Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Fake News and You
Many researchers believe that cyber propaganda campaigns rely on three factors in order to succeed in their mission: the tools and services used, social networking, and the motivation behind the campaign in question. Without any of these elements, spreading fake news becomes almost impossible.

Unfortunately, there are plenty of resources out there that can be used to spread a fake news campaign.

For instance, the Dark Web can provide those attempting to spread their propaganda with the tools they need to do so, safe behind a veil of anonymity. Social media offers platforms that encourage sharing, allowing what could be an exponential spread of a story with little hands-on effort from those responsible. Finally, while the majority of fake news that has been heard of as of late has been politically motivated, it can just as easily be used to manipulate businesses. In addition to its use as a political tool, fake news and information warfare can be used to promote a company and increase or decrease its stock--both financially and where public opinion is concerned.

China’s Fake News Marketplace
One example of the effects that fake news can have on businesses is demonstrated in the Chinese marketplace. One content distribution service, Xiezuobang, charges a user based on where the article is to be published. Services like this are easy to abuse for one’s own purposes.

Furthermore, aided by systems that enable public opinions to be measured and modified, posts can be automatically posted to 3000 websites at a rate of 100 posts per minute.

In addition to these tactics, many Chinese social networks are filled with posts shared by influential users who have been paid to promote that particular content. Based on that user’s popularity, the price of their content sharing services goes up.

A Global Problem
Of course, these practices are present in more areas than just China. Researchers have been able to collect and compare disinformation campaigns from the US, Russia, and Middle Eastern countries, and have resultantly been able to identify trends in what tools are used and how these campaigns are shaped to each region.

No matter where you are located, you need to keep an eye out for misinformation and cyber propaganda online. Whether it's politically motivated, or intended to manipulate business and the market, fake news is divisive and only benefits those that spread it.

What’s your opinion of fake news? Do you feel that it’s a real problem, or is it being overblown? Sound off in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Software Business Computing Internet Microsoft Hosted Solutions Ransomware Android IT Services Business Network Security Google Computer Backup Smartphone Mobile Devices Windows Windows 10 Innovation Small Business Data Management Browser Internet of Things App Artificial Intelligence Hardware Encryption Cloud Computing Server Data Business Continuity Outsourced IT User Tips Smartphones Data Recovery Managed Service Provider Office 365 Efficiency Saving Money Tip of the week Business Management Remote Monitoring IT Support Productivity Phishing Managed IT Services Gmail Antivirus Data storage Money Big Data Facebook Windows 10 Communication Risk Management Vulnerability Word Productivity Settings Robot Chrome IT Management Cybersecurity Google Drive Upgrade IT Support Infrastructure Office Tips Microsoft Office Data Backup Maintenance Disaster Recovery HIPAA Passwords Mobile Security Outlook Monitors Save Money LiFi Business Technology Mobile Device Automation Administration Content Filtering Mouse Virtual Reality Miscellaneous Analytics Apple Holiday SaaS Storage Data loss Telephone Systems Two-factor Authentication Alert Scam Firewall Network Computing VPN Data Security Employer-Employee Relationship Hosted Solution Server Management Virtual Private Network Workplace Tips End of Support Bandwidth Government YouTube communications Social Media Unified Threat Management BYOD Managed IT Services Unified Communications Drones Sports Disaster Specifications Fraud Hacker The Internet of Things Printer Display Time Management Black Friday Search Uninterrupted Power Supply Computer Care Emergency IBM Alt Codes VoIP Network Management Cybercrime Wireless Applications Access Control WiFi Cyber Monday Budget Marketing Training Hotspot Humor Corporate Profile Typing Touchscreen Current Events IT Technicians Automobile SharePoint Smart Technology Managed IT Dell Paperless Office Language Lenovo WannaCry Cryptocurrency Going Green Google Maps Mirgation Remote Computing Downloads IT solutions Distributed Denial of Service Shortcut Computing Infrastructure Superfish Bitcoin Printing Running Cable Chatbots Writing Managed IT Service Patch Management Legal Buisness desktop Alerts Politics Dark Data Virtual Desktop Customer Relationship Management Digital Windows 8 Heating/Cooling Laptop Identity Collaboration Multi-Factor Security Retail Break Fix Samsung Deep Learning Document Management Licensing Tech Support Networking Customer Service Spyware Office Spam Servers Tech Term File Sharing Google Calendar Dark Web Vendor Management Bring Your Own Device Operating System Downtime Solid State Drive Social Identity Theft Cooperation Websites Social Engineering Information Technology Gadgets Compliance Legislation Microsoft Excel Hard Disk Drive Best Practice Staff Techology Quick Tips Safety Apps Statistics Halloween Cabling Users Regulations Tablet Blockchain Mail Merge Google Docs How To Hacks Augmented Reality Unified Threat Management Network Congestion Education VoIP Bluetooth Google Wallet Scary Stories Comparison Permissions Wi-Fi Address Website Business Growth Firefox Password Digital Payment Wearable Technology User Error Computers Avoiding Downtime Meetings Cleaning Work/Life Balance Computer Repair Mobile Device Management Private Cloud How To Webcam Law Enforcement Health Mobile Computing Error Black Market Ben McDonald shares Point of Sale Gadget Electronic Medical Records Twitter Upgrades Staffing Administrator Processors 3D Printing what was your? Web Server GPS Unsupported Software Cameras Tracking Update Mobile Data CCTV Recovery Notifications Chromebook Travel Crowdsourcing Physical Security G Suite Supercomputer Botnet Emoji CrashOverride Motion Sickness Personal Information Taxes IT Budget Machine Learning Cortana IT Consultant Relocation Virtualization

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3