Global Data Shock by Robert Mandel;

Global Data Shock by Robert Mandel;

Author:Robert Mandel; [Mandel, Robert]
Language: eng
Format: epub
Publisher: Stanford University Press
Published: 2018-12-31T21:00:00+00:00


4

Emerging Case Patterns

THE CASE STUDIES IN CHAPTER 3 flesh out key variations in how strategic manipulation affects global security under information overload. Tables 4.1, 4.2, 4.3, and 4.4 display twenty indicators about the case background context, case initiator offensive manipulation, case target defensive response, and case strategic outcome. The case background context includes the initiator identity, the initiator type, the target identity, the target type, and the incident date. The case offensive manipulation includes initiators’ security goal, confrontation trigger, manipulation type, exposure to information overload, and action thrust. The case defensive response includes targets’ response capacity, power disadvantage, security reaction, citizen attitude, and outside aid. Last, the case strategic outcome includes the security impact, the short-run effectiveness, the long-run success, the legitimacy image, and the unintended effects.

Broad Case Trends

Overall, information overload played a significant role in enhancing both the probability of manipulation and the range of available manipulation techniques. Strategic ambiguity, deception, and surprise were often extremely effective—with relatively low short-term costs—in advancing immediate security objectives. Although national governments possess certain advantages in access to and control of manipulation instruments, the two cases with nonstate manipulation initiators—the 2001 9/11 terrorist attacks and the 2016 Brexit vote to leave the EU—show that nonstate groups can be just as successful as states in distorting or falsifying information. However, despite its pervasiveness, the perceived legitimacy of strategic manipulation use is relatively low and usually generated significant consequences affecting the initiator’s international relations.

Table 4.1 Case background context



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.