会议论文详细信息
International Multi-Conference on Industrial Engineering and Modern technologies
Information Operations of Influence: Risks and Countermeasures
Leonova, O.G.^1
Lomonosov Moscow State University, Moscow, Russia^1
关键词: Access to database;    Information operations;    Internet connection;    Misleading informations;    National elections;    Political dimensions;    Public information;    Technical countermeasures;   
Others  :  https://iopscience.iop.org/article/10.1088/1757-899X/463/4/042095/pdf
DOI  :  10.1088/1757-899X/463/4/042095
来源: IOP
PDF
【 摘 要 】

The topic's pertinence. Operations of information influence are aimed at interfering in a system of national elections, forming public opinion and destabilizing the socio-political situation in a country. Goal setting: identification of a risk system of information influence operations and systematizing possible countermeasures. Theory. The problem of elections system security has technical and political dimensions. Possible technical risks can be divided into three groups that are connected, firstly, with the security of the elections support system, secondly, with the security of the voting process, and, thirdly, with the vote counting process. Political risks cover corruption and information influence operations aiming, among other things, at disseminating misleading information. Practice. Technical risks of the elections procedure comprise unsanctioned access to databases; software "impermeability"; its quality; dependence of electronic devices on the Internet connection; a virus or a malfunction in a software that can automatically delete a person from a voting register; phishing technology etc. Misleading information technology and dissemination of falsified information cover personalization of information; information targeting; the creation of "interest targets"; "information baits" for consumers, "feedback loops", "filtering bubble" and "organic lift." Propositions and conclusions. There are three packages of information operations countermeasures. The first package consists of tasks for public information policy. The second package aims at cooperating with information users and consumers. The third package contains technical countermeasures to combat information influence operations.

【 预 览 】
附件列表
Files Size Format View
Information Operations of Influence: Risks and Countermeasures 167KB PDF download
  文献评价指标  
  下载次数:18次 浏览次数:38次