Trojan Horse 2019
DOI: 10.5040/9781350210226.00000003
|View full text |Cite
|
Sign up to set email alerts
|

Trojan Horse

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
0
0
Order By: Relevance
“…"Beware of Greeks bearing gifts" refers to the Trojan Horse delivered to the ancient city of Troy, out of which emerged soldiers who slaughtered the locals. The word "Trojan Horse" has also come to refer to a type of program that sneaks into a user's computer for nefarious purposes, such as stealing information or damaging the system (Trojan Horse, 2017). Parallels between ancient war tactics and modern propaganda tactics are remarkable, and, as Westneat (2017) argues, "The information war is real and we are losing it" (paragraph 25).…”
mentioning
confidence: 99%
“…"Beware of Greeks bearing gifts" refers to the Trojan Horse delivered to the ancient city of Troy, out of which emerged soldiers who slaughtered the locals. The word "Trojan Horse" has also come to refer to a type of program that sneaks into a user's computer for nefarious purposes, such as stealing information or damaging the system (Trojan Horse, 2017). Parallels between ancient war tactics and modern propaganda tactics are remarkable, and, as Westneat (2017) argues, "The information war is real and we are losing it" (paragraph 25).…”
mentioning
confidence: 99%