Professor Seo Kyung-deok: Right-Wing PR on Social Media
[케이에스피뉴스=김정훈 기자 kspa@kspnews.com] Professor Seo Kyung-deok, Professor of Sungshin Women’s University, revealed that Japanese right-wing netizens created an impersonation account on social media (SNS) to promote Uk Ilgi.
Professor Seo stated, “Japanese right-wing netizens created an impersonation account on X (formerly Twitter) with the ID ‘seokyoungduk’ and are using Uk Ilgi for the profile picture.” He also mentioned that the account posted content promoting the “takeshima territorial transfer story.”
Professor Seo clarified that his actual Instagram account uses the ID ‘seokyoungduk.’ He explained that the impersonation account was created to make it appear as though he was promoting Uk Ilgi and Takeshima. He emphasized that he does not use the X account and that such impersonation behavior is ongoing.
Professor Seo has been actively campaigning against Japanese right-wing SNS activities.
Social Media Impersonation: Understanding the Case of professor Seo Kyung-deok
This article delves into the issue of social media impersonation, using the case of Professor Seo Kyung-deok as a prime example. we’ll explore the tactics used, the motivations behind them, and how to protect yourself.
What is Social Media Impersonation?
Q: what is social media impersonation?
Social media impersonation is when someone creates a fake social media profile that pretends to be another person or entity. This can involve using their name, profile picture, and even posting content that mimics their style. As stated in the provided documents, it’s a tactic used for malicious purposes.
Q: What are the common goals behind social media impersonation?
Impersonation can be used for a variety of reasons, including:
spreading misinformation or propaganda: As seen in the case of Professor Seo, impersonation can be used to disseminate false information and promote specific agendas.
Damaging a person’s reputation: Impersonators might post offensive or damaging content to hurt the reputation of the person they are imitating.
Phishing and scams: Fake accounts can be used to trick people into sharing personal information or sending money.
Brandjacking: Specifically in the case of businesses, it can be used for fraudulent purposes. This is detailed in [3], where it’s referred to as direct impersonation.
The Case of Professor Seo Kyung-deok
Q: Who is Professor Seo Kyung-deok?
Professor Seo Kyung-deok is a professor at Sungshin Women’s University. He is known for actively campaigning against japanese right-wing activities on social media.
Q: What happened to Professor Seo on social media?
Japanese right-wing netizens created an impersonation account on X (formerly Twitter) using the profile ID ‘seokyoungduk’ to promote Uk Ilgi and the “Takeshima territorial transfer story.” This account used the profile picture related to Uk Ilgi.
Q: Why was professor Seo’s identity impersonated?
The impersonation account was created to make it appear as though Professor Seo was promoting Uk Ilgi and supporting the Takeshima territorial transfer story. This was likely an attempt to discredit him and spread propaganda.
Q: What social media platform was used for the impersonation?
The impersonation account was created on X (formerly Twitter).
Q: What is Professor Seo’s official Instagram account ID?
Professor Seo’s actual Instagram account ID is ‘seokyoungduk.’
Q: Does Professor Seo use the X (formerly Twitter) platform?
Based on the provided content, Professor Seo does not use the X (formerly Twitter) account.
Protecting Yourself from Social Media Impersonation
Q: How can I protect myself from social media impersonation?
Protecting your accounts involves multiple layers of security. Here are some key steps, including those referenced in [1] and [2]:
Strengthen your passwords: use strong, unique passwords for each social media account.
Enable two-factor authentication (2FA): This adds an extra layer of security by requiring a code from your phone or another device.
Be cautious with security questions: Choose security questions that are not easily answered, especially ones that can be found on your social media profile, as mentioned in [2].
Regularly review your accounts: Check your social media profiles for any unauthorized activity.
Lock down your accounts: Review the privacy settings on each platform to control who can see your posts and contact you.
Think before you post: Be mindful of the information you share publicly.
Report impersonation: if you find an impersonation account, report it to the platform immediately.
Q: What should I do if I find an impersonation account of myself or someone else?
If you find an impersonation account, take these steps:
Report to the platform: Most social media platforms have clear procedures for reporting impersonation. Look for the “report” or “Help” option.
Contact the person being impersonated: If you know the person, let them know immediately.
Gather evidence: Keep screenshots or links to the fake account as evidence.
Q: What are some key differences between a legitimate and an impersonation/fake social media account for businesses?
| Feature | Real Account | Impersonation/Fake Account |
| :— | :— | :— |
| Profile Verification | Often has a verified badge | May lack a verified badge or have a generic one |
| Content Quality | Consistent branding, professional quality | Poor quality, inconsistent branding, copied content|
| Engagement | Active engagement with followers, replies to comments | Low engagement, generic replies, automated responses|
| Follower Count & activity | Follower count aligns with business size, regular posting schedule | Unrealistic follower growth, infrequent postings, suspicious activity patterns |
| Contact information | Valid contact information linking back to websites or business contact pages | May have no contact information, or fraudulent contact details|
Conclusion
Social media impersonation is a serious threat. As the case of Professor Seo Kyung-deok demonstrates, it can be used to spread misinformation, damage reputations, and promote specific agendas. by understanding the tactics used and implementing the recommended security measures, you can better protect yourself and your online identity. Remember to stay vigilant,report suspicious activity,and regularly review your privacy settings.
