Understanding Fake News

Alongside the growth of social media there is increasing concern in many western democracies with the growing infusion of misinformation, or “fake news”, into public discourse and politics. Indeed, social media use has become the principal news source for many people and now fake news publishers are taking advantage of the unregulated social media labyrinth.  

Now, Google is trying to explain disinformation to social media users and how they can avoid fake news, following on from compelling academic research by Bristol University.

As social media has become an important news source for its users, the spread of inaccurate information 
has been theorised to adversely affect the decision-making processes of consumers and voters. After the November 2016 US election, many public officials and media organisations criticised social media platforms and other tech companies, including Google, for allowing fakes news to spread, possibly influencing the outcome of the election. 

In the wake of such criticism, Google promised to prevent its ads from appearing on fake news websites, reducing the financial incentive for publishers to produce inaccurate content.

Based on research which has found that videos can improve people's ability to recognise manipulative content, Google launched Project Jigsaw. It's mission is to reduce online security dangers and it created 90-second video clips designed to familiarise users with manipulation techniques such as scapegoating and deliberate incoherence shown on YouTube, TikTok, Twitter and Facebook. The Jigsaw videos introduce concepts from the “misinformation playbook”, illustrated with relatable examples from film and TV such as Family Guy or, in the case of false dichotomies, Star Wars and shown in Slovakia, the Czech Republic and Poland to combat fake news about Ukrainian refugees.

“Propaganda, lies and misdirections are nearly always created from the same playbook,” according to Prof Stephan Lewandowsky from the University of Bristol. “We developed the videos by analysing the rhetoric of demagogues, who deal in scape-goating and false dichotomies.”

The research was founded on a developing area of study called "prebunking", which investigates how disinformation can be exposed before people engage with it.

During the research, the adverts were shown to 5.4 million people and then 22k were surveyed. After watching the explanatory videos, researchers found:

  • An improvement in respondents' ability to spot disinformation techniques.
  • An increased ability to discern trustworthy from untrustworthy content.
  • An improved ability to decide whether or not to share content

The academic researchers argue that prebunking may be more effective at fighting the misinformation deluge than fact-checking each untruth after it spreads, the classic ‘debunk’, which is impossible to do at scale, and can entrench conspiracy theories by feeling like personal attacks to those who believe them.

Google said the "exciting" findings showed how social media can actively pre-empt the spread of disinformation.

University of Bristol:      Lewandowsky & Van Der Linden:     University of Cambridge:    BBC:    Springer

Google Jigsaw:       Campaign for Accountability:      Bjorn Ross et Al:     Vice:   

You Might Also Read: 

Twitter, Free Speech & Disinformation:
 

« Digital Banking & Cyber Crime
Email Infection Chains Are Diversifying In 2022 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Pango

Pango

Pango is a leading provider of digital consumer security solutions.