Our Blog: Stuff we think you should know

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Fake News and You
Many researchers believe that cyber propaganda campaigns rely on three factors in order to succeed in their mission: the tools and services used, social networking, and the motivation behind the campaign in question. Without any of these elements, spreading fake news becomes almost impossible.

Unfortunately, there are plenty of resources out there that can be used to spread a fake news campaign.

For instance, the Dark Web can provide those attempting to spread their propaganda with the tools they need to do so, safe behind a veil of anonymity. Social media offers platforms that encourage sharing, allowing what could be an exponential spread of a story with little hands-on effort from those responsible. Finally, while the majority of fake news that has been heard of as of late has been politically motivated, it can just as easily be used to manipulate businesses. In addition to its use as a political tool, fake news and information warfare can be used to promote a company and increase or decrease its stock--both financially and where public opinion is concerned.

China’s Fake News Marketplace
One example of the effects that fake news can have on businesses is demonstrated in the Chinese marketplace. One content distribution service, Xiezuobang, charges a user based on where the article is to be published. Services like this are easy to abuse for one’s own purposes.

Furthermore, aided by systems that enable public opinions to be measured and modified, posts can be automatically posted to 3000 websites at a rate of 100 posts per minute.

In addition to these tactics, many Chinese social networks are filled with posts shared by influential users who have been paid to promote that particular content. Based on that user’s popularity, the price of their content sharing services goes up.

A Global Problem
Of course, these practices are present in more areas than just China. Researchers have been able to collect and compare disinformation campaigns from the US, Russia, and Middle Eastern countries, and have resultantly been able to identify trends in what tools are used and how these campaigns are shaped to each region.

No matter where you are located, you need to keep an eye out for misinformation and cyber propaganda online. Whether it's politically motivated, or intended to manipulate business and the market, fake news is divisive and only benefits those that spread it.

What’s your opinion of fake news? Do you feel that it’s a real problem, or is it being overblown? Sound off in the comments!

Unpaid Invoices are a Major Problem For SMBs
Getting Back to Basics with Data Backup


Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Email Hackers Malware Computer Internet Microsoft Software Business Computing Network Security Hosted Solutions User Tips IT Services Google Ransomware Backup Windows 10 Tech Term Mobile Devices Efficiency Small Business Android Hardware Smartphone Productivity Data Browser Saving Money Managed IT Services Communication Data Management Cloud Computing Facebook Microsoft Office Business Continuity Upgrade Data Recovery Workplace Tips Internet of Things IT Support Gmail Windows Productivity Data Backup Server Office 365 Disaster Recovery Word Managed IT Services App Cybersecurity Artificial Intelligence Phishing Smartphones Business Management Managed Service Provider Remote Monitoring Employer-Employee Relationship Innovation Passwords Encryption Network Windows 10 Chrome Analytics Content Filtering Tip of the week IT Support Spam Website Big Data Miscellaneous communications Social Media Government Money Infrastructure BYOD Applications Outsourced IT Office Tips Avoiding Downtime Maintenance Mobile Device Settings Apple The Internet of Things Two-factor Authentication Data storage Vulnerability Bandwidth Antivirus YouTube Robot Risk Management Wireless VoIP Firewall Customer Service IT Management WiFi Save Money Safety LiFi Virtual Reality Hacker Office Business Intelligence Storage Scam Wireless Technology Recovery Paperless Office Hosted Solution Tablet SaaS Display Company Culture Users Outlook Managed Service Unified Threat Management VPN Monitors Holiday Search Education IBM Data Security Access Control HIPAA Information Data loss Business Technology Printing Apps Mobile Device Management Development Virtual Private Network Automation Administration Operating System Customer Relationship Management End of Support Hacking Server Management Wi-Fi Computing Laptop Password Mobile Security Touchscreen Google Drive Augmented Reality Mouse Vendor Management Telephone Systems Presentation Google Docs Black Friday Regulations Halloween Address Writing Undo Hotspot Professional Services Websites Identity Theft Cortana Work Content Voice over Internet Protocol Uninterrupted Power Supply Patch Management Windows 8 Computers Marketing Microsoft Excel Star Wars Training Fun Desktop Quick Tips User Error Multi-Factor Security Mirgation Bluetooth Business Growth Gadgets Application Dark Web Nanotechnology Downtime Spying Google Wallet Staff Automobile Cyber Monday Social Networking Scary Stories Analysis Corporate Profile Current Events Retail Virtualization Language USB Optimization Streaming Google Calendar Chatbots IP Address Cybercrime FinTech Solid State Drive Blockchain Cost Management Troubleshooting VoIP Legal Alt Codes Dark Data Net Neutrality Screen Reader Employee-Employer Relationship How To Networking Drones Printer Wearable Technology Smart Technology Motherboard Remote Computing Sports WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Legislation Identity Update Mobile Office MSP Hard Disk Drive Social Hard Drives Permissions Assessment Time Management Managing Stress Cabling Typing FCC Smart Tech PowerPoint Firefox BDR Servers Deep Learning Humor Distributed Denial of Service Router Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device User Comparison Chromebook Running Cable Hacks Refrigeration Fraud Internet Exlporer Politics LED Network Management Cables Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Techology Budget Public Speaking SharePoint Collaboration Google Maps Bring Your Own Device sip Managed IT Service Modem Buisness Slack Digital Lenovo How To Competition Licensing Continuity Specifications Compliance Lithium-ion battery Charging Mail Merge Value Tech Support Document Management IT solutions Smart Office Co-Managed IT File Sharing Wires Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage Unified Threat Management Downloads IT Technicians Solar Statistics Best Practice telephony Break Fix Cookies Samsung 5G Monitoring Spyware Superfish Information Technology Cooperation Black Market Point of Sale Regulation Mobile Computing Travel Law Enforcement Physical Security Notifications G Suite CrashOverride Upgrades Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS Printers IT Consultant Unsupported Software Domains Computer Repair Processors Cameras Relocation Meetings Tracking Cleaning Mobile Data Health Alert CCTV Private Cloud Emoji Webcam Electronic Medical Records Work/Life Balance Error