Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Fake News Can Influence Business

How Fake News Can Influence Business

Information is one of the most valuable assets available to businesses, but to be fair, there’s an awful lot of falsified information found on the Internet. Due to the increased focus on data acquisition and dissemination, false information is more harmful and easy to manipulate than ever before. The thing about this is that “fake news” is actually reliant on technology to work.

Your Relationship with Fake News
Research suggests that cyber propaganda generally requires three factors in order to be successful. The first includes the tools and services used to create the propaganda. The second is a platform to share it, such as social media. The third is a motivation behind the campaign itself--also known as why it’s being implemented itself. Without any of these three, spreading false information becomes difficult at best.

The problem here is that all of these have become plentiful in the past few years, allowing fake news campaigns to take off.

The Dark Web is close to the ideal solution for those hoping to spread vitriol, hate, and propaganda across the web. Social media allows stories with little-to-no substance to spread like wildfire due to some people’s goal to share and spread information regardless of the truth. Fake news itself has been used as a political tool, but it can be used to influence stocks, public opinion, and other variables.

China Has a Fake News Marketplace
Fake news can be found easily enough in marketplaces. The one we’ll discuss is Xiezuobang, a content distribution service in China. This service charges a user based on where the article has been published, which makes it very easy to abuse. If the user is taking advantage of systems that allow public opinions to be measured and modified, posts can be shared out on 3000 websites as frequently as 100 posts a minute.

These tactics can be used to flood Chinese social networks with posts from influential users who have dumped their own funds into promoting their content. The user’s popularity will eventually determine the price of the of the content sharing service.

The Global Issue
These practices are not limited to just China. In fact, researchers have collected information from various disinformation campaigns in the United States, Russia, and Middle Eastern countries, all of which help them identify trends in how these tools are used and what types of campaigns have been formed.

Regardless of where you’re located, you need to be on the lookout for cyber propaganda and fake news, be it politically motivated or for business-manipulation. After all, fake news can only stand to benefit those who spread it.

What is your opinion on this disturbing and emerging trend? Let us know in the comments.

Tip of the Week: The Basics of Data Backup
A DDoS Attack Hits Your Productivity and Profits


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Privacy Best Practices Business Computing Hackers Network Security Cybersecurity IT Support Malware Backup Technology Email Small Business Managed IT Services User Tips Ransomware Google Software Android Business Management Efficiency Cloud Productivity Data Smartphone IT Management Windows 10 Internet Phishing Communications Update Artificial Intelligence Hardware Antivirus Innovation Mobile Device Management Cybercrime Gadgets Business Outsourced IT Data Recovery Data Security Cost Management Hard Drive Internet of Things Data Management Bitcoin Facebook Disaster Recovery Maintenance Saving Money Remote Monitoring Social Engineering App Blockchain Microsoft Office Data Protection BDR Alert Data Backup Gmail Business Technology Word Vulnerabilities Digital IT Services Apps Collaboration Patch Management Scam Holiday Websites Laptop SaaS Network Money Computer Search Business Continuity Hacking Touchscreen Save Money Project Management Access Control Office 365 Microsoft Start Menu Law Enforcement Passwords Browser Windows VPN Encryption Server Mobility Operating System Mouse Administration Consultant Two-factor Authentication Managed IT Services DDoS Time Management Corporate Profile Uninterrupted Power Supply eWaste Information Technology Managed IT Worker Multi-factor Authentication Password Computer Care Robot Google Calendar Mobile Technology Cloud Computing Device security Samsung Excel Spam Unified Threat Management History Unified Threat Management Document Management Augmented Reality Automation Outlook SharePoint Website Disaster Tip of the week Vendor Mangement IBM Computing Infrastructure Hosted Solutions Google Docs Virtual Reality Automobile Distributed Denial of Service Access Tech Term Business Mangement Best Practice Unified Communications Networking Employer-Employee Relationship Budget Company Culture Redundancy Freedom of Information Spyware HTML Knowledge Cortana Software as a Service Tablet Unsupported Software Printing Business Cards Smartphones Identity Theft News Analytics Tech Terms Virtual Assistant Social Media How to Government Comparison Desktop Fake News Mobile Device Google Drive Legal Downtime Virus Upgrades Data Breach Managed Service Provider Big Data Telephony Google Maps Hard Drive Disposal Downloads Piracy Specifications YouTube Running Cable Applications Emergency Microsoft Excel VoIP Solid State Drive WiFi email scam VoIp Software License Television Settings Telephone Systems Cabling Mobile Security IT Support Vulnerability Cryptocurrency Wireless Audit Mobile Devices CrashOverride Office Users Office Tips Data loss Devices Compliance Windows 10 Regulations Marketing

Latest Blog

If you’ve ever felt as though someone was watching what you were doing while you were working remotely, either at home or in public, there’s a chance that you were right. Without a private Internet connection, it is a simple matter for others to watch your processes and stea...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.