You are on page 1of 12

Business Horizons (2021) 64, 763e774

Available online at www.sciencedirect.com

ScienceDirect
w w w. j o u r n a l s . e l s e v i e r. c o m / b u s i n e s s - h o r i z o n s

Misinformation, disinformation, and fake


news: Cyber risks to business
Pythagoras N. Petratos a,b

a
Coventry University Business School, William Morris Building, 94 Gosford Street,
Coventry CV1 5DL, UK
b
City University of London, London, UK

KEYWORDS Abstract Misleading information is an emerging cyber risk. It includes misinforma-


Disinformation; tion, disinformation, and fake news. Digital transformation and COVID-19 have
Misinformation; exacerbated it. While there has been much discussion about the effects of misinfor-
Fake news; mation, disinformation, and fake news on the political process, the consequences
Cyber risks; of misleading information on businesses have been far less, and it can be argued
Cybersecurity insufficiently, examined. The article offers a primer on misleading information
and cyber risks aimed at business executives and leaders across an array of indus-
tries, organizations, and nations. Misleading information can have a profound effect
on business. I analyze different misleading information types and identify associ-
ated cyber risks to help businesses think about these emerging threats. I examine
in general the cyber risk posed by misleading information on business, and I explore
in more detail the impact on healthcare, media, financial markets, and elections
and geopolitical risks. Finally, I offer a set of practical recommendations for orga-
nizations to respond to these new challenges and to manage risks.
ª 2021 Kelley School of Business, Indiana University. Published by Elsevier Inc. All
rights reserved.

1. The importance of information technologies that integrates physical, digital, and


biological spheres and systems. This trans-
The information age is all around us; the third in- formation of businesses and societies also presents
dustrial revolution, grounded in new information new risks (Schwab, 2016). As defined by Kaplan and
technologies (IT), spread throughout the world and Haenlein (2019, p. 679), digital transformation is
transformed business (Dosi & Galambos, 2013). “the integration of digital technology into all areas
The fourth industrial revolution, building on the of society, and the changes that result from this
third, is characterized by a fusion of emerging integration.” It extends beyond the business world
and impacts governments and public administra-
tion, among others (Kaplan & Haenlein, 2019). The
E-mail address: pythagoras.petratos@coventry.ac.uk fourth industrial revolution is disrupting nearly

https://doi.org/10.1016/j.bushor.2021.07.012
0007-6813/ª 2021 Kelley School of Business, Indiana University. Published by Elsevier Inc. All rights reserved.
764 P.N. Petratos

every industry worldwide (Schwab, 2016). Thus, first define and analyze the various types of
digital transformation is a key challenge for busi- misleading information. Then, I link misleading
nesses (Saarikko et al., 2020). Digitized informa- information with cyber risks and examine the
tion is becoming an essential element of products general impact on business. I analyze the impact
and services, and also of enterprise systems and of misleading information on the healthcare
businesses, in which digital and physical compo- sector, media, financial services, and elections and
nents are integrated (Saarikko et al., 2020). In- geopolitical risks, since these present key chal-
formation that businesses use and create, and the lenges for business and society, especially in the
wide spectrum of technologies used to process this context of COVID-19. Finally, this article attempts
information, can transform industries, reshape to bridge the divide between academic research
business competitive advantage, and spur innova- and real-world practice by providing practical
tion (Porter & Millar, 1985). Obtaining quality in- recommendations for risk management amid
formation is critical for business transformation, misleading information and emerging
performance, and survival. cyberthreats.
Misleading information usually appears in the
forms of misinformation, disinformation, and fake 2. Misleading information:
news. Although this has been a considerable
problem for some time, factors such as the
Misinformation, disinformation, and
continual increase in the frequency and sophisti- fake news
cation of cyberattacks, election interference, and
crises such as the COVID-19 “infodemic,” have 2.1. Misinformation and disinformation
made it a pressing issue for businesses. Misleading
information poses significant threats and risks to First, it is essential to define and clarify what
businesses. The 2013 World Economic Forum’s misinformation, disinformation, and fake news
Global Risk Report highlighted the risk of digital mean. The Oxford English Dictionary (2020) defines
misinformation and connected it directly to misinformation as “wrong or misleading informa-
cyberattacks (Howell, 2013). The risk of digital tion,” a rather broad and inclusive concept. The
disinformation was later realized on a large scale term “misinformation” first appeared in the 16th
in the 2016 U.S. presidential elections and century, and it can be argued that it included el-
throughout the COVID-19 crisis. The impact of ements of other types of information. Today, the
misleading information in these cases was sub- word is generally used to refer to misleading in-
stantial, disrupting democratic institutions, asso- formation created or disseminated without
ciated economic and other policies, public health manipulative or malicious intent (Ireton & Posetti,
services, and the economydand most importantly, 2018). Disinformation (Oxford English Dictionary,
resulting in loss of human life. These large-scale 2020) is defined as:
events can have secondary effects on businesses.
The dissemination of deliberately false in-
At the same time, misinformation at the busi-
formation, esp. when supplied by a govern-
nesses level can threaten brand names and
ment or its agent to a foreign power or to the
potentially affect the consumption of a business’s
media, with the intention of influencing the
product or services (Zhang et al., 2019).
policies or opinions of those who receive it;
The U.S. election issues of 2016 highlighted the
false information so supplied. Cf. black
urgency of the need to reexamine issues of
propaganda.
cybersecurity (NASEM, 2018). While there has been
much discussion about the effects of misinforma- The United Nations considers disinformation to
tion, disinformation, and fake news on the politi- refer to deliberate, often orchestrated attempts
cal process, the consequences of misleading to confuse or manipulate people through deliv-
information on businesses have been far less, and ering dishonest information to them. It includes
it can be argued insufficiently, examined (ABA, information that is false and deliberately created
2019). Research has shown that senior managers and disseminated to harm a person, social group,
facing the challenge of how to handle the oppor- organization, or country (Ireton & Posetti, 2018).
tunities and risks of digital transformation are The European Commission’s (2018) definition of
often unaware of the elements that they should disinformation includes “all forms of false, inac-
consider (Hess et al., 2016; Saarikko et al., 2020), curate, or misleading information” and warns that
including misleading information. In this article, I the risk of harm concerns threats not only to
examine the impact of misinformation, disinfor- democratic processes and values but also to a va-
mation, and fake news cyberthreats to business. I riety of business sectors, such as health, finance,
Misinformation, disinformation, and fake news 765

and more. It defines disinformation as “the crea- Some of these definitions overlap with disinfor-
tion, presentation and dissemination of verifiably mation. An appropriate definition of fake news for
false or misleading information for the purposes of the purpose of this article is, “news articles that
economic gain or intentionally deceiving the pub- are intentionally and verifiably false, and could
lic, and which may cause public harm” (European mislead readers” (Allcott & Gentzkow, 2017, p.
Court of Auditors, 2020). Disinformation “is 213). Additional types of information can be
widely defined as the purposeful dissemination of illegal, such as defamation, hate speech and
false information intended to mislead or harm” incitement, fraud, misrepresentation, and deceit.
according to the U.S. State Department (Nemr & The COVID-19 pandemic has severely affected
Gangware, 2019), which largely coincides with both health and economy. In addition, it has
the other definitions of disinformation. instigated a surge of misleading information. World
Disinformation is a substantially loaded term. It Health Organization Director-General Tedros
can include black propaganda, although experts Adhanom Ghebreyesus, referring to COVID-19,
debate the extent to which disinformation and stated, “We’re concerned about the levels of ru-
propaganda overlap (Jackson, 2017). In addition, it mours and misinformation.we’re not just fighting
encompasses a wide range of methods, such as: an epidemic; we’re fighting an infodemic. Fake
deceptive advertising (in business and in politics); news spreads faster and more easily than this
doctored photographs and manipulation of visual virus, and is just as dangerous” (WHO, 2020).
images; forged documents; historical fabrications; Misinformation and disinformation, both online
fake transmissions; internet fraud; fake websites; and offline, can be harmful to people’s health,
and manipulated Wikipedia entries (Fallis, 2009, reduce the effectiveness of public health mea-
2015). Disinformation can combine a variety of sures, and endanger countries’ abilities to manage
activities either as covert (cyber) operations (e.g., the pandemic (WHO, 2020). COVID-19 is a crucial
social engineering, hacking, troll farms, bots) or as topic for study because it is a rather unusual risk, a
overt actions (e.g., dissemination of disinforma- so-called “black swan,” which has lasted for a
tion in public media or on websites). In addition, considerable period and has raised the profile of
disinformation can have a diverse and inter- emerging cyberthreats.
connected ecosystem of actors, including state-
backed media, social media, proxies, unattribut-
able communication channels, intelligence 3. Cybersecurity, quality of information,
agencies, and cyber criminals (Nemr & Gangware, and increased business risks
2019; U.S. Department of State, 2020).
Many types of cyberattacks use misleading infor-
2.2. Fake news and the “infodemic” mation. Social engineering is the most commonly
used type of cyberattack on organizations (ISACA,
Fake news is defined as “originally U.S. news that 2020). The increase in use of IT technologies led
conveys or incorporates false, fabricated, or to an increase in social engineering techniques, so
deliberately misleading information, or that is that most cyberattacks nowadays include some
characterized as or accused of doing so” (Oxford form of social engineering (ENISA, 2020). Social
English Dictionary, 2020). While the term origi- engineering techniques include pretexting, bait-
nates from the late 19th century, it gained popu- ing, quid pro quo, and tailgating, as well phishing
larity during and after the 2016 U.S. presidential and spear phishing (ENISA, 2020). Phishing, or
election (NATO, 2020). It has been used in “two sending fraudulent communications, is an
main ways: to refer to inaccurate stories circu- increasingly common cyberthreat (Cisco, 2020).
lated on social media and the internet, esp. ones Thus, by definition, phishing is using misleading
which serve a particular political or ideological information. Phishing is one of the most potent
purpose; or to seek to discredit media reports threats, especially to businesses, and has evolved
regarded as partisan or untrustworthy” (Oxford into an industry on its own (Boddy, 2018). It is a
English Dictionary, 2020). Although there is no “sustained, all-out assault on business,” with likely
universal definition, fake news “generally refers to daily or hourly frequency across all businesses, and
misleading content found on the internet, espe- with a staggering 77% of businesses experiencing a
cially on social media” (Jackson, 2017). A survey phishing attack at least once a month (Boddy,
on the definition of fake news found that there are 2018, p. 9). The average wire-transfer cyber-
six types: news satire; news parody; fabrication; attack in 2020 resulted in a US $80,183 cost, and
photo manipulation; advertising and public re- one Russian operation targeted companies for an
lations; and propaganda (Tandoc et al., 2018). average loss of $1.27 million (APWG, 2020).
766 P.N. Petratos

Advanced persistent threats (APTs) form the extensively used by cyberattackers. In the early
second most common type of cyberattack (10%), days of COVID-19, there was an increase of more
after social engineering (15%; ISACA, 2020). APTs than 6,000% in coronavirus-themed spam (Parham
involve sophisticated levels of expertise and sig- & Whitmore, 2020). Within the abundance of
nificant resources. They use multiple attack COVID-19 themes, there are many hidden threats.
methods, most notably deception, to disrupt or- Attackers use COVID-19 disinformation to imper-
ganizations’ missions, business functions, and in- sonate brands, thereby misleading employees and
formation systems (NIST, 2015). APTs share customers in a range of malspams, phishing at-
commonalities with disinformation, such as high tacks, and ransomware (Deloitte, 2020). Cyber-
sophistication and substantial resources. APTs can threats and risks remain at high levels, having
utilize disinformation’s covert cyberoperations increased significantly during the pandemic. In
(i.e., social engineering), overt actions, and a addition, industries such as healthcare and finan-
range of actors. Cyberthreat actors (CTAs) can cial services face the most security challenges
have a diverse and significant impact on business. (Panda, 2020).
Cybercriminals remain the top exploiters (22%),
often using phishing (ISACA, 2020). Another note-
4. Misleading information and cyber risks
worthy category of actors is nation/state (9%;
ISACA, 2020). Although this percentage might seem to business sectors
relatively small, a nation/state cyberattack can
have a devastating impact on organizations. At the 4.1. COVID-19, misleading information, and
same time, it is likely that the vast majority of cyber risks to healthcare
businesses cannot be protected against such so-
phisticated and wealthy actors. Moreover, nation The healthcare and public health sector has been
states can employ other CTAs, such as criminal designated as critical infrastructure (CISA, n.d.).
groups, insiders, and other hackers, thus Healthcare is one of the most valuable sectors in
increasing their cyberthreat. The intersection is business, encompassing numerous industries and
such that nation states and APTs have been used accounting for more than 10% of the world’s gross
interchangeably (CIS, 2021). domestic product (Deloitte, 2020). The healthcare
The COVID-19 pandemic has changed the sector is experiencing significant digital trans-
broader threat landscape. It has not only intensi- formation and interoperability, fueled by unprec-
fied the existing risks but has also generated edented advancements in technologies such as
emerging threats. Large-scale adoption of work- cloud computing, open platforms, and a connected
from-home technologies, increased activity on infrastructure of digital health known as the
customer-facing networks, and greater general use Internet of Medical Things (Deloitte, 2020). A re-
of online services in response to the pandemic view of digital transformation revealed that health
have exacerbated cyber risks (ICC, 2020). All of information technology faces many challenges
these factors have increased the attack surface that can affect cybersecurity (e.g., design,
and cyber risks of corporations and customers. implementation, keeping up with new technolo-
COVID-19 is fueling cyberattacks on businesses as gies). One highly controversial area is the privacy
well as on governments, critical infrastructure, and security of health information (Agarwal et al.,
and homes, and attacks have become more so- 2010). While the sector has experienced significant
phisticated, targeted, widespread, and unde- benefits from digital transformation, as more de-
tected (ENISA, 2020). An assessment by Interpol vices and applications are connected to healthcare
(2020) of the impact of COVID-19 on cybercrime networks, they create cyber risks for business
found a shift from individuals and small businesses assurance and operations (e.g., slowdowns, avail-
to major corporations, governments, and critical ability, and vulnerabilities; Haggerty, 2017).
infrastructure. At the same time, micro, small, The healthcare sector relies heavily on digital
and medium-sized enterprises and their workers, technologies, which increase cyber risks (Luna
as well as entrepreneurs and the self-employed, et al., 2016). A systematic review of digital
remain among the hardest hit (ICC, 2020). It has transformation in the healthcare sector found that
also been shown that the rapid spread of misin- a major concern is the security and privacy of
formation and fake news can be used to facilitate medical information (Marques & Ferreira, 2019).
the execution of cyberattacks (Interpol, 2020). It Another systematic review of cyber risks in the
was found that phishing scams increased by 667% health sector identifies significant cyber risks to
in one month during the pandemic (ENISA, 2020). the detriment of companies and individuals,
Disinformation, often with a coronavirus theme, is including COVID-19, which has seriously affected
Misinformation, disinformation, and fake news 767

cybersecurity (Sardi et al., 2020). In addition, certain states and companies (Stubbs, 2020).
healthcare has inherent weaknesses in its security There were also attacks on the U.S. Department of
and therefore faces larger cyber risks in compari- Health and Human Services, attacks on the Czech
son with other sectors (Martin et al., 2017). Republic’s largest COVID-19 testing laboratories,
Therefore, digital transformation in healthcare and phishing attacks on the vaccine “cold chain,”
can generate cyberthreats and increase an orga- the transportation and storage environment of
nization’s attack surface. vaccines (Stilgherrian, 2020). Cyberattacks against
Another important cyber risk is network capac- healthcare and medical organizations have inten-
ity and operations. There are increasing demands sified during the pandemic with the participation
on healthcare networks, putting them under strain of state-backed spies, and state-sponsored groups
(Haggerty, 2017). The requirements for more IT have targeted seven COVID-19 vaccine makers
systems, network capacity, and speed, and the (Stilgherrian, 2020; Stubbs, 2020). The cyber risks
resulting complexity of these systems, also affect have increased so much that “all CISOs and
healthcare cybersecurity risks. There are emerging healthcare [organizations], are seeing attempted
cyber risks in network infrastructure and protocol penetrations by nation-state actors, not just North
vulnerabilities (Jang-Jaccard & Nepal, 2014). On Korea, every single minute of every single day”
top of the already increasing demands for medical (Cimpanu, 2020). State-sponsored attacks are
IT services, COVID-19 puts even more of a burden particularly likely to use disinformation in their
on healthcare IT systems and networks. First, campaigns.
COVID-19 boosted the demand for healthcare ser-
vices in general, and therefore also for IT services. 4.2. Media, digital transformation, and
Second, the COVID-19 infodemic generates a great misleading information
deal of data, which can further put a strain on the
healthcare IT infrastructure. To counter and stop The media business has been continuously exposed
misinformation, disinformation, and fake news, to technology-induced change and transformation
international organizations, governments, health- (Martens et al., 2018). One of the biggest trans-
care providers, and stakeholders provide COVID-19 formations in the media industry occurred toward
information, which requires additional IT resources the end of the 19th century. This transformation
(CISA, n.d.; WHO, 2020). Owing to the rapid spread occurred after the rise of a new form of reporting
of coronavirus, and in some cases to lockdowns, and business model called the “yellow” press.
the public relied on and demanded online sources Around the same time, the term “fake news” was
from which to acquire health information and to coined in 1890 in an article in the Milwaukee Daily
limit misinformation (Le et al., 2020). These Journal (Oxford English Dictionary, 2020). Yellow
trends have significantly affected demand for IT press encouraged new forms of reporting, such as
services and increased cyber risks, and many of fake news, as well as misinformation and disin-
them are related to misleading information. formation, although these terms were not yet in
Healthcare is one of the most targeted sectors, common use.
and only half of its associated businesses think Digital technologies have brought about another
they have the ability to defend themselves from media transformation. A key characteristic of
cyberattacks (Martin et al., 2017). Four-fifths of digital transformation is the transition from a
executives of healthcare providers and payer linear business model and offline news publishing
businesses said that their information technology to a multisided market/platform business model
systems have been compromised by cyberattacks and online news publishing (Martens et al., 2018).
(Bell & Ebert, 2015). Cybersecurity breaches range The shift from an offline to an online business
from health information theft to ransomware at- model increases cyber risks. Social media is
tacks on hospitals and even on implanted medical another important transformational innovation in
devices (Coventry & Branley, 2018). Another major the media industry. It is widely agreed that social
cyber risk for both providers and payers in media is internet-based and that it constitutes a
healthcare is financial loss and fraud (Bell & Ebert, communication media channel (Carr & Hayes,
2015). Healthcare has the highest average industry 2015; Kaplan & Haenlein, 2019).
cost of data breach at $7.13 million (IBM, 2020). Yellow journalism became widespread through
The recent unprecedented attacks on specific the efforts of newspaper publishers Joseph Pulit-
healthcare organizations are another emerging zer and William Hearst. Newspapers completed
threat. For example, in the attack on the European the transition from stand-alone shops to giant in-
Medicines Agency, hackers accessed COVID-19 dustrial enterprises of news commercialization;
vaccine data that could be extremely valuable to consequently, this mass communications industry
768 P.N. Petratos

gave rise to mass production and mass marketing information can overlap. Disinformation is an
(Daly, 2018). This mass marketing was facilitated important feature of social media. Many state ac-
by keen advertisers, and as a result, newspapers tors are involved in spreading disinformation on
became more dependent on advertising revenue social media platforms, exploiting them to exer-
(Daly, 2018; Griffin, 2019). Yellow journalism in cise power (Bradshaw & Howard, 2018). More than
the 1890s had profound effects not only on busi- half of regular internet users globally are con-
ness but also, and more importantly, on society cerned about the threat posed by disinformation
and public opinion. Newspapers attracted larger found in social media platforms (Knuutila et al.,
audiences and grew enormously, partly because of 2020). Fake news websites, politicians, partisan
the sensational style of reporting fake news. The media outlets, mainstream media, governments,
most noteworthy episode of the Hearst-Pulitzer and other actors have overlapping roles in pro-
yellow press competition is the Spanish-American ducing and amplifying disinformation in the social
War of 1898, which created significant geopolit- media ecosystem (Tucker et al., 2018). Motivations
ical tensions. The “incredulous news” played a can differ too. State-sponsored actors with politi-
significant role in leading the U.S. into this war cal motivation engage in disinformation cam-
(CITS, 2021). The apotheosis of the yellow press paigns. On the other hand, North Macedonian
came with the sinking of the USS Maine, and the teenagers with financial incentives from the small
uproar for war reached a peak (Daly, 2018). Both town of Veles launched more than 140 U.S. polit-
Hearst and Pulitzer published details from a “top- ical websites to spread fake news in order to get
secret” cable, which turned out to be fake, paid for ad clicks (Kshetri & Voas, 2017). The case
involving the secretary of the navy and hinting that of the North Macedonian actors highlights the
the sinking of the USS Maine was not an accident broader issue of financial motivation, value crea-
(Daly, 2018). Although the yellow press largely tion, and social media business models. With “in-
declined in the early 20th century (Daly, 2018), fluence” being a key concept in social media
tabloids continue to retain this style. Tabloid marketing, businesses are trying to increase their
journalism, “with a sensationalist approach and an reach and to increase ad clicks, which are a major
easily digested mix of entertainment and news, it revenue stream (Hanna et al., 2011). As with the
has often attracted mass audiences . today yellow press, some social media outlets sensa-
considered to characterize a range of other media tionalize or distort news and information in order
content, extending to popular TV programs and to become more attractive to specific audiences.
certain kinds of online news,” therefore presents
many similarities with yellow press (Johansson, 4.3. Misleading information and financial
2020). markets
Fake news resurfaced during the 2016 U.S.
presidential election, raising concerns for a num- The first time that the term “fake news” was used
ber of reasons: The majority of U.S. adults obtain in the Milwaukee Daily Journal, it concerned a
their news via social media; the most popular fake mining business. Mining was an important business
news items were more widely shared on social venture in the U.S., especially during that era of
media; many people believe in fake news; and mining exploration. Fake news about mines could
fake news is partisan (Allcott & Gentzkow, 2017). affect the associated investors and stakeholders,
There is substantial literature on fake news and stocks, and industries. And still today, fake news,
social media. A literature review of political po- and especially fake financial news, can be aimed
larization and social media concludes that there is at certain domains and themes (Zhang & Ghorbani,
“broad scholarly agreement regarding the high 2020). Social media financial bots spread disinfor-
prevalence of misinformation and propaganda in mation and are involved in speculative campaigns
online platforms” (Tucker et al., 2018, p. 15). In promoting specific stocks (Tardelli et al., 2020).
addition to the dissemination of fake news by Kogan et al. (2020) studied fake news in financial
particular websites, a review and synthesis of the markets and found that it increases abnormal
literature suggests that mainstream news media trading activity by more than 50% and price vola-
play a significant and important role in further tility by approximately 40%, and that misleading
spreading fake news (Tsfati et al., 2020). information can impact economic as well as social
There is not much consensus across the aca- and political relationships. Fake news stories
demic literature on how to define many of the generate significantly more attention regarding
phenomena associated with fake news (Tucker stock price reaction than legitimate news (Clarke
et al., 2018). As we discussed in the quality of in- et al., 2020). While fake news can affect trading
formation section, different types of misleading volumes around the time of its release, the stock
Misinformation, disinformation, and fake news 769

market appears to eventually regain its equilib- Chairman Jay Clayton stated that the 2020 U.S.
rium (Clarke et al., 2020). During the COVID-19 presidential elections and the pandemic cyber
pandemic, the stock market’s reaction to corona- risks “are there more than ever,” and corporations
virus news reveals that fake news has a negative, should be vigilant about these cyberthreats
nonlinear influence on returns (Cepoi, 2020). (Stankiewicz & Pisani, 2020).
Although existing research suggests that, in gen-
eral, financial markets account for the effects of 4.4. Elections, disinformation, and
fake news appropriately, there are some trading geopolitical risks
volume and stock price reactions that indicate
market biases. The discussion above leads us to a closer exami-
Cyberattacks on financial markets have fol- nation of elections. In the 2016 U.S. presidential
lowed similar increasing trends during the election, state actors used social media campaigns
pandemic. Globally, up to 90% of banking and in- to spread disinformation aimed at dividing the
surance workers may be working from home American electorate and undermining confidence
(Krohn, 2020). In addition, the demand for online in U.S. democratic institutions (NASEM, 2018). The
financial services has risen owing to technology disinformation campaigns were accompanied by
trends and the transformation of financial services other methods and probes of the U.S. voting
by financial technology, and because of the rising infrastructure (NASEM, 2018). The Joint Analysis
need for online and other digital services during Report identifies that APTs 28 and 29 used spear
the pandemic. Therefore, the attack surface of phishing campaigns to target U.S. government of-
both employees and customers has substantially ficials, and in the course of the campaign, a po-
increased, and cyber risks need to be reevaluated litical party was compromised (U.S. Department of
accordingly. With financial gain a primary motiva- Homeland Security, 2016). These were emerging
tion of cyberattackers, financial markets and ser- and unprecedented cyberthreats that deployed
vices remain a key target. The lockdown also novel forms of misleading information. The Mueller
increased the threats by cyber criminals to commit (2019) Report outlines three findings related to
financial crime (Mirfin, 2020). Cyberattacks and disinformation: (1) Military units 26165 and 74455
anti-money laundering violations could further of the General Staff of the Russian Army carried
exacerbate operational and reputational risks out computer intrusions while conducting large-
during the pandemic (Crisanto & Prenio, 2020). scale spear phishing campaigns; (2) the spear
Financial authorities and institutions instruct their phishing campaign also targeted corporations and
staff, as part of their COVID-19 training, on how to used their products, such as Google email, Micro-
deal with fraudulent communications, social en- soft Word documents, and web hosting and voting
gineering schemes, and fake reports (Crisanto & technology companies; and (3) social media were
Prenio, 2020), which is further evidence that used for obtaining campaign finances, personal
disinformation is often used in cyberattacks identifying and financial information, fundraising
against financial services. files and information, information about busi-
Elections lie on the intersection of politics and nesses, foreign corporations and purchases, money
financial markets. There is an extensive literature laundering, and even bitcoins.
on the effects of elections on economic perfor- Moving from elections to broader geopolitical
mance and financial markets (Wisniewski, 2015). risks, the Obama administration ejected 35 sus-
Wolfers and Zitzewitz (2016) studied the 2016 U.S. pected Russian intelligence operatives from the
presidential election and found movements in U.S. and imposed sanctions on two leading Russian
financial market volatility, including effects on the intelligence services and companies (Sanger,
U.S., U.K., and Asian stock markets, as well as on 2016). The cyber-related sanctions program of
oil prices and currencies, suggesting that markets the U.S. Department of the Treasury began in
were responding to election-related news. Some 2015. It declared a national emergency to deal
commentators have suggested that the 2016 with the unusual and extraordinary threat to the
presidential election outcome was influenced by national security, foreign policy, and economy of
fake news (Allcott & Gentzkow, 2017). Fake news the U.S. constituted by cyber-enabled activities
can have an immediate effect around the election originating from outside the country, and it was
period. In addition, fake news and disinformation amended in 2016 to include sanctions related to
campaigns can have a more profound effect on election processes or institutions (U.S. Department
financial markets and on the economy if they can of the Treasury, 2017). It is a framework to protect
determine or influence election outcomes. The businesses from, among other things, misappro-
U.S. Securities and Exchange Commission priation from outside the U.S. through cyber-
770 P.N. Petratos

enabled commercial or competitive advantage or development of legacy systems, as well as


private financial gain, and from theft of trade se- contemporary systems, into more effective and
crets (U.S. Department of the Treasury, 2017). The secure forms largely depends on the digital
department has applied this framework and transformation strategy. Businesses have to
imposed sanctions for “cyber operations to inter- decide which digital transformation strategy to
fere with the 2016 election and a wide range of follow based on a variety of criteria, including
other malign activities” (U.S. Department of the cyber risks.
Treasury, 2018).
Ahmad et al. (2019) found that APTs are used by 5.2. Recognize, detect, and assess cyber
nation-states to attack corporations and govern- risks
ments, to steal intellectual property, and to gain
competitive advantage. APTs containing disinfor- First, it is necessary for business executives and
mation have targeted the intellectual property of leaders to recognize the existence of cyber risks.
corporations. For example, APT 1, a Chinese cyber In order to recognize cyberthreats, it is crucial to
espionage unit, has systematically stolen intellec- have the capabilities to detect them. A main
tual property from over 141 organizations (Ghafir & concern is the limited ability of healthcare busi-
Prenosil, 2014). Intellectual property theft vic- nesses to understand, track, report, and manage
timizes companies of every size, and China is cyberthreats effectively (Bell & Ebert, 2015). This
responsible for most of it (Blair et al., 2017). problem is exacerbated because cyberattacks
Cyberattacks on intellectual property and corpo- have become more sophisticated and because
rations are usually performed by states or state- their volume has increased substantially during the
sponsored actors and are complex, involving APT pandemic. Detection is not only a problem in
phishing and the use of disinformation. Cyber risks healthcare but in other sectors. Attackers improve
have spread into other areas, such as geopolitics and adapt their methods; for example, phishers
and trade. Cyber demands were part of the trade may host on a compromised domain to avoid
negotiations that aimed to end the trade dispute detection (Jang-Jaccard & Nepal, 2014). Many or-
between the U.S. and China (Mitchell & Politi, ganizations fail to detect attacks, and in 2019, a
2019). This indicates this type of cyberthreat quarter of all breaches remained undetected for
could remain a significant risk for businesses. months (Champion, 2020). Another essential ac-
tion is to understand misleading information cyber
risks and their impacts on business. While some of
5. Recommendations for managing these risks, such as fake news, can be detected
misleading information cyber risks and understood rather easily, other complex risks,
such as APTs, are harder to assess. In that sense,
Misinformation, disinformation, and fake news an appropriate risk-assessment framework that
generate significant cyber risks for businesses. captures the effects of misleading information is
There is an urgent need to establish cybersecurity essential.
policies and best practices to manage these
emerging and multifaceted cyberthreats. I provide 5.3. Set and adopt standards and norms
interlinked recommendations that can be used by
business executives and leaders across an array of Cybersecurity standards can manage risk and
industries, sectors, and nations. create resilience (Collier et al., 2014). The United
Nations, with the Organization for Security and Co-
5.1. Generate digital transformation operation in Europe and other organizations, is-
strategies sued a joint declaration setting standards on
disinformation and propaganda (OSCE, 2017). The
We have observed that the trend of digital Code of Practice on Disinformation is a worldwide
transformation prevails across businesses, notably self-regulatory set of standards voluntarily signed
in the healthcare, media, and financial sectors, as by companies (European Commission, 2018). An
we experience the forces of the fourth industrial effective standard should have two key elements:
revolution. To embrace digital transformation, It should encompass both risk assessment and
firms must initially identify what technologies are decision-making models so as to bridge the gap
relevant and how they will be implemented in between empirically derived technical data and
their business settings (Saarikko et al., 2020). It is qualitative judgments and managerial perspec-
generally accepted that legacy systems present tives, such as risk tolerance and strategy (Collier
vulnerabilities and increase risks. The et al., 2014).
Misinformation, disinformation, and fake news 771

5.4. Use and create antimisinformation, 6. Summary


disinformation, and fake news tools
The digital transformation of businesses and soci-
There is a range of tools that combat disinforma- eties presents new risks, and an emerging cyber
tion. These tools have many forms, from websites risk for business is misleading information.
with human fact checkers to apps using artificial Misleading information usually appears in the
intelligence to detect bots, and they are grouped forms of misinformation, disinformation, and fake
into several categories: (1) bot/spam detection; news. This article examined the impact of
(2) codes and standards; (3) credibility scoring; (4) misleading information cyber risks on businesses.
disinformation tracking; (5) education/training; It presented some general effects of attacks, and
(6) verification; and (7) whitelisting (RAND, 2019). then it analyzed specific sectors, notably health-
Businesses can select which of them best suits care, media, financial markets, and elections and
their digital transformation, their overall strategy, geopolitics, that present key challenges for busi-
and their methods of managing misleading infor- ness and society, especially in the context of
mation cyber risks. COVID-19. Finally, this article offered some rec-
ommendations for managing misleading informa-
tion cyber risk: generate digital transformation
5.5. Form partnerships and increase strategies; recognize, detect, and assess cyber
capacity building risks; set and adopt standards and norms; use and
create antimisinformation, antidisinformation,
Partnerships can have many benefits. First, they and anti-fake news tools; and form partnerships
can facilitate the development of standards and and increase investment, which can benefit busi-
national, sectoral, or industry policies. Second, ness executives and leaders across an array of in-
partnerships create economies of scale and scope dustries, sectors, and nations.
in cyberdefenses. Thirddand most importantly
din many cases, it is impossible or extremely
costly for businesses to mitigate the cyber risks References
posed by highly resourceful and sophisticated
state-sponsored attacks. Therefore, cooperation ABA. (2019). Misinformation poses threat to business, political
process. American Bar Association. Available at https://
with the public sector is essential in managing
www.americanbar.org/news/abanews/aba-news-archives/
these cyber risks, possibly in the form of public- 2019/12/misinformation-poses-threat/
private partnerships. Another crucial feature of Agarwal, R., Gao, G., Desroches, C., & Jha, A. K. (2010).
cooperation is capacity building (Awotar-Mauree, Research commentarydthe digital transformation of
2016). Especially in the case of an infodemic, healthcare: Current status and the road ahead. Information
Systems Research, 21(4), 796e809.
when there is a massive flood of misleading in-
Ahmad, A., Webb, J., Desouza, K. C., & Boorman, J. (2019).
formation and cyberattacks, organizations and Strategically-motivated advanced persistent threat: Defini-
nations must cooperate closely to increase de- tion, process, tactics and a disinformation model of coun-
fense capacity. terattack. Computers & Security, 86, 402e418.
Allcott, H., & Gentzkow, M. (2017). Social media and fake news
in the 2016 election. The Journal of Economic Perspectives,
31(2), 211e236.
5.6. Invest sufficiently APWG. (2020, August 27). Phishing activity trends report, 2nd
quarter 2020. Anti-Phishing Working Group. Available at
https://docs.apwg.org/reports/apwg_trends_report_q2_
To implement the above recommendations, busi- 2020.pdf
nesses should invest sufficient funds. Although there Awotar-Mauree, R. (2016). Building cybersecurity capacity
are existing antidisinformation tools and methods, global partnerships. Available at https://rm.coe.int/
the fourth industrial revolution is evolving, and 16806b9932
along with it, new technologies are emerging. It is Bell, G., & Ebert, M. (2015). Health care and cyber security:
Increasing threats require increased capabilities. KPMG.
therefore vital to invest in research and develop- Available at https://assets.kpmg/content/dam/kpmg/pdf/
ment and to find innovative cyberdefenses against 2015/09/cyber-health-care-survey-kpmg-2015.pdf
misleading information. For example, firms could Blair, D., Huntsman, J., Barrett, C., Lynn, W., Gorton, S.,
invest in technology to find fake news through al- Wince-Smith, D., et al. (2017). Update to the IP commission
gorithms and crowdsourcing (West, 2017). At the report. National Bureau of Asian Research. Available at
https://www.nbr.org/program/commission-on-the-theft-
same time, digital transformation strategy should be of-intellectual-property/
supported by appropriate investment aimed at Boddy, M. (2018). Phishing 2.0: The new evolution in cyber-
reducing cyber risks and losses. crime. Computer Fraud & Security, 2018(11), 8e10.
772 P.N. Petratos

Bradshaw, S., & Howard, P. (2018). The global organization of European Court of Auditors. (2020). EU action plan against
social media disinformation campaigns. Journal of Interna- disinformation. Available at https://www.eca.europa.eu/
tional Affairs, 71(1.5), 23e32. Lists/ECADocuments/AP20_04/AP_Disinformation_EN.pdf
Carr, C. T., & Hayes, R. A. (2015). Social media: Defining, Fallis, D. (2009). A conceptual analysis of disinformation.
developing, and divining. Atlantic Journal of Communica- Available at https://www.ideals.illinois.edu/handle/2142/
tion, 23(1), 46e65. 15205
Cepoi, C. (2020). Asymmetric dependence between stock mar- Fallis, D. (2015). What is disinformation? Library Trends, 63(3),
ket returns and news during COVID-19 financial turmoil. 401e426.
Finance Research Letters, 36, 101658. Ghafir, I., & Prenosil, V. (2014). Advanced persistent threat
Champion, A. (2020, October). Cyber attack detection chal- attack detection: An overview. International Journal of Ad-
lenges and how to meet them. F-secure. Available at vances in Computer Networks and Its Security, 4(4), 50e54.
https://www.f-secure.com/gb-en/consulting/our-thinking/ Griffin, B. (2019). Yellow journalism, sensationalism, and cir-
challenges-of-cyber-attack-detection culation wars. New York, NY: Cavendish Square Publishing.
Cimpanu, C. (2020, December 04). Johnson & Johnson CISO: Haggerty, E. (2017). Healthcare and digital transformation.
Healthcare orgs are seeing nation-state attacks every single Network Security, 2017(8), 7e11.
minute of every single day. ZDNet. Available at https:// Hanna, R., Rohm, A., & Crittenden, V. L. (2011). We’re all
www.zdnet.com/article/johnson-johnson-ciso-healthcare- connected: The power of the social media ecosystem.
orgs-are-seeing-nation-state-attacks-every-single-minute- Business Horizons, 54(3), 265e273.
of-every-single-day/ Hess, T., Matt, C., Benlian, A., & Wiesböck, F. (2016). Options
CIS. (2021). Cybersecurity spotlight: Cyber threat actors. Cen- for formulating a digital transformation strategy. MIS Quar-
ter for Internet Security. Available at https://www. terly Executive, 15(2), 123e139.
cisecurity.org/spotlight/cybersecurity-spotlight-cyber- Howell, L. (2013). Global risks 2013. Cologny/Geneva,
threat-actors/ Switzerland: World Economic Forum.
CISA. (n.d.). Healthcare and public health sector. Cybersecurity IBM. (2020). Cost of a data breach report 2020. Available at
and Infrastructure Security Agency. Available at https:// https://www.ibm.com/security/digital-assets/cost-data-
www.cisa.gov/healthcare-and-public-health-sector. breach-report/#/
Cisco. (2020). What are the most common cyber attacks?. ICC. (2020). COVID-19 cyber security threats to MSMEs. Inter-
Available at https://www.cisco.com/c/en/us/products/ national Chamber of Commerce. Available at https://
security/common-cyberattacks.html iccwbo.org/content/uploads/sites/3/2020/05/2020-icc-sos-
CITS. (2021). A brief history of fake news. Center for Informa- cybersecurity.pdf
tion Technology and Society. Available at https://www.cits. Interpol. (2020). INTERPOL report shows alarming rate of
ucsb.edu/fake-news/brief-history cyberattacks during COVID-19. Lyon, France: International
Clarke, J., Chen, H., Du, D., & Hu, Y. (2020). Fake news, Criminal Police Organization.
investor attention, and market reaction. Information Sys- Ireton, C., & Posetti, J. (2018). Journalism, ‘fake news,’ and
tems Research, 32(1), 35e52. disinformation. Paris, France: UNESCO.
Collier, Z. A., Dimase, D., Walters, S., Tehranipoor, M. M., ISACA. (2020). State of cybersecurity 2020. Schaumburg, IL:
Lambert, J. H., & Linkov, I. (2014). Cybersecurity standards: Information Systems Audit and Control Association.
Managing risk and creating resilience. Computer, 47(9), Jackson, D. (2017, October 17). Issue brief: Distinguishing
70e76. disinformation from propaganda, misinformation, and “fake
Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: news.” National Endowment for Democracy. Available at
A narrative review of trends, threats, and ways forward. https://www.ned.org/issue-brief-distinguishing-
Maturitas, 113, 48e52. disinformation-from-propaganda-misinformation-and-fake-
Crisanto, J. C., & Prenio, J. (2020). Financial crime in times of news/
COVID-19: AML and cyber resilience measures. Financial Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging
Stability Institute. Available at https://www.bis.org/fsi/ threats in cybersecurity. Journal of Computer and System
fsibriefs7.pdf Sciences, 80(5), 973e993.
Daly, C. B. (2018). Covering America: A narrative history of a Johansson, S. (2020). Tabloid journalism and tabloidization. Ox-
nation’s journalism. Amherst, MA: University of Massachu- ford Research Encyclopedias: Communication. Available at
setts Press. https://doi.org/10.1093/acrefore/9780190228613.013.877
Deloitte. (2020). COVID-19 executive cyber briefing. Available at Kaplan, A., & Haenlein, M. (2019). Digital transformation and
https://www2.deloitte.com/global/en/pages/risk/covid-19/ disruption: On big data, blockchain, artificial intelligence,
global-cyber-covid-19-weekly-executive-cyber-briefing.html and other things. Business Horizons, 62(6), 679e681.
Dosi, G., & Galambos, L. (2013). The third industrial revolution Knuutila, A., Neuder, L., & Howard, P. (2020). Global fears of
in global business. Cambridge, UK: Cambridge University disinformation. Oxford, UK: Oxford University Press.
Press. Kogan, S., Moskowitz, T. J., & Niessner, M. (2020). Fake news:
ENISA. (2020). ENISA threat landscape. European Union Agency Evidence from financial markets. Available at https://
for Cybersecurity. Available at https://www.enisa.europa. papers.ssrn.com/sol3/papers.cfm?abstract_idZ3237763
eu/topics/threat-risk-management/threats-and-trends Krohn, A. (Ed.), (2020, March 26). Coronavirus is testing op risk
European Commission. (2018). Final report of the high-level managers to the limit. Risk. Available at https://www.risk.
expert group on fake news and online disinformation. net/comment/7511026/coronavirus-is-testing-op-risk-
Available at https://ec.europa.eu/digital-single-market/ managers-to-the-limit
en/news/final-report-high-level-expert-group-fake-news- Kshetri, N., & Voas, J. (2017). The economics of “fake news.” IT
and-online-disinformation Professional, 19(6), 8e12.
Misinformation, disinformation, and fake news 773

Le, H. T., Nguyen, D. N., Beydoun, A. S., Le, X. T., Saarikko, T., Westergren, U. H., & Blomquist, T. (2020). Digital
Nguyen, T. T., Pham, Q. T., et al. (2020). Demand for health transformation: Five recommendations for the digitally
information on COVID-19 among Vietnamese. International conscious firm. Business Horizons, 63(6), 825e839.
Journal of Environmental Research and Public Health, Sanger, D. E. (2016, December 29). Obama strikes back at Russia
17(12). Article 4377. for election hacking. The New York Times. Available at
Luna, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. https://www.nytimes.com/2016/12/29/us/politics/russia-
(2016). Cyber threats to health information systems: A sys- election-hacking-sanctions.html
tematic review. Technology and Health Care, 24(1), 1e9. Sardi, A., Rizzi, A., Sorano, E., & Guerrieri, A. (2020). Cyber risk
Marques, I. C., & Ferreira, J. J. (2019). Digital transformation in in health facilities: A systematic literature review. Sustain-
the area of health: Systematic review of 45 years of evolu- ability, 12(17). Article 7002.
tion. Health Technology, 10(3), 575e586. Schwab, K. (2016). The fourth industrial revolution. World
Martens, B., Aguiar, L., Gomez-Herrera, E., & Mueller-Langer, F. Economic Forum. Available at https://www.weforum.org/
(2018). The digital transformation of news media and the agenda/2016/01/the-fourth-industrial-revolution-what-it-
rise of disinformation and fake news. Digital Economy means-and-how-to-respond/
Working Paper 2018-02, Joint Research Centre Technical Stankiewicz, K., & Pisani, B. (2020, November 2). Cybersecurity
Reports. Available at https://dx.doi.org/10.2139/ssrn. threats to corporate America are present now ‘more than
3164170 ever,’ SEC chair says. CNBC. Available at https://www.cnbc.
Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. com/2020/11/02/secs-jay-clayton-on-cybersecurity-
(2017). Cybersecurity and healthcare: How safe are we? threats-to-corporate-america.html
BMJ. Available at https://dx.doi.org/10.1136/bmj.j3179 Stilgherrian. (2020, December 7). Cyber attacks on COVID-19
Mirfin, J. (2020, October 8). COVID-19 and financial crime digital vaccine production are not quite a war crime. ZDNet.
transformation. Refinitive. Available at https://www. Available at https://www.zdnet.com/article/cyber-attacks-
refinitiv.com/perspectives/financial-crime/covid-19-and- on-covid-19-vaccine-production-are-not-quite-a-war-crime/
fighting-financial-crime/ Stubbs, J. (2020, December 9). Hackers steal Pfizer/BioNTech
Mitchell, T., & Politi, J. (2019, April 30). Trump drops cyber COVID-19 vaccine data in Europe, companies say. Reuters.
theft demands in bid for swift trade deal with China. Available at https://www.reuters.com/article/uk-ema-
Financial Times. Available at https://www.ft.com/content/ cyber/hackers-steal-pfizer-biontech-covid-19-vaccine-data-
3cb5bfda-6b0e-11e9-80c7-60ee53e6681d in-europe-companies-say-idUKKBN28J1VF
Mueller, R. S. (2019). The Mueller report: Report on the Tandoc, E. C., Jr., Lim, Z. W., & Ling, R. (2018). Defining “fake
investigation into Russian interference in the 2016 presi- news”: A typology of scholarly definitions. Digital Journal-
dential election. Available at https://www.justice.gov/ ism, 6(2), 137e153.
archives/sco/file/1373816/download Tardelli, S., Avvenuti, M., Tesconi, M., & Cresci, S. (2020).
NASEM. (2018). Securing the vote: Protecting American de- Characterizing social bots spreading financial disinforma-
mocracy. Washington, DC: The National Academies Press. tion. In G. Meiselwitz (Ed.), Social computing and social
NATO. (2020). Media e (Dis)information e security. Available at media: Design, ethics, user behavior, and social network
https://www.nato.int/nato_static_fl2014/assets/pdf/2020/ analysis lecture notes in computer science (pp. 376e392).
5/pdf/2005-deepportal1-fake-news.pdf Cham, Switzerland: Springer.
Nemr, C., & Gangware, W. (2019). Weapons of mass distraction: Tsfati, Y., Boomgaarden, H. G., Strömbäck, J., Vliegenthart, R.,
Foreign state-sponsored disinformation in the digital age. Damstra, A., & Lindgren, E. (2020). Causes and conse-
Park Advisors. Available at https://www.state.gov/wp- quences of mainstream media dissemination of fake news:
content/uploads/2019/05/Weapons-of-Mass-Distraction- Literature review and synthesis. Annals of the International
Foreign-State-Sponsored-Disinformation-in-the-Digital-Age. Communication Association, 44(2), 157e173.
pdf Tucker, J., Guess, A., Barbera, P., Vaccari, C., Siegel, A.,
NIST. (2015). Security and privacy controls for federal infor- Sanovich, S., et al. (2018). Social media, political polariza-
mation systems and organizations. Washington, DC: National tion, and political disinformation: A review of the scientific
Institute for Standards and Technology. literature. Hewlett Foundation. Available at https://www.
OSCE. (2017). Joint declaration on freedom of expression and hewlett.org/wp-content/uploads/2018/03/Social-Media-
“fake news,” disinformation and propaganda. Vienna, Political-Polarization-and-Political-Disinformation-
Austria: Organization for Security and Co-Operation in Literature-Review.pdf
Europe. U.S. Department of Homeland Security. (2016, December 29).
Oxford English Dictionary. (2020). Oxford, UK: Oxford Univer- Grizzly steppe e Russian malicious cyber activity. Wash-
sity Press. ington, DC: DHS.
Panda. (2020). 43 COVID-19 cybersecurity statistics. Available U.S. Department of State. (2020). Pillars of Russia’s disinfor-
at https://www.pandasecurity.com/en/mediacenter/ mation and propaganda ecosystem. Washington, DC: DoS.
news/covid-cybersecurity-statistics/ U.S. Department of the Treasury. (2017). Cyber-related sanc-
Parham, G., & Whitmore, W. (2020). COVID-19 cyberwar: How tions program. Washington, DC: DoT.
to protect your business. IBM. Available at https://www. U.S. Department of the Treasury. (2018). Treasury sanctions
ibm.com/downloads/cas/Y5QGA7VZ Russian cyber actors for interference with the 2016 U.S.
Porter, M. E., & Millar, V. E. (1985). How information gives you elections and malicious cyber-attacks. Available at https://
competitive advantage: The information revolution is home.treasury.gov/news/press-releases/sm0312
transforming the nature of competition. Harvard Business West, D. M. (2017). How to combat fake news and disinforma-
Review, 63(4), 149e160. tion. Brookings. Available at https://www.brookings.edu/
RAND. (2019, December 19). Fighting disinformation online: A research/how-to-combat-fake-news-and-disinformation/
database of web tools. Available at https://www.rand.org/ WHO. (2020, February 15). Munich security conference. Avail-
research/projects/truth-decay/fighting-disinformation. able at https://www.who.int/director-general/speeches/
html detail/munich-security-conference
774 P.N. Petratos

Wisniewski, T. P. (2015). Is there a link between politics and Zhang, X., & Ghorbani, A. A. (2020). An overview of online fake
stock returns? A literature survey. International Review of news: Characterization, detection, and discussion. Infor-
Financial Analysis, 47, 15e23. mation Processing & Management, 57(2), Article 102025.
Wolfers, J., & Zitzewitz, E. (2016). What do financial markets Zhang, C., Gupta, A., Kauten, C., Deokar, A. V., & Qin, X.
think of the 2016 election? Brookings. Available at https:// (2019). Detecting fake news for reducing misinformation
www.brookings.edu/wp-content/uploads/2016/10/what- risks using analytics approaches. European Journal of
do-financial-markets-think-of-the-2016-election_102016_ Operational Research, 279(3), 1036e1052.
wolferszitzewitz.pdf

You might also like