{"id":4205,"date":"2024-11-25T04:59:50","date_gmt":"2024-11-25T04:59:50","guid":{"rendered":"https:\/\/cisanewsletter.com\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/"},"modified":"2024-11-25T05:21:59","modified_gmt":"2024-11-25T05:21:59","slug":"gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation","status":"publish","type":"post","link":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/","title":{"rendered":"Gestion des ressources \u00e0 l&rsquo;\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation"},"content":{"rendered":"\n<p>Dans le paysage mondial interconnect\u00e9 d&rsquo;aujourd&rsquo;hui, la gestion des ressources est devenue plus compliqu\u00e9e, en particulier si l&rsquo;on consid\u00e8re la contagion de la s\u00e9curit\u00e9 et la prolif\u00e9ration de la d\u00e9sinformation (L\u00f3pez et al., 2024). Afin d&rsquo;att\u00e9nuer les effets de ces probl\u00e8mes, qui ont le potentiel de perturber la stabilit\u00e9 sociale, politique et \u00e9conomique, les ressources doivent \u00eatre utilis\u00e9es et allou\u00e9es de mani\u00e8re efficace. <\/p>\n\n<p><strong><em>Contagion de la s\u00e9curit\u00e9 : Les menaces locales se r\u00e9percutent \u00e0 l&rsquo;\u00e9chelle mondiale<\/em><\/strong><\/p>\n\n<p>La contagion de la s\u00e9curit\u00e9 fait r\u00e9f\u00e9rence \u00e0 la propagation rapide des menaces \u00e0 la s\u00e9curit\u00e9 entre les r\u00e9gions, qui d\u00e9coule souvent de la nature interconnect\u00e9e des soci\u00e9t\u00e9s modernes et des progr\u00e8s technologiques (Brett, 2021). Ce ph\u00e9nom\u00e8ne peut prendre diff\u00e9rentes formes, telles que les guerres g\u00e9opolitiques, le terrorisme et les cyberattaques. Prenons l&rsquo;exemple de l&rsquo;\u00e9pid\u00e9mie de ransomware WannaCry de 2017 : issue d&rsquo;une petite vuln\u00e9rabilit\u00e9 dans les syst\u00e8mes Windows obsol\u00e8tes, cette cybermenace a balay\u00e9 le monde en quelques heures seulement, paralysant des h\u00f4pitaux au Royaume-Uni, arr\u00eatant les cha\u00eenes de production dans les usines Renault et perturbant les chemins de fer en Allemagne (Chen &amp; Bridges, 2017 ; Akbanov et al, 2019). Les d\u00e9g\u00e2ts ne se sont pas limit\u00e9s \u00e0 un seul secteur ou \u00e0 un seul pays, mettant en \u00e9vidence les effets en cascade d&rsquo;une menace localis\u00e9e.   <\/p>\n\n<p>La crise financi\u00e8re de 2008 en est un autre exemple frappant. Si elle a d\u00e9but\u00e9 aux \u00c9tats-Unis avec la faillite de Lehman Brothers, ses effets se sont rapidement propag\u00e9s dans le monde entier, r\u00e9v\u00e9lant la fragilit\u00e9 des syst\u00e8mes financiers interconnect\u00e9s (Schoen, 2017 ; Bernanke, 2018). Les pays dot\u00e9s de cadres de gestion des ressources solides \u00e9taient mieux plac\u00e9s pour r\u00e9sister \u00e0 la temp\u00eate, ce qui souligne l&rsquo;importance d&rsquo;un investissement pr\u00e9ventif dans des strat\u00e9gies d&rsquo;att\u00e9nuation des risques (Lu et al., 2022).  <\/p>\n\n<p>G\u00e9rer efficacement les ressources dans de tels sc\u00e9narios ne consiste pas seulement \u00e0 limiter les d\u00e9g\u00e2ts, mais aussi \u00e0 renforcer la r\u00e9silience. En outre, comme les menaces d\u00e9passent souvent les fronti\u00e8res nationales, il s&rsquo;agit de renforcer les mesures de cybers\u00e9curit\u00e9, d&rsquo;encourager la coop\u00e9ration internationale et de cr\u00e9er des \u00e9quipes d&rsquo;intervention rapide capables d&rsquo;att\u00e9nuer la propagation de ces menaces. <\/p>\n\n<p><strong><em>D\u00e9sinformation et d\u00e9sinformation : L&rsquo;ennemi invisible<\/em><\/strong><\/p>\n\n<p>La d\u00e9sinformation, caract\u00e9ris\u00e9e par la diffusion d\u00e9lib\u00e9r\u00e9e d&rsquo;informations fausses ou trompeuses, est tout aussi insidieuse, si ce n&rsquo;est plus. Elle est susceptible d&rsquo;\u00e9roder la confiance du public, d&rsquo;exacerber les troubles sociaux et de fausser la prise de d\u00e9cision (Heffernan, 2024). Ce probl\u00e8me a \u00e9t\u00e9 mis en lumi\u00e8re par la pand\u00e9mie de COVID-19, car la d\u00e9sinformation sur le virus et les vaccins s&rsquo;est r\u00e9pandue plus rapidement que le virus lui-m\u00eame, provoquant r\u00e9sistance et r\u00e9ticence, ce qui a rendu les interventions de sant\u00e9 publique plus difficiles (Pennycook et al., 2020). Les strat\u00e9gies de gestion des ressources doivent pr\u00e9voir l&rsquo;affectation de ressources \u00e0 la lutte contre la d\u00e9sinformation. Il s&rsquo;agit d&rsquo;investir dans des organismes de v\u00e9rification des faits, de renforcer la culture num\u00e9rique au sein de la population et de tirer parti de la technologie pour identifier et contrer les faux r\u00e9cits. La collaboration avec les plateformes de m\u00e9dias sociaux et l&rsquo;\u00e9laboration de cadres r\u00e9glementaires sont \u00e9galement essentielles pour freiner la propagation de la d\u00e9sinformation.     <\/p>\n\n<p><strong><em>Interaction entre la contagion de la s\u00e9curit\u00e9 et la d\u00e9sinformation<\/em><\/strong><\/p>\n\n<p>Ces deux ph\u00e9nom\u00e8nes ne sont pas isol\u00e9s. La d\u00e9sinformation peut exacerber la propagation des menaces pour la s\u00e9curit\u00e9. Par exemple, lors de la cyberattaque de 2021 contre Colonial Pipeline aux \u00c9tats-Unis, de fausses informations sur des p\u00e9nuries de carburant se sont rapidement r\u00e9pandues, provoquant des achats de panique et des p\u00e9nuries r\u00e9elles (Lubin, 2022), ce qui montre comment la d\u00e9sinformation peut amplifier l&rsquo;impact d&rsquo;une atteinte \u00e0 la s\u00e9curit\u00e9.  <\/p>\n\n<p>En revanche, une gestion inad\u00e9quate des ressources peut rendre les soci\u00e9t\u00e9s vuln\u00e9rables \u00e0 l&rsquo;un et \u00e0 l&rsquo;autre. Dans les r\u00e9gions o\u00f9 la culture num\u00e9rique est faible, la d\u00e9sinformation se propage sans contr\u00f4le, tandis que les cadres de cybers\u00e9curit\u00e9 disposant de peu de ressources sont mal \u00e9quip\u00e9s pour g\u00e9rer les effets en cascade des menaces \u00e0 la s\u00e9curit\u00e9 (Skiba, 2024). <\/p>\n\n<p>L&rsquo;interaction entre la gestion des ressources, la contagion s\u00e9curitaire et la d\u00e9sinformation cr\u00e9e un paysage complexe. La d\u00e9sinformation peut exacerber les contagions s\u00e9curitaires en semant la peur, la confusion et la panique, ce qui a pour effet de solliciter les ressources. Par exemple, la d\u00e9sinformation en situation d&rsquo;urgence peut conduire \u00e0 une mauvaise affectation des ressources, comme l&rsquo;a montr\u00e9 l&rsquo;achat excessif de fournitures m\u00e9dicales au cours des premi\u00e8res phases de la pand\u00e9mie de COVID-19 (Pulido et al., 2020).  <\/p>\n\n<p>Inversement, une mauvaise gestion des ressources peut aggraver la d\u00e9sinformation et la contagion s\u00e9curitaire. Alors que les infrastructures de s\u00e9curit\u00e9 sous-financ\u00e9es sont mal pr\u00e9par\u00e9es pour faire face aux impacts en cascade des menaces s\u00e9curitaires, un investissement inad\u00e9quat dans la communication et l&rsquo;\u00e9ducation du public expose les communaut\u00e9s \u00e0 la manipulation. <\/p>\n\n<p><strong><em>Apprendre sur le terrain<\/em><\/strong><\/p>\n\n<p>Le gouvernement estonien offre un exemple int\u00e9ressant d&rsquo;investissement proactif. L&rsquo;Estonie a r\u00e9alis\u00e9 d&rsquo;importants investissements dans la cybers\u00e9curit\u00e9 apr\u00e8s une cyberattaque de grande ampleur en 2007 et figure aujourd&rsquo;hui parmi les pays les plus r\u00e9silients sur le plan technologique (Nicol, 2018 ; G\u00f3rka, 2023). Depuis sa cr\u00e9ation, le Centre d&rsquo;excellence en coop\u00e9ration pour la cyberd\u00e9fense de l&rsquo;OTAN a jou\u00e9 un r\u00f4le d\u00e9terminant dans la lutte contre les cyberattaques dans le monde entier (Atkinson, 2023).  <\/p>\n\n<p>L&rsquo;approche de l&rsquo;Union europ\u00e9enne en mati\u00e8re de d\u00e9sinformation est un autre exemple. Gr\u00e2ce \u00e0 des initiatives telles que l&rsquo;Observatoire europ\u00e9en des m\u00e9dias num\u00e9riques, l&rsquo;UE encourage la collaboration entre les v\u00e9rificateurs de faits, les chercheurs et les d\u00e9cideurs politiques, en mettant en commun les ressources pour lutter efficacement contre la d\u00e9sinformation (Hoxtell, n.d). <\/p>\n\n<p>Aux Philippines, o\u00f9 les fausses informations sont tr\u00e8s r\u00e9pandues, des organisations non gouvernementales ont lanc\u00e9 des initiatives locales pour apprendre aux gens \u00e0 rep\u00e9rer et \u00e0 \u00e9viter les fausses nouvelles (Lewis et al., 2020 ; Barron, 2021). Ces programmes permettent aux communaut\u00e9s de s&rsquo;opposer aux r\u00e9cits trompeurs tout en am\u00e9liorant la culture num\u00e9rique. <\/p>\n\n<p><strong><em>La voie \u00e0 suivre<\/em><\/strong><\/p>\n\n<p>Pour lutter contre la cybers\u00e9curit\u00e9, des ressources devraient \u00eatre allou\u00e9es \u00e0 la cybers\u00e9curit\u00e9, \u00e0 la communication publique et \u00e0 l&rsquo;\u00e9ducation, y compris le financement des avanc\u00e9es technologiques et des programmes de formation. La mise en place de cadres de collaboration internationale pour le partage des ressources et l&rsquo;att\u00e9nuation des menaces sera utile. L&rsquo;utilisation de l&rsquo;intelligence artificielle et de l&rsquo;analyse des donn\u00e9es (big data) pour la d\u00e9tection pr\u00e9coce et la r\u00e9ponse aux menaces de s\u00e9curit\u00e9 ne peut pas \u00eatre laiss\u00e9e de c\u00f4t\u00e9. Il est tout aussi important de favoriser une culture de la transparence et de l&rsquo;engagement public pour renforcer la confiance et la r\u00e9silience, en r\u00e9pondant aux pr\u00e9occupations des citoyens et en fournissant des informations exactes.   <\/p>\n\n<p><strong>Conclusion<\/strong><\/p>\n\n<p>Les d\u00e9fis de la contagion s\u00e9curitaire et de la d\u00e9sinformation sont profonds, mais ils ne sont pas insurmontables. Une gestion efficace des ressources par l&rsquo;utilisation de l&rsquo;innovation technologique, l&rsquo;encouragement de la coop\u00e9ration internationale et l&rsquo;engagement du public peuvent renforcer la r\u00e9silience de la soci\u00e9t\u00e9 \u00e0 long terme. <\/p>\n\n<p>En tirant les le\u00e7ons des incidents pass\u00e9s et en adoptant des mesures proactives, les soci\u00e9t\u00e9s peuvent naviguer dans le paysage complexe des menaces modernes et garantir la stabilit\u00e9 et la s\u00e9curit\u00e9 dans un monde de plus en plus instable.<\/p>\n\n<p><strong>R\u00e9f\u00e9rences<\/strong><\/p>\n\n<p>L\u00f3pez, A. B., Pastor-Galindo, J. et Ruip\u00e9rez-Valiente, J. A. (2024). Cadres, mod\u00e9lisation et simulations de la d\u00e9sinformation et de la m\u00e9sinformation : A Systematic Literature Review. <em>arXiv preprint arXiv:2406.09343<\/em>. <\/p>\n\n<p>Brett, T. (2021). <em>Understanding contagion spreading processes of cyber security threats through social networks<\/em> (Th\u00e8se de doctorat, Universit\u00e9 de Greenwich).<\/p>\n\n<p>Chen, Q. et Bridges, R. A. (2017, d\u00e9cembre). Analyse comportementale automatis\u00e9e des logiciels malveillants : A case study of wannacry ransomware. In <em>2017 16th IEEE International Conference on machine learning and applications (ICMLA)<\/em> (pp. 454-460). IEEE.   <\/p>\n\n<p>Akbanov, M., Vassilakis, V. G. et Logothetis, M. D. (2019). Le ransomware WannaCry : Analyse des m\u00e9canismes d&rsquo;infection, de persistance, de pr\u00e9vention de r\u00e9cup\u00e9ration et de propagation. <em>Journal des t\u00e9l\u00e9communications et des technologies de l&rsquo;information<\/em>, (1), 113-124. <\/p>\n\n<p>Bernanke, B. S. (2018). The real effects of disrupted credit : Evidence from the global financial crisis. <em>Brookings Papers on Economic Activity<\/em>, <em>2018<\/em>(2), 251-342. <\/p>\n\n<p>Schoen, E. J. (2017). La crise financi\u00e8re de 2007-2009 : Une \u00e9rosion de l&rsquo;\u00e9thique : A case study. <em>Journal of Business Ethics<\/em>, <em>146<\/em>, 805-830. <\/p>\n\n<p>Lu, J., Rodenburg, K., Foti, L. et Pegoraro, A. (2022). Are firms with better sustainability performance more resilient during crises ? <em>Business Strategy and the Environment<\/em>, <em>31<\/em>(7), 3354-3370.<\/p>\n\n<p>Pennycook, G., McPhetres, J., Zhang, Y., Lu, J. G. et Rand, D. G. (2020). Fighting COVID- 19 misinformation on social media : Experimental evidence for a scalable accuracy- nudge intervention. <em>Psychological science<\/em>, <em>31<\/em>(7), 770-780. <\/p>\n\n<p>Heffernan, A. (2024). Contrer la d\u00e9sinformation climatique en Afrique. <\/p>\n\n<p>Lubin, A. (2022). Cyber plungers : colonial pipeline and the case for an omnibus cybersecurity legislation (Les plongeurs du cyberespace : la fili\u00e8re coloniale et les arguments en faveur d&rsquo;une l\u00e9gislation omnibus sur la cybers\u00e9curit\u00e9).   <em>Ga. L. Rev. <\/em>, <em>57<\/em>, 1605.<\/p>\n\n<p>Skiba, R. (2024). <em>Les ombres de la catastrophe : Naviguer dans les risques de souffrance modernes dans une soci\u00e9t\u00e9 vuln\u00e9rable<\/em>. After Midnight Publishing. <\/p>\n\n<p>Pulido, C. M., Villarejo-Carballido, B., Redondo-Sama, G. et G\u00f3mez, A. (2020). COVID-19 infodemic : Plus de retweets pour les informations scientifiques sur le coronavirus que pour les fausses informations. <em>International sociology<\/em>, <em>35<\/em>(4), 377-392. <\/p>\n\n<p>Nicol, C. (2018). Cybers\u00e9curit\u00e9 et r\u00e9silience nationale en Estonie. <\/p>\n\n<p>G\u00f3rka, M. (2023). Politique de cybers\u00e9curit\u00e9 des \u00c9tats baltes : D\u00e9veloppement des capacit\u00e9s num\u00e9riques en 2017-2022.   <em>Stosunki  <\/em><\/p>\n\n<p>Atkinson, R. J. (2023). <em>NATO Cyber Defence, 2000-2022<\/em> (Th\u00e8se de doctorat, The University of Western Ontario (Canada)).<\/p>\n\n<p>Hoxtell, W. Att\u00e9nuer la d\u00e9sinformation en Europe.<\/p>\n\n<p>Lewis, D., Kanji, N. et Themudo, N. S. (2020). <em>Les organisations non gouvernementales et le d\u00e9veloppement<\/em>. Routledge.<\/p>\n\n<p>Barron, A. L. (2021). Freedom of Expression, Fake News, and the Elections : Comment l&rsquo;expression est limit\u00e9e ou amplifi\u00e9e dans les \u00e9lections d\u00e9mocratiques aux Philippines. <em>Ateneo LJ<\/em>, <em>66<\/em>, 463. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans le paysage mondial interconnect\u00e9 d&rsquo;aujourd&rsquo;hui, la gestion des ressources est devenue plus compliqu\u00e9e, en particulier si l&rsquo;on consid\u00e8re la contagion de la s\u00e9curit\u00e9 et la prolif\u00e9ration de la d\u00e9sinformation (L\u00f3pez et al., 2024). Afin d&rsquo;att\u00e9nuer les effets de ces probl\u00e8mes, qui ont le potentiel de perturber la stabilit\u00e9 sociale, politique et \u00e9conomique, les ressources [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4202,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"jnews-multi-image_gallery":[],"jnews_single_post":{"subtitle":"","format":"standard","video":"","gallery":"","source_name":"CISA ANALYST","source_url":"cisanewsletter.com","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"0","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":"","disable_ad":"0"},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_review":[],"enable_review":"0","type":"percentage","name":"","summary":"","brand":"","sku":"","good":[{"good_text":""}],"bad":[{"bad_text":""}],"score_override":"","override_value":"","rating":[{"rating_text":"","rating_number":"10"}],"price":[{"shop":"","price":"","link":"","icon":""}],"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"jnews_post_split":{"enable_post_split":"0","post_split":[{"template":"1","tag":"h2","numbering":"asc","mode":"normal","first":"0","enable_toc":"0","toc_type":"normal"}]},"footnotes":""},"categories":[187],"tags":[221],"class_list":["post-4205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analyse","tag-12e-edition-2024"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gestion des ressources \u00e0 l&#039;\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation - CISA NEWSLETTER<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gestion des ressources \u00e0 l&#039;\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation - CISA NEWSLETTER\" \/>\n<meta property=\"og:description\" content=\"Dans le paysage mondial interconnect\u00e9 d&rsquo;aujourd&rsquo;hui, la gestion des ressources est devenue plus compliqu\u00e9e, en particulier si l&rsquo;on consid\u00e8re la contagion de la s\u00e9curit\u00e9 et la prolif\u00e9ration de la d\u00e9sinformation (L\u00f3pez et al., 2024). Afin d&rsquo;att\u00e9nuer les effets de ces probl\u00e8mes, qui ont le potentiel de perturber la stabilit\u00e9 sociale, politique et \u00e9conomique, les ressources [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/\" \/>\n<meta property=\"og:site_name\" content=\"CISA NEWSLETTER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61558173539135\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-25T04:59:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-25T05:21:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/11\/missinformation.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CISA EDITORIAL\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CisaSocial\" \/>\n<meta name=\"twitter:site\" content=\"@CisaSocial\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"CISA EDITORIAL\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/\"},\"author\":{\"name\":\"CISA EDITORIAL\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/person\\\/a0e04c9eece75fa21ae2273867968b01\"},\"headline\":\"Gestion des ressources \u00e0 l&rsquo;\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation\",\"datePublished\":\"2024-11-25T04:59:50+00:00\",\"dateModified\":\"2024-11-25T05:21:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/\"},\"wordCount\":1814,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/missinformation.jpg\",\"keywords\":[\"12e \u00e9dition 2024\"],\"articleSection\":[\"ANALYSE\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/\",\"name\":\"Gestion des ressources \u00e0 l'\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation - CISA NEWSLETTER\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/missinformation.jpg\",\"datePublished\":\"2024-11-25T04:59:50+00:00\",\"dateModified\":\"2024-11-25T05:21:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/missinformation.jpg\",\"contentUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/missinformation.jpg\",\"width\":768,\"height\":432,\"caption\":\"Seamlessly looping animation showing a variety of general fake news and misinformation related terms and concepts.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gestion des ressources \u00e0 l&#8217;\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#website\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/\",\"name\":\"CISA NEWSLETTER\",\"description\":\"Headlining West African News\",\"publisher\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cisanewsletter.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\",\"name\":\"Centre for Intelligence & Security Analysis Ghana\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cisaghana.png\",\"contentUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cisaghana.png\",\"width\":1055,\"height\":1063,\"caption\":\"Centre for Intelligence & Security Analysis Ghana\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61558173539135\",\"https:\\\/\\\/x.com\\\/CisaSocial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/person\\\/a0e04c9eece75fa21ae2273867968b01\",\"name\":\"CISA EDITORIAL\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"caption\":\"CISA EDITORIAL\"},\"sameAs\":[\"http:\\\/\\\/cisanewsletter.com\"],\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/author\\\/cisa-editorial\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gestion des ressources \u00e0 l'\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation - CISA NEWSLETTER","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/","og_locale":"fr_FR","og_type":"article","og_title":"Gestion des ressources \u00e0 l'\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation - CISA NEWSLETTER","og_description":"Dans le paysage mondial interconnect\u00e9 d&rsquo;aujourd&rsquo;hui, la gestion des ressources est devenue plus compliqu\u00e9e, en particulier si l&rsquo;on consid\u00e8re la contagion de la s\u00e9curit\u00e9 et la prolif\u00e9ration de la d\u00e9sinformation (L\u00f3pez et al., 2024). Afin d&rsquo;att\u00e9nuer les effets de ces probl\u00e8mes, qui ont le potentiel de perturber la stabilit\u00e9 sociale, politique et \u00e9conomique, les ressources [&hellip;]","og_url":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/","og_site_name":"CISA NEWSLETTER","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61558173539135","article_published_time":"2024-11-25T04:59:50+00:00","article_modified_time":"2024-11-25T05:21:59+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/11\/missinformation.jpg","type":"image\/jpeg"}],"author":"CISA EDITORIAL","twitter_card":"summary_large_image","twitter_creator":"@CisaSocial","twitter_site":"@CisaSocial","twitter_misc":{"\u00c9crit par":"CISA EDITORIAL","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/#article","isPartOf":{"@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/"},"author":{"name":"CISA EDITORIAL","@id":"https:\/\/cisanewsletter.com\/#\/schema\/person\/a0e04c9eece75fa21ae2273867968b01"},"headline":"Gestion des ressources \u00e0 l&rsquo;\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation","datePublished":"2024-11-25T04:59:50+00:00","dateModified":"2024-11-25T05:21:59+00:00","mainEntityOfPage":{"@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/"},"wordCount":1814,"commentCount":0,"publisher":{"@id":"https:\/\/cisanewsletter.com\/#organization"},"image":{"@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/#primaryimage"},"thumbnailUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/11\/missinformation.jpg","keywords":["12e \u00e9dition 2024"],"articleSection":["ANALYSE"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/","url":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/","name":"Gestion des ressources \u00e0 l'\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation - CISA NEWSLETTER","isPartOf":{"@id":"https:\/\/cisanewsletter.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/#primaryimage"},"image":{"@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/#primaryimage"},"thumbnailUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/11\/missinformation.jpg","datePublished":"2024-11-25T04:59:50+00:00","dateModified":"2024-11-25T05:21:59+00:00","breadcrumb":{"@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/#primaryimage","url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/11\/missinformation.jpg","contentUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/11\/missinformation.jpg","width":768,"height":432,"caption":"Seamlessly looping animation showing a variety of general fake news and misinformation related terms and concepts."},{"@type":"BreadcrumbList","@id":"https:\/\/cisanewsletter.com\/fr\/index.php\/gestion-des-ressources-a-lere-de-la-contagion-securitaire-et-de-la-desinformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cisanewsletter.com\/index.php\/home\/"},{"@type":"ListItem","position":2,"name":"Gestion des ressources \u00e0 l&#8217;\u00e8re de la contagion s\u00e9curitaire et de la d\u00e9sinformation"}]},{"@type":"WebSite","@id":"https:\/\/cisanewsletter.com\/#website","url":"https:\/\/cisanewsletter.com\/","name":"CISA NEWSLETTER","description":"Headlining West African News","publisher":{"@id":"https:\/\/cisanewsletter.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cisanewsletter.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/cisanewsletter.com\/#organization","name":"Centre for Intelligence & Security Analysis Ghana","url":"https:\/\/cisanewsletter.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cisanewsletter.com\/#\/schema\/logo\/image\/","url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/08\/cisaghana.png","contentUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/08\/cisaghana.png","width":1055,"height":1063,"caption":"Centre for Intelligence & Security Analysis Ghana"},"image":{"@id":"https:\/\/cisanewsletter.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61558173539135","https:\/\/x.com\/CisaSocial"]},{"@type":"Person","@id":"https:\/\/cisanewsletter.com\/#\/schema\/person\/a0e04c9eece75fa21ae2273867968b01","name":"CISA EDITORIAL","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","caption":"CISA EDITORIAL"},"sameAs":["http:\/\/cisanewsletter.com"],"url":"https:\/\/cisanewsletter.com\/fr\/index.php\/author\/cisa-editorial\/"}]}},"_links":{"self":[{"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/posts\/4205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/comments?post=4205"}],"version-history":[{"count":1,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/posts\/4205\/revisions"}],"predecessor-version":[{"id":4206,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/posts\/4205\/revisions\/4206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/media\/4202"}],"wp:attachment":[{"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/media?parent=4205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/categories?post=4205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/tags?post=4205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}