Devising a code-free method for detecting signs of informational-psychological influences in messages

Authors

DOI:

https://doi.org/10.15587/1729-4061.2025.342297

Keywords:

informational-psychological operation, semantic network, LLM, prompt engineering, codeless analytics, AI, disinformation

Abstract

This study investigates text messages that potentially contain signs of informational-psychological operations (IPSOs). The task addressed aims to solve the problem of detecting signs of IPSOs in the media space.

An innovative method for detecting such signs has been proposed, based on the construction and analysis of semantic networks and implemented without the use of program code by using large language models (LLMs). This makes it possible to generate formalized analytical queries to LLMs in the form of a code-free system based on the composition of structured prompts.

The method's unique feature is the parallel analysis of data from two sources of knowledge: internal and external. The internal one contains generalized IPSO patterns formed on the basis of a wide corpus of data. The external one includes verified examples of fake messages from social networks, news outlets, and archives of fact-checking organizations.

To improve the accuracy of analysis, semantic normalization of concepts is used, which employs embedded vectors to unify terminology, as well as comparison of causal paths in semantic networks to identify connections. The assessment of the probability of a message belonging to IPSO is formed by aggregating the results using a weighted average, which makes it possible to take into account semantic and structural similarity. An example of applying the method to the analysis of a disinformation message is given, demonstrating the ability to detect key signs of psychological influence: manipulative narratives, emotional loading, and cause-and-effect relationships.

The proposed method is flexible, reproducible, and accessible to researchers without programming skills, which makes it a valuable tool for monitoring information threats and analyzing disinformation in the context of information confrontations

Author Biographies

Dmytro Lande, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”

Doctor of Technical Sciences, Professor

Department of Information Security

Kostiantyn Yefremov, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”

PhD

Educational and Scientific Center “World Data Center for Geoinformatics and Sustainable Development”

Artem Soboliev, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”

PhD

Educational and Scientific Center “World Data Center for Geoinformatics and Sustainable Development”

Ivan Pyshnograiev, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”

PhD, Associate Professor

Department of Artificial Intelligence

References

  1. Hassan, S. U., Ahamed, J., Ahmad, K. (2022). Analytics of machine learning-based algorithms for text classification. Sustainable Operations and Computers, 3, 238–248. https://doi.org/10.1016/j.susoc.2022.03.001
  2. Zgurovsky, M., Lande, D., Dmytrenko, O., Yefremov, K., Boldak, A., Soboliev, A. (2023). Technological Principles of Using Media Content for Evaluating Social Opinion. System Analysis and Artificial Intelligence, 379–396. https://doi.org/10.1007/978-3-031-37450-0_22
  3. Ahmad Tamerin, A. S., Bakar, N. A. A., Hassan, N. H., Maarop, N. (2023). Counter-Narrative Cyber Security Model to Address the Issues of Cyber Terrorism. Open International Journal of Informatics, 11 (1), 96–113. https://doi.org/10.11113/oiji2023.11n1.30
  4. Lande, D., Strashnoy, L. (2025). Semantic AI Framework for Prompt Engineering. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.5172867
  5. Lande, D., Strashnoy, L. (2025). Advanced Semantic Networking based on large language models. Kyiv: Engineering, 264.
  6. Kingdon, A. (2021). The Meme Is the Method: Examining the Power of the Image Within Extremist Propaganda. Researching Cybercrimes, 301–322. https://doi.org/10.1007/978-3-030-74837-1_15
  7. Guleria, P. (2024). NLP-based clinical text classification and sentiment analyses of complex medical transcripts using transformer model and machine learning classifiers. Neural Computing and Applications, 37 (1), 341–366. https://doi.org/10.1007/s00521-024-10482-x
  8. Dhiman, P., Kaur, A., Gupta, D., Juneja, S., Nauman, A., Muhammad, G. (2024). GBERT: A hybrid deep learning model based on GPT-BERT for fake news detection. Heliyon, 10 (16), e35865. https://doi.org/10.1016/j.heliyon.2024.e35865
  9. Piña-García, C. A. (2025). In-context learning for propaganda detection on Twitter Mexico using large language model meta AI. Telematics and Informatics Reports, 19, 100232. https://doi.org/10.1016/j.teler.2025.100232
  10. Liu, Z., Zhang, T., Yang, K., Thompson, P., Yu, Z., Ananiadou, S. (2024). Emotion detection for misinformation: A review. Information Fusion, 107, 102300. https://doi.org/10.1016/j.inffus.2024.102300
  11. Hu, L., Wei, S., Zhao, Z., Wu, B. (2022). Deep learning for fake news detection: A comprehensive survey. AI Open, 3, 133–155. https://doi.org/10.1016/j.aiopen.2022.09.001
  12. Aïmeur, E., Amri, S., Brassard, G. (2023). Fake news, disinformation and misinformation in social media: a review. Social Network Analysis and Mining, 13 (1). https://doi.org/10.1007/s13278-023-01028-5
  13. Barabash, O. V., Hryshchuk, R. V., Molodetska-Hrynchuk, K. V. (2018). Identification threats to the state information security in the text content of social networking services. Science-Based Technologies, 38 (2). https://doi.org/10.18372/2310-5461.38.12855
  14. Lande, D., Hyrda, V. (2024). Use of large language models to identify fake information. Collection “Information Technology and Security,” 12 (2), 236–242. https://doi.org/10.20535/2411-1031.2024.12.2.315743
  15. Strashnoy, L., Lande, D. (2024). Implementation Of The Concept Of A "Swarm Of Virtual Experts" In The Formation Of Semantic Networks In The Field Of Cybersecurity Based On Large Language Models. https://doi.org/10.2139/ssrn.4978924
  16. Hryshchuk, R., Molodetska, K., Syerov, Y. (2019). Method of improving the information security of virtual communities in social networking services. CEUR Workshop Proceedings. Available at: https://ceur-ws.org/Vol-2392/paper3.pdf
  17. Abels, A., Lenaerts, T. (2025). Wisdom from Diversity: Bias Mitigation Through Hybrid Human-LLM Crowds. Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, 321–329. https://doi.org/10.24963/ijcai.2025/37
Devising a code-free method for detecting signs of informational-psychological influences in messages

Downloads

Published

2025-10-31

How to Cite

Lande, D., Yefremov, K., Soboliev, A., & Pyshnograiev, I. (2025). Devising a code-free method for detecting signs of informational-psychological influences in messages. Eastern-European Journal of Enterprise Technologies, 5(2 (137), 55–69. https://doi.org/10.15587/1729-4061.2025.342297