{"id":2738,"date":"2021-05-05T11:22:17","date_gmt":"2021-05-05T02:22:17","guid":{"rendered":"https:\/\/itresearchart.biz\/?p=2738"},"modified":"2021-05-05T11:22:17","modified_gmt":"2021-05-05T02:22:17","slug":"%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e5%bd%b1%e9%9f%bf%e5%b7%a5%e4%bd%9c%e3%81%ae%e5%ae%9a%e7%be%a9-css-cyber-defense-cyber-influence-operations-an-overview-and-comparative-analysis","status":"publish","type":"post","link":"https:\/\/itresearchart.biz\/?p=2738","title":{"rendered":"\u30b5\u30a4\u30d0\u30fc\u5f71\u97ff\u5de5\u4f5c\u306e\u5b9a\u7fa9-CSS CYBER DEFENSE \u201cCyber Influence Operations: An Overview and Comparative Analysis\u201d\u3092\u8aad\u3080(2)"},"content":{"rendered":"<p><a href=\"https:\/\/itresearchart.biz\/?p=2725\">\u5f71\u97ff\u5de5\u4f5c\u306e\u5b9a\u7fa9-CSS CYBER DEFENSE \u201cCyber Influence Operations: An Overview and Comparative Analysis\u201d\u3092\u8aad\u3080(1)<\/a>\u3067\u3001\u5f71\u97ff\u5de5\u4f5c\u3092\u985e\u4f3c\u306e\u6982\u5ff5\u3068\u6bd4\u8f03\u3057\u3066\u307f\u307e\u3057\u305f\u3002<\/p>\n<p><a href=\"https:\/\/css.ethz.ch\/content\/dam\/ethz\/special-interest\/gess\/cis\/center-for-securities-studies\/pdfs\/Cyber-Reports-2019-10-CyberInfluence.pdf\">CSS CYBER DEFENSE \u201cCyber Influence Operations: An Overview and Comparative Analysis\u201d<\/a>\u306f\u30013\u7ae0\u3067\u5b9a\u7fa9\u304a\u3088\u3073\u7bc4\u56f2\u3001\u5f71\u97ff\u5de5\u4f5c\u3068\u30b5\u30a4\u30d0\u30fc\u5f71\u97ff\u5de5\u4f5c\/\u985e\u4f3c\u3068\u76f8\u9055\u3001\u53ef\u80fd\u6027\u304a\u3088\u3073\u6226\u7565\u7684\u610f\u7fa9\u3068\u8ad6\u3092\u3059\u3059\u3081\u3066\u3044\u304d\u307e\u3059\u3002<\/p>\n<h5>\u30b5\u30a4\u30d0\u30fc\u5f71\u97ff\u5de5\u4f5c\u306e\u5b9a\u7fa9\u3068\u7bc4\u56f2\u306b\u3064\u3044\u3066<\/h5>\n<p>\u5b9a\u7fa9\u304a\u3088\u3073\u7bc4\u56f2\u3068\u3044\u3046\u3068\u3053\u308d\u3092\u307f\u3066\u307f\u307e\u3059\u3002\u540c\u66f8\u306b\u304a\u3044\u3066\u306f\u3001<\/p>\n<blockquote><p>\n\u6587\u732e\u7684\u306b\u306f\u3001\u3053\u306e\u7279\u6b8a\u306a\u30d9\u30af\u30c8\u30eb(\u9ad8\u6a4b\u6ce8-\u307e\u3059\u307e\u3059\u30b5\u30a4\u30d0\u30fc\u30b9\u30da\u30fc\u30b9\u306b\u79fb\u884c\u3057\u3066\u3044\u308b\u3053\u3068) \u3092\u793a\u3059\u591a\u304f\u306e\u95a2\u9023\u7528\u8a9e\u304c\u767b\u5834\u3057\u3066\u3044\u307e\u3059\u3002\u4f8b\u3048\u3070\u3001\u300c\u30b5\u30a4\u30d0\u30fc\u30d7\u30ed\u30d1\u30ac\u30f3\u30c0\u300d\u3001\u300c\u30b5\u30a4\u30d0\u30fc\u3092\u5229\u7528\u3057\u305f\u507d\u60c5\u5831\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u300d\u3001\u300c\u30b5\u30a4\u30d0\u30fc\u3092\u5229\u7528\u3057\u305f\u63a8\u8ad6\u300d\u3001\u300c\u30b5\u30a4\u30d0\u30fc\u8aac\u5f97\u6d3b\u52d5\u300d\u3001\u300c\u5f71\u97ff\u529b\u306e\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u4f5c\u6226\u300d\u3001\u300c\u30b5\u30a4\u30d0\u30fc\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u4f5c\u6226\u300d\u3001\u300c\u30b5\u30a4\u30d0\u30fc\u3092\u5229\u7528\u3057\u305f\u60c5\u5831\u6d3b\u52d5\u300d\u306a\u3069\u304c\u3042\u308a\u307e\u3059\u3002<\/p><\/blockquote>\n<p>\u3068\u3057\u3066\u3001\u3055\u3089\u306b\u73fe\u72b6\u306f\u3001\u5f71\u97ff\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u3068\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3068\u306e\u533a\u5225\u3082\u3057\u306a\u3044\u50be\u5411\u304c\u3042\u308b\u3068\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u540c\u66f8\u306f\u3001\u57fa\u672c\u3068\u306a\u308b\u6982\u5ff5\u3068\u3057\u3066\u30b5\u30a4\u30d0\u30fc\u5f71\u97ff\u5de5\u4f5c(cyber influence operations \u3001CIO)\u3092\u6e96\u5099\u3057\u3066\u3044\u307e\u3059\u3002\u305d\u3053\u3067\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u5f71\u97ff\u5de5\u4f5c\u3092<\/p>\n<blockquote><p>\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u3067\u5b9f\u884c\u3055\u308c\u3001\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306e\u5206\u6563\u3055\u308c\u305f\u8106\u5f31\u6027\u3092\u6d3b\u7528\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u95a2\u9023\u306e\u30c4\u30fc\u30eb\u3084\u6280\u8853\u306b\u4f9d\u5b58\u3057\u3066\u3001\u8996\u8074\u8005\u306e\u9078\u629e\u3001\u30a2\u30a4\u30c7\u30a2\u3001\u610f\u898b\u3001\u611f\u60c5\u3084\u52d5\u6a5f\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u3001\u305d\u306e\u610f\u601d\u6c7a\u5b9a\u30d7\u30ed\u30bb\u30b9\u3092\u59a8\u5bb3\u3059\u308b\u4e0d\u6b63\u306a\uff08\u6642\u306b\u306f\u9055\u6cd5\u306a\uff09\u6d3b\u52d5<\/p><\/blockquote>\n<p>\u3068\u5b9a\u7fa9\u3057\u3066\u3044\u307e\u3059(Bonfanti, 2019\u5e74-Bonfanti, M., (2019).<a href=\"https:\/\/css.ethz.ch\/en\/publications\/search\/details.html?id=%2Fa%2Fn%2Fi%2Fn%2Fan_intelligencebased_approach_to_counter\"> An Intelligence-based approach to countering social media influence operations<\/a>, in:Romanian Intelligence Studies Review. National Intelligence Academy, Bucharest.\u306e\u5b9a\u7fa9\u306b\u4f9d\u62e0\u3057\u3066\u3044\u307e\u3059)\u3002<\/p>\n<h4>\u5f71\u97ff\u5de5\u4f5c\u3068\u30b5\u30a4\u30d0\u30fc\u5f71\u97ff\u5de5\u4f5c\/\u985e\u4f3c\u3068\u76f8\u9055<\/h4>\n<p>CIO\u306e\u30bf\u30fc\u30b2\u30c3\u30c8\u3001\u76ee\u7684\u3001\u305d\u3057\u3066\u3042\u308b\u7a0b\u5ea6\u306e\u6226\u7565\u30fb\u30b9\u30c8\u30e9\u30bf\u30b8\u30a7\u30e0(\u8ecd\u7565)\u306f\u3001\u524d\u4e16\u7d00\u306b\u884c\u308f\u308c\u305f\u5f71\u97ff\u5de5\u4f5c\u3068\u985e\u4f3c\u3057\u3066\u3044\u308b\u3002\u3057\u304b\u3057\u3001\u30c4\u30fc\u30eb\u3001\u30a2\u30af\u30bf\u30fc\u3001\u7bc4\u56f2\u3001\u898f\u6a21\u3001\u5229\u7528\u53ef\u80fd\u6027\u306f\u3059\u3079\u3066\u7570\u306a\u3063\u3066\u3044\u308b\u3002\u3053\u308c\u3089\u3092\u500b\u5225\u306b\u307f\u3066\u3044\u304d\u307e\u3059\u3002<\/p>\n<h5>\u30bf\u30fc\u30b2\u30c3\u30c8<\/h5>\n<p>\u30b5\u30a4\u30d0\u30fc\u5f71\u97ff\u5de5\u4f5c\u306f\u3001\u4e3b\u3068\u3057\u3066<\/p>\n<ul>\n<li>\u4e00\u822c\u793e\u4f1a\u30bf\u30fc\u30b2\u30c3\u30c8(\u5927\u8846\u30aa\u30fc\u30c7\u30a3\u30a8\u30f3\u30b9)<\/li>\n<li>\u793e\u4f1a\u30c7\u30e2\u30b0\u30e9\u30d5\u30a3\u30c3\u30af(\u7a2e\u3005\u306e\u793e\u4f1a\u30b0\u30eb\u30fc\u30d7\u3084\u30cd\u30c3\u30c8\u30ef\u30fc\u30af)<\/li>\n<li>\u5fc3\u7406\u7684\u30bf\u30fc\u30b2\u30c3\u30c8(\u5fc3\u7406\u5b66\u7684\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067\u7279\u5b9a\u3055\u308c\u305f\u500b\u4eba)<\/li>\n<\/ul>\n<p>\u4e09\u3064\u306e\u30ec\u30d9\u30eb\u3092\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u3066\u3044\u307e\u3059\u3002\u5f71\u97ff\u529b\u5de5\u4f5c\u306f\u3001\u7279\u5b9a\u306e\u500b\u4eba\u3001\u30ca\u30e9\u30c6\u30a3\u30d6\u3001\u307e\u305f\u306f\u554f\u984c\u306b\u5408\u308f\u305b\u305f\u300c\u30e1\u30c3\u30bb\u30fc\u30b8\u6307\u5411\u300d\u306e\u3082\u306e\u3068\u3001\u4e00\u822c\u5927\u8846\u3084\u60c5\u5831\u74b0\u5883\u5168\u4f53\u306b\u5411\u3051\u305f\u300c\u74b0\u5883\u6307\u5411\u300d\u306e\u3082\u306e\u3068\u306b\u533a\u5225\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3053\u3068\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306f\u3001\u69d8\u3005\u306a\u30a2\u30af\u30bf\u30fc\uff08\u4f01\u696d\u3001\u653f\u5e9c\u6a5f\u95a2\u3001\u5831\u9053\u6a5f\u95a2\u3001\u653f\u515a\u306a\u3069\uff09\u306e\u30b7\u30b9\u30c6\u30e0\u3092\u76f4\u63a5\uff08\u6280\u8853\u7684\u306b\uff09\u72d9\u3063\u305f\u3082\u306e\u3067\u3042\u308b\u4e00\u65b9\u3067\u3001\u305d\u306e\u3088\u3046\u306a\u653b\u6483\u306f\u5fc5\u305a\u3001\u69d8\u3005\u306a\u7a0b\u5ea6\u3001\u69d8\u3005\u306a\u30ec\u30d9\u30eb\u3067\u9593\u63a5\u7684\u306a\u8a8d\u77e5\u7684\u52b9\u679c\u3092\u3082\u305f\u3089\u3059\u3053\u3068\u3092\u5ff5\u982d\u306b\u7f6e\u304b\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3053\u3068\u3001\u305d\u306e\u4e0a\u3067\u3001\u540c\u6642\u306b\u3001CIO\u306f\u5916\u56fd\u306e\u30bf\u30fc\u30b2\u30c3\u30c8\u306b\u5bfe\u3057\u3066\u306e\u307f\u4f7f\u7528\u3055\u308c\u308b\u306e\u3067\u306f\u306a\u304f\u3001\u653f\u5e9c\u304c\u81ea\u56fd\u306e\u56fd\u6c11\u306b\u5bfe\u3057\u3066\u4f7f\u7528\u3059\u308b\u3053\u3068\u3082\u53ef\u80fd\u3067\u3042\u308b\u3053\u3068\u306b\u3082\u7559\u610f\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3053\u3068\u304c\u306e\u3079\u3089\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<h5>\u76ee\u7684<\/h5>\n<p>\u30b5\u30a4\u30d0\u30fc\u5f71\u97ff\u5de5\u4f5c\u306e\u76ee\u7684\u306b\u95a2\u3057\u3066\u306f\u3001<\/p>\n<blockquote><p>\u4ed6\u306e\u5f71\u97ff\u529b\u3092\u884c\u4f7f\u3059\u308b\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u3068\u540c\u69d8\u3001\u614b\u5ea6\u3092\u4fee\u6b63\u3057\u3001\u5bfe\u8c61\u8005\u306e\u5fc3\u7406\u7684\u30d7\u30ed\u30bb\u30b9\u3001\u30e2\u30c1\u30d9\u30fc\u30b7\u30e7\u30f3\u3001\u30a2\u30a4\u30c7\u30a2\u3092\u5f62\u6210\u3059\u308b\u3053\u3068\u3067\u3042\u308b\uff08Palmertz, 2017\uff09\u3002<\/p><\/blockquote>\n<p>\u3068\u308c\u3066\u3044\u307e\u3059\u3002\u3082\u3063\u3068\u3082\u3001\u5177\u4f53\u7684\u306a\u76ee\u7684\u306f\u69d8\u3005\u3067\u3001\u6587\u8108\u3068\u30bf\u30fc\u30b2\u30c3\u30c8\u306e\u4e21\u65b9\u306b\u4f9d\u5b58\u3057\u3066\u3044\u3066\u3001\u7279\u306b\u3001\u7279\u5b9a\u306e\u5730\u57df\u306e\u6c11\u9593\u4eba\u3092\u5bfe\u8c61\u3068\u3057\u305f\u76f8\u624b\u56fd\u306e\u8ecd\u3084\u653f\u5e9c\u306b\u5bfe\u3059\u308b\u4e0d\u4fe1\u611f\u3092\u717d\u308a\u3001\u5f53\u5c40\u306e\u4fe1\u983c\u6027\u3092\u4f4e\u4e0b\u3055\u305b\u3001\u4e0d\u5b89\u611f\u3092\u717d\u308b\u305f\u3081\u306b\u3001\u30c7\u30a3\u30b9\uff0f\u30df\u30b9\u30a4\u30f3\u30d5\u30a9\u30e1\u30fc\u30b7\u30e7\u30f3\u3084\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3092\u7279\u5b9a\u5730\u57df\u306e\u6c11\u9593\u4eba\u306b\u884c\u3046\u3053\u3068\u306a\u3069\u304c\u3042\u308b\u3053\u3068\u304c\u306e\u3079\u3089\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u305d\u3057\u3066\u3001\u3053\u306e\u76ee\u7684\u306f\u3001<\/p>\n<ul>\n<li>\u69cb\u7bc9\u7684\u60c5\u5831\u5de5\u4f5c(Constructive IOs )<\/li>\n<\/ul>\n<blockquote><p>\u30bf\u30fc\u30b2\u30c3\u30c8\uff0f\u30aa\u30fc\u30c7\u30a3\u30a8\u30f3\u30b9\u306b\u4e00\u8cab\u3057\u305f\u7269\u8a9e\uff08\u5171\u7523\u4e3b\u7fa9\u3084\u8cc7\u672c\u4e3b\u7fa9\u306a\u3069\u306e\u30a4\u30c7\u30aa\u30ed\u30ae\u30fc\uff09\u3092\uff08\u518d\uff09\u78ba\u7acb\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3059\u308b\u3002<\/p><\/blockquote>\n<ul>\n<li>\u7834\u58ca\u7684\u60c5\u5831\u5de5\u4f5c(Disruptive IO)<\/li>\n<\/ul>\n<blockquote><p>\u7834\u58ca\u7684IO\u306f\u3001\u51fa\u73fe\u3057\u3066\u3044\u308b\u307e\u305f\u306f\u65e2\u5b58\u306e\u7269\u8a9e\u306b\u5bfe\u3057\u3066\u7834\u58ca\u7684\u307e\u305f\u306f\u7834\u58ca\u7684\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u3066\u3044\u308b\u3002<\/p><\/blockquote>\n<p>\u305d\u306e\u305f\u3081\u3001\u72af\u7f6a\u3084\u79fb\u6c11\u306a\u3069\u3001\u975e\u5e38\u306b\u5206\u65ad\u7684\u3067\u8ad6\u4e89\u306e\u7684\u3068\u306a\u3063\u3066\u3044\u308b\u554f\u984c\u306b\u95a2\u9023\u3057\u305f\u6d3b\u52d5\u304c\u884c\u308f\u308c\u308b\u3053\u3068\u304c\u591a\u3044\u3002\u4e00\u822c\u7684\u306a\u30ec\u30d9\u30eb\u3067\u306f\u3001\u3053\u308c\u306f\u4f8b\u3048\u3070\u3001\u4e0d\u4fe1\u611f\u3092\u717d\u308b\u305f\u3081\u306b\u793e\u4f1a\u306e\u30a2\u30af\u30bf\u30fc\u3092\u5168\u4f53\u7684\u306b\u504f\u3089\u305b\u308b\u3053\u3068\u3092\u610f\u5473\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u30b0\u30eb\u30fc\u30d7\u30ec\u30d9\u30eb\u3067\u306f\u3001\u4e3b\u8981\u306a\u653f\u7b56\u6c7a\u5b9a\u8005\u306e\u610f\u601d\u6c7a\u5b9a\u3084\u610f\u898b\u5f62\u6210\u306e\u30d7\u30ed\u30bb\u30b9\u3092\u6df7\u4e71\u3055\u305b\u308b\u305f\u3081\u306b\u3001\u5f7c\u3089\u306b\u507d\u60c5\u5831\u3092\u5e83\u3081\u308b\u3053\u3068\u3082\u3042\u308a\u307e\u3059\u3002\u500b\u4eba\u30ec\u30d9\u30eb\u3067\u306f\u3001\u7279\u5b9a\u306e\u4eba\u7269\u306b\u5acc\u304c\u3089\u305b\u3092\u3057\u305f\u308a\u3001\u516c\u306e\u5834\u306b\u53c2\u52a0\u3059\u308b\u610f\u6b32\u3092\u5931\u308f\u305b\u305f\u308a\u3059\u308b\u3053\u3068\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u6563\u6f2b\u60c5\u5831\u5de5\u4f5c(distractive IOs)<\/li>\n<\/ul>\n<blockquote><p>\u6563\u6f2b\u60c5\u5831\u5de5\u4f5c\u3068\u3044\u3046\u306e\u306f\u3001\u7279\u5b9a\u306e\u4e9b\u7d30\u306a\u554f\u984c\u3084\u884c\u52d5\u306b\u6ce8\u610f\u3092\u5f15\u304d\u3064\u3051\u3066\u3001\u4eba\u3005\u306e\u6ce8\u610f\u3092\u305d\u3089\u3059\u3053\u3068\u3092\u76ee\u7684\u3068\u3059\u308b\u3002<\/p><\/blockquote>\n<p>\u3053\u306e\u3088\u3046\u306a\u6d3b\u52d5\u306f\u3001\u60c5\u5831\u74b0\u5883\u306b\u7126\u70b9\u3092\u5f53\u3066\u3001\u4ee3\u66ff\u30e1\u30c3\u30bb\u30fc\u30b8\u3067\u5e0c\u91c8\u3057\u305f\u308a\u3001\u6c3e\u6feb\u3055\u305b\u305f\u308a\u3001\u6bd2\u3092\u76db\u3063\u305f\u308a\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u6d3b\u52d5\u306f\u3001\u4f8b\u3048\u3070\u3001\u865a\u507d\u306e\u7533\u3057\u7acb\u3066\u3084\u9ad8\u5ea6\u306a\u7591\u60d1\u306b\u3088\u3063\u3066\u516c\u5171\u306e\u8b70\u8ad6\u3092\u4e57\u3063\u53d6\u308b\u3053\u3068\u3067\u884c\u308f\u308c\u307e\u3059\u3002<\/p>\n<p>\u3068\u3044\u3046\u4e09\u3064\u306b\u5206\u985e\u3067\u304d\u308b\u3068\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<h5>\u30b5\u30a4\u30d0\u30fc\/\u5747\u8861\u5316\u3068\u53ef\u80fd\u5316<\/h5>\n<p>\u540c\u66f8\u3067\u306f\u3001\u73fe\u4ee3\u306e\u30b5\u30a4\u30d0\u30fc\u60c5\u5831\u5de5\u4f5c\u306f\u3001\u65b0\u3057\u3044\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3084\u30b5\u30fc\u30d3\u30b9\uff08\u30bd\u30fc\u30b7\u30e3\u30eb\u30e1\u30c7\u30a3\u30a2\u306e\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3084\u30b5\u30fc\u30d3\u30b9\u306a\u3069\uff09\u3067\u60c5\u5831\u304c\u3069\u306e\u3088\u3046\u306b\u751f\u6210\u3001\u6d41\u901a\u3001\u6d88\u8cbb\u3055\u308c\u308b\u304b\u3060\u3051\u3067\u306a\u304f\u3001\u30e6\u30fc\u30b6\u30fc\u3084\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u304c\u3069\u306e\u3088\u3046\u306b\u76f8\u4e92\u4f5c\u7528\u3057\u3001\u95a2\u4fc2\u3092\u69cb\u7bc9\u3059\u308b\u304b\u3092\u5229\u7528\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u70b9\u3067\u4f1d\u7d71\u7684\u306a\u30d7\u30ed\u30d1\u30ac\u30f3\u30c0\u3068\u7570\u306a\u3063\u3066\u3044\u308b\u3068\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306f\u3001\u5177\u4f53\u7684\u306b\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30b9\u30da\u30fc\u30b9\u306e\u5229\u7528\u306f\u3001\u5f71\u97ff\u529b\u3092\u884c\u4f7f\u3059\u308b\u305f\u3081\u306e\u5927\u304d\u306a\u30a4\u30b3\u30e9\u30a4\u30b6\u30fc\u3001\u30a4\u30cd\u30fc\u30d6\u30e9\u3068\u3057\u3066\u6a5f\u80fd\u3057\u3066\u3044\u308b\u3068\u3044\u3046\u3053\u3068\u3092\u610f\u5473\u3057\u3066\u3044\u308b\u3068\u3057\u3066\u307e\u3059\u3002<\/p>\n<p>\u5747\u8861\u5316\u3068\u3044\u3046\u306e\u306f\u3001\u8ab0\u3067\u3082\u3001\u60c5\u5831\u5316\u5de5\u4f5c\u3092\u306a\u3059\u3053\u3068\u304c\u3067\u304d\u308b\u3088\u3046\u306b\u306a\u3063\u305f\u3068\u3044\u3046\u3053\u3068\u3067\u3059\u3002\u4e00\u65b9\u3001\u6280\u8853\u306e\u9032\u6b69\u306b\u3088\u3063\u3066\u60c5\u5831\u5316\u5de5\u4f5c\u304c\u3001\u53ef\u80fd\u306b\u306a\u3063\u305f\u3068\u3044\u3046\u3053\u3068\u3082\u610f\u5473\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u304c\u3001\u30a4\u30cd\u30fc\u30d6\u30e9\u3068\u3057\u3066\u306e\u6a5f\u80fd\u3068\u3044\u3046\u3053\u3068\u306b\u306a\u308a\u307e\u3059\u3002\u5177\u4f53\u7684\u306a\u3082\u306e\u3068\u3057\u3066\u306f\u3001\u305d\u306e\u5373\u6642\u6027\u3001\u30b9\u30b1\u30fc\u30eb\u3001\u4f4e\u30b3\u30b9\u30c8\u306a\u3069\u304c\u305d\u306e\u53ef\u80fd\u6027\u3092\u62e1\u5927\u3057\u3066\u3044\u308b\u3068\u3044\u3046\u3053\u3068\u304c\u3044\u3048\u308b\u308f\u3051\u3067\u3059\u3002\u305d\u3057\u3066\u3001\u3053\u308c\u306f\u3001\u73fe\u4ee3\u306e<\/p>\n<blockquote><p>\u30e1\u30c7\u30a3\u30a2\u306f\u3001\u30a4\u30f3\u30d5\u30a9\u30c6\u30a4\u30f3\u30e1\u30f3\u30c8\u3084\u30bb\u30f3\u30bb\u30fc\u30b7\u30e7\u30ca\u30eb\u306a\u30cb\u30e5\u30fc\u30b9\u3068\u3044\u3046\u6ce8\u76ee\u3092\u96c6\u3081\u308b\u30d3\u30b8\u30cd\u30b9\u30e2\u30c7\u30eb\u306b\u5411\u3051\u3066\u5546\u696d\u7684\u306b\u518d\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u305f\u3081\u3001\u771f\u507d\u306b\u304b\u304b\u308f\u3089\u305a\u3001\u793e\u4f1a\u306e\u5e83\u3044\u7bc4\u56f2\u306b\u308f\u305f\u3063\u3066\u60c5\u5831\u306e\u4f1d\u64ad\u3068\u62e1\u6563\u306e\u901f\u5ea6\u304c\u5927\u5e45\u306b\u5411\u4e0a\u3057\u3066\u3044\u307e\u3059\u3002<\/p><\/blockquote>\n<p>\u3068\u3044\u3046\u3053\u3068\u306b\u306a\u308a\u307e\u3059(\u540c\u66f814\u9801)\u3002<\/p>\n<p>\u3055\u3089\u306b\u3001\u691c\u8a3c\u3055\u308c\u3066\u3044\u306a\u3044\u30cb\u30e5\u30fc\u30b9\u3067\u3082\u5e83\u304f\u5171\u6709\u3055\u308c\u3001\u307f\u3068\u3081\u3089\u308c\u308b\u3053\u3068\u3067\u3001\u300c\u5e7b\u60f3\u5fc3\u7406\u52b9\u679c(\u201cillusory truth effect\u201d)\u300d\u304c\u767a\u751f\u3057\u3066\u3001\u8a8d\u77e5\u306e\u6020\u60f0\u3055\u304b\u3089\u3001\u60c5\u5831\u3092\u4fe1\u983c\u3067\u304d\u308b\u3082\u306e\u3068\u8003\u3048\u3066\u3057\u307e\u3046\u3068\u3044\u3046\u3053\u3068\u304c\u6307\u6458\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3081\u308c\u3089\u306b\u3088\u308a\u3001\u30b5\u30a4\u30d0\u30fc\u60c5\u5831\u5de5\u4f5c\u304c\u3001\u52b9\u679c\u3092\u5897\u52a0\u3057\u3066\u304a\u308a\u3001\u307e\u305f\u3001\u6700\u9069\u5316\u3055\u308c\u3066\u3044\u308b\u3002<\/p>\n<p>\u3053\u3053\u3067\u3001AI\u6280\u8853\u3001\u30bd\u30fc\u30b7\u30e3\u30eb\u30e1\u30c7\u30a3\u30a2\u306e\u5e83\u304c\u308a\u306e\u3082\u3068\u3001\u56fd\u3084\u6c11\u9593\u4f01\u696d\u306b\u3088\u308b\u5fc3\u7406\u5b66\u7684\u30c7\u30fc\u30bf\u306e\u53ce\u96c6\u3001\u5206\u6790\u3001\u5229\u7528\u304c\u5bb9\u6613\u306b\u306a\u3063\u3066\u3044\u308b\u3002\u3053\u306e\u4f8b\u304c\u30b1\u30f3\u30d6\u30ea\u30c3\u30b8\u30a2\u30ca\u30ea\u30c6\u30a3\u30ab\u306e\u4e8b\u4ef6\u3068\u3044\u3046\u3053\u3068\u306b\u306a\u308b\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"\u5f71\u97ff\u5de5\u4f5c\u306e\u5b9a\u7fa9-CSS CYBER DEFENSE \u201cCyber Influence Operations: An Overview and Comparative Analysis\u201d\u3092\u8aad\u3080(1)\u3067\u3001\u5f71\u97ff\u5de5\u4f5c\u3092\u985e\u4f3c\u306e\u6982\u5ff5 [&hellip;]","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[11,37,38,5],"tags":[],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8IUOX-Ia","_links":{"self":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts\/2738"}],"collection":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2738"}],"version-history":[{"count":1,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts\/2738\/revisions"}],"predecessor-version":[{"id":2739,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts\/2738\/revisions\/2739"}],"wp:attachment":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}