|
NLM
abstract of "Attitude change: persuasion and social influence", by Wood,
in Annual Review of Psychology, 2000
-
This chapter reviews empirical and theoretical developments in research on
social influence and message-based persuasion. The review emphasizes research
published during the period from 1996-1998. Across these literatures, three
central motives have been identified that generate attitude change and
resistance. These involve concerns with the self, with others and the
rewards/punishments they can provide, and with a valid understanding of reality.
The motives have implications for information processing and for attitude
change in public and private contexts. Motives in persuasion also have been
investigated in research on attitude functions and cognitive dissonance theory.
In addition, the chapter reviews the relatively unique aspects of each
literature: In persuasion, it considers the cognitive and affective mechanisms
underlying attitude change, especially dual-mode processing models, recipients'
affective reactions, and biased processing. In social influence, the chapter
considers how attitudes are embedded in social relations, including social
identity theory and majority/minority group influence.
-
click on "Related Articles" link in upper right hand corner
of above abstract at NLM to view list of many influence-related articles
What
is Information Warfare?, by Borden, Air & Space Power
Chronicles, 1999 - with formulas
see also
Bayesian
inference net
Influence
History
-
The Evolution
of Strategic Influence (local copy), by Gough,
strategic research project for US Army War College, 2003
-
"This paper will examine the evolution of how the U.S. Government and the
Department of Defense have organized to conduct strategic influence as an
instrument of national power, from the Psychological Warfare Division of
World War II, through the Psychological Strategy Board and Operations
Coordinating Board of the early Cold War, through the Vietnam years to today.
Are they organized effectively today to meet the asymmetric threats of the
21st Century?"
-
PsyWarrior.com
-
- with a great deal of history articles/resources relating to psychological
operations and influence efforts in particular
- look in both the History section AND the Links section
- Links section has leaflets used in several wars, as well as articles such
as Joseph Goebbels' Principles of Propaganda
-
Powers
of Persuasion: Poster Art from WW II, National Archives
-
German Propaganda
Archive, Nazi and East German Propaganda
-
How
to Win Friends and Influence People, by Dale Carnegie, 1936
-
The
Prince, by Niccolo Machiavelli, 1515
Influence
Tools
-
see also
storytelling at the Air War College Gateway to the
Internet
-
see also
metaphors at the Air War College Gateway to the Internet
-
YouTube
War: Fighting in a World of Cameras in Every Cell Phone and Photoshop on
Every Computer (local copy), by Dauber, Strategic
Studies Institute, Nov 2009
-
Stanford University Persuasive
Technology Lab
-
The Stanford Persuasive Technology Lab creates insight into how computing
products from websites to mobile phone software can be designed
to change what people believe and what they do.
-
"Yes, this can be a scary topic: machines designed to influence human beliefs
and behaviors. But there's good news. We believe that much like human persuaders,
persuasive interactive technologies can bring about positive changes in many
domains, including health, business, safety, and education. With such ends
in mind, we are creating a body of expertise in the design, theory, and analysis
of persuasive technologies, an area called captology.
-
Sandia National Labs
-
Los Alamos National Lab
-
Understanding
and Using SIAM (local copy), by Sands and Hayes,
Naval War College - discussing the SAIC tool called Situational Influence
Assessment Module (SIAM)
-
Influence Net Modeling,
SAIC site - includes software (such as SIAM) to help
-
Introduction
to Influence Net Modeling
-
"Influence Net modeling has been developed to assist you in sorting and assessing
uncertain information to: "
-
Analyze the multi-discipline issues of cause and effect;
-
Focus resources on highly leveraged areas for action;
-
Identify the likelihood of events;
-
Determine courses of action to influence outcomes; and
-
Integrate the opinions of experts from diverse fields of study.
-
Community
Tool Box, National Park Service - includes tools such as
-
Consensus building
-
Networking
-
Focus
groups
-
Press conferences
-
Group mapping
-
and many more - with sections for each tool on "use it if ..." and "forget
it if ..."
Marketing and
Advertising
-
Enlisting Madison Avenue:
The Marketing Approach to Earning Popular Support in Theaters of Operation,
by Helmus et al, RAND monograph, 2007
-
Virtually every action, message, and decision of a military force shapes
the opinions of an indigenous population: strategic communication, treatment
of civilians at vehicle checkpoints, and the accuracy or inaccuracy of aerial
bombardment. Themes of U.S. goodwill mean little if its actions convey otherwise.
Consequently, a unified message in both word and deed is fundamental to success.
Business marketing practices provide a useful framework for improving U.S.
military efforts to shape the attitudes and behaviors of local populations
in a theater of operations as well as those of a broader, international audience.
-
Undercover
marketing - Wikipedia entry - "also known as buzz marketing, stealth
marketing, or -- by its detractors -- roach baiting"
-
guerrilla
marketing - at SourceWatch
-
buzz - at
SourceWatch
-
"buzz"
marketing search results
-
Improving
Information Operations with a Military Cultural Analyst
(local copy), by Rogers, SAMS paper, Jan 2005
- includes chapter focused on the marketing model
-
The process developed in the marketing industry has been tested and proven
to work in achieving the very effect that information operations attempt
to produce changing relative perceptions to influence a target audience
and elicit specific behavior. Therefore, it would be irresponsible not to
study the marketing model within the context of understanding its
characteristics, and which, if any, of those characteristics might be
transferable to a military information operations setting.
-
Marketing:
An Overlooked Aspect of Information Operations (local
copy), by Trent and Doty, in Military Review, Jul-Aug
2005
-
"Defeating enemy formations on the field of battle is merely the first, and
often the easiest, phase of a military operation. Ultimate success (accomplishing
the political goals of the National Command Authority) hinges on a successful
post-high-intensity conflict occupation in which the population comes to
accept the new state of affairs. In all phases, understanding and influencing
the people is critical to reducing the cost of victory in terms of lives,
dollars, and time."
-
Advertising
Primer, from SBA
-
MIT
Marketing Courses
-
Wharton
Marketing, U. of Penn.
-
marketing
theory - internet search
-
advertising
theory - internet search
Propaganda and
Counterpropaganda
-
A lie can travel halfway around the world while the truth is putting on its
shoes.
--- Mark Twain
-
see also
blogs
and discussion groups
-
see also
persuasion on Communication Skills page of AWC Gateway
to Internet
-
see also
Conflict
of Perception or Peception Warfare
-
Definitions, from DoD Dictionary
-
propaganda - (DOD) Any form of communication in support of national objectives
designed to influence the opinions, emotions, attitudes, or behavior of any
group in order to benefit the sponsor, either directly or indirectly.
-
black propaganda - (DOD) Propaganda that purports to emanate from a source
other than the true one.
-
grey propaganda - (DOD) Propaganda that does not specifically identify any
source.
-
white propaganda - (DOD) Propaganda disseminated and acknowledged by the
sponsor or by an accredited agency thereof.
-
counterpropaganda operations - (DOD) Those psychological operations activities
that identify adversary propaganda, contribute to situational awareness,
and serve to expose adversary attempts to influence friendly populations
and military forces.
-
YouTube
War: Fighting in a World of Cameras in Every Cell Phone and Photoshop on
Every Computer (local copy), by Dauber, Strategic
Studies Institute, Nov 2009
-
China's
Propaganda and Influence Operations, Its Intelligence Activities that Target
the United States, and the Resulting Impacts on U.S. National Security
(local copy), hearing before the Congressional
U.S.-China Economic and Security Review Commission, 30 Apr 2009
-
Propaganda:
Can a Word Decide aWar?, by Murphy and White, in Parameters,
Autumn 2007
-
Iraqi
Insurgent Media: the War of Images and Ideas - How Sunni Insurgents in Iraq
and Their Supporters Worldwide are Using the Media, by Kimmage and Ridolfo,
RFE/RL Special Report, 2007
(local
copy, 6.5 Mb - if you are unable to access above URL)
{Copyright (c) 2007. RFE/RL, Inc. Reprinted with the permission
of Radio Free Europe/Radio Liberty, 1201 Connecticut Ave., N.W. Washington
DC 20036}
-
Storytelling
and Terrorism: Towards a Comprehensive 'Counter-Narrative Strategy' by
Casebeer and Russell, in Strategic Insights, Mar 2005
(Local Copy)
-
RL32750 - Public
Relations and Propaganda: Restrictions on Executive Agency Activities
(local copy), Congressional Research Service
(CRS) report
-
from IO
Sphere
-
24 Oct 2001 DoD Background Briefing on Enemy Denial and Deception
-
"Third World, First Threat," in Letters from Lexington, by Noam
Chomsky, 1993
-
"A principle familiar to propagandists is that the doctrines to be instilled
in the target audience should not be articulated: that would only expose
them to reflection, inquiry, and, very likely, ridicule. The proper procedure
is to drill them home by constantly presupposing them, so that they become
the very condition for discourse."
-
Propaganda Analysis Home Page,
including techniques and history
-
Powers
of Persuasion: Poster Art from WW II, National Archives
-
DoD Dictionary defines grey propaganda as "propaganda that does
not specifically identify any source"
-
Information
War - Cyberwar - Netwar, Chapter 6, Battlefield of the Future,
including discussion of propaganda and infopropaganda
-
German Propaganda
Archive, Nazi and East German Propaganda
Deception
-
All warfare is based on deception.
--- Sun Tzu
-
see also
Deception Detection on AWC Gateway to Internet
-
see also
Conflict
of Perception or Peception Warfare
-
Definitions
-
deception - (DOD dictionary) Those measures designed to
mislead the enemy by manipulation, distortion, or falsification of evidence
to induce the enemy to react in a manner prejudicial to the enemy's interests.
See also counterdeception; military deception.
-
counterdeception - (DOD dictionary) Efforts to negate,
neutralize, diminish the effects of, or gain advantage from a foreign deception
operation. Counterdeception does not include the intelligence function of
identifying foreign deception operations. See also deception.
-
military deception - (DOD dictionary) Actions executed to
deliberately mislead adversary military decision makers as to friendly military
capabilities, intentions, and operations, thereby causing the adversary to
take specific actions (or inactions) that will contribute to the accomplishment
of the friendly mission. Also called MILDEC. See also deception.
-
deception action - (DOD dictionary) A collection of related
deception events that form a major component of a deception operation.
-
deception concept - (DOD dictionary) The deception course
of action forwarded to the Chairman of the Joint Chiefs of Staff for review
as part of the combatant commander's strategic concept.
-
deception course of action - (DOD dictionary) A deception
scheme developed during the estimate process in sufficient detail to permit
decisionmaking. At a minimum, a deception course of action will identify
the deception objective, the deception target, the desired perception, the
deception story, and tentative deception means.
-
deception event - (DOD dictionary) A deception means executed
at a specific time and location in support of a deception operation.
-
deception means - (DOD dictionary) Methods, resources, and
techniques that can be used to convey information to the deception target.
There are three categories of deception means: a. physical means. Activities
and resources used to convey or deny selected information to a foreign power.
b. technical means. Military material resources and their associated operating
techniques used to convey or deny selected information to a foreign power.
c. administrative means. Resources, methods, and techniques to convey or
deny oral, pictorial, documentary, or other physical evidence to a foreign
power.
-
deception objective - (DOD dictionary) The desired result
of a deception operation expressed in terms of what the adversary is to do
or not to do at the critical time and/or location.
-
deception story - (DOD dictionary) A scenario that outlines
the friendly actions that will be portrayed to cause the deception target
to adopt the desired perception.
-
deception target - (DOD dictionary) The adversary decisionmaker
with the authority to make the decision that will achieve the deception
objective.
-
The Truth
is out there: Responding to Insurgent Disinformation and Deception Operations
(local copy), by Dauber, in Military
Review, Jan-Feb 2009
-
Hizballah:
Deception in the 2006 Summer War, by Acosta, in IO Sphere, Winter
2008
-
The Tao of Deception: Unorthodox Warfare in Historic and Modern China,
by Sawyer, pub. by Basic Books, Jan 2007
-
A
Primer For Deception Analysis: Psychological Operations Target Audience
Analysis, by Stroh and Wendell, in IO Sphere, Fall 2007
-
Chinese
Strategic Power: Myths, Intent, and Projections, by Sawyer, in Journal
of Military and Strategic Studies, Winter 2006/07, Vol. 9, Issue 2.
-
Creating a new
Reality: Information Age Effects on the Deception Process, by Webb, SAASS
paper, June 2006
-
Foreign Denial
and Deception: Minimizing the Impact to Operational Intelligence
(local copy), by Cyr, Naval War College paper,
2002
-
Formal
Methods of Countering Deception and Misperception in Intelligence Analysis
(local copy), by Pope et al, presented at the
11th International Command and Control Technology Symposium (ICCRTS), 2006
(slides)
-
The ability of these formal models to mitigate attempted deception by an
adversary is affected by many factors, including the choice of analytical
model, the type of formal representation used, and the ability to address
issues of source reliability and information credibility. This paper discusses
how the use of Subjective Logic and the modelling approach known as the Analysis
of Competing Hypotheses using Subjective Logic (ACHSL) can provide a level
of protection against attempted deception and misperception.
-
JP 3-13.4,
Joint Doctrine for Military Deception - formerly JP 3-58
-
FM 90-2, Battlefield
Deception as posted by FAS
-
OPNAVINST
S3433.1 Military Deception (MILDEC)
-
Deception
101 - Primer on Deception (local copy), by Caddell,
Strategic Studies Institute, Dec 2004
-
Strategic
Deception in Modern Democracies: Ethical, Legal, and Policy Challenges
(local copy), by Pumphrey and Echevarria, briefing
at SSI conference
-
Unweaving the
Web: Deception and Adaptation in Future Urban Operations, by Gerwehr
and Glenn, RAND report, 2003
-
Deception
- Magic! (local copy), by Davis, in Military
Review, Sep-Oct 2002
-
24 Oct 2001 DoD Background Briefing on Enemy Denial and Deception
-
Deception, Newsletter No. 3-88, Army CALL
-
Maintaining
Credibility Within Military Public Affairs While Preserving and Participating
in Military Deception, DoD Joint Course in Communication
-
Detecting
Online Deception and Responding to It (local
copy), by Rowe, Naval Postgraduate School
-
Military
Deception: Hiding the Real - Showing the Fake (local
copy), by Johnson and Meyeraan, Joint Forces Staff College, Mar
2003
-
But even a technologically advanced nation like the United States is susceptible
to deception. Analysis of friendly and enemy deception techniques in Operations
DESERT STORM and ALLIED FORCE shows the main U.S.vulnerabilities to include
its insatiable appetite for news, the lack of deception-detection
expertise in the military, and the tendency to believe that technological
advancements make a nation deception-proof. Therefore, the key to mitigating
the U.S. vulnerabilities to deception lies in educating the media about the
military and common deception practices, giving the military intensive
deception-detection training, and abandoning the notion that technological
advancement inoculates against deception.
-
A
Short Course on Software-Based Deception and Counter Deception
(local copy), Aug 2003 presentation by Michael,
Naval Postgraduate School
-
Principles of Deception
-
Aimed at the mind of the opponent
-
Aim is to make the opponent act
-
Coordination and centralized control
-
Preparation and timing
-
Security
-
Credibility and confirmation
-
Flexibility
-
Confronting
Cyberterrorism with Cyber Deception (local
copy), thesis by Tan, Naval Postgraduate School, Dec 2003
-
Two Taxonomies
of Deception for Attacks on Information Systems (local
copy), Rowe and Rothstein, Naval Postgraduate School
-
Deception for
Defense of Information Systems:Analogies from Conventional Warfare
(local copy), Rowe and Rothstein, Naval Postgraduate
School
-
-
six general principles for effective tactical deception (Fowler and Nesbitt,
1995)
-
Deception should reinforce enemy expectations
-
Deception should have realistic timing and duration
-
Deception should be integrated with operations
-
Deception should be coordinated with concealment of true intentions
-
Deception realism should be tailored to needs of the setting
-
Deception should be imaginative and creative
-
taxonomy of kinds of deception (Dunnigan and Nofi, 2001)
-
Concealment (hiding your forces from the enemy)
-
Camouflage (hiding your troops and movements from the enemy by artificial
means)
-
False and planted information (disinformation, letting the enemy get
his hands on information that will hurt him and help you)
-
Lies (when communicating with the enemy)
-
Displays (techniques to make the enemy see what isn't there)
-
Ruses (tricks, such as displays that use enemy equipment and
procedures)
-
Demonstrations (making a move with your forces that implies imminent
action, but is not followed through)
-
Feints (like a demonstration, but you actually make an attack)
-
Insight (deceive the opponent by outthinking him)
-
Designing
Good Deceptions in Defense of Information Systems, by Rowe, Naval
Postgraduate School
-
Command
Dysfunction: Minding the Cognitive War, by Dahl, SAAS paper
-
chapters include - OODA Loop, Normandy Invasion, Battle of the Bulge, and
October 1973 War
-
appendices include
-
Janis Vigilant Problem-Solving Approach
-
Bias-Deception Relationships
-
Whaleys Structure of Deception
-
Dewars Principles and Techniques of Deception
-
Deception in
Warfare bibliography, Air University Library
-
Second World
War Deception - Lessons Learned for Todays Joint Planner - analysis
of six Allied deception operationsjccd.html">Joint Camouflage, Concealment,
and Deception Program (JCCD) -->
-
Denial and Deception Course, Fort Huachuca
-
Say Not to
Say - New Perspectives on Miscommunication, including chapter on
"Deceptive Miscommunication Theory (DeMiT): a New Model for the Analysis
of Deceptive Communication"
-
A Cognitive
Model for Exposition of Human Deception and Counterdeception
(local copy), Technical Report 1076, Oct 1987,
SPAWAR Systems Center (SSC), U.S. Navy
-
Sissela Bok. Lying: Moral Choice in Public and Private Life (New
York: Vintage Books, Second ed., 1999)
Books &
Monographs
-
see also
books
on USAF Negotiation Center of
Excellence
-
see also
books
on Air Force Center for Regional
and Cultural Studies
-
Simple Models
to Explore Deterrence and More General Influence in the War with al-Qaeda,
by Davis, RAND report, 2010
-
"Simple, conceptual models can be used to help guide thinking about how to
deter or to otherwise influence potential, actual, or disengaging terrorists
and the many people who support their organizations directly or indirectly.
Deterring terrorism is best approached as part of a broad effort to influence
all elements of a terrorist system, and simple, conceptual models of
decisionmaking can help in understanding how to affect others' behavior.
The paper lays out a theory of how to use influence (including deterrence)
to affect elements of a terrorist system, touching on root causes, individual
motivation, public support, and likely factors in the decisionmaking of terrorist
organizations."
-
"In
the Same Light as Slavery" - Building a Global Antiterrorist Consensus
(local copy), ed. by McMillan, NDU, 2006
-
Information
Operations: Putting the "I" back into DIME (local
copy), by Steele, Strategic Studies Institute (SSI), Feb 2006
-
Carrots
or Sticks? Libya and U.S. Efforts to Influence Rogue States
(local copy), by Calabrese, in Strategic
Insights, Nov 2004
-
Nisbett, R. (2003).
The
Geography of Thought: How Asians and Westerners Think Differently
and
Why
-
Dynamic Social Network
Modeling and Analysis: Workshop Summary and Papers, ed.s Breiger
et al, pub. by National Academies Press, 2003
-
Cialdini, R. B. (2001). Influence: Science and practice, 4rd Ed.
Glenview, IL: Scott, Foresman.
-
Shavitt, S., & Brock, T. C. (1994)(Eds.), Persuasion: Psychological
insights and perspectives. Pacific Grove, CA: Brooks/Cole.
-
from RAND
-
The Global
Technology Revolution 2020, In-Depth Analyses: Bio/Nano/Materials/Information
Trends, Drivers, Barriers, and Social Implications, by Silverglitt
et al, RAND Technical Report, 2006
-
Dissuading
Terror: Strategic Influence and the Struggle Against Terrorism,
by Cragin and Gerwehr, RAND, 2005
-
Louder than Words:
TACIT Communication in Internaltional Crises, by Arquilla, RAND,
2004
-
The Zapatista
"Social Netwar" in Mexico, by Ronfeldt, Arquilla, Fuller and Fuller,
RAND, 1998
-
Thinking about opponent
behavior in crisis and conflict : a generic model for analysis and group
discussion, by Davis and Arquilla, RAND, 1991
-
Reality and Belief
in Military Affairs : A First Draft (June 1977), by Goldhamer, RAND,
1977
-
"... the author discusses the factors and circumstances that influence the
assessment process, and the role of manipulation and deception in shaping
images of the enemy and the self in military affairs."
-
How
to Win Friends and Influence People, by Dale Carnegie, 1936
-
The
Prince, by Niccolo Machiavelli, 1515
Links
-
Information/Influence
Operations at Small Wars Journal
-
ChangingMinds.org - "largest
site in the world on all aspects of how we change one another's minds. There
are already around 1800 pages here, with much more to come!"
-
Essays
and Arguments: A Handbook on Writing Argumentative and Interpretative
Essays, by Johnston, May 2000, in public domain
-
Primer on Persuasion
and Influence
-
Persuasion Context
- theories page, U. of Ky
-
Argumentation-Persuasion:
Logic in Argumentative Writing, Purdue Online Writing Lab
-
Stanford University Persuasive
Technology Lab
-
The Stanford Persuasive Technology Lab creates insight into how computing
products from websites to mobile phone software can be designed
to change what people believe and what they do.
-
"Yes, this can be a scary topic: machines designed to influence human beliefs
and behaviors. But there's good news. We believe that much like human persuaders,
persuasive interactive technologies can bring about positive changes in many
domains, including health, business, safety, and education. With such ends
in mind, we are creating a body of expertise in the design, theory, and analysis
of persuasive technologies, an area called captology.
-
Influence at Work - the Psychology
of Persuasion - including quiz to find your iNfluence Quotient (NQ)
-
Global
Network Terrorism: - I. Sacred Values and Radicalization, II. Comparative
Anatomy and Evolution (local copy), by Scott
Atran, National Security Council briefing, White House, 28 Apr 2006
-- see also
other
terrorism materials by Atran
-
The Society for the Study of Artificial
Intelligence and Simulation of Behaviour (SSAISB)
-
Neuro-Linguistic Programming:
A Basis for Language Learning, by Love, in The Journal of the Imagination
in Language Learning and Teaching
-
Some NLP Presuppositions
-
The map is not the territory. [Our senses filter everything we experience.]
-
What you believe either is true or becomes true.[Perceptions are individual
and influence behavior.]
-
The mind and the body affect each other.[Thought, emotions and behavior are
interconnected.]
-
Knowing what you want helps you to get it.[Identify your goals and break
them down into manageable tasks.]
-
The meaning of your communication is the response you get.[Communication
is not your intention; it is an experiential process.]
-
There is no failure, only feedback.[Stop blaming yourself if something isn't
working. Try something else!]
-
Communication is verbal and non-verbal.[You are always sending and receiving
messages.]
-
Modeling excellent behavior leads to excellence. [Find the model and follow
the pattern.]
-
There is a positive intention behind every behavior.[People respond in the
only way they know how at the time.]
-- RETURN TO TOP
--
see
privacy and security notice and
web
maintainer
page updated/reviewed 29 July 2010
|