Näytä suppeat kuvailutiedot

dc.contributor.authorSartonen, Miika
dc.contributor.authorHuhtinen, Aki-Mauri
dc.contributor.authorLehto, Martti
dc.contributor.editorAbouzakhar, Nasser
dc.date.accessioned2015-07-24T11:29:30Z
dc.date.available2015-07-24T11:29:30Z
dc.date.issued2015
dc.identifier.citationSartonen, M., Huhtinen, A.-M., & Lehto, M. (2015). From influencee to influencer : the rhizomatic target audience of the cyber domain. In N. Abouzakhar (Ed.), <i>ECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015</i> (pp. 249-256). Academic Conferences and Publishing International Limited. Proceedings of the European conference on cyber warfare and security. <a href="http://tinyurl.com/ECCWS2015" target="_blank">http://tinyurl.com/ECCWS2015</a>
dc.identifier.otherCONVID_24783484
dc.identifier.otherTUTKAID_66551
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/46541
dc.description.abstractThe messages of an influence operation are interpreted in a variety of ways by their receivers. To increase the probability of success, these messages are typically tailored to affect a defined group, a target audience. Target audience analysis (TAA) is a process of finding suitable target audiences for influence operations. There are multiple ways of completing the task, ranging from fast and intuitive to complex multi-staged processes. These processes use the information available at the moment of making presumptions about the effectiveness of competing approaches in order to choose those with best end results. The internet presents a challenge to this type of sequential, linear process by resisting to stop changing while the process is being executed or to conform to direct causalities. The internet is more like a rhizome, as presented by Deleuze and Guattari in the Thousand Plateaus. Within the context of rhizome, we also suggest defining the target audience (TA) – not as a pre-defined, but as a timesensitive group, temporarily advantageous to the intended influence effort. This temporal advantage may be due to different causes, such as the topic being promoted by a popular media figure (a blogger for instance) or real-life incidents capable of shifting opinions towards the intended end of opinion charts. Instead of carrying out a linear, effectively one-time process of TAA we argue that it is possible to use the powers granted by the digital domain to constantly be on the lookout for, not perhaps the rhizome itself, but the ‘fruiting bodies’ it produces. Whenever the rhizome produces a favourable TA, it can be found by software, analysed and either catalysed into growing or suffocated with a spiral of silence.fi
dc.format.extent450
dc.language.isoeng
dc.publisherAcademic Conferences and Publishing International Limited
dc.relation.ispartofECCWS 2015 : Proceedings of the 14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015
dc.relation.ispartofseriesProceedings of the European conference on cyber warfare and security
dc.relation.urihttp://academic-conferences.org/eccws/eccws2015/eccws15-proceedings.htm
dc.rightsIn Copyright
dc.subject.othercyber domain
dc.subject.otherpsychological operations
dc.subject.othertarget audience
dc.titleFrom influencee to influencer : the rhizomatic target audience of the cyber domain
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-201507092561
dc.contributor.laitosTietotekniikan laitosfi
dc.contributor.laitosDepartment of Mathematical Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2015-07-09T09:15:02Z
dc.relation.isbn978-1-910810-28-6
dc.type.coarconference paper
dc.description.reviewstatuspeerReviewed
dc.format.pagerange249-256
dc.relation.issn2048-8602
dc.type.versionacceptedVersion
dc.rights.copyright© 2015 the Authors & Academic Conferences and Publishing International Limited.
dc.rights.accesslevelopenAccess
dc.relation.conferenceEuropean conference on information warfare and security
dc.subject.ysomaavarsi
dc.subject.ysososiaalinen media
jyx.subject.urihttp://www.yso.fi/onto/yso/p25546
jyx.subject.urihttp://www.yso.fi/onto/yso/p20774
dc.rights.urlhttps://rightsstatements.org/page/InC/1.0/


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright