The Double Edge of the Information Sword

The Double Edge of the Information Sword

Aki-Mauri Huhtinen
Copyright: © 2019 |Pages: 17
ISBN13: 9781522583042|ISBN10: 1522583041|ISBN13 Softcover: 9781522593423|EISBN13: 9781522583059
DOI: 10.4018/978-1-5225-8304-2.ch011
Cite Chapter Cite Chapter

MLA

Huhtinen, Aki-Mauri. "The Double Edge of the Information Sword." Developments in Information Security and Cybernetic Wars, edited by Muhammad Sarfraz, IGI Global, 2019, pp. 267-283. https://doi.org/10.4018/978-1-5225-8304-2.ch011

APA

Huhtinen, A. (2019). The Double Edge of the Information Sword. In M. Sarfraz (Ed.), Developments in Information Security and Cybernetic Wars (pp. 267-283). IGI Global. https://doi.org/10.4018/978-1-5225-8304-2.ch011

Chicago

Huhtinen, Aki-Mauri. "The Double Edge of the Information Sword." In Developments in Information Security and Cybernetic Wars, edited by Muhammad Sarfraz, 267-283. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8304-2.ch011

Export Reference

Mendeley
Favorite

Abstract

After the collapse of the Soviet Union, the West became increasingly confident that globalization, supported by an information technology network, the internet, would increase openness, liberalism, and democracy – the core values of the “free world.” Western leaders knew then, just as they do now, a quarter of a century later, that the power of the internet would grow as the technology that controls its use develops. However, no development is wholly good, and the internet is no exception. It seems that the technology that has enabled us to create a “global village” where people are able to communicate in a way that is open and free, and that bypasses the encumbrances of class and ethnicity, has also brought with it a very dark underworld, an uncontrolled rhizome or meshwork, where propaganda, trolling, and hate speeches are rife. After the 2016 US elections, cyber warfare is no longer just about the technical details of computer ports and protocols. Propaganda as disinformation distributed via social media is rapidly becoming the best hacking tool.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.