Contrasting misinformation: tools and techniques for managing threats and risks

Contrasting misinformation: tools and techniques for managing threats and risks

This module explores the main threats posed by misinformation and techniques for verifying information, with a focus on OSINT (Open-Source Intelligence) tools, source evaluation, propaganda and emerging technologies such as generative AI and deepfakes. All the topics needed to train professionals capable of managing IT risks. 

Would you like to attend the course live with the tutor? Download the course timetable and get in touch

Would you like to take the course via e-learning, available 24/7? Register on the platform

Topics

Key Threats; Source Assessment; Open-Source Intelligence; Factchecking; Propaganda and Fallacies; Echo Chambers and Filter Bubbles; Generative AI and Deepfakes; Risk Assessment Framework.

Target

Journalism sector
Newsrooms, press agencies and media professionals who require advanced skills to combat misinformation (journalists, fact-checkers, and editors responsible for communications).

Business sector
Communication, brand reputation, marketing and PR departments, responsible for safeguarding the corporate image and managing media crises (PR managers, brand managers and social media strategists).

Public administration
Local and national authorities seeking to combat misinformation in the context of public policy and institutional communication (decision-makers, policymakers and public officials responsible for communication strategies and crisis management).

Security and defence sector
Intelligence and law enforcement agencies involved in protecting against disinformation and propaganda campaigns (OSINT analysts, intelligence officers and cybersecurity managers).

Non-profit organisations and NGOs
Organisations combating misinformation on global, social or humanitarian issues; educational and research institutions: Universities, research centres and educational institutions (academics specialising in media, misinformation and communication; students on undergraduate or postgraduate courses in journalism, communication studies, data science and cybersecurity).

Course structure

Module 1 - MAIN THREATS OF DISINFORMATION
6 hours
  • Types of disinformation
  • Practical examples: Analysis of case studies such as Cambridge Analytica, election campaigns and health crises
  • Impact of misinformation
Module 2 - OSINT
10 hours
  • Intelligence cycle
  • Introduction to OSINT tools: (i) Acquisition, (ii) Analysis, (iii) Visualization
  • Limits and challenges
  • Examples
Module 3 - FACT-CHECKING AND CONTENT ANALYSIS
8 hours
  • Criteria for evaluating sources
  • Online source analysis
  • Analysis tool and content check
Module 4 - NETWORK ANALYSIS
8 hours
  • Algorithms and tools
  • Polarization, echo chamber and filter bubbles
  • Examples
Module 6 - GENERATIVE AI, DEEPFAKE
6 hours
  • Creating and detecting deepfakes: images, videos and audio
  • Generative AI for creating persuasive text (e.g., large language models such as ChatGPT)
  • Detection instruments
  • Examples of media campaigns created using generative AI.
Module 6 - RISK ASSESSMENT FRAMEWORK
6 hours
  • DISARM (Disinformation Analysis and Risk Management)
  • ABCDE (Actor, Behaviour, Content, Degree, Effect)
  • Others
  • Use examples: FIMI Report I and II
Workshop
16 hours
  • Practical exercises on checking information, factchecking and analysing manipulated content using digital tools and network analysis software.
  • An in-depth look at a case of investigative journalism carried out using OSINT tools by experts, for example: Bellingcat, RAND, etc.
  • Analyse one or more cases of misinformation of your choice, identifying: the type of threat, the actors, the message, and the target.

  • Fact-checking real news stories using the tools introduced in the course.

  • Content analysis aimed at identifying emerging narratives in known datasets or those acquired using tools for detecting propaganda, clickbait, stance analysis, etc.
  • Use of tools (e.g., Gephi) for social network analysis (centrality measures, community detection, etc.) on known or newly acquired datasets.
  • Production of a summary report.

Contrasting misinformation: tools and techniques for managing threats and risks

Index

Request more information

Fill in all sections of the form and click CONFIRM.

You may also be interested in…