top of page
Real-time disinformation response
Background
We start by demystifying information threats based on key parameters, such as actors, narratives, targets, topics, geographies, channels, techniques.
This is then cross-referenced with data from thousands of empirical experiments on comparable threats to survey evidence. Analysis of this data by in-house experts and AI inform optimal intervention design and implementation considerations.
We then run multivariate testing and multi-armed bandits based on the analysis to iterate and optimise over time.
Case Study
The Problem
Our Solutions
bottom of page