- citati u SCIndeksu: 0
- citati u CrossRef-u:0
- citati u Google Scholaru:[
]
- posete u poslednjih 30 dana:22
- preuzimanja u poslednjih 30 dana:13
|
|
2022, vol. 2, br. 4, str. 217-233
|
Operacije uticaja na drušvenim mrežama kao hibridna pretnja
Operations of influence on social networks as a hybrid threat
Sažetak
Društvene mreže kao fenomen svakodnevno kreiraju svoj uticaj na realan život. Određene društvene pojave i procesi započeti na društvenim mrežama svoje posledice ispoljavaju na život izvan sajber prostora. Mnogi društveni pokreti svoje začetke su imali upravo na društvenim mrežama, mnoge inicijative i politički zahtevi prvo su inicirani na društvenim mrežama. O tome nam svedoče onlajn peticije, pozivi na proteste i demonstracije, ukazivanje na postojeće i "postojeće" društvene protivurečnosti. Ono čime se bavimo u ovom radu jeste koliko su određeni diskursi i mišljenja spontana na društvenim mrežama, a koliko su plod koordiniranih akcija koje imaju jasno zacrtane kratkoročne i dugoročne ciljeve. Da li iza takvih aktivnosti stoje pojedinici, interesne grupe i državne institucije. Za našu analizu je naročito važno kako izgledaju aktivnosti iza kojih stoje države. Kojim metodima se može na vreme otkriti takav izvor ugrožavanja kao pojava i proces. Šta nam je dostupno od tehnika kojima se može nedvosmisleno ustanoviti da iza određene aktivnosti stoji određene država. Posebnu važnost u ovom kontekstu ima tzv. "pripisivanje" odnosno iznošenje optužbi koje sa sobom nose političku odgovornost. Zbog svega navedenog u današnjem trenutku je veoma isplativo izvoditi ovakve operacije. Literatura prepoznaje takva dejstva kao "operacije uticaja". Međutim, kako bi se razumela ova bezbednosna pojava važno je baratati kompetentnim alatima koji nam omogućavaju da razumemo sam poligon na kome se odvija dejstvo - društvene mreže, ali i da razumemo širi kontekst zbog čega je određeno dejstvo manje ili više uspešno. U ovom radu sagledaćemo novu realnost ljudskog društva i zbog čega su danas operacije uticaja uspšenije, dinamičnije i ekonomičnije nego što su bile pre 50 godina. Rad nastoji da analizira hibridne pretnje, odnosno operacije uticaja, u jednom "uskom" domenu društvenih mreža. Mogućnosti izvođenja operacija uticaja su veoma izazovne. Ali nije svaka dezinformacija ili kampanja na društvenim mrežama ujedno operacija uticaja. Fokusiraćemo se na operacije uticaja kao informacione i psihološke operacije koje predstavljaju bezbednosnu pretnju za savremene države.
Abstract
Social networks as a phenomenon create their impact on real life every day. Certain social phenomena and processes started on social networks have their consequences on life outside cyberspace. Many social movements had their beginnings precisely on social networks, many initiatives and political demands were first initiated on social networks. This is evidenced by online petitions, calls for protests and demonstrations, pointing to existing and "existing" social contradictions. What we discuss in this paper is how certain discourses and opinions are spontaneous on social networks, and how much they are the result of coordinated actions that have clearly defined short-term and long-term goals. Are individuals, interest groups and state institutions behind such activities? What is particularly important for our analysis is what the activities with states behind them look like. What methods can be used in time to detect such a source of danger as an occurrence and a process. What techniques are available to us that can unequivocally establish that a certain state is behind a certain activity. In this context, the so-called "attribution", i.e. making accusations that carry political responsibility, is of special importance. Due to all of the above, it is very profitable to perform such operations at the present time. The literature recognizes such actions as "influence operations". However, in order to understand this security phenomenon, it is important to use competent tools that allow us to understand the very training ground where the action takes place - social networks, but also to understand the wider context that makes a certain action more or less successful. In this paper, we are going to look at the new reality of human society and why influence operations are more successful, dynamic and economical today than they were 50 years ago. The paper tries to analyze hybrid threats, i.e. influence operations, in a "narrow" domain of social networks. The possibilities of performing influence operations are very challenging. However, not every disinformation or social media campaign is an influence operation. We are going to focus on influence operations as informational and psychological operations that pose a security threat to modern states.
|
|
|
Reference
|
|
Aslam, S. (2018) Twitter by the numbers: Stats, demographics & fun facts. San Francisco, CA, USA: Omnicore
|
1
|
Bennett, W.L. (2004) Communicating global activism: Strengths and vulnerabilities of networked politics. u: van de Donk W., Loader B.D., Paul G., Rucht D. [ur.] Cyberprotest: New media, citizens and social movements, London: Routledge
|
1
|
Bennett, W., Livingston, S. (2018) The disinformation order: Disruptive communication and the decline of democratic institutions. European Journal of Communication, 33(2): 122-139
|
|
Bilgin, P., Eliş, B. (2008) Hard power, soft power: Toward a more realistic power analysis. Insight Turkey, 10(2): 5-20
|
|
Bimber, B.A., Flanagin, A.J., Stohl, C. (2005) Reconceptualizing collective action in the contemporary media environment. Communication Theory, 15(4): 365-388
|
|
Borgesius, F., Zuiderveen, J. (2016) Singling out people without knowing their names: Behavioural targeting, pseudonymous data, and the new Data Protection Regulation. Computer Law & Security Review
|
|
Borgesius, Z.F., Trilling, D., Moeller, J., Bodó, B., de Vreese, C.H., Helberger, N. (2005) Should we worry about filter bubbles?. Internet Policy Review Journal on Internet Regulation, Volume 5, Issue 1
|
|
Cheng, C.Y., Zhang, W.J., Zhang, Q. (2022) Authority-led conspiracy theories in China during the COVID-19 pandemic: Exploring the thematic features and rhetoric strategies. Convergence, 28(4), rr. 1172-1197
|
|
Cunningham, D., Everton, S.F., Schroeder, R. (2022) Social Media and the ISIS Narrative: White Paper. Monterey, CA: Defense Analysis Department, Naval Postgraduate School, http://hdl.handle.net/10945/53059 (pristupljeno 20.03.2022.)
|
1
|
Hoffman, F.G. (2006) Complex Irregular Warfare: The Next Revolution in Military Affairs. Orbis, 50(3): 395-411
|
|
Kagan, K. (2022) Military learning and the future of war. Institute for the Study of War
|
|
Kaplan, M. (2015) Social media, the digital revolution, and the business of media. International Journal on Media Management, 17(4): 197-199
|
|
Khan, T., Michalas, A., Akhunzada, A. (2021) Fake news outbreak 2021: Can we stop the viral spread?. Journal of Network and Computer Applications, 190: 103112-103112
|
|
Laurent, C., Cafiero, F., Bronner, G. (2021) Why are conspiracy theories more successful in some countries than in others: An exploratory study on Internet users from 22 Western and non-Western countries. Social Science Information: SAGE Publications
|
|
Miracola, S. (2018) Chinese Hybrid Warfare. https://www.ispionline.it/en/pubblicazione/chinese-hybrid-warfare-21853
|
|
Nye, J.S. (2000) Understanding international conflicts: An introduction to theory and history. New York: Longman
|
|
Nye, J.S. (2004) Soft power and American foreign policy. Annals of the American Academy of Political and Social Science, 119(2): 255-270
|
|
Nye, J.S. (2008) Public diplomacy and soft power. ANNALS of the American Academy of Political and Social Science, 616(1): 94-109
|
|
Singer, P.W., Brooking, E. (2018) Like War the Weaponization of social media. Boston, New York: Mariner Books
|
|
Stegnel, R. (2020) Information wars. New York: Grove Press
|
|
Ventre, D. (2016) Information Warfare. John Wiley & Sons, Inc
|
|
|
|