Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

NI-HCM Mind Hacking Extent of teaching: 2P+1C
Instructor: Holý J., Jiřina M. Completion: ZK
Department: 18106 Credits: 5 Semester: Z

Annotation:
Cognitive security is an emerging discipline that is closely related to cyber security. While the domain of cyber security is the protection of networks, information systems and assets, the domain of cognitive security is the protection of the human mind from intentional and unintentional digital manipulation. The topic of cognitive security is growing in importance in the context of information warfare, increasing digital dependence and the development of artificial intelligence, where these phenomena from the Internet environment have real societal impacts such as disruption of social cohesion, threats to democracy or war.

Lecture syllabus:
1. (Intro) Introduction to the topic, digital manipulation and epistemic crisis, societal implications.
2. (Intro) Context. History, ethics, myths, what is different today than before. Paradigm shift - from book printing, to mass, to social media.
3. (Intro) Optics for structuring complexity. Digital Manipulation - The Epidemiological Triad
4. (Deep) Zoom in on the detail. Agent. Memetics, actor identity, motivation.
5. (Deep) Zoom on detail. Agent. Manipulative narratives, troll strategies.
6. (Deep) Close-up. Guest - individual. Humanity, transhumanism, limits of critical thinking. Neuroplasticity - Mere Exposure Effect,, Emotions - Cognitive Biases, Behavioral profiles and their processing.
7. Guest - Group. Group dynamics in information space. Types of communities, models of (self-)organization, value frameworks. Digital cults - QAnon, cryptocurrencies and others. Herd behaviour, group manipulation, "movement hijack".
8. Environment. Social networking algorithms, Situational Awareness, Digital addiction.
9. Environment. Media space and conspiracy, fragmentation of society.
10. (Defence) Looking back at the whole. So what? Solution 1 - Individual. Critical thinking, mindfulnes, depolarizing techniques, tools.
11. (Defense) Looking back at the whole. So what? Solution 2 - Group/Organization. Technological solutions.
12. (Defense) Looking back at the whole. So what? Solution 3 - Company. Legal aspects, European vs US law (for digital technologies, AI, social networks).
13. (Conclusion) Reminder of red line subject and highlights. Opening the door for further exploration and resolution of the topic.

Seminar syllabus:
Exercises will take the form of semester projects in which students will work in teams to solve real problems. The semester projects will focus on a wide range of technologies used for digital manipulation. Specific assignments will be developed at least in part with relevant government and non-profit sector stakeholders. The output of each semester project should ideally be a working prototype published as open source and reusable by the general public.
1. Assignment of semester projects and formation of teams.
2. Understanding the problem, mapping existing solutions.
3. Mapping of existing solutions, concept design.
4. Supervision 1. Design of own solution.
5. Supervision 2. Testing and calibration of own solution.
6. Defence of semester projects before an expert committee (practitioners + external experts).
7. Reflection of semester projects.

Literature:
Books:
[1] Sinan Aral: The Hype Machine (2021)
[2] John Rust, Michal Kosinski, David Stillwell: Modern Psychometrics (2021)
[3] Kate Crawford: Atlas of AI (2021)
[4] Johan Farkas, Jannick Schou: Post-Truth, Fake News and Democracy (2020)
[5] Christopher Wylie: Mindfuck: Insiden Cambridge Analytica?s Plot to Break the World (2019)
[6] Shoshana Zuboff: The Age of Surveillance Capitalism (2019)
[7] Peter Pomerantsev: This Is Not Propaganda (2019)
[8] Katherine Hayles: Untought: The Power of the Cognitive Nonconsious (2017)
[9] David Halpern: Inside the Nudge Unit: How Small Changes Can Make a Big Difference (2015)
[10] Frank Pasquale: The Black Box Society (2015)
[11] Gad Saad: The Parasitic Mind: How Infectious Ideas Are Killing Common Sense (2021)
Studies:
[12] Carlos Carrasco-Farré: The fingerprints of misinformation: how deceptive content differs from reliable sources in terms of cognitive effort and appeal to emotions (Nature, 2022)
[13] Topological measures for identifying and predicting the spread of complex contagions (Nature, 2021)
[14] Predicting human decisions with behavioral theories and machine learning (2019)
[15] Aral, et. al: The spread of true and false news online (MIT, 2018)
Organizations:
[16] Center for Humane Technology
[17] Stanford Internet Observatory
[18] Shorenstein Center of Media, Politics and Public Policy
[19] The Markup
[20] Algotransparency
[21] Behavioral Institute
Essays:
[21] Jonathan Haidt: Why the past 10 years of American Life have been uniquely stupid (2022, The Atlantic)
[22] Shoshana Zuboff: The Coup We Are Not Talking About (2021, NYTimes)
[23] Why some biologists and ecologists think social media is a risk to humanity (2021)

Requirements:
There are no entry requirements.

Garantem a vyučujícím bude Ing. Josef Holý.
Informace o předmětu a výukové materiály naleznete na https://courses.fit.cvut.cz/NI-HCM/

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
NI-TI.2018 Computer Science V Není
NI-PB.2020 Computer Security V Není
NI-ZI.2020 Knowledge Engineering V Není
NI-SPOL.2020 Unspecified Branch/Specialisation of Study V Není
NI-TI.2020 Computer Science V Není
NI-TI.2023 Computer Science V Není
NI-NPVS.2020 Design and Programming of Embedded Systems V Není
NI-PSS.2020 Computer Systems and Networks V Není
NI-MI.2020 Managerial Informatics V Není
NI-SI.2020 Software Engineering (in Czech) V Není
NI-SP.2020 System Programming V Není
NI-WI.2020 Web Engineering V Není
NI-SP.2023 System Programming V Není


Page updated 24. 4. 2024, semester: Z/2020-1, Z/2019-20, Z/2023-4, Z/2021-2, L/2022-3, Z/2024-5, L/2019-20, Z/2022-3, L/2020-1, L/2021-2, L/2023-4, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška