The method of socio-technical systems informational stability evaluation at the informational war conditions

Authors

  • Andrey Dudatyev Vinnitsia National Technical University 95 Khmelnitske shose, Vinnitsa, Ukraine, 21021, Ukraine
  • Vladimir Luzhetsky Vinnitsia National Technical University 95 Khmelnitske highway, Vinnitsa, Ukraine, 21021, Ukraine https://orcid.org/0000-0001-7466-7738
  • Dmitriy Korotaev Vinnitsia National Technical University 95 Khmelnitske highway, Vinnitsa, Ukraine, 21021, Ukraine https://orcid.org/0000-0001-7500-336X

DOI:

https://doi.org/10.15587/1729-4061.2016.65691

Keywords:

information war, informational stability, informational and psychological operation, probabilistic stability measure, information meme

Abstract

The method of evaluation of the informational stability of socio-technical systems, which are influenced by specific informational and psychological operations in the information war is presented. The method uses a logical-probabilistic model and a probabilistic measure for evaluating the informational stability of the system. The proposed informational stability measure is based on the concept of minimum unit of information, designed to change human consciousness - a meme and uses probabilistic estimates of occurrence of so-called destructive and compensatory memes, i.e. the meme, used for the informational and psychological operation (reprogramming of the consciousness of the social part of the SLS) and the compensating meme, the use of which minimizes the consequences of the destructive meme. For decision-making with regard to the stability of the social part of the SLS, a flexible scale that can be adapted to any object of research is proposed.

An approach to the construction of the so-called vector of stability of the social part of the SLS, which provides a visualization of the derived probabilistic estimates of a violation of confidentiality, integrity and availability, is proposed.

The method is of practical interest since it allows considering an actually weakly formalized class of threats - informational and psychological operations, the aim of which is a destructive impact on the social part of the SLS. The proposed method is useful for the decision-making on the management of complex informational security at the "enterprise-region-state" level.

Author Biographies

Andrey Dudatyev, Vinnitsia National Technical University 95 Khmelnitske shose, Vinnitsa, Ukraine, 21021

PhD, Associate professor

Department of information security

Vladimir Luzhetsky, Vinnitsia National Technical University 95 Khmelnitske highway, Vinnitsa, Ukraine, 21021

Doctor of technical sciences, professor, head of the department

Department of information security

Dmitriy Korotaev, Vinnitsia National Technical University 95 Khmelnitske highway, Vinnitsa, Ukraine, 21021

Postgraduate student

Department of information security

References

  1. Harchenko, V. P. (2009). Kiberterrorizm na aviacionnom transporte: zb. nauk. Problemi іnformatizacyi ta upravlіnnya, 4 (28), 131–140.
  2. Vilskij, G. B. (2012). Informacionnye riski sudovozhdeniya. Nauk. Vіstnik HDMA, 1 (4), 17–26.
  3. Dudikevich, V. B. (2012). Problemi ocіnki efektivnostі sistem zahistu. Vіsnik Nacіonalnogo unіversitetu «Lvіvs'ka polіtexnіka». Ser.: Avtomatika, vimіryuvannya ta keruvannya, 741, 118–122.
  4. Mіroshnik, M. A. (2015). Rozrobka metodіv ocіnki efektivnostі zahistu іnformacyi v rozpodіlenih kompyuternih sistemah. Іnformacіjno-keruyuchі sistemi na zalіznichnomu transportі: naukovo-texnіchnij zhurnal, 4 (113), 39–43.
  5. Lahno, V. A., Grabaryev, A. V. (2016). Improving the transport cyber security under destructive impacts on information and communication systems. Eastern-European Journal of Enterprise Technologies, 1/3 (79), 4–11. doi: 10.15587/1729-4061.2016.60711
  6. Artemov, A. A. (2015). Teoretichiskie osnovi informacionnogo upravlenia. Informacionnue voiny, 3, 83–97.
  7. Ciganov, V. V. (2015). Globalnoe informacionnoe protivoborstvo. Informacionnue voiny, 2, 7–13
  8. Malkov, S. U. (2015). Model ustoichivosti/destabilizacii politicheskih system. Informacionnie voyni, 1, 7–18.
  9. Lundberg, J., Rogier, W. (2013). The resilience analysis matrix (RAM): visualizing functional dependencies in complex socio-technical systems. 5th symposium on resilience engineering managing trade-offs.
  10. Oosthuizen, R., Pretorius, L. (2013). An analysis methodology for impact of new technology in complex sociotechnical systems. 2013 International Conference on Adaptive Science and Technology. doi: 10.1109/icastech.2013.6707508
  11. Simmons, M. P., Adamic L. A., Adar E. (2011). Memes Online: Extracted, Subtracted, Injected, and Recollected. ICWSM, 11, 17–21.
  12. IBMSecurity Services (2014). Cyber Security Intelligence Index. – Available at: http://media.scmagazine.com/documents/82/ibm_cyber_security_intelligenc_20450.pdf
  13. Andreeva, O. M., Musienko, К. (2014). Kiberzbroya ta analiz ii destruktivnoi diyalnosti na prikladi vplivu virusu novogo pokolinnya STUXNET na iransku yadernu programu. Actual problems of international relations, 1 (103).
  14. Ostapenko, G. A. (2007). Informacionnie operacii I ataki v sociotehnicheskih sistemah. М.: Goryachaya liniya – Telekom, 134
  15. Dudatyev, A. V. (2015). Modeli ta organizacia protydii informaciynim atakam. Zahist informacii, 2, 157–162.
  16. Chistyakov, V. P. (1987). Kurs teorii veroyatnostey. Moscow: Nauka, 240.

Published

2016-04-22

How to Cite

Dudatyev, A., Luzhetsky, V., & Korotaev, D. (2016). The method of socio-technical systems informational stability evaluation at the informational war conditions. Eastern-European Journal of Enterprise Technologies, 2(2(80), 4–11. https://doi.org/10.15587/1729-4061.2016.65691