Development of a method for determining the indicators of manipulation based on morphological synthesis
DOI:
https://doi.org/10.15587/1729-4061.2022.258675Keywords:
morphological synthesis, content analysis of text messages, target audience, manipulation, information and psychological impactAbstract
Research on the development of methods for identifying signs of hidden manipulation (destructive information and psychological impact) in text messages that are published on Internet sites and distributed among users of social networks is relevant. One of the main problems in the development of these methods is the difficulty of formalizing the process of identifying signs of manipulation in text messages of social network agents. To do this, based on morphological synthesis, it is necessary to determine relevant indicators for analyzing text messages and criteria for making a decision about the presence of signs of manipulation in text messages.
Based on morphological synthesis, a method for determining manipulation indicators in text messages was developed, taking into account the achievements of modern technologies of intelligent content analysis of text messages, machine learning methods, fuzzy logic and computational linguistics, which made it possible to reasonably determine a group of indicators for evaluating text messages for signs of manipulation.
The stages of the method include evaluating the text message at the level of perception by the indicator of text readability, at the phonetic level by the indicator of emotional impact on the subconscious, at the graphic level by the indicator of text marking intensity, and calculating the integral indicator for making a decision about the presence of manipulation in the text message.
Based on the proposed method, specialized software was developed that provided 13 % greater accuracy in evaluating messages for manipulative impact compared to the known method of expert evaluations, which reduced the influence of the subjective factor on the evaluation result
References
- Holovka, A. (2016). Information threats in a globalized world: economics, politics, society (experience of Ukraine). Baltic Journal of Economic Studies, 2 (3), 42–47. doi: https://doi.org/10.30525/2256-0742/2016-2-3-42-47
- DeBenedictis, K. (2021). Russian “Hybrid Warfare” and the Annexation of Crimea. Bloomsbury Publishing. doi: https://doi.org/10.5040/9780755640027
- Haig, Z., Hajdu, V. (2017). New Ways in the Cognitive Dimension of Information Operations. Land Forces Academy Review, 22 (2), 94–102. doi: https://doi.org/10.1515/raft-2017-0013
- Forrest, J. (2021). Digital influence warfare in the age of social media. Praeger, 303.
- Levko, O. (2020). Precedent Units as a Means of Manipulation in Ukrainian Religious Media Discourse: Psycholinguistic Approach. Psycholinguistics, 28 (2), 99–127. doi: https://doi.org/10.31470/2309-1797-2020-28-2-99-127
- Vilko, V. M., Hrytsiuk, V. M., Dykun, V. H. et. al. (2012). Moralno-psykholohichne zabezpechennia u Zbroinykh Sylakh Ukrainy. Ch. 1. Kyiv: NUOU, 464.
- Kuprienko, D. A., Borovyk, O. V. (2015). Strukturnyi syntez dynamichnykh system iz kvaziliniinym i chasovym rozpodilennia komponentiv. Khmelnytskyi: Vydavnytstvo NADPSU, 348.
- Korobiichuk, I., Hryshchuk, R., Katsalap, V., Snitsarenko, P. (2019). Determination and Evaluation of Negative Informational and Psychological Influence on the Military Personnel Based on the Quantitative Measure. Proceedings of the 1st International Workshop on Control, Optimisation and Analytical Processing of Social Networks (COAPSN-2019). Lviv, 66–78. Available at: http://ceur-ws.org/Vol-2392/paper6.pdf
- Molodetska, K., Solonnikov, V., Voitko, O., Humeniuk, I., Matsko, O., Samchyshyn, O. (2021). Counteraction to information influence in social networking services by means of fuzzy logic system. International Journal of Electrical and Computer Engineering (IJECE), 11 (3), 2490. doi: https://doi.org/10.11591/ijece.v11i3.pp2490-2499
- Pysarchuk, O., Lahodnyi, O., Mikhieiev, Y. (2017). Statistical Analysis of the Activity of the Thematic Content on the Internet for Predicting the Development of Information Threats. Path of Science, 3 (8), 3011–3019. doi: https://doi.org/10.22178/pos.25-2
- Snitsarenko, P., Nakonechnyi, V., Mikhieiev, Y., Hrytsiuk, V. (2019). The approach to automated internet monitoring system creation. 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT). doi: https://doi.org/10.1109/atit49449.2019.9030446
- Palchuk, V. (2017). Methods of Content-Monitoring and Content-Analysis of Information Flows: Modern Features. Academic Papers of The Vernadsky National Library of Ukraine, 48, 506–526. doi: https://doi.org/10.15407/np.48.506
- Kolmogorova, A. V., Kalinin, A. A., Malikova, A. V. (2018). Linguistic principles and computational linguistics methods for the purposes of sentiment analysis of russian texts. Current Issues in Philology and Pedagogical Linguistics, 1 (29), 139–148. doi: https://doi.org/10.29025/2079-6021-2018-1(29)-139-148
- Molodetska-Hrynchuk, K. (2017). Outreaches content tracing technique for social networking services. Radio Electronics, Computer Science, Control, 2 (41), 117–126. doi: https://doi.org/10.15588/1607-3274-2017-2-13
- Ekshmidt, V. (2015). Verbal Manipulation: Persuasion and Suggestion. Movni i kontseptualni kartyny svitu, 1, 275–281. Available at: http://nbuv.gov.ua/UJRN/Mikks_2015_1_31
- Savchuk, V. S., Hryshchuk, R. V., Hryshchuk, O. M., Musienko, A. P. (2018). Intelligent system for evaluating destructive nature of text content of social networks based on fuzzy logic. Science-based technologies, 38 (2). doi: https://doi.org/10.18372/2310-5461.38.12838
- Lytvyn, V., Vysotska, V., Uhryn, D., Hrendus, M., Naum, O. (2018). Analysis of statistical methods for stable combinations determination of keywords identification. Eastern-European Journal of Enterprise Technologies, 2 (2 (92)), 23–37. doi: https://doi.org/10.15587/1729-4061.2018.126009
- Carrillo, M., López-López, A. (2010). Concept Based Representations as Complement of Bag of Words in Information Retrieval. IFIP Advances in Information and Communication Technology, 154–161. doi: https://doi.org/10.1007/978-3-642-16239-8_22
- Li, Y., McLean, D., Bandar, Z. A., O’Shea, J. D., Crockett, K. (2006). Sentence similarity based on semantic nets and corpus statistics. IEEE Transactions on Knowledge and Data Engineering, 18 (8), 1138–1150. doi: https://doi.org/10.1109/tkde.2006.130
- Mladenić, D., Grobelnik, M. (2013). Automatic text analysis by artificial intelligence. Informatica (Ljubljana), 37 (1), 27–33. Available at: https://www.dlib.si/details/URN:NBN:SI:DOC-DKCVOIFG
- Gutierrez, E., Karwowski, W., Fiok, K., Davahli, M. R., Liciaga, T., Ahram, T. (2021). Analysis of Human Behavior by Mining Textual Data: Current Research Topics and Analytical Techniques. Symmetry, 13 (7), 1276. doi: https://doi.org/10.3390/sym13071276
- Zhuravlev, A. P. (1991). Zvuk i smysl. Moscow: Prosveschenie, 160.
- Levytskyi, V. V. (1971). Chy isnuie universalnyi zvukosymvolizm? Movoznavstvo, 1, 25–37.
- Zhou, S., Jeong, H., Green, P. A. (2017). How Consistent Are the Best-Known Readability Equations in Estimating the Readability of Design Standards? IEEE Transactions on Professional Communication, 60 (1), 97–111. doi: https://doi.org/10.1109/tpc.2016.2635720
- Perazzoli, S., de Santana Neto, J. P., de Menezes, M. J. M. B. (2022). Systematic analysis of constellation-based techniques by using Natural Language Processing. Technological Forecasting and Social Change, 179, 121674. doi: https://doi.org/10.1016/j.techfore.2022.121674
- Coleman, M., Liau, T. L. (1975). A computer readability formula designed for machine scoring. Journal of Applied Psychology, 60 (2), 283–284. doi: https://doi.org/10.1037/h0076540
- Senter, R. J., Smith, E. A. (1967). Automated Readability Index. AMRL-TR-66-220. Wright-Patterson Air Force Base. Available at: https://apps.dtic.mil/sti/pdfs/AD0667273.pdf
- Sagi, E., Kaufmann, S., Clark, B. (2009). Semantic density analysis: comparing word meaning across time and phonetic space. Proceedings of the EACL 2009 Workshop on GEMS, 104–111. Available at: https://aclanthology.org/W09-0214.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Serhii Yevseiev, Vitaliy Katsalap, Yurii Mikhieiev, Vladyslava Savchuk, Yurii Pribyliev, Oleksandr Milov, Serhii Pohasii, Ivan Opirskyy, Nataliia Lukova-Chuiko, Ihor Korol
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.