Countering fake information as a guarantee of state information security

被引:0
|
作者
Svintsytskyi, Andrii, V [1 ]
Semeniuk, Oleksandr H. [2 ]
Ufimtseva, Olena S. [3 ]
Irkha, Yurii B. [4 ]
Suslin, Serhii, V [5 ]
机构
[1] Secur Serv Ukraine, Ukrainian Sci & Res Inst Special Equipment & Fore, 3 Mykoly Vasylenka Str, UA-03113 Kiev, Ukraine
[2] Natl Secur & Def Council Ukraine, Interagcy Sci & Res Ctr Problems Combating Organi, 1 Solomyanska Sq, UA-03035 Kiev, Ukraine
[3] Natl Acad Secur Serv Ukraine, Sci & Org Ctr, 22 Mykhaila Maksymovycha Str, UA-03066 Kiev, Ukraine
[4] Minist Internal Affairs Ukraine, Res Dept, State Res Inst, 4A Yevhena Gutsala Lane, UA-01011 Kiev, Ukraine
[5] Natl Acad Secur Serv Ukraine, Dept Gen Legal Disciplines, 22 Mykhaila Maksymovycha Str, UA-03066 Kiev, Ukraine
关键词
Fake information; Manipulation; Propaganda; Hybrid war; Forensic expertise; NEWS;
D O I
10.1057/s41284-022-00347-0
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
The article focuses on the notion of fake information as a tool of psychological influence in the context of hybrid wars. Works of the prominent academicians in the area of manipulation studies constitute the theoretical framework of this research. Empirical research methods such as observation, comparison, generalization and expert evaluation are used. First of all, types and methods of psychological influences used by mass media and social networks with a view to manipulate public opinions are distinguished. Moreover, the impact of emotions on the critical perception of the news is highlighted. The indicators of manipulative influence are defined in order to resist them. Besides, the ways of creating and distributing false information are described. In addition, the development of fakes identification mechanisms is considered a priority for the governmental and other public institutions. This is illustrated by a range of technologies developed to automatically detect fake news. Apart from that, the degrees of the information reliability are explored. Furthermore, structural elements of fake messages, which include the source and the message itself, are discussed. Misinformation of the public, promotion of certain opinions, encouragement of aggressive actions and instalment of doubts are singled out as the main tasks of fake information. Additionally, stages of countering fakes are distinguished. Finally, the specific features of the forensic expertise procedure are determined in order to provide information security in Ukraine. The research demonstrates the importance of an efficient security system, which would identify fake information and limit its propagation.
引用
收藏
页码:427 / 442
页数:16
相关论文
共 50 条
  • [21] VALUE DETERMINANTS OF THE INFORMATION SECURITY OF A DEMOCRATIC STATE
    Danilyan, Oleg G.
    Dzeban, Aleksander P.
    Kalynovskyi, Yury Yu
    Kovalenko, Inna I.
    Melyakova, Julia, V
    Danilyan, Vadim O.
    [J]. REVISTA INCLUSIONES, 2020, 7 (02): : 457 - 473
  • [22] State of the art in information security policy development
    Paananen, Hanna
    Lapke, Michael
    Siponen, Mikko
    [J]. COMPUTERS & SECURITY, 2020, 88
  • [23] STATE SECURITY, PRIVACY AND INFORMATION - BAXTER,JD
    RAAB, CD
    [J]. POLITICAL QUARTERLY, 1992, 63 (01): : 106 - 107
  • [24] State of standards in the information systems security area
    Fernandez-Medina, Eduardo
    Yaguee, Mariemma I.
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 339 - 340
  • [25] A Review on Information, Information Security and Security Processes
    Canbek, Gurol
    Sagiroglu, Seref
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174
  • [26] Information Fake in Supply Chains
    Hong, Jiang
    [J]. MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 958 - 962
  • [27] Countering terroism through information technology
    Popp, R
    Armour, T
    Senator, T
    Numrych, K
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (03) : 36 - 43
  • [28] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    [J]. CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [29] Countering information leakage in the Concealed Information Test: The effects of item detailedness
    Geven, Linda Marjoleine
    Verschuere, Bruno
    Kindt, Merel
    Vaknine, Shani
    Ben-Shakhar, Gershon
    [J]. PSYCHOPHYSIOLOGY, 2022, 59 (02)
  • [30] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252