The method of socio-technical systems informational stability evaluation at the informational war conditions
DOI:
https://doi.org/10.15587/1729-4061.2016.65691Keywords:
information war, informational stability, informational and psychological operation, probabilistic stability measure, information memeAbstract
The method of evaluation of the informational stability of socio-technical systems, which are influenced by specific informational and psychological operations in the information war is presented. The method uses a logical-probabilistic model and a probabilistic measure for evaluating the informational stability of the system. The proposed informational stability measure is based on the concept of minimum unit of information, designed to change human consciousness - a meme and uses probabilistic estimates of occurrence of so-called destructive and compensatory memes, i.e. the meme, used for the informational and psychological operation (reprogramming of the consciousness of the social part of the SLS) and the compensating meme, the use of which minimizes the consequences of the destructive meme. For decision-making with regard to the stability of the social part of the SLS, a flexible scale that can be adapted to any object of research is proposed.
An approach to the construction of the so-called vector of stability of the social part of the SLS, which provides a visualization of the derived probabilistic estimates of a violation of confidentiality, integrity and availability, is proposed.
The method is of practical interest since it allows considering an actually weakly formalized class of threats - informational and psychological operations, the aim of which is a destructive impact on the social part of the SLS. The proposed method is useful for the decision-making on the management of complex informational security at the "enterprise-region-state" level.
References
- Harchenko, V. P. (2009). Kiberterrorizm na aviacionnom transporte: zb. nauk. Problemi іnformatizacyi ta upravlіnnya, 4 (28), 131–140.
- Vilskij, G. B. (2012). Informacionnye riski sudovozhdeniya. Nauk. Vіstnik HDMA, 1 (4), 17–26.
- Dudikevich, V. B. (2012). Problemi ocіnki efektivnostі sistem zahistu. Vіsnik Nacіonalnogo unіversitetu «Lvіvs'ka polіtexnіka». Ser.: Avtomatika, vimіryuvannya ta keruvannya, 741, 118–122.
- Mіroshnik, M. A. (2015). Rozrobka metodіv ocіnki efektivnostі zahistu іnformacyi v rozpodіlenih kompyuternih sistemah. Іnformacіjno-keruyuchі sistemi na zalіznichnomu transportі: naukovo-texnіchnij zhurnal, 4 (113), 39–43.
- Lahno, V. A., Grabaryev, A. V. (2016). Improving the transport cyber security under destructive impacts on information and communication systems. Eastern-European Journal of Enterprise Technologies, 1/3 (79), 4–11. doi: 10.15587/1729-4061.2016.60711
- Artemov, A. A. (2015). Teoretichiskie osnovi informacionnogo upravlenia. Informacionnue voiny, 3, 83–97.
- Ciganov, V. V. (2015). Globalnoe informacionnoe protivoborstvo. Informacionnue voiny, 2, 7–13
- Malkov, S. U. (2015). Model ustoichivosti/destabilizacii politicheskih system. Informacionnie voyni, 1, 7–18.
- Lundberg, J., Rogier, W. (2013). The resilience analysis matrix (RAM): visualizing functional dependencies in complex socio-technical systems. 5th symposium on resilience engineering managing trade-offs.
- Oosthuizen, R., Pretorius, L. (2013). An analysis methodology for impact of new technology in complex sociotechnical systems. 2013 International Conference on Adaptive Science and Technology. doi: 10.1109/icastech.2013.6707508
- Simmons, M. P., Adamic L. A., Adar E. (2011). Memes Online: Extracted, Subtracted, Injected, and Recollected. ICWSM, 11, 17–21.
- IBMSecurity Services (2014). Cyber Security Intelligence Index. – Available at: http://media.scmagazine.com/documents/82/ibm_cyber_security_intelligenc_20450.pdf
- Andreeva, O. M., Musienko, К. (2014). Kiberzbroya ta analiz ii destruktivnoi diyalnosti na prikladi vplivu virusu novogo pokolinnya STUXNET na iransku yadernu programu. Actual problems of international relations, 1 (103).
- Ostapenko, G. A. (2007). Informacionnie operacii I ataki v sociotehnicheskih sistemah. М.: Goryachaya liniya – Telekom, 134
- Dudatyev, A. V. (2015). Modeli ta organizacia protydii informaciynim atakam. Zahist informacii, 2, 157–162.
- Chistyakov, V. P. (1987). Kurs teorii veroyatnostey. Moscow: Nauka, 240.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Andrey Dudatyev, Vladimir Luzhetsky, Dmitriy Korotaev
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.