Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Professor Seo Kyung-deok: Right-Wing PR on Social Media

Professor Seo Kyung-deok: Right-Wing PR on Social Media

May 2, 2025 Catherine Williams - Chief Editor Tech

[케이에스피뉴스=김정훈 기자 kspa@kspnews.com] Professor Seo Kyung-deok, Professor of Sungshin Women’s University, revealed that Japanese right-wing ‍netizens created an impersonation account on social ⁣media ​(SNS) ‍to promote Uk Ilgi.

Professor Seo ⁤stated, “Japanese right-wing netizens created an ⁤impersonation account⁣ on X (formerly Twitter) ⁣with the ID ‘seokyoungduk’ and are ‌using Uk⁢ Ilgi ⁤for the​ profile picture.” He also mentioned that the account⁢ posted content ⁢promoting‍ the “takeshima territorial transfer story.”

Professor Seo clarified that his actual Instagram account ​uses the‍ ID ‘seokyoungduk.’ He explained that the impersonation​ account ‌was ⁣created to ⁢make it appear as though he was promoting Uk ⁣Ilgi and Takeshima. ‌He emphasized that he does ‌not use the X account and that such⁢ impersonation behavior ​is ‍ongoing.

Professor Seo has ​been actively campaigning against Japanese right-wing ⁤SNS activities.

Social Media ⁣Impersonation: Understanding⁢ the Case of professor Seo ​Kyung-deok

This article delves ​into⁣ the issue of social media impersonation, using the case of Professor ‌Seo Kyung-deok as a prime example. ⁣we’ll explore the tactics used, ⁤the motivations behind them, and how to protect ‌yourself.

What is Social‌ Media Impersonation?

Q: what is social media ⁤impersonation?

Social media impersonation is when ⁣someone⁣ creates⁢ a‌ fake social media profile ⁤that pretends to be another person or ‍entity. ⁣This can involve using their name, profile⁤ picture, and‍ even posting​ content that mimics ⁢their style. ‌As stated in‍ the⁢ provided documents, it’s ‍a⁤ tactic used ⁢for malicious purposes.

Q: What are the common goals behind social ⁣media impersonation?

Impersonation can ‍be‌ used for a variety of reasons, including:

spreading misinformation or propaganda: As seen in the ⁢case ⁤of Professor Seo, impersonation can be used ⁣to disseminate false information and promote‌ specific agendas.

Damaging a person’s ​reputation: Impersonators might post offensive or damaging content to hurt the reputation of the person they are ⁣imitating.

Phishing​ and‍ scams: Fake accounts can be used to trick people ⁤into sharing personal information or​ sending ‌money.

Brandjacking: Specifically in the⁢ case of businesses, it can be used for fraudulent purposes.⁢ This is ‌detailed in [3], ‌where it’s referred to ‌as direct impersonation.

The Case ⁤of Professor Seo Kyung-deok

Q: Who is Professor Seo Kyung-deok?

Professor Seo Kyung-deok is a professor at Sungshin Women’s University. He is known ⁣for actively campaigning against ‌japanese right-wing activities on‌ social⁢ media.

Q: What happened to Professor Seo on social ⁣media?

Japanese right-wing‌ netizens created an ⁣impersonation account on X (formerly Twitter) using the​ profile‍ ID ‘seokyoungduk’ to‍ promote Uk⁣ Ilgi and‌ the “Takeshima territorial transfer⁤ story.” This account used the profile picture related to Uk Ilgi.

Q: Why was professor⁢ Seo’s identity impersonated?

The impersonation account was ‌created to make it appear as though Professor Seo was ​promoting Uk Ilgi and supporting the‌ Takeshima territorial transfer story. This was likely an attempt to‍ discredit him and spread propaganda.

Q: What‍ social media platform was ⁤used for ​the impersonation?

The impersonation account‌ was‍ created on X (formerly Twitter).

Q: What is Professor Seo’s official Instagram account ID?

Professor Seo’s actual Instagram account ID is ‘seokyoungduk.’

Q: Does Professor Seo use the​ X (formerly‍ Twitter) ⁢platform?

Based on the provided content, Professor Seo does not use the‌ X (formerly Twitter)​ account.

Protecting Yourself from ⁤Social Media ​Impersonation

Q: How can I protect myself from social media impersonation?

Protecting ‌your ⁤accounts involves multiple ⁢layers of security. Here ⁢are some key steps, including those referenced in [1] and [2]:

Strengthen your passwords: ⁤use strong, unique passwords ⁤for each ‌social media account.

Enable two-factor authentication ‍(2FA): This adds an extra layer of security by requiring a code from your phone or another device.

Be cautious with security ⁤questions: Choose security questions⁣ that ‍are⁣ not easily ​answered, especially ones that can⁢ be found on your social media profile, as ⁣mentioned in [2].

Regularly review your ‌accounts: Check your social media profiles for any unauthorized activity.

Lock ‍down your accounts: Review the privacy settings on each platform to control ⁢who can see your posts and contact ⁤you.

Think before you​ post: Be mindful of the information you share publicly.

Report ⁣impersonation: ​if you find an ⁢impersonation account, report it to the platform immediately.

Q: What should I do if I find‍ an ⁢impersonation account of myself or someone else?

If you find an impersonation account, ‌take ‌these steps:

Report ‍to the platform: Most social media platforms have ‍clear procedures for reporting impersonation. Look for the “report” or “Help”⁢ option.

Contact the person being impersonated: ​If you know the person, let them know immediately.

Gather evidence: Keep ‌screenshots ​or links to the fake account as evidence.

Q: What are some key differences between a legitimate and an impersonation/fake social media account for businesses?

| Feature | Real Account | Impersonation/Fake ‌Account |

| ‍:— | :— | :— |

| Profile ⁣Verification | Often has a verified badge | May lack a verified badge‍ or have a ⁣generic one |

| Content Quality |⁤ Consistent branding, professional quality | Poor quality, inconsistent branding, copied content|

| Engagement | Active engagement with followers, replies to comments | Low⁢ engagement, generic replies, automated responses|

| Follower‍ Count & activity | Follower count aligns with business ⁢size, regular ⁢posting schedule | Unrealistic follower ⁤growth, infrequent postings, suspicious activity patterns |

| ‍ Contact ⁣information ⁢ | Valid contact information linking back to websites or business contact pages | May have no contact information,⁢ or fraudulent contact details|

Conclusion

Social media‍ impersonation​ is a serious⁢ threat. ‍As ⁤the case of Professor Seo Kyung-deok demonstrates, it can‍ be used to spread misinformation, damage reputations, and promote specific ⁣agendas. ⁣by​ understanding the tactics⁣ used and implementing the recommended security measures, you can better protect yourself and your⁣ online identity. Remember to⁤ stay vigilant,report suspicious​ activity,and regularly review your privacy settings.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Copyright Notice
  • Disclaimer
  • Terms and Conditions

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service