INFORMATION COUNTERFEATURE: MODELS OF IMPLEMENTATION AND EVALUATION OF INFORMATION OPERATIONS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2023.20.7280

Keywords:

information security; model of information influence; Bernoulli's formula

Abstract

Life activity of modern large socio-technical systems, which consist of two components: technical and social parts, takes place in a competitive information space. Therefore, the information security of such systems in general, in particular of the state, largely depends on the level of societysecurity. Special destructive informational and psychological operations conducted against the social component of the sociotechnical system pursue the main goal of informational struggle, namely: changing its state by reprogramming the society consciousness (the social part of sociotechnical systems). One of the ways to implement a special information operation is the use of a specially prepared conditional unit of information, such as a meme, which spreads in the information space by the using of influence various channels and performs the function of actually "infecting" the social part of socio-technical systems. The problems that must be solved in order to achieve the goal of destructive informational and psychological influence are considered. The main stages of preparation and implementation of an informational and psychological operation are also given. A structural model of the processes involved in the implementation of information warfare is developed. The article proposes a model for the implementation of a special informational and psychological operation, which is built,based on the Bernoulli formula and allows obtaining a probabilistic assessment of the effective implementation of an informational and psychological operation. In addition, further analysis of the developed model allows getting an assessment of the effectiveness of conducting a special informational and psychological operation. The effectiveness of the conducted special informational and psychological operation is evaluated byusing the probable number of social partelements, which, under the influence changed its initial state, and, as a result, the entire socio-technical system came out of equilibrium. The proposed models are can be used in solving the forecasting the risks problems of conducting special informational and psychological operations and, accordingly, building a system for counteracting destructive informational and psychological influences.

Downloads

Download data is not yet available.

References

Voitovych, O., Kupershtein, L., Holovenko , V. (2022). DETECTION OF FAKE ACCOUNTS IN SOCIAL MEDIA. Electronic Professional Scientific Edition «Cybersecurity: Education, Science, Technique», 2(18), 86-98. https://doi.org/10.28925/2663-4023.2022.18.8698

Chenhao Tan.(ICWSM 2016). Unfolding News Cycles from the Source.Proceedingsof the Tenth International Conference on Web and Social Media С.378-387. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13011

Gnatyuk, S., Zhmurko, T. (2016). Information-Psychological Security of Society in the Context of Information Warfare. In J. Rysiński (Ed.), Inżynier XXI wiekuprojectujemyprzyszlosc (pp. 321-341). Bielsko-Biała: WydawnictwoNaukoweAkademiiTechniczno-Humanistycznej w Bielsku-Białej.

Komarov, M., Honchar, S., Dimitriieva, D. (2021). Study of the Cyber Survivability of Critical Information Infrastructure Objects. Nuclear and Radiation Safety, 1(89), 59-66. https://doi.org/10.32918/nrs.2021.1(89).07

Brodie, R. (2011). Virus of the mind: The new science of the meme (Reissue ed.). Hay House.

Gene Sharp 198 METHODS OF NONVIOLENT ACTION. https://www.aeinstein.org/nonviolentaction/198-methods-of-nonviolent-action/

Cook, T. (2019). Technology does not need vast troves of personal data. Advertising existed and thrived for decades without it. https://www.marketingweek.com/apple-data-privacy

Vasylkiv, I. (2020). Basics of probability theory and mathematical statistics. https://new.mmf.lnu.edu.ua/wp-content/uploads/2020/04/Vasyl-kiv-I.M.-TIMS_CHASTYNA_1.pdf

Dudatyev, A. V., Voitovych, O. P. (2017). Information security of the socio-technical system: The model of the information impact. Information Technology and Computer Engineering, 38(1), 16–21. Retrieved from https://itce.vntu.edu.ua/index.php/itce/article/view/657

Luzhetskyi V., Dudatyev A. (2017) Conceptual model of information impact system. Ukrainian Scientific Journal of Information Security, 23(1), 45-49.https://doi.org/10.18372/2225-5036.23.11550

Downloads


Abstract views: 256

Published

2023-06-29

How to Cite

Dudatyev, A., Kupershtein, L., & Voitovych, O. (2023). INFORMATION COUNTERFEATURE: MODELS OF IMPLEMENTATION AND EVALUATION OF INFORMATION OPERATIONS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(20), 72–80. https://doi.org/10.28925/2663-4023.2023.20.7280