Cyberspace as a Tool of Contemporary Propaganda


social media

How to Cite

Pilarski, G. (2020). Cyberspace as a Tool of Contemporary Propaganda. Safety & Defense, 6(1), 95-108.


The scientific deliberation presented in this article concerns the use of cyberspace in contemporary propaganda activities. The aim of the analysis is to identify propaganda activities and to state the role of cyberspace as an indispensable element for its existence. The following research methods were applied in the research: analysis, synthesis, abstracting, generalization, and a case study.

The case study presented in this article, concerning the identification of propaganda activities based on the engagement of Germany in the issue of refugees from Syria, perfectly points to the significance and possibilities offered by cyberspace in the realization of the activities in question and attaining the set goals.

The results obtained from the research underline the significant role of cyberspace in  contemporary society where the success of propaganda is conditioned by the use of tools which allow to appeal to a vast group of recipients through the media, the Internet, and social media. The presented deliberation indicates that cyberspace with all its elements is a prerequisite for the success of propaganda activities conducted nowadays.


Act of 30th August 2011 on the state of war and the competencies of the Commander-in-chief and the rules governing his subordination to the constitutional bodies of the Republic of Poland, Poland (2011). Retrieved from, access 13.1.2020.

Auchard, E. (2017). German court rejects injunction for Facebook in Syrian selfie case. Retrieved from, access 30.11.2019.

Casey, R. (2019). The two contrasting sides of German refugee policy. Retrieved from, access 20.1.2020.

Communication. (2020). Retrieved from, access 10.2.2020.

Convention and protocol relating to the status of refugees, UNHCR (1951). Retrieved from, access 15.12.2019.

Cybersecurity. A generic reference curriculum, (2016). NATO Graphics & Printing. Retrieved from, access 25.1.2020.

Definition of Cybersecurity, Gaps and overlaps in standardization V1.0, ENISA (2015). Greece. DOI:10.2824/4069. Retrieved from, access 22.1.2020.

Degler, E., and Liebig, T. (2017). Finding their Way - labour market integration of refugees in Germany. Retrieved from, access 30.11.2019.

Department of Defense Dictionary of Military and Associated Terms, JP 1-02, Joint Chiefs of Staff. (2016). USA. Retrieved from, access 23.1.2020.

Edwards, T. (2015). German football fans welcome refugees and invite hundreds to watch match. Retrieved from, access 30.11.2019.

Gadish, O. (2017). Cyber Terror: How It Happens And What We Can Do. OGM.

Gallup, S. (2015). A Syrian man held a picture of Chancellor Angela Merkel of Germany after arriving at Hauptbahnhof station in Munich on Saturday. Retrieved from, access 30.11.2019.

Gastarbeiter. (2020). Retrieved from, access 30.1.2020.

Germany shocked by Cologne New Year gang assaults on women. (2016). Retrieved from, access 10.12.2019.

Gibson, W. (2003). Burning Chrome. Harper Voyager.

Information systems defence and security France’s strategy, ANSSI (2011). France. Retrieved from, access 18.1.2020.

Jowett, G.S., and O’Donnell, V. (2006). Propaganda & persuasion. London: SAGE Publication.

Lane, O. (2015). Propaganda For Children as German Elite Unites to Condemn PEGIDA. Retrieved from, access 22.11.2019.

Lomas, N. (2017). Germany’s social media hate speech law is now in effect. Retrieved from, access 5.12.2019.

Luyken, J. (2016). Silence on sex crimes will make racism worse. Retrieved from, access 6.12.2019.

Marsh, N. et al. (2017). Oxytocin-enforced norm compliance reduces xenophobic outgroup rejection. The Proceedings of the National Academy of Sciences PNAS vol. 114 no. 35 9314-9319,

Mortimer, C. (2016). Germany local elections: Far-right groups make huge gains. Retrieved from, access 18.2.2020.

National cyber security strategy 2016-2021, HM Government (2016). Retrieved from, access 23.1.2020.

Ottis, R., and Lorents, P. (2011). Cyberspace: Definition and implications. 5th European Conference on Information Management and Evaluation, ECIME.

Pilarski, G. (2014). The Concept of Recommender System Supporting Command and Control System in Hierarchical Organization. European Network Intelligence Conference (ENIC), IEEE, DOI: 10.1109/ENIC.2014.9.

Porter, M. (2015). My parents were refugees, but not all refugees are equal. Retrieved from, access 25.2.2020.

Refugees needed for Germany to survive say scientists - Children's Television, Germany. (2017). Retrieved from, access 23.11.2019.

Regulation establishing the criteria and mechanisms for determining the Member State responsible for examining an asylum application lodged in one of the Member States by a third-country national, UNHCR (2003). Retrieved from, access 15.12.2019.

Rigamonti, M. (2016). Był raj, jest śmietnisko. Jak naprawdę wyglądają Niemcy zasiedlane przez uchodźców? [There was a paradise, there is a dump. What do Germans really look like by refugees?]. Retrieved from,azylanci-uchodzcy-w-bawarii-w-niemczech-rozmowa-rigamonti.html, access 22.2.2020.

The UK Cyber Security Strategy Protecting and promoting the UK in a digital world, Cabinet Office (2011). London. Retrieved from, access 22.1.2020.

Uchodźcy są potrzebni, aby Niemcy przetrwały – mówią naukowcy. Chora propaganda serwowana już przedszkolakom... (2017). Retrieved from, access 20.11.2019.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.