{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T19:47:23Z","timestamp":1774295243758,"version":"3.50.1"},"reference-count":97,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["NWA.1332.20.008"],"award-info":[{"award-number":["NWA.1332.20.008"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["NWA.1332.20.008"],"award-info":[{"award-number":["NWA.1332.20.008"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["NWA.1332.20.008"],"award-info":[{"award-number":["NWA.1332.20.008"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This article analyses ideas to use AI-supported systems to counter \u2018cognitive warfare\u2019 and critically examines the implications of such systems for fundamental rights and values. After explicating the notion of \u2018cognitive warfare\u2019 as used in contemporary public security discourse, the article describes the emergence of generative AI tools that are expected to exacerbate the problem of adversarial activities against the online information ecosystems of democratic societies. In response, researchers and policymakers have proposed to utilize AI to devise countermeasures, ranging from AI-based early warning systems to state-run content moderation tools. These interventions, however, interfere, to different degrees, with fundamental rights and values such as privacy, communication rights, and self-determination. This article argues that such proposals insufficiently account for the complexity of contemporary online information ecosystems, particularly the inherent difficulty in establishing causality and attribution. Reliance on the precautionary principle might offer a justificatory frame for AI-enabled measures to counter \u2018cognitive warfare\u2019 in the absence of conclusive empirical evidence of harm. However, any such state intervention must be based in law and adhere to strict proportionality.<\/jats:p>","DOI":"10.1007\/s10676-025-09868-9","type":"journal-article","created":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T04:26:35Z","timestamp":1759724795000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The fundamental rights risks of countering cognitive warfare with artificial intelligence"],"prefix":"10.1007","volume":"27","author":[{"given":"Henning","family":"Lahmann","sequence":"first","affiliation":[]},{"given":"Bart","family":"Custers","sequence":"additional","affiliation":[]},{"given":"Benjamyn I.","family":"Scott","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,6]]},"reference":[{"key":"9868_CR1","unstructured":"Adami, M. (2024). How AI-generated Disinformation Might Impact This Year\u2019s Elections and How Journalists Should Report on It. Reuters Institute for the Study of Journalism. Available at: (accessed 5 September 2025). https:\/\/reutersinstitute.politics.ox.ac.uk\/news\/how-ai-generated-disinformation-might-impact-years-elections-and-how-journalists-should-report"},{"key":"9868_CR2","doi-asserted-by":"publisher","first-page":"eabb5824","DOI":"10.1126\/sciadv.abb5824","volume":"6","author":"M Alizadeh","year":"2020","unstructured":"Alizadeh, M., et al. (2020). Content-based features predict social media influence operations. Science Advances, 6, eabb5824.","journal-title":"Science Advances"},{"key":"9868_CR3","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1093\/jopart\/muac007","volume":"33","author":"S Alon-Barkat","year":"2023","unstructured":"Alon-Barkat, S., & Busuioc, M. (2023). Human-AI interactions in public sector decision-making: Automation bias and selective adherence to algorithmic advice. Journal of Public Administration Research and Theory, 33, 153.","journal-title":"Journal of Public Administration Research and Theory"},{"key":"9868_CR4","unstructured":"Arendt, H. (1958). The Origins of Totalitarianism. New York: Harcourt Brace Jovanovich (2nd edition)."},{"key":"9868_CR5","unstructured":"Baade, B. (2022). The EU\u2019s Ban of RT and Sputnik. Verfassungsblog. Available at: https:\/\/verfassungsblog.de\/the-eus-ban-of-rt-and-sputnik\/ (accessed 16 December 2024)."},{"key":"9868_CR6","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1163\/18750230-02901006","volume":"29","author":"M Bader","year":"2018","unstructured":"Bader, M. (2018). Disinformation in elections. Security and Human Rights, 29, 24.","journal-title":"Security and Human Rights"},{"key":"9868_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2024.100545","volume":"16","author":"D Barman","year":"2024","unstructured":"Barman, D., Guo, Z., & Conlan, O. (2024). The dark side of language models: Exploring the potential of LLMs in multimedia disinformation generation and dissemination\u2019. Machine Learning with Applications, 16, Article 100545.","journal-title":"Machine Learning with Applications"},{"key":"9868_CR8","unstructured":"Bateman, J., Hickok, E., Courchesne, L., Thange, I. & Shapiro, J.N. (2021). Measuring the Effects of Influence Operations: Key Findings and Gaps from Empirical Research. Carnegie Endowment for International Peace. Available at: (accessed 10 December 2024). https:\/\/esoc.princeton.edu\/publications\/measuring-effects-influence-operations-key-findings-and-gaps-empirical-research"},{"key":"9868_CR9","unstructured":"Bateman, J., & Jackson, D. (2024). Countering Disinformation Effectively: An Evidence-Based Policy Guide. Carnegie Endowment for International Peace 2024. Available at: https:\/\/carnegieendowment.org\/files\/Carnegie_Countering_Disinformation_Effectively.pdf (accessed 10 December 2024)."},{"key":"9868_CR10","unstructured":"Bayer, J., Katsirea, I., Batura, O., Holznagel, B., Hartmann, S. & Lubianiec, K. (2021). The Fight Against Disinformation and the Right to Freedom of Expression. European Parliament, Committee on Civil Liberties, Justice and Home Affairs 2021."},{"key":"9868_CR11","unstructured":"Benedek, W., & Kettemann, M. C. (2020). Freedom of Expression and the Internet Council of Europe (2nd edn)."},{"key":"9868_CR12","doi-asserted-by":"crossref","unstructured":"Benkler, Y., Faris, R., & Roberts, H. (2018). Network propaganda. Oxford University Press.","DOI":"10.1093\/oso\/9780190923624.001.0001"},{"key":"9868_CR13","doi-asserted-by":"crossref","unstructured":"Bennett, C. J., & Oduro-Marfo, S. (2019). Privacy, Voter Surveillance and Democratic Engagement: Challenges for Data Protection Authorities. University of Victoria. Available at https:\/\/privacyconference2019.info\/wp-content\/uploads\/2019\/11\/Privacy-and-International-Democratic-Engagement_finalv2.pdf (accessed 10 December 2024).","DOI":"10.2139\/ssrn.3517889"},{"key":"9868_CR14","unstructured":"Bilal, A. (2021). NATO Review - Hybrid Warfare \u2013 New Threats, Complexity, and Trust as the Antidote. NATO Review. Available at: https:\/\/www.nato.int\/docu\/review\/articles\/2021\/11\/30\/hybrid-warfare-new-threats-complexity-and-trust-as-the-antidote\/index.html (accessed 29 April 2024)."},{"key":"9868_CR15","unstructured":"Brunner, M., Hofinger, H., Roblee, C., Schoo, P. & Todt, S. (2010). Anonymity and Privacy in Distributed Early Warning Systems. Proceedings of the 5th International Conference on Critical Information Infrastructures Security. Available at: (accessed 18 December 2024). https:\/\/www.sec.in.tum.de\/i20\/publications\/anonymity-and-privacy-in-distributed-early-warning-systems"},{"key":"9868_CR16","doi-asserted-by":"crossref","unstructured":"Buchheim, J. (2022). Der Kommissionsentwurf eines Digital Services Act \u2013 Regelungsinhalte, Regelungsansatz, Leerstellen und Konfliktpotential. In I. Spiecker gen. D\u00f6hmann, M. Westland, & R. Campos (Eds.), Demokratie und \u00d6ffentlichkeit im 21. Jahrhundert \u2013 zur Macht des Digitalen (pp. 249\u2013272). Nomos.","DOI":"10.5771\/9783748932741-249"},{"key":"9868_CR17","unstructured":"Callies, C. (2024). Planetary Boundaries, Precautionary Principle and \u2018Climate Engineering\u2019 from a Legal Perspective. Berlin e-Working Papers on European Law 153."},{"key":"9868_CR18","unstructured":"Colomina, C., S\u00e1nchez Margalef, H., & Youngs, R. (2021). The Impact of Disinformation on Democratic Processes and Human Rights in the World. European Parliament. Available at: https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2021\/653635\/EXPO_STU(2021)653635_EN.pdf (accessed 11 February 2025)."},{"key":"9868_CR19","unstructured":"Commission (2000). Communication of the Commission on the Precuationary Principle. COM(2000) 1 final."},{"key":"9868_CR20","unstructured":"Coombs, A. (2024). Persuade, Challenge and Influence with AI: Leveraging Artificial Intelligence in the Information Environment. Modern War Institute. Available at: https:\/\/mwi.westpoint.edu\/persuade-change-and-influence-with-ai-leveraging-artificial-intelligence-in-the-information-environment\/ (accessed 5 September 2025)."},{"key":"9868_CR21","unstructured":"Council of the EU (2022). EU imposes sanctions on state-owned outlets RT\/Russia Today and Sputnik\u2019s broadcasting in the EU. Press release. Available at: https:\/\/www.consilium.europa.eu\/en\/press\/press-releases\/2022\/03\/02\/eu-imposes-sanctions-on-state-owned-outlets-rtrussia-today-and-sputnik-s-broadcasting-in-the-eu\/ (accessed 16 December 2024)."},{"key":"9868_CR22","doi-asserted-by":"crossref","unstructured":"Custers, B. (2003). Effects of Unreliable Group Profiling by Means of Data Mining. In: Grieser G, Tanaka Y and Yamamoto A (Eds.) Lecture Notes in Artificial Intelligence, Proceedings of the 6th International Conference on Discovery Science (DS 2003). Sapporo, Berlin, Heidelberg, New York: Springer-Verlag, 290\u2013295.","DOI":"10.1007\/978-3-540-39644-4_25"},{"key":"9868_CR23","doi-asserted-by":"crossref","unstructured":"Custers, B., Dechesne, F., Pieters, W. (2018). Consent and privacy. In P. Schaber, & A. M\u00fcller (Eds.), The Routledge handbook of the ethics of consent (pp. 247\u2013258). Routledge.","DOI":"10.4324\/9781351028264-23"},{"key":"9868_CR24","doi-asserted-by":"publisher","unstructured":"De Nadal, L., & Jan\u010d\u00e1rik, P. (2024). Beyond the Deepfake Hype: AI, Democracy, and the Slovak Case. Harvard Kennedy School (HKS) Misinformation Review. Available at: https:\/\/doi.org\/10.37016\/mr-2020-153 (accessed 6 October 2024).","DOI":"10.37016\/mr-2020-153"},{"key":"9868_CR25","unstructured":"Digital Forensic Research Lab (2024). Undermining Ukraine: How Russia Widened Its Global Information War in 2023. Atlantic Council. Available at: https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/undermining-ukraine-how-russia-widened-its-global-information-war-in-2023\/ (accessed 11 March 2024)."},{"key":"9868_CR26","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1162\/ISEC_a_00117","volume":"37","author":"AB Downes","year":"2013","unstructured":"Downes, A. B., & Monten, J. (2013). Forced to be free? Why foreign-imposed regime change rarely leads to democratization. International Security, 37, 90.","journal-title":"International Security"},{"key":"9868_CR27","unstructured":"Elli, F. (2024). From Generative AI to General Elections: The Risks and Realities of GAI. DSA Decoded. Available at: https:\/\/www.dsadecoded.com\/gai-and-elections (accessed 11 June 2024)."},{"key":"9868_CR28","unstructured":"ELSA Lab Defence (2022). Use Case: Countering Cognitive Warfare Using Early Warning Systems. Available at: https:\/\/elsalabdefence.nl\/use-cases\/ (accessed 5 September 2025)."},{"key":"9868_CR29","unstructured":"European Commission (2024). Guidelines for Providers of VLOPs and VLOSEs on the Mitigation of Systemic Risks for Electoral Processes. Available at: https:\/\/digital-strategy.ec.europa.eu\/en\/library\/guidelines-providers-vlops-and-vloses-mitigation-systemic-risks-electoral-processes (accessed 18 December 2024)."},{"key":"9868_CR30","unstructured":"European Court of Human Rights Handyside v. UK, app. no. 5493\/72, judgment of 7 December 1976."},{"key":"9868_CR31","unstructured":"European Court of Human Rights Lingens v. Austria, app. no. 9815\/82, judgment of 8 July 1986."},{"key":"9868_CR32","unstructured":"European Court of Human Rights Observer and Guardian v. UK, app. no. 13585\/88, judgment of 26 November 1991."},{"key":"9868_CR33","unstructured":"European Court of Human Rights Salov v. Ukraine, app. no. 65518\/01, judgment of 6 September 2005."},{"key":"9868_CR34","unstructured":"European Parliament (2020). Resolution of 20 October 2020 with recommendations to the Commission on a framework of ethical aspects of artificial intelligence, robotics and related technologies, (2020\/2012(INL)."},{"key":"9868_CR35","first-page":"176","volume":"6","author":"H Fan","year":"2008","unstructured":"Fan, H. (2008). The missing link between self-determination and democracy: The case of East Timor. Northwestern Journal of International Human Rights, 6, 176.","journal-title":"Northwestern Journal of International Human Rights"},{"key":"9868_CR36","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1038\/s41562-023-01726-2","volume":"7","author":"S Feuerriegel","year":"2023","unstructured":"Feuerriegel, S., et al. (2023). Research can help to tackle AI-generated disinformation. Nature Human Behaviour, 7, 1818.","journal-title":"Nature Human Behaviour"},{"key":"9868_CR37","doi-asserted-by":"publisher","first-page":"46","DOI":"10.2307\/2203138","volume":"86","author":"TM Franck","year":"1992","unstructured":"Franck, T. M. (1992). The emerging right to democratic governance. American Journal of International Law, 86, 46.","journal-title":"American Journal of International Law"},{"key":"9868_CR38","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1093\/icon\/mot004","volume":"11","author":"J Gerards","year":"2013","unstructured":"Gerards, J. (2013). How to improve the necessity test of the European court of human rights. International Journal of Constitutional Law, 11, 466.","journal-title":"International Journal of Constitutional Law"},{"key":"9868_CR39","unstructured":"Gleicher, N. (2018). Coordinated Inauthentic Behavior Explained. Meta. Available at: https:\/\/about.fb.com\/news\/2018\/12\/inside-feed-coordinated-inauthentic-behavior\/ (accessed 12 December 2024)."},{"key":"9868_CR40","unstructured":"Goldstein, J. A., Sastry, G., Musser, M., DiResta, R., Gentzel, M. & Sedova, K. (2023). Generative Language Models and Automated Influence Operations: Emerging Threats and Potential Mitigations. Available at: (accessed 8 July 2024). https:\/\/arxiv.org\/abs\/2301.04246"},{"key":"9868_CR41","unstructured":"Goldstein, J. A., & Sastry, G. (2023). The Coming Age of AI-Powered Propaganda. Foreign Affairs. Available at: https:\/\/www.foreignaffairs.com\/united-states\/coming-age-ai-powered-propaganda (accessed 11 March 2024)."},{"key":"9868_CR42","doi-asserted-by":"publisher","first-page":"205395171989794","DOI":"10.1177\/2053951719897945","volume":"7","author":"R Gorwa","year":"2020","unstructured":"Gorwa, R., Binns, R., & Katzenbach, C. (2020). Algorithmic content moderation: Technical and political challenges in the automation of platform governance. Big Data & Society, 7, 2053951719897945.","journal-title":"Big Data & Society"},{"key":"9868_CR43","doi-asserted-by":"publisher","unstructured":"He, B., Ahamad, M., & Kumar, S. (2023). Reinforcement Learning-Based Counter-Misinformation Response Generation: A Case Study of COVID-19 Vaccine Misinformation. ACM. Available at: https:\/\/dl.acm.org\/doi\/https:\/\/doi.org\/10.1145\/3543507.3583388 (accessed 9 July 2024).","DOI":"10.1145\/3543507.3583388"},{"key":"9868_CR44","unstructured":"Hockenos, P. (2024). Russia Just Helped Swing a European Election. Foreign Policy. Available at: https:\/\/foreignpolicy.com\/2024\/04\/17\/slovakia-president-pellegrini-russia-election-interference-disinformation\/ (accessed 21 April 2024)."},{"key":"9868_CR45","unstructured":"Honigberg, B. (2022). The Existential Threat of AI-Enhanced Disinformation Operations. Just Security. Available at: https:\/\/www.justsecurity.org\/82246\/the-existential-threat-of-ai-enhanced-disinformation-operations\/ (accessed 28 April 2024)."},{"key":"9868_CR46","doi-asserted-by":"crossref","unstructured":"Husovec, M. (2024). Principles of the digital services act. Oxford University Press.","DOI":"10.1093\/law-ocl\/9780192882455.001.0001"},{"key":"9868_CR47","unstructured":"International Court of Justice Legal Consequences Arising from the Policies and Practices of Israel in the Occupied Palestinian Territory, Including East Jerusalem, Advisory Opinion of 19 July 2024."},{"key":"9868_CR48","unstructured":"Iyengar, R. (2024). What AI Will Do to Elections. Foreign Policy. Available at: https:\/\/foreignpolicy.com\/2024\/01\/03\/2024-elections-ai-tech-social-media-disinformation\/ (accessed 10 December 2024)."},{"key":"9868_CR49","unstructured":"Johns Hopkins University and Imperial College London (2021). Countering Cognitive Warfare: Awareness and Resilience. NATO Review. Available at: https:\/\/www.nato.int\/docu\/review\/articles\/2021\/05\/20\/countering-cognitive-warfare-awareness-and-resilience\/index.html (accessed 29 April 2024)."},{"key":"9868_CR50","unstructured":"Jowett, G. S., & O\u2019Donnell, V. (2012). Propaganda and Persuasion. 5th edition. Thousand Oaks, London, New Delhi: Sage Publishing."},{"key":"9868_CR51","unstructured":"Kapoor, S., & Narayanan, A. (2024). We Looked at 78 Election Deepfakes. Political Misinformation Is Not an AI Problem. AI Snake Oil. Available at: https:\/\/www.aisnakeoil.com\/p\/we-looked-at-78-election-deepfakes (accessed 27 March 2025)."},{"key":"9868_CR52","unstructured":"Kaye, D. (2020). Disease Pandemics and the Freedom of Opinion and Expression. Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression. UN Doc. A\/HRC\/44\/49. Available at: https:\/\/undocs.org\/A\/HRC\/44\/49 (accessed 10 December 2024)."},{"key":"9868_CR53","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1093\/ejil\/chab034","volume":"32","author":"J Klabbers","year":"2021","unstructured":"Klabbers, J., et al. (2021). International law and democracy revisited: Introduction to the symposium. European Journal of International Law, 32, 9.","journal-title":"European Journal of International Law"},{"key":"9868_CR54","first-page":"1598","volume":"131","author":"K Klonick","year":"2017","unstructured":"Klonick, K. (2017). The new governors: The people, rules, and processes governing online speech. Harvard Law Review, 131, 1598.","journal-title":"Harvard Law Review"},{"key":"9868_CR55","doi-asserted-by":"publisher","unstructured":"Krack, N., Dutkiewicz, L. & De Meyere, J. (2025). Generative artificial intelligence and disinformation. Available at: (accessed 5 September 2025). https:\/\/doi.org\/10.2139\/ssrn.5192993","DOI":"10.2139\/ssrn.5192993"},{"issue":"4","key":"9868_CR56","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1111\/polp.12617","volume":"52","author":"M \u0141abuz","year":"2024","unstructured":"\u0141abuz, M., & Nehring, C. (2024). Information apocalypse or overblown Fears\u2014What AI Mis- and disinformation is all about? Shifting away from technology toward. Human Reactions Politics & Policy, 52(4), 874.","journal-title":"Human Reactions Politics & Policy"},{"key":"9868_CR57","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1017\/S0021223720000060","volume":"53","author":"H Lahmann","year":"2020","unstructured":"Lahmann, H. (2020). Information operations and the question of illegitimate interference under international Law. 53. Israel Law Review, 53, 189.","journal-title":"Israel Law Review"},{"key":"9868_CR58","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1093\/ejil\/chac023","volume":"33","author":"H Lahmann","year":"2022","unstructured":"Lahmann, H. (2022). Infecting the mind: Establishing responsibility for transboundary disinformation. European Journal of International Law, 33, 411.","journal-title":"European Journal of International Law"},{"key":"9868_CR59","unstructured":"Lahmann, H. (2025). Self-Determination in the age of algorithmic warfare. European Journal of Legal Studies, Special Issue on Law and Technology, 161."},{"key":"9868_CR60","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1017\/S1574019612000260","volume":"8","author":"K Lenaerts","year":"2012","unstructured":"Lenaerts, K. (2012). Exploring the limits of the EU charter of fundamental rights. European Constitutional Law Review, 8, 375.","journal-title":"European Constitutional Law Review"},{"key":"9868_CR61","doi-asserted-by":"crossref","unstructured":"Lepoutre, M. (2021). Democratic speech in divided times. Oxford University Press.","DOI":"10.1093\/oso\/9780198869757.001.0001"},{"key":"9868_CR62","unstructured":"Lipka, M., & Shearer, E. (2023). Audiences Are Declining for Traditional News Media in the U.S. \u2013 with Some Exceptions. Pew Research Center. Available at: https:\/\/www.pewresearch.org\/short-reads\/2023\/11\/28\/audiences-are-declining-for-traditional-news-media-in-the-us-with-some-exceptions\/ (accessed 18 December 2024)."},{"key":"9868_CR63","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1017\/S1744133122000263","volume":"18","author":"J Marecos","year":"2023","unstructured":"Marecos, J., et al. (2023). Health misinformation and freedom of expression: Considerations for policymakers. Health Economics, Policy and Law, 18, 204.","journal-title":"Health Economics, Policy and Law"},{"key":"9868_CR64","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/19331681.2023.2211969","volume":"22","author":"L Maschmeyer","year":"2025","unstructured":"Maschmeyer, L., et al. (2025). Donetsk don\u2019t Tell \u2013 Hybrid war in Ukraine and the limits of social media influence operations. Journal of Information Technology & Politics, 22, 49.","journal-title":"Journal of Information Technology & Politics"},{"key":"9868_CR65","doi-asserted-by":"publisher","first-page":"4692","DOI":"10.1038\/s41598-024-53755-0","volume":"14","author":"SC Matz","year":"2024","unstructured":"Matz, S. C., et al. (2024). The potential of generative AI for personalized persuasion at scale. Scientific Reports, 14, 4692.","journal-title":"Scientific Reports"},{"key":"9868_CR66","doi-asserted-by":"crossref","unstructured":"Mazarr, M. J., Bauer, R., Casey, A., Heintz, S. & Matthews, L. J. (2019). The Emerging Risk of Virtual Societal Warfare: Social Manipulation in a Changing Information Environment. RAND Corporation. Available at: (accessed 13 November 2024). https:\/\/www.rand.org\/pubs\/research_reports\/RR2714.html","DOI":"10.7249\/RR2714"},{"key":"9868_CR67","unstructured":"Meaker, M. (2023). Slovakia\u2019s Election Deepfakes Show AI Is a Danger to Democracy. Wired. Available at: https:\/\/www.wired.com\/story\/slovakias-election-deepfakes-show-ai-is-a-danger-to-democracy\/ (accessed 29 April 2024)."},{"key":"9868_CR68","doi-asserted-by":"crossref","unstructured":"Mercier, H., & Altay, S. (2022). Do cultural misbeliefs cause costly behavior? In J. Sommer, J. Musolino, & P. Hemmer (Eds.), The cognitive science of belief: A multidisciplinary approach (pp. 193\u2013208). Cambridge University Press.","DOI":"10.1017\/9781009001021.014"},{"key":"9868_CR69","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/s10676-023-09717-7","volume":"25","author":"S Miller","year":"2023","unstructured":"Miller, S. (2023). Cognitive warfare: An ethical analysis. Ethics and Information Technology, 25, 46.","journal-title":"Ethics and Information Technology"},{"key":"9868_CR70","unstructured":"NATO Allied Command Transformation (2024). Allied Command Transformation Develops the Cognitive Warfare Concept to Combat Disinformation and Defend Against Cognitive Warfare. Available at: https:\/\/www.act.nato.int\/article\/cogwar-concept\/ (accessed 10 December 2024)."},{"key":"9868_CR71","doi-asserted-by":"crossref","unstructured":"Newman, N. (2023). Young People Are Abandoning News Websites \u2013 New Research Reveals Scale of Challenge to Media. The Conversation. Available at: http:\/\/theconversation.com\/young-people-are-abandoning-news-websites-new-research-reveals-scale-of-challenge-to-media-207659 (accessed 18 December 2024).","DOI":"10.64628\/AB.q3tg95p4m"},{"key":"9868_CR72","unstructured":"Norden, L., Panditharatne, M., & Harris, D. (2024). Multiple Threats Converge to Heighten Disinformation Risks to This Year\u2019s US Elections. Just Security. Available at: https:\/\/www.justsecurity.org\/92348\/multiple-threats-converge-to-heighten-disinformation-risks-to-this-years-us-elections\/ (accessed 19 February 2024)."},{"key":"9868_CR73","unstructured":"Ositsyn, A., et al. (2023). Vera.Ai: VERification assisted by artificial Intelligence, D5.1: Annotation model. API Definitions, and Database of Known Fakes First Release."},{"key":"9868_CR74","unstructured":"Ovadya, A. (2022). Contextualization Engines Can Fight Misinformation without Censorship. Medium. Available at: https:\/\/aviv.medium.com\/contextualization-engines-can-fight-misinformation-without-censorship-c5c47222a3b7 (accessed 12 December 2024)."},{"key":"9868_CR75","unstructured":"Pavel, V. (2024). Democracy on TikTok? Digital Service Act (DSA) rules put to the test in the Romanian presidential elections. Liberal Debatt. Available at: https:\/\/www.liberaldebatt.se\/2024\/11\/democracy-on-tiktok-digital-service-act-dsa-rules-put-to-the-test-in-the-romanian-presidential-elections\/ (accessed 10 December 2024)."},{"key":"9868_CR76","doi-asserted-by":"publisher","first-page":"1517726","DOI":"10.3389\/fpos.2025.1517726","volume":"7","author":"F Pilati","year":"2025","unstructured":"Pilati, F., & Venturini, T. (2025). The use of artificial intelligence in counter-disinformation: A world wide (web) mapping. Frontiers in Political Science, 7, 1517726.","journal-title":"Frontiers in Political Science"},{"key":"9868_CR77","doi-asserted-by":"crossref","unstructured":"Salvi, F., Horta Ribeiro, M., Gallotti, R. & West, R. (2024). On the Conversational Persuasiveness of Large Language Models: A Randomized Controlled Trial. arXiv. Available at: (accessed 29 July 2024). http:\/\/arxiv.org\/abs\/2403.14380","DOI":"10.21203\/rs.3.rs-4429707\/v1"},{"key":"9868_CR78","doi-asserted-by":"publisher","unstructured":"Schmechtig, P. (2025). Epistemic Paternalism and Protective Authority in a Non-Ideal World. Social Epistemology. Available at: https:\/\/doi.org\/10.1080\/02691728.2025.2453942 (accessed 5 September 2025).","DOI":"10.1080\/02691728.2025.2453942"},{"key":"9868_CR79","doi-asserted-by":"crossref","unstructured":"Selejan-Gutan, B. (2024). The Second Round That Wasn\u2019t. Verfassungsblog. Available at: https:\/\/verfassungsblog.de\/the-second-round-that-wasnt\/ (accessed 10 December 2024).","DOI":"10.59704\/60b2d4d62859cfe1"},{"key":"9868_CR80","doi-asserted-by":"publisher","unstructured":"Shin, D. (2025). Automating Epistemology: How AI Reconfigures Truth, Authority, and Verification. AI & Society. Available at: https:\/\/doi.org\/10.1007\/s00146-025-02560-y (accessed 5 September 2025).","DOI":"10.1007\/s00146-025-02560-y"},{"key":"9868_CR81","unstructured":"Simon, F. M., & Altay, S. (2025). Don\u2019t Panic (Yet): Assessing the Evidence and Discourse Around Generative AI and Elections. Knight First Amendment Institute. Available at: http:\/\/knightcolumbia.org\/content\/dont-panic-yet-assessing-the-evidence-and-discourse-around-generative-ai-and-elections (accessed 5 September 2025)."},{"key":"9868_CR82","doi-asserted-by":"publisher","unstructured":"Simon, F. M., Altay, S., & Mercier, H. (2023). Misinformation Reloaded? Fears about the Impact of Generative AI on Misinformation Are Overblown. Harvard Kennedy School (HKS) Misinformation Review. Available at: https:\/\/doi.org\/10.37016\/mr-2020-127 (accessed 17 April 2024).","DOI":"10.37016\/mr-2020-127"},{"key":"9868_CR83","unstructured":"Stockwell, S. (2024). AI-Enabled Influence Operations: Threat Analysis of the 2024 UK and European Elections. Centre for Emerging Technology and Security. Available at: https:\/\/cetas.turing.ac.uk\/publications\/ai-enabled-influence-operations-threat-analysis-2024-uk-and-european-elections (accessed 10 December 2024)."},{"key":"9868_CR84","unstructured":"TITAN (2025). Teaching Truth \u2013 Why Critical Thinking Is Your Best Defense Against Online Disinformation. Available at: https:\/\/www.titanthinking.eu\/post\/teaching-truth-why-critical-thinking-is-your-best-defense-against-online-disinformation (accessed 5 September 2025)."},{"key":"9868_CR85","unstructured":"Trilateral Research (2025). Using Responsible AI to Combat Misinformation. Available at: https:\/\/trilateralresearch.com\/responsible-ai\/using-responsible-ai-to-combat-misinformation (accessed 5 September 2025)."},{"key":"9868_CR86","doi-asserted-by":"crossref","unstructured":"Uhlenbusch, J. (2025). Elon Musk, the Systemic Risk. Verfassungsblog. Available at: https:\/\/verfassungsblog.de\/elon-musk-the-systemic-risk\/ (accessed 5 September 2025).","DOI":"10.59704\/bbb5b45066581219"},{"key":"9868_CR87","unstructured":"UN Commission on Human Rights Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, E\/CN.4\/2000\/63, 18 January 2000."},{"key":"9868_CR88","unstructured":"UN General Assembly (1946). Resolution 59(I), UN Doc. A\/RES\/59(I). 14 December."},{"key":"9868_CR89","unstructured":"UN Human Rights Committee (2011). General Comment No. 34 on Article 19: Freedoms of Opinion and Expression, UN Doc. CCPR\/C\/GC\/34.29 July."},{"key":"9868_CR90","unstructured":"Ursic, H. (2019). Uncontrollable: Data Subject Rights and the Data-Driven Economy. Leiden University. Available at: https:\/\/hdl.handle.net\/1887\/68574 (accessed 18 December 2024)."},{"key":"9868_CR91","unstructured":"Uscinski, J. E., & Enders, A. M. (2020). The Coronavirus Conspiracy Boom. The Atlantic. Available at: https:\/\/www.theatlantic.com\/health\/archive\/2020\/04\/what-can-coronavirus-tell-us-about-conspiracy-theories\/610894\/ (accessed 10 December 2024)."},{"key":"9868_CR92","doi-asserted-by":"publisher","unstructured":"Vainaite, V. (2025). Electoral Processes in EU Member States and Deepfake-based Disinformation: How do the Responses Differ? Available at: https:\/\/doi.org\/10.2139\/ssrn.5039297 (accessed 5 September 2025).","DOI":"10.2139\/ssrn.5039297"},{"key":"9868_CR93","unstructured":"Van Diggelen, J., Jazz, R., Aidman, E., & Vince, J. (2024). Designing AI-Enabled Countermeasures to Cognitive Warfare."},{"key":"9868_CR94","unstructured":"Van Hoboken, J. (2019). The Legal Framework on the Dissemination of Disinformation Through Internet Services and the Regulation of Political Advertising. Institute for Information Law, University of Amsterdam. Available at: https:\/\/www.ivir.nl\/publicaties\/download\/Report_Disinformation_Dec2019-1.pdf (accessed 10 December 2024)."},{"key":"9868_CR97","doi-asserted-by":"publisher","unstructured":"Wack, M., Ehrett, C., Linvill, D. & Warren, P. (2025). Generative propaganda: Evidence of AI\u2019s impact from a state-backed disinformation campaign. PNAS Nexus 4, pgaf083. https:\/\/doi.org\/10.1093\/pnasnexus\/pgaf083","DOI":"10.1093\/pnasnexus\/pgaf083"},{"key":"9868_CR95","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1093\/idpl\/ipab014","volume":"11","author":"B Wong","year":"2021","unstructured":"Wong, B. (2021). Problems with controller-based responsibility in EU data protection law. International Data Privacy Law, 11, 375.","journal-title":"International Data Privacy Law"},{"key":"9868_CR96","doi-asserted-by":"crossref","unstructured":"Woods, L., & Perrin, W. (2019). Online Harm Reduction \u2013 A Statutory Duty of Care and Regulator. Carnegie UK. Available at: https:\/\/carnegieuk.org\/publication\/online-harm-reduction-a-statutory-duty-of-care-and-regulator\/ (accessed 5 September 2025).","DOI":"10.2139\/ssrn.4003986"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-025-09868-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-025-09868-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-025-09868-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T03:34:10Z","timestamp":1763782450000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-025-09868-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":97,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["9868"],"URL":"https:\/\/doi.org\/10.1007\/s10676-025-09868-9","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,6]]},"assertion":[{"value":"6 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"49"}}