Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Sartonen, Miika"'
Publikováno v:
In Emerging Cyber Threats and Cognitive Vulnerabilities 2020:175-196
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2019, p459-465, 7p
Autor:
Sartonen, Miika, Huhtinen, Aki-Mauri
Publikováno v:
Tiede ja ase
The internet has brought us many benefits that have helped it grow global and touch in some way almost every citizen on this planet. Today, shopping online or visiting a virtual bank no longer is something extraordinary, reserved only for the digital
Target Audience Analysis (TAA) is a process of finding suitable target audiences for psychological operations (PSYOPS). Typically, a TAA is a one-way process with some kind of a feedback system. The cyber domain presents a challenge to this type of s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::1822ca4b77caa620e95d938413dd7a51
http://urn.fi/URN:NBN:fi:jyu-202208194261
http://urn.fi/URN:NBN:fi:jyu-202208194261
The messages of an influence operation are interpreted in a variety of ways by their receivers. To increase the probability of success, these messages are typically tailored to affect a defined group, a target audience. Target audience analysis (TAA)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::b022e97838e8d87c5416233aeccd5f17
http://urn.fi/URN:NBN:fi:jyu-201507092561
http://urn.fi/URN:NBN:fi:jyu-201507092561
Publikováno v:
International Journal of Cyber Warfare and Terrorism (IJCWT); January 2020, Vol. 10 Issue: 1 p34-49, 16p
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2017, p734-740, 7p, 1 Chart
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2017, p411-418, 8p, 2 Diagrams
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2016, p237-244, 8p, 1 Chart, 2 Maps
Autor:
Apeh, Edward, Baazeem, Rami, Bada, Maria, Benson, Vladlena, Betts, Lucy R., Idris, Bochra, Janeliūnas, Tomas, Jeffries, Stephen, Kukkola, Juha, Lovén, Lauri, Macaulay, Peter J.R., Mohammed, Anne-Marie, Nurse, Jason R.C., Qaffas, Alaa, Ristolainen, Mari, Saridakis, George, Sartonen, Miika, Simola, Jussi, Simola, Petteri, Steer, Oonagh L., Timonen, Jussi, Tumkevič, Agnija, Veerasamy, Namosha
Publikováno v:
In Emerging Cyber Threats and Cognitive Vulnerabilities 2020:ix-x