Skip to main content

Posts

Showing posts from May, 2020

Securing digital communications

Digital communications are now indispensable. For a lot of organisations, the use of digital communication is key to achieving work effectiveness and efficiency. Date: Apr 16 , 2020 , 12:24 Every day, millions of digital communications get transmitted per second through online, social media and messaging platforms globally.  These communications come in the form of E-mails, text messages, video calls, file transmissions and online storage.  Some of these messages are rudimentary day-to-day ones which do not need to be transmitted securely; however, some digital communications by government end-users, corporate bodies, non-profits and security agencies, need to be transmitted using an appropriate secured option.  For instance, transactions by credit cards to make purchases online, necessitates the transmission of sensitive information, therefore, information on transactions must be transmitted securely. Similarly, online banking, filling out online applications such as passport applicat

What is weaponisation of information?

By Kwami Ahiabenu,II Information is power. Controlling information or weaponising information represents a key mechanism to leverage this power. Weaponised information can be described as messages, data or content that is deliberately created to affect a recipient’s perception about an issue, a thing or a person in a manner which may lead to behaviour change, provocation or influence the recipient in sinister ways. It is important to note, in weaponisation of information, the information could be true or false. The underlying requirement is for it to have been consciously created with the intention of achieving a tactical or strategic goal once it is assimilated by the recipient. Although weaponisation of information is more of a cognitive process, its main vehicle in today’s information world is through digital technologies. Weaponisation of information does not take place within the scope of day to day information exchanges since it is anchored firmly on complex