"],"_oembed_time_d97f76f8b433f402047bbc4059463872":["1516936294"],"_oembed_19676642f69e8af7344312c7428547f1":["

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure Information Technologies (CSIT) (@CSIT_QUB) March 19, 2015
"],"_oembed_time_19676642f69e8af7344312c7428547f1":["1516936295"],"_oembed_9d261893a48adbc88a46addbb51d0a90":["

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
"],"_oembed_time_9d261893a48adbc88a46addbb51d0a90":["1516936295"],"_wp_attachment_metadata":[""],"_oembed_58a58c42a8b1a757cce462d0a6d871ff":["

Nobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015

— Cyberlytic (@CyberlyticUK) March 18, 2015
","

Nobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015

— Cyberlytic (@CyberlyticUK) March 18, 2015
"],"_oembed_time_58a58c42a8b1a757cce462d0a6d871ff":["1523710309","1523710310"],"_oembed_3b831404ef38597e2dfc0170a669959f":["

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure IT at QUB (@CSIT_QUB) March 19, 2015
","

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure IT at QUB (@CSIT_QUB) March 19, 2015
"],"_oembed_time_3b831404ef38597e2dfc0170a669959f":["1523710309","1523710310"],"_oembed_1b2134eecf9632bdd085d4b09743cf66":["

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
","

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
"],"_oembed_time_1b2134eecf9632bdd085d4b09743cf66":["1523710309","1523710310"],"_wp_page_template":["default"],"_yoast_wpseo_content_score":["30"],"post_doi":[""],"_post_doi":["post_doi"],"_yoast_wpseo_primary_category":["221"],"ampforwp_custom_content_editor":[""],"ampforwp_custom_content_editor_checkbox":[null],"ampforwp-amp-on-off":["default"],"ampforwp-redirection-on-off":["enable"],"_wpml_media_duplicate":["1"],"_wpml_media_featured":["1"],"_wpml_media_has_media":["1"],"_wpml_word_count":["{\"total\":1382,\"to_translate\":{\"en\":1382}}"]}},"jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","streetAddress":"Französische Straße 9","addressLocality":"Berlin","addressRegion":"Berlin","PostalCode":"10117","addressCountry":"Germany"}},"baseSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"estimatedSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"title":"Berlin trifft Belfast: Eine Zusammenfassung des 5. Global Cybersecurity Technology Research Summit 2015","description":"Im Laufe der letzten Woche fand der 5. Global Cybersecurity Technology Research Summit am Centre for Secure Information Technologies (CSIT) der Queen’s University Belfast (QUB) statt. Die diesjährige Veranstaltung hatte den Titel \"A Future Legacy\" und bezog sich dabei auf Belfasts Vergangenheit und Vermächtnis als Zentrum der florierenden Industrie und des Ingenieurwesens. Unter den circa hundert TeilnehmerInnen aus Wissenschaft, Gewerbe und Politik wurden zukünftige technologische Entwicklungen und Herausforderungen diskutiert, wobei diesmal insbesondere ein Fokus auf sozial-gesellschaftliche Elemente der Internetsicherheit lag. Dies stellt einen neuen sowie notwendigen Trend dar und wird im Rahmen des englischsprachigen Beitrags genauer eruiert.\r\nBerlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015\r\nOne week ago, the 5th Global Cybersecurity Technology Research Summit organised by the Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast (QUB) took place. This year’s conference was underpinned by the theme \"A Future Legacy\" and was tied to Belfast’s heritage as a hub for industry and engineering. Among the more than hundred participants from academia, industry and governments, future technological developments and challenges were discussed. Specifically the societal element of cybersecurity was one of the core focuses of this year’s keynotes and break-out sessions, depicting a new as well as a necessary trend within the field.\r\nDay 0: Let the hacking begin\r\nOne day prior to the official start of the main Summit, attendees had the chance to engage in a capture the flag hackathon. Some Twitter-Posts display that the competitors took the task very seriously and - for once and officially - hacking was allowed and actually more than welcomed. Day 0 ended with a brief speaker’s session which involved Pizza and free drinks and hopefully comforted all the ones who lost or simply missed to eat throughout the day.\r\nNobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015\r\n\r\n— Cyberlytic (@CyberlyticUK) 18. März 2015\r\n\r\nSecurity means Resilience\r\nThe main Summit started on Thursday the 19th of March and opened with the announcement that CSIT at QUB had secured further funding for cyber security research on Smart Cities and the Internet of Things.\r\nProf John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf — CSIT (@CSIT_QUB) 19. März 2015\r\n\r\n\r\nWith this pleasant news in mind the event was kicked off by Professor John McCanny (CSIT), whereby in the course of the next days all speakers accentuated the importance to be able to assess, prevent and defeat cyber threats and to generate a robust and resilient internet based on adequate software and hardware solutions. Certainly methods such as detecting anomalies, conducting malware or behavioural analyses or simply monitoring access controls – which have been discussed and displayed at the Summit - are ways of dealing with the issue. However, the presenters were aware that not addressing the root causes of threats and risks will not provide sufficient solutions for the future. It is therefore that the aspects of human security and collaboration were prominent ideas across the Summit.\r\nThe Human Element in Cybersecurity\r\nThe factor human in cybersecurity ranges from the handling of insider threats, ensuring privacy and data protection, to the notion of victimology, up to the general needs and requirements of customers. The Summit took in this regard a specific interest in emphasising the individual, which was reflected in all presentations but was specifically discussed in the context of two break-out sessions which dealt with the topic of political activism and psychological dynamics online. Besides, as it is difficult to guarantee technical security despite the fallibility caused by human errors, the human element is and should be part of any cybersecurity equation.\r\n\"The weakest link in any secure system...in other words...the human\" - @maryCyPsy #cybersecurity #Belfast2015\r\n\r\n— Jonny Voon (@JonnyVoon) 19. März 2015\r\n\r\n\r\nThe inclusion of non-technical research areas at the Summit is therefore a positive development and should foster a debate on the progression of a multi- and transdisciplinary research field that touches upon both technical as well as societal factors. The just recently set up Leverhulme Interdisciplinary Network on Cybersecurity and Society (LINCS) at QUB will hopefully influence this trend further.\r\nHow to Influence People To Care?\r\nAlign with the idea to focus more on the human element in cybersecurity considerations, speakers such as Jon Browning (OCSIA) stressed the need to get more people demand appropriate security solutions. This sentiment on making people aware of the importance of cybersecurity and to evaluate and be cautions about potential security risk online was followed by the request to involve more people in cybersecurity education and was specifically thematised by Dr Douglas Maughan (US DHS). A quick survey among the Summit participants in the course of his presentation revealed an age gap among the audience; less than ten people were under thirty years of age. This outcome reflects the overall cybersecurity sector which is facing a significant recruitment problem across all nation states and was noted by Maughan.\r\nCollaboration and Information Sharing\r\nThis idea of not being able to simply protect the internet and/or the human online was accompanied by the constant and reoccurring theme to engage in collaboration and information sharing. Zach Tudor (SRI International) and Suren Gupta (Allstate) articulated this issue as a prevalent topic in cyber protection and essential to proceed with future developments. This was echoed by Mark Schloesser (Rapid7) who in the course of his presentation referred to the Internet-Wide Scan Data Repository and Recog as positive examples of research data sharing and publicly archiving collected information. According to Schloesser the cybersecurity field has to embrace the community and reduce Intellectual Property while using Open Source Software where possible. This statement certainly set his presentation apart from the rest and highlights one of the first commitments and hopefully also future developments to the demand for collaboration expressed across the attendees.\r\nMy Personal Résumé\r\nOverall, the 5th Global Cybersecurity Technology Research Summit 2015 encompassed far more than the here outlined issues. The topics stretched from the successful setup and support of start-ups up to the governmental steps taken to implement cybersecurity in small and medium-sized enterprises. However, what I take away from these couple of days is certainly that companies seem to require and actually want users to demand security. It is therefore that we should not tolerate flawed and insufficiently debugged software and make our voice heard. Moreover, security should no longer be an opt-in option – neither for users nor the industry - but ensured and guaranteed by default.\r\n\r\nThis goes along with the need to shift the focus from a purely technical to an interdisciplinary research field that is able to address all factors which come into play when developing cybersecurity solutions. Social scientists and ethicists are needed to not let technology run ahead of itself, leaving major societal developments or problems aside. As we live in a digitalised society, but are most certainly not yet digital beings, the human has to be at the heart of all debates on and developments in cybersecurity. Treating the internet as a separate entity independent of society can simply not lead to favourable outcomes. Thus, all sectors of the cybersecurity field – academia, industry and policy makers – need to be committed to knowledge exchange which underlines the importance of events such as the Cybersecurity Summit in Belfast.\r\nFurther Links of Relevance:\r\n\r\n \tPhD opportunities with the Leverhulme Interdisciplinary Network on Cybersecurity and Society (LINCS) at Queen’s University Belfast (Deadline: 1st April 2015)\r\n \tRepresentatives of the cybersecurity sector are invited to participate in my current study on the perceptions of digital disobedience in the context of the tech-industry. The Participant Information Sheet provides details on the scope and focus of the study and the data protection measures taken in this research.\r\n\r\nDieser Beitrag ist Teil der regelmäßig erscheinenden Blogartikel der Doktoranden des Alexander von Humboldt Institutes für Internet und Gesellschaft. Er spiegelt weder notwendigerweise noch ausschließlich die Meinung des Institutes wieder. Für mehr Informationen zu den Inhalten dieser Beiträge und den assoziierten Forschungsprojekten kontaktieren Sie bitte info@hiig.de.","url":"https://www.hiig.de/berlin-trifft-belfast-eine-zusammenfassung-des-5-global-cybersecurity-technology-research-summit-2015/","employmentType":{"_edit_lock":["1530518246:194"],"_edit_last":["194"],"_esft_meta":["none"],"page_contacts":["a:2:{s:5:\"title\";s:0:\"\";s:4:\"text\";s:0:\"\";}"],"_thumbnail_id":["22411"],"_oembed_d97f76f8b433f402047bbc4059463872":["

Nobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015

— Cyberlytic (@CyberlyticUK) March 18, 2015
"],"_oembed_time_d97f76f8b433f402047bbc4059463872":["1516936294"],"_oembed_19676642f69e8af7344312c7428547f1":["

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure Information Technologies (CSIT) (@CSIT_QUB) March 19, 2015
"],"_oembed_time_19676642f69e8af7344312c7428547f1":["1516936295"],"_oembed_9d261893a48adbc88a46addbb51d0a90":["

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
"],"_oembed_time_9d261893a48adbc88a46addbb51d0a90":["1516936295"],"_wp_attachment_metadata":[""],"_oembed_58a58c42a8b1a757cce462d0a6d871ff":["

Nobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015

— Cyberlytic (@CyberlyticUK) March 18, 2015
","

Nobody has gone up for sandwiches yet! The hackers are too busy hacking - food is an unwanted distraction! #Belfast2015

— Cyberlytic (@CyberlyticUK) March 18, 2015
"],"_oembed_time_58a58c42a8b1a757cce462d0a6d871ff":["1523710309","1523710310"],"_oembed_3b831404ef38597e2dfc0170a669959f":["

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure IT at QUB (@CSIT_QUB) March 19, 2015
","

Prof John McCanny kicking off proceedings at #Belfast2015 with £38 million announcement of funding for next 5 years pic.twitter.com/sl6BeTlWaf

— Centre for Secure IT at QUB (@CSIT_QUB) March 19, 2015
"],"_oembed_time_3b831404ef38597e2dfc0170a669959f":["1523710309","1523710310"],"_oembed_1b2134eecf9632bdd085d4b09743cf66":["

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
","

"The weakest link in any secure system...in other words...the human" - @maryCyPsy #cybersecurity #Belfast2015

— Jonny Voon (@JonnyVoon) March 19, 2015
"],"_oembed_time_1b2134eecf9632bdd085d4b09743cf66":["1523710309","1523710310"],"_wp_page_template":["default"],"_yoast_wpseo_content_score":["30"],"post_doi":[""],"_post_doi":["post_doi"],"_yoast_wpseo_primary_category":["221"],"ampforwp_custom_content_editor":[""],"ampforwp_custom_content_editor_checkbox":[null],"ampforwp-amp-on-off":["default"],"ampforwp-redirection-on-off":["enable"],"_wpml_media_duplicate":["1"],"_wpml_media_featured":["1"],"_wpml_media_has_media":["1"],"_wpml_word_count":["{\"total\":1382,\"to_translate\":{\"en\":1382}}"]},"image":[{"@type":"ImageObject","@id":"https://www.hiig.de/berlin-trifft-belfast-eine-zusammenfassung-des-5-global-cybersecurity-technology-research-summit-2015/#primaryimage","url":"https://www.hiig.de/wp-content/uploads/2023/12/post_generic-1920x1080.png","width":"1920","height":"1080"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2023/12/post_generic-1200x900.png","width":"1200","height":"900"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2023/12/post_generic-1200x675.png","width":"1200","height":"675"}]}] Zum Inhalt springen
Cybersecurity
24 März 2015

Berlin trifft Belfast: Eine Zusammenfassung des 5. Global Cybersecurity Technology Research Summit 2015

Im Laufe der letzten Woche fand der 5. Global Cybersecurity Technology Research Summit am Centre for Secure Information Technologies (CSIT) der Queen’s University Belfast (QUB) statt. Die diesjährige Veranstaltung hatte den Titel “A Future Legacy” und bezog sich dabei auf Belfasts Vergangenheit und Vermächtnis als Zentrum der florierenden Industrie und des Ingenieurwesens. Unter den circa hundert TeilnehmerInnen aus Wissenschaft, Gewerbe und Politik wurden zukünftige technologische Entwicklungen und Herausforderungen diskutiert, wobei diesmal insbesondere ein Fokus auf sozial-gesellschaftliche Elemente der Internetsicherheit lag. Dies stellt einen neuen sowie notwendigen Trend dar und wird im Rahmen des englischsprachigen Beitrags genauer eruiert.

Berlin meets Belfast: A Recap of the 5th Global Cybersecurity Technology Research Summit 2015

One week ago, the 5th Global Cybersecurity Technology Research Summit organised by the Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast (QUB) took place. This year’s conference was underpinned by the theme “A Future Legacy” and was tied to Belfast’s heritage as a hub for industry and engineering. Among the more than hundred participants from academia, industry and governments, future technological developments and challenges were discussed. Specifically the societal element of cybersecurity was one of the core focuses of this year’s keynotes and break-out sessions, depicting a new as well as a necessary trend within the field.

Day 0: Let the hacking begin

One day prior to the official start of the main Summit, attendees had the chance to engage in a capture the flag hackathon. Some Twitter-Posts display that the competitors took the task very seriously and – for once and officially – hacking was allowed and actually more than welcomed. Day 0 ended with a brief speaker’s session which involved Pizza and free drinks and hopefully comforted all the ones who lost or simply missed to eat throughout the day.

Security means Resilience

The main Summit started on Thursday the 19th of March and opened with the announcement that CSIT at QUB had secured further funding for cyber security research on Smart Cities and the Internet of Things.

With this pleasant news in mind the event was kicked off by Professor John McCanny (CSIT), whereby in the course of the next days all speakers accentuated the importance to be able to assess, prevent and defeat cyber threats and to generate a robust and resilient internet based on adequate software and hardware solutions. Certainly methods such as detecting anomalies, conducting malware or behavioural analyses or simply monitoring access controls – which have been discussed and displayed at the Summit – are ways of dealing with the issue. However, the presenters were aware that not addressing the root causes of threats and risks will not provide sufficient solutions for the future. It is therefore that the aspects of human security and collaboration were prominent ideas across the Summit.

The Human Element in Cybersecurity

The factor human in cybersecurity ranges from the handling of insider threats, ensuring privacy and data protection, to the notion of victimology, up to the general needs and requirements of customers. The Summit took in this regard a specific interest in emphasising the individual, which was reflected in all presentations but was specifically discussed in the context of two break-out sessions which dealt with the topic of political activism and psychological dynamics online. Besides, as it is difficult to guarantee technical security despite the fallibility caused by human errors, the human element is and should be part of any cybersecurity equation.

The inclusion of non-technical research areas at the Summit is therefore a positive development and should foster a debate on the progression of a multi- and transdisciplinary research field that touches upon both technical as well as societal factors. The just recently set up Leverhulme Interdisciplinary Network on Cybersecurity and Society (LINCS) at QUB will hopefully influence this trend further.

How to Influence People To Care?

Align with the idea to focus more on the human element in cybersecurity considerations, speakers such as Jon Browning (OCSIA) stressed the need to get more people demand appropriate security solutions. This sentiment on making people aware of the importance of cybersecurity and to evaluate and be cautions about potential security risk online was followed by the request to involve more people in cybersecurity education and was specifically thematised by Dr Douglas Maughan (US DHS). A quick survey among the Summit participants in the course of his presentation revealed an age gap among the audience; less than ten people were under thirty years of age. This outcome reflects the overall cybersecurity sector which is facing a significant recruitment problem across all nation states and was noted by Maughan.

Collaboration and Information Sharing

This idea of not being able to simply protect the internet and/or the human online was accompanied by the constant and reoccurring theme to engage in collaboration and information sharing. Zach Tudor (SRI International) and Suren Gupta (Allstate) articulated this issue as a prevalent topic in cyber protection and essential to proceed with future developments. This was echoed by Mark Schloesser (Rapid7) who in the course of his presentation referred to the Internet-Wide Scan Data Repository and Recog as positive examples of research data sharing and publicly archiving collected information. According to Schloesser the cybersecurity field has to embrace the community and reduce Intellectual Property while using Open Source Software where possible. This statement certainly set his presentation apart from the rest and highlights one of the first commitments and hopefully also future developments to the demand for collaboration expressed across the attendees.

My Personal Résumé

Overall, the 5th Global Cybersecurity Technology Research Summit 2015 encompassed far more than the here outlined issues. The topics stretched from the successful setup and support of start-ups up to the governmental steps taken to implement cybersecurity in small and medium-sized enterprises. However, what I take away from these couple of days is certainly that companies seem to require and actually want users to demand security. It is therefore that we should not tolerate flawed and insufficiently debugged software and make our voice heard. Moreover, security should no longer be an opt-in option – neither for users nor the industry – but ensured and guaranteed by default.

This goes along with the need to shift the focus from a purely technical to an interdisciplinary research field that is able to address all factors which come into play when developing cybersecurity solutions. Social scientists and ethicists are needed to not let technology run ahead of itself, leaving major societal developments or problems aside. As we live in a digitalised society, but are most certainly not yet digital beings, the human has to be at the heart of all debates on and developments in cybersecurity. Treating the internet as a separate entity independent of society can simply not lead to favourable outcomes. Thus, all sectors of the cybersecurity field – academia, industry and policy makers – need to be committed to knowledge exchange which underlines the importance of events such as the Cybersecurity Summit in Belfast.

Further Links of Relevance:

  • PhD opportunities with the Leverhulme Interdisciplinary Network on Cybersecurity and Society (LINCS) at Queen’s University Belfast (Deadline: 1st April 2015)
  • Representatives of the cybersecurity sector are invited to participate in my current study on the perceptions of digital disobedience in the context of the tech-industry. The Participant Information Sheet provides details on the scope and focus of the study and the data protection measures taken in this research.

Dieser Beitrag ist Teil der regelmäßig erscheinenden Blogartikel der Doktoranden des Alexander von Humboldt Institutes für Internet und Gesellschaft. Er spiegelt weder notwendigerweise noch ausschließlich die Meinung des Institutes wieder. Für mehr Informationen zu den Inhalten dieser Beiträge und den assoziierten Forschungsprojekten kontaktieren Sie bitte info@hiig.de.

Dieser Beitrag spiegelt die Meinung der Autorinnen und Autoren und weder notwendigerweise noch ausschließlich die Meinung des Institutes wider. Für mehr Informationen zu den Inhalten dieser Beiträge und den assoziierten Forschungsprojekten kontaktieren Sie bitte info@hiig.de

Leonie Maria Tanczer

Ehem. Fellow: Globaler Konstitutionalismus und das Internet

Aktuelle HIIG-Aktivitäten entdecken

Forschungsthemen im Fokus

Das HIIG beschäftigt sich mit spannenden Themen. Erfahren Sie mehr über unsere interdisziplinäre Pionierarbeit im öffentlichen Diskurs.

Forschungsthema im Fokus Entdecken

Du siehst eine Bibliothek mit einer runden Treppe die sich in die höhe schraubt. Sie steht sinnbildlich für die sich stetig weiterentwickelnden digitalen Infrastrukturen unserer Wissensgesellschaft. You see a library with a round staircase that spirals upwards. It symbolises the constantly evolving digital infrastructures of our knowledge society.

Offene Hochschulbildung

Wir erforschen den Einsatz von offener Hochschulbildung, um Wissen für alle in unserer zu fördern, zu teilen und zu verbreiten.

HIIG Monthly Digest

Jetzt anmelden und  die neuesten Blogartikel gesammelt per Newsletter erhalten.

Weitere Artikel

2 Quechuas, die auf einer grünen Wiese sitzen und im Sonnenlicht auf ihre Smartphones schauen, was folgendes symbolisiert: Was sind indigene Perspektiven der Digitalisierung? Die Quechuas in Peru zeigen Offenheit für die Anforderungen an das Wachstum ihrer digitalen Wirtschaft.

Digitalisierung erkunden: Indigene Perspektiven aus Puno, Peru

Was sind indigene Perspektiven der Digitalisierung? Die Quechuas in Peru zeigen Offenheit für die Anforderungen an das Wachstum ihrer digitalen Wirtschaft.

eine mehrfarbige Baumlandschaft von oben, die eine bunte digitale Publikationslandschaft symbolisiert

Diamond OA: Für eine bunte, digitale Publikationslandschaft

Der Blogpost macht auf neue finanzielle Fallstricke in der Open-Access-Transformation aufmerksam und schlägt eine gemeinschaftliche Finanzierungsstruktur für Diamond OA in Deutschland vor.

ein Haufen zusammengeknüllter Zeitungen, die Desinformation im Netz repräsentieren

Desinformation: Überschätzen wir uns wirklich selbst?

Wie bewusst sind wir im Umgang mit Desinformation im Internet und vermittelt der öffentliche Diskurs ein ausgewogenes Bild der Reichweite von Desinformationen?