Social Murder in Another Century: Technologies That Enable Misinformation to Instigate Assault
Abstract:
Social media is currently understood as a potential path to extremist beliefs, which sometimes lead to violent action. Current enabling technologies of Internet infrastructure, personalized advertisement targeting, and AI generated text and images allow for the previously expensive process of instigating extremism to be done via online services for exponentially less time and resources than previously possible. The historical context that ‘approves’ murder is explored with foci on modern engagements. This includes modern calls to violence. The specificity of the call to violence is explored. A hypothethical case study is presented as an example for a potential call to violence.
AUTHORS
BIOSView Labs
Oswego, Kansas, United States of America
Lucas N. Potter is a highly skilled biomedical engineer with expertise in designing, developing, and optimizing medical technologies through the integration of biology, medicine, and engineering principles. He completed his Ph.D. in Biomedical Engineering from Old Dominion University in 2023, after earning a B.S. in Biomedical Engineering from Virginia Commonwealth University in 2015.
BIOSView Labs
Oswego, Kansas, United States of America
Xavier-Lewis Palmer is an interdisciplinary researcher with a background largely concentrated in biomedical engineering, cybersecurity, and biotechnology. He holds five degrees, including a PhD in Biomedical Engineering from Old Dominion University (ODU). His body of work explores intersections of biology and technology, in addition to biocybersecurity/cyberbiosecurity, where biology, cybersecurity, and cyber-physical systems overlap. He collaborates on initiatives within this field, mentoring others and encouraging community engagement in understanding, critiquing, and using new technologies.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive