Gorwa, 2017 - Google Patents
Computational propaganda in Poland: False amplifiers and the digital public sphereGorwa, 2017
View PDF- Document ID
- 4761765152841663874
- Author
- Gorwa R
- Publication year
- Publication venue
- Omputational Propaganda Research Project
External Links
Snippet
This report provides the first overview of political bots, fake accounts, and other false amplifiers in Poland. Based on extensive interviews with political campaign managers, journalists, activists, employees of social media marketing firms, and civil society groups, the …
- 230000000694 effects 0 abstract description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/32—Messaging within social networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gorwa | Computational propaganda in Poland: False amplifiers and the digital public sphere | |
| Tucker et al. | Social media, political polarization, and political disinformation: A review of the scientific literature (March 19, 2018) | |
| Tucker et al. | Social media, political polarization, and political disinformation: A review of the scientific literature | |
| Margetts | Rethinking democracy with social media | |
| Margolin | Tackling misinformation: What researchers could do with social media data | |
| Vasu et al. | FAKE NEWS: NATIONAL SECURITY IN THE POST-TRUTH ERA. | |
| Diamond et al. | Liberation technology: Social media and the struggle for democracy | |
| Bernstein et al. | 4chan and/b: An Analysis of Anonymity and Ephemerality in a Large Online Community | |
| Deibert et al. | Access contested: Security, identity, and resistance in Asian cyberspace | |
| Elmas et al. | Ephemeral astroturfing attacks: The case of fake twitter trends | |
| Westcott | Digital diplomacy: The impact of the internet on international relations | |
| Demirhan | Social media effects on the Gezi Park movement in Turkey: Politics under hashtags | |
| Hoser et al. | Questions on ethics for research in the virtually connected world | |
| Cai et al. | Hate raids on twitch: Understanding real-time human-bot coordinated attacks in live streaming communities | |
| Filer et al. | Sparking debate? Political deaths and Twitter discourses in Argentina and Russia | |
| Gorwa | Unpacking the Ecosystem of Social Media Manipulation | |
| Nicol et al. | Revealing cumulative risks in online personal information: a data narrative study | |
| Liaropoulos | The challenge of social media for the intelligence community | |
| Mahajan et al. | Community connect: A mock social media platform to study online behavior | |
| Druzin et al. | Censorship's fragile grip on the Internet: Can online speech be controlled | |
| Di Pietro et al. | Information disorder | |
| Small | What the Hashtag?: A Content Analysis of Canadian Politics on Twitter | |
| Farmer | Cybercrime vs Hacktivism: Do we need a differentiated regulatory approach? | |
| Kasmani et al. | Who is tweeting on# PRU13? | |
| Biscop et al. | Anonymity technologies in investigative journalism: a tool for inspiring trust in sources |