Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Fake News and You
Many researchers believe that cyber propaganda campaigns rely on three factors in order to succeed in their mission: the tools and services used, social networking, and the motivation behind the campaign in question. Without any of these elements, spreading fake news becomes almost impossible.

Unfortunately, there are plenty of resources out there that can be used to spread a fake news campaign.

For instance, the Dark Web can provide those attempting to spread their propaganda with the tools they need to do so, safe behind a veil of anonymity. Social media offers platforms that encourage sharing, allowing what could be an exponential spread of a story with little hands-on effort from those responsible. Finally, while the majority of fake news that has been heard of as of late has been politically motivated, it can just as easily be used to manipulate businesses. In addition to its use as a political tool, fake news and information warfare can be used to promote a company and increase or decrease its stock--both financially and where public opinion is concerned.

China’s Fake News Marketplace
One example of the effects that fake news can have on businesses is demonstrated in the Chinese marketplace. One content distribution service, Xiezuobang, charges a user based on where the article is to be published. Services like this are easy to abuse for one’s own purposes.

Furthermore, aided by systems that enable public opinions to be measured and modified, posts can be automatically posted to 3000 websites at a rate of 100 posts per minute.

In addition to these tactics, many Chinese social networks are filled with posts shared by influential users who have been paid to promote that particular content. Based on that user’s popularity, the price of their content sharing services goes up.

A Global Problem
Of course, these practices are present in more areas than just China. Researchers have been able to collect and compare disinformation campaigns from the US, Russia, and Middle Eastern countries, and have resultantly been able to identify trends in what tools are used and how these campaigns are shaped to each region.

No matter where you are located, you need to keep an eye out for misinformation and cyber propaganda online. Whether it's politically motivated, or intended to manipulate business and the market, fake news is divisive and only benefits those that spread it.

What’s your opinion of fake news? Do you feel that it’s a real problem, or is it being overblown? Sound off in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Computing Internet Hosted Solutions Microsoft IT Services Business Ransomware Software Network Security Smartphone Windows Google Android Computer Backup Small Business Windows 10 App Hardware Data Management Data Business Continuity Browser Innovation Internet of Things Mobile Devices Remote Monitoring Saving Money IT Support Artificial Intelligence Office 365 Encryption Productivity Managed IT Services Phishing Cloud Computing User Tips Data Recovery Smartphones Tip of the week Outsourced IT Vulnerability Efficiency Risk Management Robot Google Drive Upgrade Settings Word Data storage Productivity Cybersecurity Money Gmail Office Tips IT Support Windows 10 Big Data Facebook Managed Service Provider Analytics Mobile Device Computing IT Management Virtual Private Network Network Holiday End of Support Telephone Systems Business Management Alert Chrome Firewall Hosted Solution Server Antivirus Bandwidth Data Backup Workplace Tips Microsoft Office YouTube Employer-Employee Relationship Social Media communications Outlook Monitors Save Money Government Disaster Recovery Automation Passwords Mouse Unified Threat Management Managed IT Services Miscellaneous Apple LiFi Two-factor Authentication SaaS Maintenance Administration Scam Content Filtering Break Fix IBM Dark Data Computer Care Windows 8 Wireless IT solutions Networking Retail Servers Google Calendar Dark Web VPN Corporate Profile Customer Service Training Automobile Data Security Running Cable Office Server Management Vendor Management Dell Operating System Legislation Buisness Microsoft Excel Virtual Desktop WannaCry Social Google Maps Information Technology Techology Laptop Quick Tips Social Engineering Statistics Best Practice Deep Learning Tablet Blockchain Mail Merge Data loss Safety Spam Unified Threat Management VoIP Downtime Bluetooth desktop Google Docs Bring Your Own Device Comparison Hacks Politics Permissions Address Digital Network Congestion Gadgets Google Wallet Collaboration User Error Avoiding Downtime Wi-Fi Business Growth Samsung Specifications Password Fraud Spyware Computers Users Drones File Sharing Apps Printer Halloween Time Management Black Friday Search Solid State Drive Hacker Websites Mobile Security Education Emergency Display Network Management Access Control Scary Stories Cyber Monday Website Hard Disk Drive Alt Codes Hotspot Business Technology Touchscreen Cabling Budget Unified Communications SharePoint Sports Smart Technology Managed IT Humor Typing Current Events Language Lenovo The Internet of Things How To Infrastructure Downloads BYOD Distributed Denial of Service Shortcut Virtual Reality VoIP Cryptocurrency Digital Payment Going Green Computing Infrastructure WiFi Superfish Cybercrime Firefox Communication Marketing Disaster Managed IT Service Patch Management Storage Bitcoin Printing Alerts Customer Relationship Management Writing Heating/Cooling Uninterrupted Power Supply Legal Multi-Factor Security Law Enforcement Update Error Licensing Mobile Data Ben McDonald shares Point of Sale Gadget Recovery Paperless Office Chromebook Staffing Administrator Physical Security what was your? Web Server Processors Emoji GPS Personal Information Cameras Cortana Tracking CCTV Tech Support Virtualization Document Management Computer Repair Notifications Mobile Device Management Identity Theft How To Travel Health G Suite Crowdsourcing Supercomputer Mobile Computing Botnet Black Market CrashOverride Motion Sickness Electronic Medical Records Taxes IT Budget Machine Learning Twitter Upgrades IT Consultant Relocation Remote Computing 3D Printing Meetings Work/Life Balance Cleaning Private Cloud Unsupported Software Webcam

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3