Conference of National Aviation University, AVIATION IN THE XXI-st CENTURY 2018

Font Size: 
The theoretical basis of system construction of the state information security in social networking services
Hryshchuk Ruslan Valentynovych, Molodetska Kateryna Valeriivna

Last modified: 2018-09-14

Abstract


The authors elaborate theoretical basis of providing information security of the state in social networking services by implementing procedures for detection, assessment and countering threats in the information space. Effectiveness of the proposed theoretical basis is achieved by developing timely measures to identify threats, using the natural peculiarities of the interaction of actors for the synthesis the controlling influence and artificially managed transition to a definite stable state of information security of the state.

Keywords


state information security; social networking service; actors; threats; synergetic management; information operations

References


1. O. S. Onyshhenko, V. M. Gorovyj, and V. I. Popyk, Socialni merezhi jak instrument vzajemovplyvu vlady ta gromadjanskogo suspilstva (Kyiv: Natsionalna biblioteka Ukrainy im. V. I. Vernadskoho, 2014).

2. R. V. Hryshchuk and J. H. Danyk, Osnovy kibernetychnoi bezpeky. Monografija (Zhytomyr: ZhNAEU, 2016).

3. K. V. Molodetska-Hrynchuk, Methodology of support system construction of the state information security in social networking services, State Univ. of Telecom., Kyiv, 2018.

4. M. Holloway, “How Russia Weaponized Social Media in Crimea,” Realcleardefense.com, May 10, 2017, https://www.realcleardefense.com/articles/ 2017/05/10/how_russia_weaponized_social_media_in_crimea_111352.html.

5. B. Perry, “Non-Linear Warfare in Ukraine: The Critical Role of Information Operations and Special Operations,” Small Wars Journal 11, no. 1 (2017), http://smallwarsjournal.com/jrnl/art/non-linear-warfare-in-ukraine-the-critical-role-of-information-operations-and-special-opera.

6. M. Zhdanova and D. Orlova, Computational Propaganda in Ukraine: Caught between external threats and internal challenges, Working Paper 2017.9 (Oxford, UK: Project on Computational Propaganda, 2017).

7. K. Molodetska-Hrynchuk, “Metod vyjavlennja oznak informacijnyh vplyviv u socialnyh internet-servisah za zmistovnymy oznakamy,” Radioelektronika, informatyka, upravlinnja 2, no. 41 (2017): 117–126.

8. K. Molodetska, “Tehnologija vyjavlennja organizacijnyh oznak informacijnyh operacij u socialnyh internet-servisah,” Problemy informacijnyh tehnologij 20 (2016): 84–93.

9. K. Molodetska-Hrynchuk, “Metodyka vyjavlennja manipuljacij suspilnoju dumkoju u socialnyh internet-servisah,” Informacijna bezpeka 3, no. 23 (2016): 80–92.

K. Molodetska-Hrynchuk, “Metod pobudovy profiliv informacijnoi bezpeky aktoriv socialnyh internet-servisiv,” Informacijna bezpeka 1, no. 25 (2017):104–110.

Full Text: PDF