Education against Disinformation Antoliš, Krunoslav
Interdisciplinary Description of Complex Systems,
02/2024, Letnik:
22, Številka:
1
Paper, Journal Article
Recenzirano
Odprti dostop
In the contemporary world, disinformation has serious consequences, including undermining democracy, the economy and public health. They influence electoral processes, undermine trust in companies, ...encourage divisions and divert attention from key issues. Social networks play a key role in spreading disinformation and lack of transparency. Prevention of disinformation requires the cooperation of different sectors and the application of effective detection, removal and education strategies. Artificial intelligence is playing an increasingly important role in spreading and combating disinformation.
Psychological factors such as confirmation bias, cognitive dissonance, and social influence contribute to the spread of disinformation. Education, media literacy and critical thinking are key to overcoming these factors. Software tools such as InVID & WeVerify, Google Fact-Check Explorer and others help debunk disinformation by verifying sources and analysing content.
Exploratory research conducted at the University of Applied Sciences in Criminal Investigation and Public Security in Zagreb studied attitudes and behaviours related to disinformation. Participants recognized the importance of checking sources and content analysis, but fewer of them felt that they were sufficiently informed about ways to recognize disinformation. Critical thinking and media literacy play a key role in understanding and combating disinformation.
Svjedoci smo velikih tehnoloških promjena u današnjem modernom svijetu. Sve te tehnološke promjene i nove IoT (engl. Internet of Things) tehnologije, kojoj je hrvatski pandan IS (internet stvari) ...olakšavaju svakodnevni život, ali donose i mnoge ranjivosti, rizike i prijetnje. Svaka ranjiva situacija u pametnom gradu može dovesti do ozbiljnih ugroza za cijeli grad te prouzročiti goleme posljedice. Oslonac na nove IKT (informacijsko-komunikacijske tehnologije) sustave u pametnom gradu donosi i brojne digitalne tragove, koji izuzeti na zakonit način od zakonom ovlaštene osobe mogu znatno pridonijeti u istraživanju sigurnosnih ugroza i sankcioniranju počinitelja kaznenih djela i prekršaja. No da bi cjelokupni IKT potporni sustav bio izvor digitalnih dokaza, sveukupna rješenja moraju biti zakonom utemeljena i usklađena s europskim i nacionalnim normama. Kompilacije, ali i komparativne metode primijenjene u radu imaju za cilj uočavanje najboljih praksi, međunarodnih, ali i domaćih pristupa integriranja IKT-a u koncept pametnih gradova, primjerice u Zadru. U radu će se primijeniti metode znanstvenog istraživanja deskripcije konkretnih primjera pametnih gradova i njihovih rješenja u pojedinim ključnim segmentima za njihovo funkcioniranje i optimiziranje resursa. Metode analize i sinteze u definicijskom poimanju pametnih gradova, na korištenim izvorima, tj. tekstovima iz domaće i strane literature, imale su za cilj predstaviti razne pristupe, ali i nove paradigme važne za daljnji razvoj koncepta pametnih gradova.
Razotkrivanje dezinformacija izuzetno je važan proces koji se odnosi na otkrivanje, analizu i pružanje ispravnih informacija, kako bi se ispravile i osporile lažne ili obmanjujuće tvrdnje. Prilikom ...razotkrivanja dezinformacija važno je provjeriti izvor informacije i potražiti druge nezavisne izvore potvrde ili osporavanja tvrdnje. Analizom sadržaja potrebno je identificirati nedosljednosti, nelogičnosti i manipulativne tehnike. Provjera faktografskih podataka i provjera konteksta, uz potrebitu razinu skeptičnosti prema primljenim informacijama, imaju za cilj dijeljenje samo provjerenih informacija s drugima. Razotkrivanje dezinformacija zahtijeva vrijeme, istraživanje i kritično razmišljanje te poznavanje softverskih alata koji pri tome mogu pomoći. Važno je biti educirani potrošač informacija i razviti nastavne programe za prepoznavanje lažnih ili obmanjujućih tvrdnji, kako bi se na odgovoran i meritoran način mogli baviti policijskim poslom. Spomenuto je uključeno u istraživanje koje je imalo za cilj ispitati stavove, vjerovanja i navike ponašanja vezane za dezinformacije na internetu kod studenata Veleučilišta kriminalistike i javne sigurnosti te ispitati potencijalne prediktore tih ponašanja. U istraživanju u kojem je sudjelovalo 278 sudionika korištena su dva novokreirana upitnika, od kojih svaki sadrži 4 subskale (Upitnik stavova i vjerovanja o dezinformacijama – utjecaj dezinformacija, svrha dezinformacija, raspoznavanje dezinformacija te učestalost dezinformacija; Upitnik ponašanja na internetu – zaštita od dezinformacija, zaštita sigurnosti, negativna iskustva na internetu, korištenje društvenih mreža i internetskih portala). U radu su prezentirani preliminarni deskriptivni podaci prikupljeni istraživanjem, kao i podaci regresijske analize koji su rezultirali dvama značajnim prediktorima – pojedinci koji vjerojatnije koriste metode za zaštitu vlastite privatnosti i sigurnosti na internetu te pojedinci koji smatraju da su bolje informirani o opasnostima i načinima raspoznavanja dezinformacija češće koriste metode za provjeru istinitosti informacija. S obzirom na rezultate istraživanja, u rada su predloženi ishodi učenja za kreiranje kolegija koji bi u fokusu imao razotkrivanje dezinformacija.
Debunking disinformation is an extremely important process that involves detecting, analyzing and providing correct information in order to correct and challenge false or misleading claims. When exposing disinformation, it is important to check the source of the information, and look for other independent sources to confirm or dispute the claim. It is necessary to identify the inconsistencies and illogicalities of this manipulative technique through content analysis. Fact checking and context checking with the necessary level of skepticism towards received information aims to share only verified information with others. Debunking disinformation requires time, research and critical thinking, as well as knowledge of software tools that can help you with this. It is important to be an educated consumer of information and to develop training programs for identifying false or misleading claims, so that one can engage in police work in a responsible and meritorious manner. The aforemen tioned was included in the research that aimed to examine attitudes, beliefs, and behavioral habits related to online disinformation among students of the College of Criminalistics and Public Security, as well as investigating potential predictors of these behaviors. The study involved 278 participants and utilized two newly cre ated questionnaires, each comprising 4 subscales: (1) Disinformation Attitudes and Beliefs Questionnaire - impact of disinformation, purpose of disinformation, recognition of disinformation, and frequency of encountering disinformation; (2) Internet Behavior Questionnaire - protection against disinformation, security me asures, negative online experiences, use of social media and online portals. The paper presents preliminary descriptive data gathered from the research, along with regression analysis results that yielded two significant predictors: individuals who are more likely to employ methods to safeguard their online privacy and security, and individuals who consider themselves better informed about dangers and ways to recognize disinformation, are more prone to use methods for fact-checking infor mation. Based on the research findings, the paper suggests learning outcomes for designing a course focused on debunking disinformation.
Smuggling in South Eastern Europe Antoliš, Krunoslav
Connections. The quarterly journal,
04/2007, Letnik:
6, Številka:
1
Journal Article
Recenzirano
Odprti dostop
The smuggling of migrants, narcotics, and weapons are currently some of the most important issues in the sphere of international crime. At the same time, they are essential to the issue of fighting ...terrorism. By analyzing the overall situation and the factors that encourage global terrorism, this paper argues that, apart from the risk posed by so-called rogue states, unstable states should also be a focus in efforts to combat terrorism. The termunstable statesis used here to refer to states facing many unsettled internal issues, and which are likely to become a bridge or an interface for terrorists in their worldwide operations. Typical issues in unstable states (also known as “transitional states”) include high rates of organized crime, corruption, human trafficking, and trade in drugs and weapons; at the same time, such states are characterized by inefficient legal and governance structures, and weak central state power in general. According to this definition, a few countries in South Eastern Europe could be regarded as unstable states.
A systematic effort to discover the routes used by smugglers of all kinds is needed if states are to concentrate their limited resources on solving these problems. Yet, it will only be possible to make forward progress in this respect by coordinating the efforts of executive, legislative, and judicial authorities in these countries, with the support of non-governmental organizations (NGOs) and security experts of multinational corporations that currently deal with the transportation of people and goods.¹ Professional support for this effort will require the implementation of the most recent scientific achievements and technologically advanced methods in uncovering smugglers and their cargos.² Thea main goal of cooperative anti-trafficking and security efforts is the early detection and monitoring of all participants in a smuggling network. This achievement will create the conditions to deal with the network and its key strong-holds—both physically and virtually—and to eliminate its vital infrastructure.
Modern information and communication technology, apart from their numerous advantages, bring with themselves new forms of threats and dangers to which any of their users are exposed. One of the most ...serious is the identity theft, through ICT which is the matter of concern not only for the victims but also for the experts in IT and legislation. This paper analyses the technological and legal aspect of an identity theft. Concerning technological aspect, the paper recognizes the manners of an identity theft through ICT and the methods and techniques which ICT users can apply as their protection. With regard to legal aspect, the paper examines the possibilities for protection within the existing legal framework and points out the possibility of its advancement by analyzing the experience obtained worldwide. All mentioned in the paper is aimed at protecting of the ICT users and also at creating preconditions for criminal proceedings of an identity thieves.
U suvremenom svijetu upotreba informacijsko-komunikacijskih tehnologija (IKT) postala je dio života. IKT infrastruktura nositelj je digitalnih tragova: legalnih i ilegalnih aktivnosti koje se putem ...nje obavljaju. No da bi nešto postalo digitalni dokaz, zakonom ovlaštena osoba to mora i zakonski pribaviti. Naime, virtualna infrastruktura, posebice internet i novi izazovi koje nam donosi arhitektura oblaka zbog česte fizičke pozicioniranosti izvan državnih granica, dovodi u pitanje zakonitost pretraživanja i prikupljanja digitalnih dokaza izvan državnih granica. Ovaj rad analizira pravnu osnovu za prikupljanje digitalnih dokaza u kibernetičkom prostoru na međunarodnoj razini, kao što su: Konvencija Vijeća Europe o kibernetičkom kriminalu, američki Cloud Act, australski Zakon o dešifriranju i europski GDPR. Iako je Sud Europske unije proglasio nevažećom odluku Europske komisije (EU) 2016/1250 o primjerenosti zaštite podataka kroz EU-US Privacy Shield, stručnjaci ne smiju prestati tražiti rješenje tog evidentnog problema. Rad ima namjeru podržati donositelje odluka u zauzimanju jasnih nacionalnih stavova o navedenim kontroverznim pravnim normama i njihovu međusobnom sukobu. U radu se uspoređuju pravne posljedice takvog prikupljanja i prihvatljivost takvog digitalnog dokaza, a takvo prikupljanje može biti povezano i s povredom privatnosti pravne i fizičke osobe.
Nove informacijsko komunikacijske tehnologije pored niza prednosti donose i nove oblike ugroza i prijetnji kojima smo izloženi prilikom njihove uporabe. Jedna od najvećih, koja pored žrtava uvelike ...brine informacijske ali i pravne stručnjake je krađa identiteta putem ICT. U radu se rašćlanjuje tehnologijski i pravni aspet krađe identiteta. U tehnologijskom smislu važno u radu se prepoznaju načini krađe identiteta putem ICT te metode i tehnike putem kojih se možemo kao korisnici ICT zaštititi. U pravnom pogledu u radu se sagledava mogućnosti zaštite koje nam nudi postojeći zakonski okvir, a potom se raščlambom svjetskih iskustava ukazuje na mogućnosti njegova unapređenja. Sve radom spomenuto u funkcije zaštite ICT korisnika, ali i stvaranja preuvijeta za kazneni progon kradljivaca identiteta.
Patients' Perception of Data Security in Healthcare Antolis, Krunoslav; Jaksetic, Dubravka
2023 IEEE International Mediterranean Conference on Communications and Networking (MeditCom),
2023-Sept.-4
Conference Proceeding
To improve diagnosis, treatment, rehabilitation, and other medical care, a doctor needs to have access to a variety of personal and health data. This indicates a connection between the patient and ...the entire medical staff, including the nurses and other healthcare workers. A survey that was conducted in the general medicine settings of the Gospić Health Center serves as the study's basis. Patients place a lot of trust in electronic papers, such as e-prescriptions, e-medicines, and other electronic documents. Patients are less likely to believe verbally delivered information than information that is distributed electronically. This evidence suggests that some patients have some scepticism about the idea that data made, distributed, and saved verbally may not be as secure as data created, distributed, and stored electronically. Patients' opinions of their safety are virtually identical when it comes to the health information that is available to doctors, nurses, and other healthcare professionals and, on the other hand, information that patients provide to doctors, nurses, and other healthcare professionals. Only half of the patients believe their data is secure within the healthcare system, according to the patients' impression of that security. Security ought to be a top concern given that data from several writers point to potential abuses.