Figure 5 - uploaded by Jaap Muijs
Content may be subject to copyright.
Source publication
Constructions of reality take place in online environments where perceptions are managed from abroad. Ordinary people employ themselves daily on the frontlines of an information war and are the targets for achieving desired goals of international power politics.
This thesis defines the relation between disinformation and International Security by...
Contexts in source publication
Context 1
... due to structural reasons, luck, and effective anticipation and reaction. As shown in figure 5, the attack initiator used a well-known hack and leak disinformation operation, and we can consider the hacker (susceptibly Russia), the leaker, the catalyst accounts, and the bots as initiators of the disinformation attack. For the attack, use has been made of well-known channels, such as bots and other Twitter accounts, also used during the Clinton campaign leaks, to disseminate the content on social media. ...
Context 2
... due to structural reasons, luck, and effective anticipation and reaction. As shown in figure 5, the attack initiator used a well-known hack and leak disinformation operation, and we can consider the hacker (susceptibly Russia), the leaker, the catalyst accounts, and the bots as initiators of the disinformation attack. For the attack, use has been made of well-known channels, such as bots and other Twitter accounts, also used during the Clinton campaign leaks, to disseminate the content on social media. ...