Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Fake News and You
Many researchers believe that cyber propaganda campaigns rely on three factors in order to succeed in their mission: the tools and services used, social networking, and the motivation behind the campaign in question. Without any of these elements, spreading fake news becomes almost impossible.

Unfortunately, there are plenty of resources out there that can be used to spread a fake news campaign.

For instance, the Dark Web can provide those attempting to spread their propaganda with the tools they need to do so, safe behind a veil of anonymity. Social media offers platforms that encourage sharing, allowing what could be an exponential spread of a story with little hands-on effort from those responsible. Finally, while the majority of fake news that has been heard of as of late has been politically motivated, it can just as easily be used to manipulate businesses. In addition to its use as a political tool, fake news and information warfare can be used to promote a company and increase or decrease its stock--both financially and where public opinion is concerned.

China’s Fake News Marketplace
One example of the effects that fake news can have on businesses is demonstrated in the Chinese marketplace. One content distribution service, Xiezuobang, charges a user based on where the article is to be published. Services like this are easy to abuse for one’s own purposes.

Furthermore, aided by systems that enable public opinions to be measured and modified, posts can be automatically posted to 3000 websites at a rate of 100 posts per minute.

In addition to these tactics, many Chinese social networks are filled with posts shared by influential users who have been paid to promote that particular content. Based on that user’s popularity, the price of their content sharing services goes up.

A Global Problem
Of course, these practices are present in more areas than just China. Researchers have been able to collect and compare disinformation campaigns from the US, Russia, and Middle Eastern countries, and have resultantly been able to identify trends in what tools are used and how these campaigns are shaped to each region.

No matter where you are located, you need to keep an eye out for misinformation and cyber propaganda online. Whether it's politically motivated, or intended to manipulate business and the market, fake news is divisive and only benefits those that spread it.

What’s your opinion of fake news? Do you feel that it’s a real problem, or is it being overblown? Sound off in the comments!

Comments

 
No comments yet
Already Registered? Login Here
Guest
Saturday, 20 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Business Computing Privacy Email Productivity Business Microsoft Internet Hosted Solutions Windows 10 Software Managed Service Provider Backup IT Services Network Security Ransomware Computer Mobile Devices Android Smartphone Managed IT services User Tips Google Browser Outsourced IT IT Support Workplace Tips Social Media Hardware Communication Disaster Recovery Innovation Efficiency Data Backup Data Business Continuity Smartphones App Business Management Data Management Holiday Productivity Upgrade Cloud Computing Small Business Office Facebook Miscellaneous WiFi Microsoft Office Network Data Recovery Server Office 365 Windows Remote Monitoring Internet of Things Spam Phishing Encryption Tech Term Artificial Intelligence Gmail Big Data Apps Hosted Solution Recovery Unified Threat Management Password Bandwidth Firewall Robot Save Money Paperless Office Customer Relationship Management Content Filtering Work/Life Balance Chrome Passwords Wi-Fi Apple Office Tips Avoiding Downtime Infrastructure Employer-Employee Relationship Customer Service Mobile Device Management Risk Management Document Management Tip of the week Cybersecurity Word Saving Money Remote Computing Hacker How To Government Money Managed IT Services IT Management Social Mobile Device Antivirus Website Project Management Health File Sharing Managed IT Data loss BDR Vendor Management Hacking Mobile Computing Two-factor Authentication Alert Settings Tech Support Telephone Systems Analytics Windows 10 Data storage The Internet of Things Computing Operating System Computers Compliance VoIP Presentation Business Growth Data Security Virtual Reality IT Support Education SaaS BYOD Applications Outlook Cybercrime Budget End of Support Maintenance User HIPAA IT solutions Router Safety Mouse Mobile Security Wireless Technology Retail Wireless Collaboration Legal Best Practice Lithium-ion battery Downtime Tablet communications Business Owner Twitter Politics Business Technology Monitors YouTube Unified Communications Marketing Travel Google Drive Websites Automation Going Green LiFi Physical Security Competition Taxes Botnet Printing Samsung Patch Management Information Technology Scam Humor Healthcare Augmented Reality Meetings Vulnerability Storage IBM Running Cable Identity Theft Analyitcs VPN Computer Care Regulations Bring Your Own Device Search Virtual Private Network Sports Training IT service Assessment Licensing Specifications Cortana Server Management Virtualization Administration Automobile Smart Technology Upgrades Digital Payment Software Tips Typing Mobile Web Server Internet Exlporer Update Statistics Software as a Service Address Remote Workers Buisness Administrator Distributed Denial of Service Proactive IT 3D Printing Cryptocurrency Vulnerabilities Knowledge Cameras Chromebook Bluetooth Law Enforcement Technology Tips Redundancy Network Congestion Corporate Profile iPhone Electronic Health Records IT Technicians Modem Managed IT Service IT Consulting Unsupported Software Quick Tips History Bitcoin Geography Experience CCTV Hotspot Emoji User Error Mirgation Gadget Comparison Display WannaCry Cyberattacks Cookies Break Fix Data Breach Mobile Data Time Management Hacks Printer Cabling Windows 8 Cables Language Migration Domains Black Friday Staffing Bookmarks Nanotechnology 5G Dark Web Technology Laws Entrepreneur Network Management Current Events Processors Access Control Wires PowerPoint G Suite Computing Infrastructure Application Chatbots Public Speaking Cyber Monday Lenovo VoIP GPS Favorites Users Google Maps Consumers IoT Motion Sickness Data Warehousing Unified Threat Management Touchscreen SharePoint Shortcut Google Docs Disaster MSP Alerts Identity flu season Superfish Writing Digital Tracking Conferencing Utility Computing Microsoft Excel business communications systems Personal Information Downloads Uninterrupted Power Supply eWaste Proactive Laptop IT Consultant Cooperation Hard Drives Virtual Desktop IT Sevices Machine Learning Fort Worth Social Engineering Spyware Blockchain Internet Protocol Computer Repair Refrigeration Notifications Multi-Factor Security Solid State Drive Environment Remote Monitoring and Management Halloween Cleaning Staff Relocation flu shot Networking How To Google Wallet Deep Learning Cost Management Fun Webcam Permissions VoIP streamlines Electronic Medical Records Heating/Cooling Crowdsourcing Google Calendar Dark Data Hard Disk Drive Troubleshooting WPA3 Scary Stories Flexibility Private Cloud Fort Worth IT Firefox Supercomputer Drones Help Desk Management Point of Sale Fraud business network infrastructure Servers Undo Legislation Fleet Tracking Phone System Operations Social Networking IP Address Error DFW IT Service Techology IT Budget Alt Codes Enterprise Resource Planning Net Neutrality data services Mail Merge Asset Tracking Wearable Technology Motherboard Mobile Office Disaster Resistance Consultation

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code