Keywords: simulation modeling, information influences, management, social network, topology, typology, cluster analysis
MODELING MANIPULATIVE INFLUENCES IN SOCIAL NETWORKS
UDC 004.94
DOI: 10.26102/2310-6018/2019.24.1.003
In the Doctrine of information security of the Russian Federation the main negative factors affecting the state of information security (IS), called informational and technical influences (ITI) and information and psychological influences (IPI). Therefore, modeling, evaluation and forecasting of information influences (II) on social groups and organizing of the corresponding information counteraction (ICA) are urgent tasks of management. The system-dynamic models of information influences in social networks and groups are considered. Their application for purposes of counteraction to information terrorism and extremism is proved. The description in the form of flowcharts is given. Systems of differential equations are presented. Experiments with models using the advanced simulation platform Anylogic were carried out. In a sample of Russian settlements based on cluster analysis found homogeneous typological groups that differ in the average time of transmission of information in social networks. Based on Gibbs ' postulate, the system-dynamic model of information influences among students has been successfully tested. The high consistency of simulation results with empirical data (determination coefficients of at least 90%) is shown. Models allow you to forecast the II and ICA and to play different scenarios of the dynamics of these processes.
1. The Doctrine of information security of the Russian Federation. Approved by the decree of the President of the Russian Federation. No. 646 of December 5, 2016. (In Russ.)
2. Minaev V. A., Ovchinskij A. S., Skryl' S. V., Trostyanskij S. N. [How to manage mass consciousness. Modern models]. M.: Publishing House "Russian New University", 2013. – 200 p. (In Russ.)
3. Minaev V. A., Dvoryankin S. V. [Modeling dynamics of informationalpsychological influences on mass consciousness] // Voprosy kiberbezopasnosti = Cybersecurity issues. 2016. № 5 (18). - Pp. 56-64. (In Russ.)
4. Minaev V. A., Dvoryankin S. V. [Rationale and description of dynamics model of informational-psychological impacts of a destructive nature in social networks] // Security of information technologies. 2016. Vol. 23. No. 3. – Pp. 40-52. 2016. (In Russ.)
5. Minaev V. A., Sychev M. P., Vaitz E. V., Gracheva YU. V. [Modeling of information security threats using the principles of system dynamics // Voprosy radioehlektroniki = Problems of Radio Electronics. 2017. No. 6. - Pp. 75-82. (In Russ.)
6. Gubanov D. A., Novikov D. A., Chkhartishvili A. G. [Social networks: models of information influence, management and confrontations]. M: Publishing house of physical and mathematical literature, 2010. – 228 p. (In Russ.)
7. Minaev V. A., Sychev M. P., Vaitz E. V., Kirakosyan A. E. [System-dynamics modeling information influences of on society] // Voprosy radioehlektroniki = Problems of Radio Electronics. 2017. No. 11. - Pp. 35-43. (In Russ.)
8. Malikov R. F. [A training manual on simulation of complex systems in AnyLogic]. Ufa: Publishing House of Bashkir State Pedagogical University, 2013. - 296 p. (In Russ.)
9. Alekhnovich S. O., Slizovsky D. E., Ozhiganov E. N. [System-dynamic modeling principles, structure and variables (on the example of Moscow region)]. // RUDN Journal of Political Science. 2009, No 1. – Pp. 22-36. (In Russ.)
10. Forrester J.W. Industrial Dynamics. Waltham (MA): Pegasus Communications, 1961. – 464 p.
11. Forrester J.W. Urban Dynamics. Waltham (MA): Pegasus Communications, 1969. – 285 p.
12. Forrester J.W. World Dynamics. Waltham (MA): Pegasus Communications, 1971. – 144 p.
13. Cappelli D. M., Desai A. G., Moore A. P., Shimeall T. J., Weaver E. A., Bradford B. J. Management and Education of the Risk of Insider Threat (MERIT): System Dynamics Modeling of Computer System Sabotage. Pittsburg: Carnegie Mellon University. Software Engineering Institute, 2006. – 34 p.
14. Liu W., Cui Y., Li. Y. Information Systems Security Assessment Based on System Dynamics // International Journal of Security and Its Applications. 2015. Vol. 9. No. 2. – Pp. 73-84.
15. Kim A. C., Lee S. M., Lee D. H. Compliance Risk Assessment Measures of Financial Information Security Using System Dynamics // International Journal of Security and Its Applications. 2012. Vol. 6. No. 4. – Pp. 191-200.
16. Behara R. S., Derrick Huang C. A. System Dynamics Model of Information Security Investments // Journal of Information System Security. 2010. Vol. 6. No. 2. – Pp. 1572-1583.
17. Gusarov A. N., Zhukov D. O., Kosarev A.V. [Description of computer threats spread dynamics in information-computing networks with delay of antiviruses action // Herald of the Bauman Moscow State Technical University. Series Instrument Engineering. 2010. No. 1. – Pp. 112-120. (In Russ.)
18. Gibbs J. Elementary principles of statistical mechanics. NY: Charles Scribner's sons, 1902. – 207 p.
Keywords: simulation modeling, information influences, management, social network, topology, typology, cluster analysis
For citation: Minaev V.A., Sychev M.P., Kulikov L.S., Vayts E.V. MODELING MANIPULATIVE INFLUENCES IN SOCIAL NETWORKS. Modeling, Optimization and Information Technology. 2019;7(1). URL: https://moit.vivt.ru/wp-content/uploads/2019/01/MinaevSoavtori_1_19_1.pdf DOI: 10.26102/2310-6018/2019.24.1.003 (In Russ).
Published 31.03.2019