• 5 Sections
  • 49 Lessons
  • 25 Hours
Expand all sectionsCollapse all sections
  • 1. The information environment from a security perspective: trends, threats, vulnerabilities, and future challenges
    10
    • 1.1
      Conflict and its manifestation in the information environment
    • 1.2
      Hybrid warfare/threats
    • 1.3
      Cognitive and information warfare
    • 1.4
      Disinformation, Fake news, Debunking and pre-bunking
    • 1.5
      Foreign information manipulation and interference (FIMI)
    • 1.6
      Cyber information operations
    • 1.7
      Understanding conspiracy theories
    • 1.8
      Case studies of hostile narratives and conspiracy theories by authoritarian state and non-state actors
    • 1.9
      Understanding hostile narratives
    • 1.10
      Exam
  • 2. Understanding the current challenge of disinformation and information manipulation: macroenvironmental and individual aggravating factors
    11
    • 2.1
      Fact v/s Opinion: Objectivity in the Digital Era
    • 2.2
      Mechanisms used in exploiting vulnerabilities and errors of judgement of fake news audiences
    • 2.3
      Exploitation of errors of judgment and the vulnerability of groups. The Case of Climate Change
    • 2.4
      Democracy and trust
    • 2.5
      Types of trust
    • 2.6
      Subverting trust. Contesting facts, distrusting authority, social polarization
    • 2.7
      Rebuilding trust. How can epistemic and institutional trust be rebuilt?
    • 2.8
      Social media
    • 2.9
      Artificial intelligences and synthetic content
    • 2.10
      Strategies to combat hostile influence
    • 2.11
      Exam
  • 3. Mitigating the threat and building resilience to disinformation
    9
    • 3.1
      Transnational responses to disinformation/FIMI
    • 3.2
      Regulatory responses to disinformation/FIMI
    • 3.3
      Resilience Building
    • 3.4
      Critical Thinking
    • 3.5
      Media and digital literacies
    • 3.6
      Fact-checking and de-bunking
    • 3.7
      How to overcome the weaknesses of de-bunking
    • 3.8
      Pre -bunking – the pro-active approach to combating disinformation
    • 3.9
      Exam
  • 4. Advanced analytic and responding toolkit
    9
    • 4.1
      Strategic analysis of disinformation and information-led hostile influencing
    • 4.2
      Current analysis of disinformation and information-led hostile influencing
    • 4.3
      Combating the effects of disinformation in the online environment
    • 4.4
      Tech-driven solutions and emerging technologies to counter disinformation
    • 4.5
      Limits of Technological Tools, Best Practices
    • 4.6
      Counter-narratives and positive content
    • 4.7
      Planning and design of counter-narratives and positive content
    • 4.8
      Implementation of counter-narratives and positive content
    • 4.9
      Exam
  • 5. Simulation exercises, serious and wargaming to combat disinformation
    10
    • 5.1
      Debunk simulation 1. Know your character and your first mission
    • 5.2
      Debunk simulation 2. Steps to perform the debunk & debunk models
    • 5.3
      Debunk simulation 3. Do your task: make the debunk
    • 5.4
      Deepfakes against deepfakes. Know your second mission
    • 5.5
      Deepfakes against deepfakes. Review your knowledge about deepfakes
    • 5.6
      Deepfakes against deepfakes. Create the deepfake video
    • 5.7
      Disinformation Game. The last mile
    • 5.8
      Disinformation Game. Know your final mission
    • 5.9
      Disinformation Game. Make the right choices to fight misinformation
    • 5.10
      Exam

Digital Resilience Against Disinformation (DOMINOES)

This content is protected, please login and enroll in the course to view this content!
Prev Previous Exploitation of errors of judgment and the vulnerability of groups. The Case of Climate Change
Next Types of trust Next
InicioCursos
Buscar

Buscar