As broadband internet access begins to take hold in Africa, this brings both opportunities and risks, which suggests paying attention to informational risks: cindynic methodology describes these risks
As broadband internet access begins to take hold in Africa, this brings both opportunities and risks, which suggests paying attention to informational risks: cindynic methodology describes these risks
Last summer, Joe Biden unilaterally ordered the withdrawal of US troops from Afghanistan, casting doubts on the ability of US intelligence to anticipate developments. The speed of the Taliban takeover
When implementing the UN 2030 agenda, the construction of perceptions and its builders, especially in the media, must be considered. This is what second-order Cindynics suggest. This approach shares s
Pseudonymity ensures the security, in particular physical, of auhtors publishing books or posting on the internet. In France, the case of LGBT activist Mila demonstrates that the law should grant the
In its fight against cyber-interference or information operations such as those carried out by Evgueny Prigozhin's conglomerate during the 2016 US elections, or more recently in Africa, especially in
About ten years ago, the real name policy imposed by social networks such as Facebook or the now deceased Google+ sparked a controversy, especially in the United States, where this policy was denounce