Assessment of information threats

Completed by: Stolitsa Social Research Agency 
 
Problem:
In the framework of analysis of the information field of an object in the presence of any information threats, it becomes necessary to assess these risks. ASIS specialists carried out an assessment of information threats following the example of construction of a TH (transport hub). Project implementation included the construction of more than 150 TH. Only the objects around which protest activity could begin or in which it was already present were used for monitoring.
 
Solution:
The main stages for assessing information threats:
  • Uploading messages and comments.
  • Assessment of the level of distribution and size of the audience.
  • Identifying and "cutting off" contrived (fake) activity.
  • Forecasts for development of the problem.
  • Content analysis of messages and comments.
  • Discourse analysis of initiated publications (on request or if necessary).
  • Preparing an information and analysis report based on uploading and evaluating messages on the requested object.
Based on the experience of working on social networks we can safely say that there is main protest activity and the formation of opposition groups. Therefore, if threats appear, special attention should be given to them.
 
Key features of the definition of information threats:
  • Efficiency. Information flows are constantly accelerating. Even 5 years ago, the information wave took an average of 1-2 weeks. Today information events spread in only a few hours and lose their relevance after 2-3 days. Therefore, an information threat must be identified in the first few minutes of its appearance in order to have time to react.
  • Initiators. A large number of sources (sites, blogs, groups in social networks) make it difficult to find the initiators and customers of the information attack. Without understanding the initiators and other initiators of threats, it is difficult to choose adequate response actions. Determining the sources and structure/scheme of information wave propagation allows for planning PR actions more accurately.
  • Development of the situation. As soon as an information threat appears, all publications and comments on this topic must be closely monitored.
 
Results:
Thanks to online monitoring, identification of initiative actors and groups, as well as sociological surveys, it was possible to identify the main points of conflict and disagreement between residents and developers. For some objects, it became possible to improve the attitude of the residents of the area to construction.
 
Advantages:
  • Effective definition of information threats;
  • Identification and assessment of information waves of the threat;
  • Identification of real demands and claims concerning the object;
  • Proposal for  alternative solutions to level information threats;
  • Monitoring of the facility at all stages of the development of information threats;
  • Evaluation of the spread of PR service activities in social networks and the blogosphere;
  • Forecasting the development of the situation after the company’s PR response.