Development of a method for determining the indicators of manipulation based on morphological synthesis

Authors

DOI:

https://doi.org/10.15587/1729-4061.2022.258675

Keywords:

morphological synthesis, content analysis of text messages, target audience, manipulation, information and psychological impact

Abstract

Research on the development of methods for identifying signs of hidden manipulation (destructive information and psychological impact) in text messages that are published on Internet sites and distributed among users of social networks is relevant. One of the main problems in the development of these methods is the difficulty of formalizing the process of identifying signs of manipulation in text messages of social network agents. To do this, based on morphological synthesis, it is necessary to determine relevant indicators for analyzing text messages and criteria for making a decision about the presence of signs of manipulation in text messages.

Based on morphological synthesis, a method for determining manipulation indicators in text messages was developed, taking into account the achievements of modern technologies of intelligent content analysis of text messages, machine learning methods, fuzzy logic and computational linguistics, which made it possible to reasonably determine a group of indicators for evaluating text messages for signs of manipulation.

The stages of the method include evaluating the text message at the level of perception by the indicator of text readability, at the phonetic level by the indicator of emotional impact on the subconscious, at the graphic level by the indicator of text marking intensity, and calculating the integral indicator for making a decision about the presence of manipulation in the text message.

Based on the proposed method, specialized software was developed that provided 13 % greater accuracy in evaluating messages for manipulative impact compared to the known method of expert evaluations, which reduced the influence of the subjective factor on the evaluation result

Author Biographies

Serhii Yevseiev, National Technical University “Kharkiv Polytechnic Institute”

Doctor of Technical Science, Professor, Head of Department

Department of Cyber Security

Vitaliy Katsalap, The National Defence University of Ukraine named after Ivan Cherniakhovskyi

PhD, Associate Professor

Department of Information Technologies Employment and Information Security

Yurii Mikhieiev, Zhytomyr Military Institute named after S. P. Korolyov

PhD

Department of Information and Cyber Security

Scientific Center

Vladyslava Savchuk, Zhytomyr Military Institute named after S. P. Korolyov

PhD

Department of Information Warfare

Yurii Pribyliev, The National Defence University of Ukraine named after Ivan Cherniakhovskyi

Doctor of Technical Sciences, Associate Professor

Department of Information Technologies Employment and Information Security

Oleksandr Milov, National Technical University “Kharkiv Polytechnic Institute”

Doctor of Technical Sciences, Professor

Department of Cyber Security

Serhii Pohasii, National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor

Department of Cyber Security

Ivan Opirskyy, Lviv Polytechnic National University

Doctor of Technical Sciences, Professor

Department of Information Security

Nataliia Lukova-Chuiko, Taras Shevchenko National University of Kyiv

Doctor of Technical Sciences, Associate Professor

Department of Cyber Security and Information Protection

Ihor Korol, Uzhhorod National University

Doctor of Physical and Mathematical Sciences, Professor, Vice-Rector for Administrative Policy and Research

References

  1. Holovka, A. (2016). Information threats in a globalized world: economics, politics, society (experience of Ukraine). Baltic Journal of Economic Studies, 2 (3), 42–47. doi: https://doi.org/10.30525/2256-0742/2016-2-3-42-47
  2. DeBenedictis, K. (2021). Russian “Hybrid Warfare” and the Annexation of Crimea. Bloomsbury Publishing. doi: https://doi.org/10.5040/9780755640027
  3. Haig, Z., Hajdu, V. (2017). New Ways in the Cognitive Dimension of Information Operations. Land Forces Academy Review, 22 (2), 94–102. doi: https://doi.org/10.1515/raft-2017-0013
  4. Forrest, J. (2021). Digital influence warfare in the age of social media. Praeger, 303.
  5. Levko, O. (2020). Precedent Units as a Means of Manipulation in Ukrainian Religious Media Discourse: Psycholinguistic Approach. Psycholinguistics, 28 (2), 99–127. doi: https://doi.org/10.31470/2309-1797-2020-28-2-99-127
  6. Vilko, V. M., Hrytsiuk, V. M., Dykun, V. H. et. al. (2012). Moralno-psykholohichne zabezpechennia u Zbroinykh Sylakh Ukrainy. Ch. 1. Kyiv: NUOU, 464.
  7. Kuprienko, D. A., Borovyk, O. V. (2015). Strukturnyi syntez dynamichnykh system iz kvaziliniinym i chasovym rozpodilennia komponentiv. Khmelnytskyi: Vydavnytstvo NADPSU, 348.
  8. Korobiichuk, I., Hryshchuk, R., Katsalap, V., Snitsarenko, P. (2019). Determination and Evaluation of Negative Informational and Psychological Influence on the Military Personnel Based on the Quantitative Measure. Proceedings of the 1st International Workshop on Control, Optimisation and Analytical Processing of Social Networks (COAPSN-2019). Lviv, 66–78. Available at: http://ceur-ws.org/Vol-2392/paper6.pdf
  9. Molodetska, K., Solonnikov, V., Voitko, O., Humeniuk, I., Matsko, O., Samchyshyn, O. (2021). Counteraction to information influence in social networking services by means of fuzzy logic system. International Journal of Electrical and Computer Engineering (IJECE), 11 (3), 2490. doi: https://doi.org/10.11591/ijece.v11i3.pp2490-2499
  10. Pysarchuk, O., Lahodnyi, O., Mikhieiev, Y. (2017). Statistical Analysis of the Activity of the Thematic Content on the Internet for Predicting the Development of Information Threats. Path of Science, 3 (8), 3011–3019. doi: https://doi.org/10.22178/pos.25-2
  11. Snitsarenko, P., Nakonechnyi, V., Mikhieiev, Y., Hrytsiuk, V. (2019). The approach to automated internet monitoring system creation. 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT). doi: https://doi.org/10.1109/atit49449.2019.9030446
  12. Palchuk, V. (2017). Methods of Content-Monitoring and Content-Analysis of Information Flows: Modern Features. Academic Papers of The Vernadsky National Library of Ukraine, 48, 506–526. doi: https://doi.org/10.15407/np.48.506
  13. Kolmogorova, A. V., Kalinin, A. A., Malikova, A. V. (2018). Linguistic principles and computational linguistics methods for the purposes of sentiment analysis of russian texts. Current Issues in Philology and Pedagogical Linguistics, 1 (29), 139–148. doi: https://doi.org/10.29025/2079-6021-2018-1(29)-139-148
  14. Molodetska-Hrynchuk, K. (2017). Outreaches content tracing technique for social networking services. Radio Electronics, Computer Science, Control, 2 (41), 117–126. doi: https://doi.org/10.15588/1607-3274-2017-2-13
  15. Ekshmidt, V. (2015). Verbal Manipulation: Persuasion and Suggestion. Movni i kontseptualni kartyny svitu, 1, 275–281. Available at: http://nbuv.gov.ua/UJRN/Mikks_2015_1_31
  16. Savchuk, V. S., Hryshchuk, R. V., Hryshchuk, O. M., Musienko, A. P. (2018). Intelligent system for evaluating destructive nature of text content of social networks based on fuzzy logic. Science-based technologies, 38 (2). doi: https://doi.org/10.18372/2310-5461.38.12838
  17. Lytvyn, V., Vysotska, V., Uhryn, D., Hrendus, M., Naum, O. (2018). Analysis of statistical methods for stable combinations determination of keywords identification. Eastern-European Journal of Enterprise Technologies, 2 (2 (92)), 23–37. doi: https://doi.org/10.15587/1729-4061.2018.126009
  18. Carrillo, M., López-López, A. (2010). Concept Based Representations as Complement of Bag of Words in Information Retrieval. IFIP Advances in Information and Communication Technology, 154–161. doi: https://doi.org/10.1007/978-3-642-16239-8_22
  19. Li, Y., McLean, D., Bandar, Z. A., O’Shea, J. D., Crockett, K. (2006). Sentence similarity based on semantic nets and corpus statistics. IEEE Transactions on Knowledge and Data Engineering, 18 (8), 1138–1150. doi: https://doi.org/10.1109/tkde.2006.130
  20. Mladenić, D., Grobelnik, M. (2013). Automatic text analysis by artificial intelligence. Informatica (Ljubljana), 37 (1), 27–33. Available at: https://www.dlib.si/details/URN:NBN:SI:DOC-DKCVOIFG
  21. Gutierrez, E., Karwowski, W., Fiok, K., Davahli, M. R., Liciaga, T., Ahram, T. (2021). Analysis of Human Behavior by Mining Textual Data: Current Research Topics and Analytical Techniques. Symmetry, 13 (7), 1276. doi: https://doi.org/10.3390/sym13071276
  22. Zhuravlev, A. P. (1991). Zvuk i smysl. Moscow: Prosveschenie, 160.
  23. Levytskyi, V. V. (1971). Chy isnuie universalnyi zvukosymvolizm? Movoznavstvo, 1, 25–37.
  24. Zhou, S., Jeong, H., Green, P. A. (2017). How Consistent Are the Best-Known Readability Equations in Estimating the Readability of Design Standards? IEEE Transactions on Professional Communication, 60 (1), 97–111. doi: https://doi.org/10.1109/tpc.2016.2635720
  25. Perazzoli, S., de Santana Neto, J. P., de Menezes, M. J. M. B. (2022). Systematic analysis of constellation-based techniques by using Natural Language Processing. Technological Forecasting and Social Change, 179, 121674. doi: https://doi.org/10.1016/j.techfore.2022.121674
  26. Coleman, M., Liau, T. L. (1975). A computer readability formula designed for machine scoring. Journal of Applied Psychology, 60 (2), 283–284. doi: https://doi.org/10.1037/h0076540
  27. Senter, R. J., Smith, E. A. (1967). Automated Readability Index. AMRL-TR-66-220. Wright-Patterson Air Force Base. Available at: https://apps.dtic.mil/sti/pdfs/AD0667273.pdf
  28. Sagi, E., Kaufmann, S., Clark, B. (2009). Semantic density analysis: comparing word meaning across time and phonetic space. Proceedings of the EACL 2009 Workshop on GEMS, 104–111. Available at: https://aclanthology.org/W09-0214.pdf

Downloads

Published

2022-06-30

How to Cite

Yevseiev, S., Katsalap, V., Mikhieiev, Y., Savchuk, V., Pribyliev, Y., Milov, O., Pohasii, S., Opirskyy, I., Lukova-Chuiko, N., & Korol, I. (2022). Development of a method for determining the indicators of manipulation based on morphological synthesis . Eastern-European Journal of Enterprise Technologies, 3(9 (117), 22–35. https://doi.org/10.15587/1729-4061.2022.258675

Issue

Section

Information and controlling system