the effects, responses, and data needed to get a complete picture of those harms and response
● Platform visibility
○ Few teams have the full Twitter firehose
○ Facebook only gives open pages/groups
● Closed messaging systems
○ (SMS, WhatsApp, Twitter etc) = the only things we see from these are the ones reported to us
6
7. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
What to measure
● Environment
● Risk
○ How often an event occurs x how much damage it does
○ How often = sanest to make this event-based (e.g. per incident)
○ How bad = which harms, to how many people, to which people
○ (targetted harms in a small community could be worse than across a larger one)
● Actions and responses
7
8. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Harms Component Landscape
● Actors
○ Nationstates, individuals, companies, DAAS
companies
● Channels
○ Where people seek, share, post information
○ Where people are encouraged to go
● Influencers
○ Not about followers: might be large influence
over smaller groups
● Groups
○ Created to create or spread disinfo. Often real
members, fake creators. Lots of themes. Often
closed groups.
● Messaging
○ Cognitive bias codex of about 200 biases:
each of these is a vulnerability
● Narratives and memes
○ Narratives designed to spread fast / be sticky.
Often on a theme, often repeated
● Tools
○ Bots, personas, network analysis, marketing
tools, IFTTT etc
8
● Verified information
● Rumours
● Misinformation
● Conspiracies
● Information voids / deserts
People and accounts:
● Seeking information - using search,
questions, influencers etc
● Sharing information through channels
● Posting information
9. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Measuring harm
Physical harm e.g. bodily injury, damage to physical assets (hardware,
infrastructure, etc).
Psychological harm e.g. depression, anxiety from cyber bullying, cyber stalking etc
Economic harm financial loss, e.g. from data breach, cybercrime etc
Reputational harm e.g. Organization: loss of consumers; Individual: disruption of
personal life; Country: damaged trade negotiations.
Cultural harm increase in social disruption, e.g. misinformation creating
real-world violence.
Political harm e.g. disruption in political process, government services from
e.g. internet shutdown, botnets influencing votes
9
Image: https://dai-global-digital.com/cyber-harm.html)
Plus responder harms: psychological damage, security risks
15. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
(Thanks, Guardian)
“A standard logframe is divided into four rows, which are your long- to short-term objectives ranging from top to bottom:
● Goal (overall aim).
● Outcome/Purpose (what will be achieved, who will benefit, and by when).
● Outputs (specific results the project will generate).
● Activities (what tasks need to be done in order for the output to be achieved).
These are achieved and measured by the headings from left to right:
● Project summary (explaining the objectives).
● Objectively verifiable indicators (how you’ll measure the achievements).
● Means of verification (how you’ll collect the information for the indicators).
● Risks and assumptions (external conditions needed to get results).”
(https://www.theguardian.com/global-development-professionals-network/2015/aug/17/how-to-write-a-logframe-a-begi
nners-guide)
15
20. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
UK Government: RESIST
Objective Metrics Effectiveness
Reach the audience vulnerable to a specific piece
of disinformation.
Demographic information on the types of people engaging with your content. Output
Present them with engaging information that
captures their attention.
The amount of time people spend viewing information (dwell time), the extent to which
they engage with that information (likes, comments, shares).
Output
Direct them to a more in-depth source of legitimate
information.
The click-through rate (the number of people who click on a link to more in-depth
information), the amount of time people spend viewing that information (dwell time).
Output
Increase the proportion of reporting or online
activity that references your communications and
messages.
The extent to which your communications are accessible and available in public
discourse – for example, of the articles covering an issue or topic, how many reference
your message/communications?
Output
Build audience resilience to a specific piece of
disinformation and enhance their ability to think
critically.
The number of people engaging with a specific piece of disinformation (is it decreasing
or increasing?)
Outcome
Change audience views, attitudes and perceptions
about a particular issue or topic.
Survey and polling data on the views, attitudes and perceptions of your target
audience.
Outcome
Change the way in which the audience behaves. The number of people amongst your target audience who are changing their behaviour
(examples include quitting smoking, getting vaccinated, applying to become a teacher).
Outcome
20
23. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
FullFact levels of risk
Levels:
1. Business as normal, no additional response needed
2. Monitor and prepare external facing responses
3. An incident is occurring, responses ramp up
4. An incident is occurring, coordinated responses start
5. Maximum response levels and cooperation required
Criteria:
● Reach
● Subject matter
● Urgency of response
● Collaboration
27. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Performance metrics, Effectiveness metrics
Measures of performance (MoP):
● “are we doing things right”
● evidence of impacts
● Impressions, page views, reach, frequency
Measures of effectiveness (MoE):
● “are we doing the right things”
● verifiable changes
● shifts in knowledge, attitudes, behaviour
Indicator:
● Piece of information that tells us more about an MoE or MoP
27
28. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Measures of performance by category
● Content focussed:
○ Number of misinformation articles/ messages (how many, by source / channel)
○ Number of counter messages created
● View focussed:
○ Impressions: number of views of content
○ Page views: of websites/ webpages
○ Volume of misinformation identified and logged
● People focussed:
○ Reach: number of people who saw content
○ Frequency: number of times people saw content and/or number of times content was posted or shared
○ Number of organizations/ leaders/ influencers recruited to disseminate messages
○ Number of people trained/ given technical assistance
28
29. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Measures of effectiveness by category
● Content
○ Relevance and credibility of messages (target audience receptivity)
● Awareness
○ Misinformation awareness (recall, exposure)
○ Counter awareness (inoculation, counter messages)
● Knowledge
○ Belief in misinformation (trust in sources, and messages)
○ Knowledge of facts and resources (e.g. local resources, priority facts)
● Action/ Attitude
○ Intent to act (vote, vaccinate etc)
○ Attitude to authorities (trust in influencers, institutions etc)
○ Hesitancy (hesitancy to vote, vaccinate etc)
○ Action coverage (votes, inoculations etc)
29
30. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Communication Effectiveness
RESIST: “in principle, counter disinformation campaigns should aim to achieve the five objectives set
out below:
● reach the audience vulnerable to a specific piece of mis- or disinformation (output);
● present that information in a manner which engages the audience and captures their
attention (output);
● direct the the audience to an alternative source of information that is both legitimate and
credible (output);
● increase the proportion of reporting or online activity that references your
communications or information from your communications (output);
● build their resilience whilst enhancing their ability to think critically about the information
they encounter (outcome);
● change their attitudes, perceptions and behaviours towards a particular issue or topic
(outcome).”
30
31. Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Measure Caldiani’s 6 universal truths
Caldiani’s truths can be useful mechanisms to monitor for these, e.g.
○ Liking: “people like those who like them”
○ Reciprocity: “people repay in kind”
○ Social proof: “people follow the lead of similar others”
○ Scarcity: “people want more of what they can have less of”
○ Authority: “people defer to experts”
○ Consistency: “people align with their clear commitments”.
31