• 5 Sections
  • 49 Lessons
  • 25 Hours
Expand all sectionsCollapse all sections
  • 1. The information environment from a security perspective: trends, threats, vulnerabilities, and future challenges
    10
    • 1.1
      Conflict and its manifestation in the information environment
    • 1.2
      Hybrid warfare/threats
    • 1.3
      Cognitive and information warfare
    • 1.4
      Disinformation, Fake news, Debunking and pre-bunking
    • 1.5
      Foreign information manipulation and interference (FIMI)
    • 1.6
      Cyber information operations
    • 1.7
      Understanding conspiracy theories
    • 1.8
      Case studies of hostile narratives and conspiracy theories by authoritarian state and non-state actors
    • 1.9
      Understanding hostile narratives
    • 1.10
      Exam
  • 2. Understanding the current challenge of disinformation and information manipulation: macroenvironmental and individual aggravating factors
    11
    • 2.1
      Fact v/s Opinion: Objectivity in the Digital Era
    • 2.2
      Mechanisms used in exploiting vulnerabilities and errors of judgement of fake news audiences
    • 2.3
      Exploitation of errors of judgment and the vulnerability of groups. The Case of Climate Change
    • 2.4
      Democracy and trust
    • 2.5
      Types of trust
    • 2.6
      Subverting trust. Contesting facts, distrusting authority, social polarization
    • 2.7
      Rebuilding trust. How can epistemic and institutional trust be rebuilt?
    • 2.8
      Social media
    • 2.9
      Artificial intelligences and synthetic content
    • 2.10
      Strategies to combat hostile influence
    • 2.11
      Exam
  • 3. Mitigating the threat and building resilience to disinformation
    9
    • 3.1
      Transnational responses to disinformation/FIMI
    • 3.2
      Regulatory responses to disinformation/FIMI
    • 3.3
      Resilience Building
    • 3.4
      Critical Thinking
    • 3.5
      Media and digital literacies
    • 3.6
      Fact-checking and de-bunking
    • 3.7
      How to overcome the weaknesses of de-bunking
    • 3.8
      Pre -bunking – the pro-active approach to combating disinformation
    • 3.9
      Exam
  • 4. Advanced analytic and responding toolkit
    9
    • 4.1
      Strategic analysis of disinformation and information-led hostile influencing
    • 4.2
      Current analysis of disinformation and information-led hostile influencing
    • 4.3
      Combating the effects of disinformation in the online environment
    • 4.4
      Tech-driven solutions and emerging technologies to counter disinformation
    • 4.5
      Limits of Technological Tools, Best Practices
    • 4.6
      Counter-narratives and positive content
    • 4.7
      Planning and design of counter-narratives and positive content
    • 4.8
      Implementation of counter-narratives and positive content
    • 4.9
      Exam
  • 5. Simulation exercises, serious and wargaming to combat disinformation
    10
    • 5.1
      Debunk simulation 1. Know your character and your first mission
    • 5.2
      Debunk simulation 2. Steps to perform the debunk & debunk models
    • 5.3
      Debunk simulation 3. Do your task: make the debunk
    • 5.4
      Deepfakes against deepfakes. Know your second mission
    • 5.5
      Deepfakes against deepfakes. Review your knowledge about deepfakes
    • 5.6
      Deepfakes against deepfakes. Create the deepfake video
    • 5.7
      Disinformation Game. The last mile
    • 5.8
      Disinformation Game. Know your final mission
    • 5.9
      Disinformation Game. Make the right choices to fight misinformation
    • 5.10
      Exam

Digital Resilience Against Disinformation (DOMINOES)

This content is protected, please login and enroll in the course to view this content!
Prev Previous Planning and design of counter-narratives and positive content
Next Exam Next
InicioCursos
Buscar

Buscar