Cyberwar
Background
The case study “Cyberwar: MAD 2.0” addresses the various aspects and issues associated with cyberwar. Some of the components included in the case study include the various targets of cyberwar. The noted targets include hard infrastructure targets, such as nuclear facilities and soft targets, such as financial systems. The case study also notes the issue involving the Russian government’s participation in the 2016 U.S. presidential election. While the issue of foreign governments making use of different entities to influence the political aspects of a country is noted not to be new, the use of cyberspace to influence the presidential election was considered new. Various advancements in different countries have resulted in the development of powerful cyber weapons. To ensure that cyber weapons are not used unless when necessary, the doctrine of mutually assured destruction (MAD) is noted to have been used to develop treaties between the countries with cyber weapons that were likely to damage each other’s infrastructures after being used (Laudon & Traver, 2019).
Issues
In 2016, the Russian government was noted to have hacked the emails of the Democratic National Committee and obtained various information from the emails before using WikiLeaks and DCLeaks to publicize the contents of the emails. Additionally, the Russian government is noted to have made use of internet trolls who opened fake accounts on Facebook and Twitter social media platforms from where they were able to spread false information. The use of the advertising capabilities of social media platforms is also noted to have been one of the methods used by the Russians to influence the 2016 U.S. presidential election. Social media platforms are noted to allow different individuals to create accounts and post various information. In some instances, this information might not be true, and this allows for social manipulation. Continuous changes that have been made to social media platforms have enabled them to identify false information through fact-checkers, preventing the further spread of false information (Hameleers & van der Meer, 2020). However, with the high number of users and the posted information, identifying all the false information posted on the platforms presents a challenge.
One of the ways through which someone can reduce their susceptibility to fake news includes through the use of fact-checkers (Morris, Morris, & Francia, 2020). Fact-checkers identify whether the information is correct or false, and someone can use this information to verify the information. Another way to inoculate oneself against false information is by considering the source of information. Trusted sources are more likely to provide the right information when compared to untrustworthy sources. Avoiding confirmation bias can also be useful when identifying false information and avoiding becoming a victim of fake news. Identifying the purpose of the information source can also be instrumental in identifying whether the information presented in the source is fact or fake news. The application of critical thinking is also another way that users can inoculate themselves against fake news. Various fake accounts used to spread fake news display similar behavior, making it possible to identify them. Hence, the display of similar behavior increases the likelihood of Facebook creating an algorithm that can effectively screen out fake accounts and, in the process, the fake news.
Summary
The allegations that the Russian government employed various means to manipulate the 2016 U.S. presidential election present an example of the possible cyber warfare likely to occur amongst various countries with advanced cyber weapons. The lack of adequate security measures creates vulnerabilities on social media platforms that allow the spread of fake news. Some of the recommended methods of avoiding becoming a victim of fake news include using fact-checkers and using critical thinking.
References
Hameleers, M., & van der Meer, T. G. (2020). Misinformation and polarization in a high-choice media environment: How effective are political fact-checkers? Communication Research, 47(2), 227-250.
Laudon, K. C., & Traver, C. G. (2019). E-commerce: business, technology, society.
Morris, D. S., Morris, J. S., & Francia, P. L. (2020). A fake news inoculation? Fact checkers, partisan identification, and the power of misinformation. Politics, Groups, and Identities, 1-20.
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Case Study: Cyberwar: MAD 2.0
The case method is an excellent learning tool as well as an important assessment instrument. It helps develop your ability to synthesize textbook material and various situational factors. With this case study, you will be meeting the following learning outcomes:
- Discuss the scope of e-commerce crime and security problems.
- Identify major e-commerce security threats and methods of protection.
- Describe electronic billing and payment systems, and the major e-commerce systems currently in use.
Assignment:
- Read the case study “Cyberwar: MAD 2.0” on pages 255-257 of Chapter 5 of the textbook.
Write a paper discussing the following:
- Discuss the ways in which the Russian government allegedly utilized Facebook to influence the 2016 U.S. presidential election.
- Discuss social networks in general and their vulnerabilities as tools for social manipulation.
- Discuss five ways in which users can inoculate themselves against fake news.
- Consider the ability of web developers to utilize SEO to manipulate search results. Discuss the likelihood that Facebook (or any organization) will be able to create an algorithm to effectively screen out fake accounts and fake news.
Organize your paper in the following sections:
- Background – Summarize the case study.
- Issues – Address the assignment questions.
- Summary – Summarize the relevant conclusions and findings.
- Resources – List the case study and at least two other sources researched for this paper. Ensure that the resources are also properly cited in the body of the work.
Your work should be submitted in a Word document, 2-3 pages in length (not including cover sheet), typed in double-space, in 10- or 12-point Arial or Times New Roman font. The page margins on the top, bottom, left side, and right side should be 1 inch each. Use the APA guidelines for writing and citations. Resources listed in the Resources section without an accompanying citation in the body of the work will not be accepted.
Textbook
- E-commerce 2018, 14th edition Kenneth C. Laudon Carol Guercio Traver Published by Pearson (January 16th 2018) – Copyright © 2019