
Perspectives for Influence Operations Investigators
- 25 October 2022
- Tikk, Eneken; Kerttunen, Mika
- EN
In a deteriorating international climate, influence operations span countless targets, platforms, and jurisdictions, which can complicate data collection and research. Often collated with adjacent issues like cybersecurity, hybrid operations, and information interference, influence operations offer multiple entry points, angles, and levels of analysis. As an influence operations researcher, clearly defining and recording your methodology will provide you with a solid basis for your investigation. A sound methodology will not only allow you to see where the limits and gaps in your analysis might be but also brings transparency to your work, allowing other researchers to better understand and accept your conclusions.
More external publications
- Research and Analysis

26 June 2025
In this article, Jakob Bund examines how authoritarian states like Russia, China, and North Korea increasingly harness non-state cyber actors to expand their capabilities, blur attribution, and complicate global responses. He argues that this growing fusion of state and criminal or contractor activity demands integrated threat assessments and response tools that can operate independently of political attribution.

22 August 2025
In this article, Annegret Bendiek and Jakob Bund analyse how authoritarian states use hybrid state/non-state networks to challenge Europe through obfuscating responsibility and escalating conflicts; Bendiek and Bund argue that the EU must reform its cybersecurity policy under a “Janus Principle” to strengthen resilience, coordination, and strategic effectiveness.

