Examining Misinformation and Deep Fakes

Authors

  • Namosha Veerasamy CSIR
  • Zubeida Khan
  • Danielle Badenhorst CSIR

DOI:

https://doi.org/10.34190/eckm.25.1.2715

Keywords:

misinformation, deep fakes, fake news, disinformation, mal-information, artificial intelligence, cybersecurity, cybersecurity learning factory

Abstract

Misinformation in the form of deep fakes and phishing links can not only spread false information but can only be used a weapon in the hands of cyber criminals. To combat this problem, the authors investigate fake news and misinformation, in a South African context.  In the paper, the use of cyber scams that contain misinformation will also be unpacked. This aims to create an awareness and defensive approach to tackling emerging cyber threats that prey on misinformation. This paper tackles a growing concern by examining the pervasiveness of fake news by looking into the extent that fake news infiltrates various media channels and its potential impact on public perception and decision-making. The paper will also explore the anatomy of fake news by dissecting the common tactics and strategies employed by purveyors of fake news and highlight red flags that can help the public identify misinformation. Maintaining academic integrity is pivotal to the research and publication community. This paper will also promote the use of trusted sources and verification of information. The paper aims to promote media literacy by sharing strategies to enhance media literacy and critical thinking skills, empowering individuals to discern credible information from misleading content. This paper proposes a human-centric framework to empower individuals in South Africa to become discerning consumers of information. Recognizing the limitations of Artificial Intelligence (AI)-based detection methods and the unique challenges of the South African context (multilingualism, resource constraints), the framework emphasizes critical thinking and media literacy skills. It outlines a step-by-step process for evaluating information sources, including source credibility analysis, content verification, and cross-referencing.  The effectiveness of the framework is demonstrated by a relevant use-case.

Author Biography

Namosha Veerasamy, CSIR

Namosha Veerasamy hold a BSc:IT Computer Science Degree, and both a BSc: Computer Science (Honours) and MSc: Computer Science with distinction from the University of Pretoria. She also obtained a PhD from the University of Johannesburg. She is currently a principal researcher at the Council for Scientific and Industrial Research (CSIR) in Pretoria.Namosha is also qualified as a Certified Information System Security Professional (CISSP) and Certified Information Security Manager (CISM). She has been involved in cyber security research and governance for nearly 20 years.

Downloads

Published

2024-09-03