Understanding Fake News

Alongside the growth of social media there is increasing concern in many western democracies with the growing infusion of misinformation, or “fake news”, into public discourse and politics. Indeed, social media use has become the principal news source for many people and now fake news publishers are taking advantage of the unregulated social media labyrinth.  

Now, Google is trying to explain disinformation to social media users and how they can avoid fake news, following on from compelling academic research by Bristol University.

As social media has become an important news source for its users, the spread of inaccurate information 
has been theorised to adversely affect the decision-making processes of consumers and voters. After the November 2016 US election, many public officials and media organisations criticised social media platforms and other tech companies, including Google, for allowing fakes news to spread, possibly influencing the outcome of the election. 

In the wake of such criticism, Google promised to prevent its ads from appearing on fake news websites, reducing the financial incentive for publishers to produce inaccurate content.

Based on research which has found that videos can improve people's ability to recognise manipulative content, Google launched Project Jigsaw. It's mission is to reduce online security dangers and it created 90-second video clips designed to familiarise users with manipulation techniques such as scapegoating and deliberate incoherence shown on YouTube, TikTok, Twitter and Facebook. The Jigsaw videos introduce concepts from the “misinformation playbook”, illustrated with relatable examples from film and TV such as Family Guy or, in the case of false dichotomies, Star Wars and shown in Slovakia, the Czech Republic and Poland to combat fake news about Ukrainian refugees.

“Propaganda, lies and misdirections are nearly always created from the same playbook,” according to Prof Stephan Lewandowsky from the University of Bristol. “We developed the videos by analysing the rhetoric of demagogues, who deal in scape-goating and false dichotomies.”

The research was founded on a developing area of study called "prebunking", which investigates how disinformation can be exposed before people engage with it.

During the research, the adverts were shown to 5.4 million people and then 22k were surveyed. After watching the explanatory videos, researchers found:

  • An improvement in respondents' ability to spot disinformation techniques.
  • An increased ability to discern trustworthy from untrustworthy content.
  • An improved ability to decide whether or not to share content

The academic researchers argue that prebunking may be more effective at fighting the misinformation deluge than fact-checking each untruth after it spreads, the classic ‘debunk’, which is impossible to do at scale, and can entrench conspiracy theories by feeling like personal attacks to those who believe them.

Google said the "exciting" findings showed how social media can actively pre-empt the spread of disinformation.

University of Bristol:      Lewandowsky & Van Der Linden:     University of Cambridge:    BBC:    Springer

Google Jigsaw:       Campaign for Accountability:      Bjorn Ross et Al:     Vice:   

You Might Also Read: 

Twitter, Free Speech & Disinformation:
 

« Digital Banking & Cyber Crime
Email Infection Chains Are Diversifying In 2022 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

Centum Digital

Centum Digital

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence.