information manipulation
Recently Published Documents


TOTAL DOCUMENTS

151
(FIVE YEARS 55)

H-INDEX

16
(FIVE YEARS 2)

2022 ◽  
pp. 65-89
Author(s):  
Nadezhda Lebedeva

The highest degree of impact is observed nowadays from the bodies that finance the media. The information community of journalists and television companies are the tools for influencing society. As a result, the picture shown to the audience does not coincide with reality, so the people don't trust the media. Thus, there is a need to find alternatives to what viewers see on the screen of official television channels. This demand also creates a supply, which, having convincing facts and evidence of its innocence, forms an audience. The purpose of the chapter is to consider a practical attempt to counteract the process of manipulation of public consciousness. To achieve this goal, the author of this chapter set the following research tasks: to study the available scientific sources on the topic of manipulative influence on people, to compare the facts provided by the official media, and the means of the YouTube network, and to find a logical explanation for the emergence of the internet party in Ukraine.


2022 ◽  
Vol 131 ◽  
pp. 245-263
Author(s):  
Andreas Grunewald ◽  
Matthias Kräkel

2021 ◽  
Vol 8 (2) ◽  
Author(s):  
Abdullah Almoqbil ◽  
Brian O'Connor ◽  
Richard Anderson ◽  
Jibril Shittu ◽  
Patrick McLeod

Information manipulation for deception continues to evolve at a remarkable rate. Artificial intelligence has greatly reduced the burden of combing through documents for evidence of manipulation; but it has also enabled the development of clever modes of deception. In this study, we modeled deception attacks by examining phishing emails that successfully evaded detection by the Microsoft 365 filtering system. The sample population selected for this study was the University of North Texas students, faculty, staff, alumni and retirees who maintain their university email accounts. The model explains why certain individuals and organizations are selected as targets, and identifies potential counter measures and counter attacks. Over a one-year period, 432 phishing emails with different features, characters, length, context and semantics successfully passed through Microsoft Office 365 filtering system. The targeted population ranged from 18 years old up to those of retirement age; ranged across educational levels from undergraduate through doctoral levels; and ranged across races. The unstructured data was preprocessed by filtering out duplicates to avoid overemphasizing a single attack. The term frequency-inverse document frequency (TF-IDF) and distribution of words over documents (topic modeling) were analyzed. Results show that staff and students were the main target audience, and the phishing email volume spiked in the summer and holiday season. The TF-IDF analysis showed that the phishing emails could be categorized under six categories: reward, urgency, job, entertainment, fear, and curiosity. Analysis showed that attackers use information gap theory to bait email recipients to open phishing emails with no subject line or very attractive subject line in about thirty percent of cases. Ambiguity remains the main stimulus used by phishing attackers, while the reinforcements used to misinform the targets range from positive reinforcements (prize, reward) to negative reinforcements (blackmail, potential consequences).


2021 ◽  
pp. 154-158
Author(s):  
Aurelia Cojocaru ◽  

In its becoming, the marital couple crosses certain obstacles, the partners can become concerned with the security of the relationship in the future, fidelity and property, attraction and rejection. Conflicts can also arise regarding the self-fulfillment and self-realization of the couple on the one hand and its stability and unity on the other. Emotional manipulation is characterized by the fact that the action of the source is primarily focused on influencing psychological processes and phenomena that are involved in structuring, orienting and supporting the attitudinal and behavioral system of the target. These can be processes in the sphere of perception, thinking, affectivity, motivation, etc. A number of psychic phenomena in the cognitive, emotional and relational spheres can be instrumentalized by the manipulator, with sometimes-spectacular results in determining and controlling human behavior, especially when this method is combined with that of information manipulation.


Author(s):  
A.A. Vikhman

The article presents the results of an empirical study of personality traits, strategies of social behavior and the acceptability of information manipulation on a sample of youth, mainly female students (n=195). Based on the theory of communicative implicatures by P. Grice and the theory of information manipulation by S. McCornack, a case test with educational and interpersonal situations of communication was created, aimed at studying the choice of admissibility of information manipulation. Correlation analysis revealed that the acceptability of all four forms of information manipulation (lies, deception, inappropriateness, and obscurity) is most closely related to deficiencies in conscientiousness (lack of productivity, organization, and responsibility) and goodwill (lack of trust and empathy). We can observe the connections with individual personality aspects that are unique for different methods of information manipulation. In addition, information manipulation is associated with destructive social strategies of behavior, especially in the intersubjective sphere and in combination with a tendency to devalue the interlocutor.


2021 ◽  
Vol 46 (2) ◽  
pp. 185-199
Author(s):  
Agata Książek

The aim of the article is to analyze the language of the Soviet propaganda posters from the Second World War period, containing the poetic commentary of the members of the Moscow TASS Agency. The research reveals the main means of persuasion used in the poems. The subject of the analysis is the phenomenon of spreading ideas in two basic social spheres that occurred in the Soviet Union during the war period, which include people who took direct part in military actions, and Soviet citizens who provided the army with all the necessary materials. Texts addressed to potential soldiers contained a direct call to defend the homeland and family. Their most important manipulative tools were emotional arguments and the technique of stereotyping the enemy. Ideas and personal patterns were instilled in the minds of the fighters with various linguistic manipulation techniques. The propaganda referenced to the belongingness need. Different propaganda techniques were used in poems targeted at people behind the lines of hostilities. The authors of the texts of TASS Windows used colloquial language, comprehensible to a wide audience. They created a vision of a world divided into two opposite poles and referred to respected authorities or raised new role models. The propaganda of the victory also required different techniques of information manipulation. The TASS Windows present the unique contribution of the Soviet poets to the action of the mobilization ofsociety to take part in the fight against the German aggressor.


Sign in / Sign up

Export Citation Format

Share Document