tag:blogger.com,1999:blog-215458063863287127.post3706087706510067630..comments2023-10-06T02:28:21.274-07:00Comments on International ICT Policies And Strategies: US Plans To Use Fake Virtual People Botnet And Persona Management SoftwarePTLBhttp://www.blogger.com/profile/15370686802852348259noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-215458063863287127.post-48470483695600198432011-07-19T09:34:32.788-07:002011-07-19T09:34:32.788-07:00whatever they are taken to prevent from malicious ...whatever they are taken to prevent from malicious activity on the cyber space ,it would not be hundred percentage and whatever proclaimed by personal management in the terms of information security that they are having robust information security policy is a good step and this is one best way to prevent from malicious activity .Rajeev Ranjan Shahi https://www.blogger.com/profile/00333063285710655829noreply@blogger.comtag:blogger.com,1999:blog-215458063863287127.post-14403562017209296072011-07-15T09:01:21.693-07:002011-07-15T09:01:21.693-07:00The concept of persona management is already in us...The concept of persona management is already in use. I don't see the problem with the military's use of it. Everyone praises "Anonymous" and "LulzSec". When you think about it, they are doing exactly the same thing. Fictitious personas to create havoc through the use of social media.Thomas Ryanhttps://www.blogger.com/profile/03556699944331102327noreply@blogger.com