2021
DOI: 10.3390/s21165496
|View full text |Cite
|
Sign up to set email alerts
|

Misinformation vs. Situational Awareness: The Art of Deception and the Need for Cross-Domain Detection

Abstract: The world has been afflicted by the rise of misinformation. The sheer volume of news produced daily necessitates the development of automated methods for separating fact from fiction. To tackle this issue, the computer science community has produced a plethora of approaches, documented in a number of surveys. However, these surveys primarily rely on one-dimensional solutions, i.e., deception detection approaches that focus on a specific aspect of misinformation, such as a particular topic, language, or source.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…Previously, operational technology networks within the oil industry were confined off the internet as opposed to today's desire for efficiency and real-time decision making which remove that freedom, A cyber-attack on an operational technology environment can result in serious consequences, such as protracted service disruptions caused by a Denial-of-Service (DoS) attack, damages to the hole system, cyber-attack can be either be active attacks or passive attacks based on the intentions and motive of the attackers. cyber threats aimed at compromising the cyber security that a company has put in place to against launch a cyber-attack [5], shows in Figure (1). Blockchain technology is the most important technology used at present to provide a high level of protection and security for various types of digital data.…”
Section: Downstreammentioning
confidence: 99%
See 1 more Smart Citation
“…Previously, operational technology networks within the oil industry were confined off the internet as opposed to today's desire for efficiency and real-time decision making which remove that freedom, A cyber-attack on an operational technology environment can result in serious consequences, such as protracted service disruptions caused by a Denial-of-Service (DoS) attack, damages to the hole system, cyber-attack can be either be active attacks or passive attacks based on the intentions and motive of the attackers. cyber threats aimed at compromising the cyber security that a company has put in place to against launch a cyber-attack [5], shows in Figure (1). Blockchain technology is the most important technology used at present to provide a high level of protection and security for various types of digital data.…”
Section: Downstreammentioning
confidence: 99%
“…In the beginning, must know who the cyber attacker is and where these attacks come from? and the most famous types of attacks, and then define the necessary defensive plans to protect from these attacks, apply cyber security, and answer all these questions through the attack maps provided by Internet service providers, and perhaps the most famous of these maps it [5] [10]:…”
Section: Literature Reviewmentioning
confidence: 99%
“…While there is an entire stream of research investigating how algorithms can be used to identify (and potentially remove) false information across many different online platforms [22], a separate and important stream of research looks at how humans process and use that false information. Given that the artificial intelligence algorithms are not likely to completely remove false information from our online sources, this paper focuses on how humans process that information once it is encountered.…”
Section: Literature Review and Gap Analysismentioning
confidence: 99%
“…As an illustration, a research investigation on clinical named entity identification attained an F1-score of 0.91 on the 2018 National NLP Clinical Challenges (n2c2) shared task [27,50]. When applied to the field of biomedical research, the Biomedical Named Entity Recognition (BioNER) technique is an essential part of the process of biomedical text mining [44,[64][65][66]. The enormous task of recognising and categorising the numerous things that can be found in biomedical literature is taken on by BioNER.…”
Section: Introductionmentioning
confidence: 99%