Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1068
Title: Combating Disinformation And Misinformation Through Source Identification And Tracking
Authors: Ohwadua, Emmanuel
Keywords: Disinformation, misinformation, mal-information and public-key cryptography.
Issue Date: 29-Mar-2024
Publisher: International Journal of Science, Technology & Management
Citation: Ohwadua, E. (2024). Combating Disinformation and Misinformation through Source Identification and Tracking. International Journal of Science, Technology & Management, 5(2), 448-459. https://doi.org/10.46729/ijstm.v5i2.1085
Series/Report no.: 5(2);448-459
Abstract: In the social media or online networks, the posting and sharing of misleading information or fake news, is done on the fly, but difficult to reverse or control, and worse still, the purveyor of such information is difficult to identify or track; unlike traditional print or electronic media whose authors are well known and can be held responsible for any harm that the information may cause. With disinformation, misinformation and mal-information spreading at the click of a button and at breakneck speed, tech companies are struggling to regulate it on social media, while grappling with public responsibility, definitions of free speech or freedom of expression, and identification of such content and its source. This research piece has provided another prism by which the excesses of the purveyors of disinformation, misinformation and mal-information, otherwise known as fake news, propaganda or misleading information can be curtailed. In the social media platform, the author of content is elusive and may not be known because the content or material does not contain any identification that could help to identify the perpetuator, and even if eventually he/she is finally tracked – probably after the content may have been shared (say) a million times, the harm may have been done. So, the goal of this scheme is to discourage and prevent the creation and posting of harmful material on social media since such content will carry the identification of the author. The identification details of the author of content is acquired at the point of posting the content online on any social media platform, while the integrity of the content is preserved by the use of cryptographic hash function. Fundamentally, this tool, if adopted and implemented by social media platforms, it will shift the focus of the fight against fake news from regulation to prevention and control.
URI: http://localhost:8080/xmlui/handle/123456789/1068
ISSN: 2722 - 4015
Appears in Collections:Research Articles

Files in This Item:
File Description SizeFormat 
1085-Article Text-7386-1-10-20240329.pdfMain article740.5 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.