dc.contributor.author | Sartonen, Miika | |
dc.contributor.author | Huhtinen, Aki-Mauri | |
dc.contributor.author | Lehto, Martti | |
dc.contributor.editor | Abouzakhar, Nasser | |
dc.date.accessioned | 2015-07-24T11:29:30Z | |
dc.date.available | 2015-07-24T11:29:30Z | |
dc.date.issued | 2015 | |
dc.identifier.citation | Sartonen, M., Huhtinen, A.-M., & Lehto, M. (2015). From influencee to influencer : the rhizomatic target audience of the cyber domain. In N. Abouzakhar (Ed.), <i>ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015</i> (pp. 249-256). Academic Conferences and Publishing International Limited. Proceedings of the European conference on cyber warfare and security. <a href="http://tinyurl.com/ECCWS2015" target="_blank">http://tinyurl.com/ECCWS2015</a> | |
dc.identifier.other | CONVID_24783484 | |
dc.identifier.other | TUTKAID_66551 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/46541 | |
dc.description.abstract | The messages of an influence operation are interpreted in a variety of ways by their receivers. To
increase the probability of success, these messages are typically tailored to affect a defined group, a
target audience. Target audience analysis (TAA) is a process of finding suitable target audiences for
influence operations. There are multiple ways of completing the task, ranging from fast and intuitive to
complex multi-staged processes. These processes use the information available at the moment of
making presumptions about the effectiveness of competing approaches in order to choose those with
best end results.
The internet presents a challenge to this type of sequential, linear process by resisting to stop
changing while the process is being executed or to conform to direct causalities. The internet is more
like a rhizome, as presented by Deleuze and Guattari in the Thousand Plateaus. Within the context of
rhizome, we also suggest defining the target audience (TA) – not as a pre-defined, but as a timesensitive
group, temporarily advantageous to the intended influence effort. This temporal advantage
may be due to different causes, such as the topic being promoted by a popular media figure (a
blogger for instance) or real-life incidents capable of shifting opinions towards the intended end of
opinion charts.
Instead of carrying out a linear, effectively one-time process of TAA we argue that it is possible to use
the powers granted by the digital domain to constantly be on the lookout for, not perhaps the rhizome
itself, but the ‘fruiting bodies’ it produces. Whenever the rhizome produces a favourable TA, it can be
found by software, analysed and either catalysed into growing or suffocated with a spiral of silence. | fi |
dc.format.extent | 450 | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences and Publishing International Limited | |
dc.relation.ispartof | ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015 | |
dc.relation.ispartofseries | Proceedings of the European conference on cyber warfare and security | |
dc.relation.uri | http://academic-conferences.org/eccws/eccws2015/eccws15-proceedings.htm | |
dc.rights | In Copyright | |
dc.subject.other | cyber domain | |
dc.subject.other | psychological operations | |
dc.subject.other | target audience | |
dc.title | From influencee to influencer : the rhizomatic target audience of the cyber domain | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-201507092561 | |
dc.contributor.laitos | Tietotekniikan laitos | fi |
dc.contributor.laitos | Department of Mathematical Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.date.updated | 2015-07-09T09:15:02Z | |
dc.relation.isbn | 978-1-910810-28-6 | |
dc.type.coar | conference paper | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 249-256 | |
dc.relation.issn | 2048-8602 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2015 the Authors & Academic Conferences and Publishing International Limited. | |
dc.rights.accesslevel | openAccess | |
dc.relation.conference | European conference on information warfare and security | |
dc.subject.yso | maavarsi | |
dc.subject.yso | sosiaalinen media | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25546 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p20774 | |
dc.rights.url | https://rightsstatements.org/page/InC/1.0/ | |