<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Quantitative Evaluation Method for Mass Media Manipulative Influence on Public Opinion</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<affiliation key="aff0">
								<address>
									<addrLine>Sergiy Gnatyuk 1, -0564], Jamilya Akhmetova 2, ], Viktoriia Sydorenko 3, -0837], Yuliia Polishchuk 4, ], Valentyn Petryk 5, ] 1</addrLine>
									<postCode>0000-0003-4992, 0000-0003-3054-5987, 0000-0002-5910, 0000-0002-0686-2328, 0000-0003-2301-0722</postCode>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="institution">Yessenov University</orgName>
								<address>
									<settlement>Aktau</settlement>
									<country key="KZ">Kazakhstan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="institution">Zhubanov University</orgName>
								<address>
									<settlement>Aktobe</settlement>
									<country key="KZ">Kazakhstan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff4">
								<orgName type="institution">ISZZI Igor Sikorsky Kyiv Polytechnic Institute</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Quantitative Evaluation Method for Mass Media Manipulative Influence on Public Opinion</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">9367949A173E6D874809B7439CDA6D81</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T23:12+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>information-psychological security</term>
					<term>manipulative influence</term>
					<term>mass media</term>
					<term>quantitative evaluation method for manipulative influence</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The manipulative influence issue is not a new topic for discussion. However only with the advent of the mass media concept it became popular and requires the intervention not only of scientists but also of the international community. The investigation mass media phenomena are equipping a mankind with a broader and deeper understanding of society and culture due to the fact that the texts produced by the mass media are the most socially significant messages and have a priority in the society over all other types of texts. Moreover, in in recent years, the concepts of mass consciousness influence and mass behavior influence had become increasingly popular. Frequently, mass media is the subject or instrument of such manipulation. The manipulation process (as the influencing process on a person or a social group) is the more effective (by the power of impact), when the deeper level of consciousness the manipulator employs. Additionally, the deeper the level of manipulation when the slower the «processing» of consciousness, but the stronger the transformation in all other levels, and the result of exposure is more prolonged. In the article was developed the quantitative evaluation method of mass media manipulative influence on public opinion. The method by means of evaluating financial expenditures, defining goals, objectives and strategies for manipulating, selecting mass media and classified methods of manipulation, based on the generated databases of causes, goals of the criteria, focus groups and mass media, allows to calculate the quantitative parameters that characterize the magnitude of manipulative mass media influences on public opinion.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Currently, the mass media has become the main tool for information dissemination that affect individual consciousness and subconscious and, as a consequence, the public consciousness. Public consciousness should be considered as a social phenomenon whose main function is to influence the audience through semantic and evaluative information transmitted by mass media channels. Moreover, public consciousness is a mechanism for actualizing information through various means of communication. Therefore, mass media influence does not always have a negative effect, since in the globalized world it is difficult to imagine human life without newspapers, social networks and other mass media. However, on the other hand, some individuals, for gaining their own advantages, use mass media as an instrument of influence on society.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Analysis of known approaches for evaluation the manipulative influence</head><p>The research in mass media manipulative influence field was engaged by large number of scientists, both Ukrainian and foreign, among them: Ivanov, V., Nesteryak,Yu., McQuail, D., Schiller, G., Noelle-Neumann, E. etc. In Peleschyshyn, A. and Guminskyi, R. scientific researches, the description of informational environment of the virtual community in social networks was described; a model of internal informational environment and the discussion model of the virtual community were developed and detailed; on the basis of a formal model of the informational environment of the virtual community, taking into account the quality of information content, the indicator of information threats is determined <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>. The presented models allow to organize the detection and counteraction of the information threat in social networks and provide the information-psychological safety of a person in a social network. However, a significant disadvantage of that models is the impossibility of their evaluation.</p><p>A human activity model and human joint activities model in the information space was proposed by Shiyan, A. On the basis of proposed models, a human protection method from negative informational and psychological influence on the basis of the peculiarities of its activity was presented <ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref>. However, directly, the formal protection model from manipulative influence was not highlighted, as a consequence, is not possible to evaluate mathematically the effect.</p><p>In Gubanov, D. studies <ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref>, an overview of the influence models in social networks was presented, the main classes of models in social networks were considered and the correspondence between classes of models and parameters of the modeling object was established. An analysis of these models allows to study the relationships between objects in a social group and the dependence of information influence on individuals and public opinion.</p><p>The formalized model for detecting PR-influence through publications in the Internet was developed by Ryabyy, M., Khatyan, O. and Bagatsky, S. <ref type="bibr" target="#b8">[9]</ref>. According to <ref type="bibr" target="#b8">[9]</ref>, PR-influence is the mass media manipulative influence. However, this model allows to identify the impact, but do not assess it. Therefore, the developed model can be used as an initial stage for the development of a further evaluation model. Proceeding from the above, a detailed analysis of manipulative influences models was conducted <ref type="bibr" target="#b9">[10]</ref>.</p><p>The analysis was based on such basic criteria (Table <ref type="table" target="#tab_0">1</ref>): IEtaking into account the information environment influence; MMItaking into account methods of manipulative influence; EEtaking into account the links between information environment elements; FDthe formal description of models and methods; CIEtaking into account the content of information environment; TChtaking into account the content transfer channel; CAtaking into account the content adequacy.</p><p>As a result of multicriteria analysis, it is established that studied models and methods have certain limitations as to practical application for solving various kind of tasks of information and psychological security. It is found that the evaluation method of mass media manipulative influence is only then effective and adequate in case it meets all the specified criteria. The paper purpose is to develop an evaluation method of mass media manipulative influence, which will allow to calculate the quantitative parameters of their influence on public opinion. </p><formula xml:id="formula_0">+ - + +/- + - -<label>3</label></formula><p>Theoretical background developed method</p><p>The proposed evaluation method of mass media manipulative influence on public opinion is realized in 8 stages (Fig. <ref type="figure">1</ref>): 1) Evaluation the financial costs; 2) Ranking of reasons by the degree of their danger; 3) Determination the objectives of the manipulation campaign (hereinafter -KMp); 4) Determination of the KMp tasks; 5) Determination of strategies for the KMp implementation; 6) Selection the mass media for manipulation; 7) Selection the manipulation method; 8) Estimation of manipulative influence. Input data for the method are: the set of reasons for conducting KMp; the set of dislocation places; the set of goals for KMp; the set of focus groups; set of criteria for estimating parameters; the set of strategies for KMp; the set of mass media; the set of manipulation methods and the set of «weight by criteria». Output data: list of selected causes, goals, criteria, tasks, strategies, methods, mass media; values of magnitude and effectiveness of manipulative influence. The realization of this method allows to evaluate the magnitude of mass media manipulative influence on public opinion <ref type="bibr" target="#b12">[13]</ref>.</p><p>Evaluation the effectiveness of manipulative actions is the preparatory stage for conducting the campaign. This stage is only necessary for the customerto evaluate the financial efficiency of KMp. At this stage, from the whole mass media database it is necessary to select those mass media which, in the opinion of the expert, are suitable for the implementation of manipulative influence. First of all, it is necessary to determine the economic effect of advertising in selected mass media:</p><formula xml:id="formula_1"> , 100 DT PD ТH E U U    </formula><p>where Ethe economic effect of advertising; D Тadditional trade turnover under the advertising influence; Т Нtrade margin on goods (measured in % to the realization price); Р Uadvertising costs; and experts choose those reasons (using voting method), which, in their opinion, require a KMp . After that experts go to step 2. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Database of reasons</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Stage 1 -Evaluation the financial costs on KMp Stage 2 -Ranking of reasons by the degree of their danger</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Database of regions</head><formula xml:id="formula_2">i i i i i v v A v A Kr A Kr x i v a     </formula><p>The list of the most dangerous reasons , ,..., 1 ,</p><formula xml:id="formula_3">i i i n A A A x x x 3, 2, 1, l p lp l p l p if a a f if a a if a a           </formula><formula xml:id="formula_4">R I T r r i j i r j t j I u t c t T r R            1 2 1 { } { , ,..., }, , 1, . c i c i i C C C C C i c      C C 1 2 1 { } { , ,..., }, , 1, . g i g i i G G G G G i g      G G 1 2 1 { } { , ,..., }, , 1, . r i r i i Kr Kr Kr Kr Kr i r      Kr Kr 1 2 1 { } { , ,..., }, , 1, . y i y i i A A A A A i y      A A i L 1 2 1 { } { , ,..., }, , 1, . m i m i i L L L L L i m      L L 1 2 , ... r Kr Kr Kr 1 2 , ... g G G G lp f i G 1 2 , ... n r r r 1 2 , ... r Kr Kr Kr i i C A  , i i i i C L A L   i L i Z . i i L Z  1 2 1 { } { , ,..., }, , 1, . z i z i i Z Z Z Z Z i z      Z Z k h</formula><p>For Z and Z </p><formula xml:id="formula_5">M M M M M M M M M i x j e M M         M , i j M Ф  i i i i i i i i R Z G R Z G R Z a c b  . i i i i i i i i i Z p Z G pR Z R Z G R d e b c     , , , 0 . kj hj kj g g g g g hj j j r r if r r p k h m if not                1 1 , , ,<label>.</label></formula><p>0 .</p><formula xml:id="formula_6">g g J J kj hj kj h g g g g j j j j j r r if r r p k h p k h m if not                           , , , , , ; , 0 . g g g g g D p k h p h k if p k h p h k k h if not                   * * * 1, , 1,.., 1, , max 1 , ,<label>.</label></formula><formula xml:id="formula_7">k k m k k m l l l k A D A min max p k h p h k                                          1 1, 2 2, 3 3, ,<label>1, , 1,</label></formula><p>,</p><formula xml:id="formula_8">i i i i j j j j k k k i I j J M            . , q B q Ф max      , max ( ) , q q Ф H B q q C B      1 , k k k i i i i D f x x      Database of mass media   1 1 1 1 1 1 1 1 , . , k k k k k k l l l l l l k k l l l k k k k k k k l l l l l l k k l l w w if w w x x x x E w w if w w x x x x                              11, 12, 1 21, 22, 2 ( 1, ) ... ... ... ( ) 1, 2, b r ij b i a j b a a ab h h h H h h h h h h h    </formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Evaluation method of mass media manipulative influence on public opinion</head><p>Step 2 -Ranking of reasons by the degree of their danger. That is, for each possible i reason (for the period of preparation and implementation of the KMp) in r regions, it is necessary to evaluate the financial cost ( i u ) for a manipulative attack on the next ratio:</p><formula xml:id="formula_9">1 1 1 ( ) ,<label>1, ; 1, ; 1,</label></formula><formula xml:id="formula_10">R J T rr i j i r j t u t c r R j J t T           </formula><p>, where ()</p><formula xml:id="formula_11">r j t</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>the amount of mass media of j type (social networks, newspaper, TV etc), for the period t in region r , r i cthe cost of one mass media of j type in region r .</p><p>Step 3 -Definition of financial constraints. At this step, it is necessary to determine financial constraints of conducting KMp for reason: Stage 2 -Ranking of reasons by the degree of their danger. During the ranking of reasons by the degree of their danger, each expert are conducting pairwise comparison of reasons by the degree of their danger for KMp (step 1) and create the matrix r H (step 2) for each r region. The expert's mark define as r ij h , where iis the expert number, jthe reason number, rthe region number:  </p><formula xml:id="formula_12">g i g i i ig      G G G G G G G , (<label>step 2</label></formula><p>) and criteria ( Kr ): , that is, the parameters by which the objectives and tasks of the KMp will be selected. As a result of the Stage 3 implementation, will be formed objectives, the focus groups who are the objects of influence are identified and the criteria (for choosing objectives and tasks) are selected.</p><p>Stage 4 -Determination of the KMp tasks. At the step 1, experts form a set of tasks ( A ), which are connected to the objectives of the KMP (the objectives were identified in step 3), for assessing the KMP's tasks: 1 { } { , ,..., }, , 1, .</p><formula xml:id="formula_13">y i y i i iy      A A A A A A A</formula><p>At the step 2, the proportion of agreed positive scores</p><formula xml:id="formula_14">i v A</formula><p>x to the criteria of each v task of each agent i A according to all the criteria is calculated:</p><formula xml:id="formula_15">, 1, . ii ii i v v A v A Kr A Kr x i v a    </formula><p>As a result of Stage 4, the tasks to be achieved during KMp are formed.</p><p>Stage 5 -Determination of strategies for the KMp implementation. The objectives of manipulating different groups are made at different times i t and with different benefits. In accordance with the formulated objectives and tasks their strategies ( L ) ,</p><formula xml:id="formula_16">i i i i  C L A</formula><p>L are selected and implemented. At the step 1, from the set of strategies experts select the strategy that require of the KMp conducting:</p><formula xml:id="formula_17">12 1 { } { , ,..., }, , 1, . m i m i i im      L L L L L L L</formula><p>At the step 2, the list of strategies are ranked: .</p><p>,</p><formula xml:id="formula_19">lp lp l p lp if a a f if a a if a a           </formula><p>As a result of Stage 5, it is formed a number of strategies (possibly more than 1) on which KMp will be conducted.</p><p>Stage 6 -Selection the mass media for manipulation. At the stage 6, it is necessary to choose mass media ( Z ) which will be used during manipulative influences <ref type="bibr" target="#b13">[14]</ref>.</p><p>Then, it is necessary to conduct an analytical study of mass media with further evaluation of the information influence effectiveness. At the step 1, a set of mass media is formed:</p><formula xml:id="formula_20">12 1 { } { , ,..., }, , 1, z i z i i iz      Z Z Z Z Z Z Z .</formula><p>Step 2evaluation the effectiveness of manipulative actions can be presented as:</p><formula xml:id="formula_21">i ii i ii i i R ZG R ZG R Z a c b  , where i ii R ZG a -a score of z mass media in g focus group in r region, 1, , zZ  1, , gG  1, ,<label>rR</label></formula><formula xml:id="formula_22"> i i R Z</formula><p>ba score of z mass media of population in r -region,</p><formula xml:id="formula_23">i ii R ZG c</formula><p>a compliance index of z mass media in g focus group in r region. Thereafter, the mass media price matrix is created and stored in database of manipulation system: After that, an important action is the calculation of «cost per thousand» readers:</p><p>.</p><formula xml:id="formula_24">i i i i i i i i i Zp Z G pR Z R Z G R d e bc  </formula><p>According to the different price in different cities (regions), the «cost per thousand» quantity will difference. So, ind index can be presented as </p><formula xml:id="formula_25">          </formula><p>where j mthe rating scale according to the j criteria, , kj g j g h rrthe value of the , kh AA options according to the j criteria in g focus group. The ratio of advantages over a pair of alternatives ( , kh AA ) taking into account all considered criteria can be defined as:</p><formula xml:id="formula_26">    11 , ; ,, 0. gg JJ kj hj kj hj j g g j j g g j rr if r r p k h p k h m if not            </formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>The ratio of the dominance k A alternative over </p><formula xml:id="formula_27">          , ,<label>, , , ; , 0.</label></formula><formula xml:id="formula_28">g g g g D g p k h p h k if p k h p h k kh if not         </formula><p>The best alternative corresponds to the condition:</p><formula xml:id="formula_29">        1,.., * * * 1, ,<label>1, , max 1 , ,</label></formula><p>.</p><formula xml:id="formula_30">km k k m k ll lk A D A min max p k h p h k                        </formula><p>As a result of Stage 6, the mass media which according to the criteria has the highest rating will be chosen. Moreover, isn't necessarily it will be one mass media for all disposition places. It is also possible to choose different mass media for different disposition places. Stage 7 -Selection the manipulation method. In database the manipulative influence methods ( M ) are stored. These methods can be presented as: In database all methods are separated by certain characteristics and used by different mass media. Furthermore, each agent chooses the most effective method from the database that, in agent's opinion can use by mass media. After that, the list of criteria for which the method selecting are conducting will be formed.</p><formula xml:id="formula_31">1 } { x i i   MM 11 12 1 21 22 2 11 }} , ,. { { {{ },{ .., }, , ,.., xe ij e e ij    M M M M M M M 12 , ,...,<label>1, , 1, ) ,.</label></formula><p> </p><formula xml:id="formula_32">1 1,<label>2 2, 3 3, , 1, , 1, ,</label></formula><formula xml:id="formula_33">i i i i j j j j k k k i j J M I         where 1 k «the value» of l criteria ( 1, 2, 3 l  ), i ij</formula><p>criterion value of j operative manipulative influences method according to i strategy for l criteria. As a result of Stage 7, manipulative influence methods which will be implemented by the mass media chosen in 6 will be chosen.</p><p>Stage 8 -Estimation of manipulative influence. If the initial evaluation of g focus group is presented as g b ,then the task of manipulation is to change the group's opinion to , , ,</p><formula xml:id="formula_34">g g g g b q q Q g N   </formula><p>where g qthe change of initial opinion, thus g q is the controlling influence.</p><p>As a result of the sequence of operational manipulative influences, the final opinion in some focus groups is formed: where () H received benefits (profit, votes in elections, change in certain officials or government, etc.) by an organization in whose interests the manipulative influence is conducted, which depends on the change of public opinion, () C costs for manipulative actions. The task of management is to choose an acceptable management method that maximizes efficiency   . ,</p><formula xml:id="formula_35">q Bq Ф max </formula><p>Then the value of operational influence can be determined by the ratio</p><formula xml:id="formula_36">i D     1 , k k k i i i f x x   </formula><p>where   k i f a function (table or algorithm) that reflects the difference in scores</p><formula xml:id="formula_37">1 kk ii xx  </formula><p>in the amount of operational influence, for example, the volume and number of compromising newspaper articles or news releases on the TV channel. If</p><formula xml:id="formula_38">1 kk ii xx   , then    1 . k k k i i i i D f x x   </formula><p>The effectiveness l of influence l E in period k  is determined in different ways, in particular, by the ratio:</p><formula xml:id="formula_39">  1 11 1 1<label>11 1 ) ( ) ) ,( , , () ( kk</label></formula><formula xml:id="formula_40">k k k k ll l l l l kk ll lk kk k k k k ll l l l l kk ll ww if w w x x xx E ww if w w x x xx                         where k l w -influence assessment in the period k  , k l</formula><p>xthe magnitudes of the produced influence of l type in the period k  , 1, lL  influence type.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Experimental study &amp; discussion based on example of Ukrainian mass media</head><p>Considering the network-centered concept involves data analyzing and gathering from different regions for obtaining results on manipulative influences, it is proposed to calculate the influence of the mass media and its efficiency as an average of 3 regions for 4 newspapers and 3 manipulation methods selected by experts on previous stages. The influence of selected mass media presented in Tab. 2, 4, 6, 8; the effectiveness of influence showed in Tab. 3, 5, 7, 9. The value of operational influence will be determined by the number of articles (expert estimate). The tables present the influence of mass media and the value of manipulative influence.</p><p>In fig. <ref type="figure">2</ref> graphically depicts the ratio of the value of operational influence, that is, the number of articles, to the value of the effectiveness of manipulative influence.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 2. Effectiveness of mass media influence</head><p>The smallest value of operational influence, namely, with the smallest number of articles that used manipu-lative methods, showed the mass media "Facty": when the number of articles -2, the effectiveness of manipulative influence equal to 28%. The other mass media "Segodny", when the number of articles -2; the effectiveness of manipulative influence equal to 14%.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>In the paper the quantitative evaluation method of mass media manipulative influence on public opinion was developed. The method by means of evaluating financial expenditures, defining goals, objectives and strategies for manipulating, selecting mass media and classified methods of manipulation, based on the generated databases of causes, goals of the criteria, focus groups and mass media, allows to calculate the quantitative parameters that characterize the magnitude of manipulative mass media influences on public opinion. This method, in compare with analogs, could quantity evaluate a manipulative influence which realized by modern mass media and using manipulation influence methods on public opinion. The obtained results will be useful in information security field for evaluation harmful mass media influence on public opinion or on consciousness individuals. In the next research, it is going to conduct an experimental study of the developed method for its verification, correctness confirmation, as well as the establishment of the practical application possibility for raising the information and psychological safety level of citizens, society and the state.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>DU</head><label></label><figDesc>additional expenses on the growth of goods turnover. The next relation . an opportunity to evaluate the effectiveness of advertising in relation to the profits of the company, obtained from advertising ( P Z ) to profit before advertising ( O Z ). Stage 1 -Evaluation the financial costs on KMp. Step 1 -Choosing the reasons for conducting KMp. At the first step of Stage 1 it is necessary to input a set of reason (</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>amount of possible financing of the KMp during t period in r region. As a result of Stage 1, will be received a financial statement about expenses on the KMp. Based on the report, it is possible to analyzed if KMp should be carry out from a financial point of view.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head></head><label></label><figDesc>by experts. The set of objectives is a possible consequence of the reasons for conducting the KMp (step 1). Moreover, by experts are creating the set of focus group (who are the target of influence) (</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head></head><label></label><figDesc>price (unit of standard area, standard broadcast time etc.) in z mass media on р page (in р broadcast time etc.).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head></head><label></label><figDesc>converted into cube, but in our example, it is necessary to leave just two indices Z and G influence of z mass media on g focus group or its segment. The ratio of advantages in g focus group for each studied above j</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head></head><label></label><figDesc>The target function of public opinion modification can be represented as:  </figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="1,0.00,190.95,595.32,460.02" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Analysis of manipulative influence models.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Parameters</cell><cell></cell><cell></cell></row><row><cell>№</cell><cell>Title</cell><cell cols="6">ІE ММI EE FD CIE TCh</cell><cell>CА</cell></row><row><cell cols="2">1. Peleschyshyn-Guminskyi's Model</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>2. Shiyan's Model</cell><cell></cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">3. Gubanov's Models</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Type 1. Optimization and simulation models</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">3.1. Models with thresholds</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">3.2. Models of independent cascades</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">3.3. Impregnation and infestation models</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>-</cell><cell>-</cell></row><row><cell>3.4. Ising models</cell><cell></cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">3.5. Models based on cellular automata</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">3.6. Models based on Markov chains</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">Type 2. Theoretical and game model</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">Type 3. Models of innovations diffusion</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">Type 4. Models of network correlation</cell><cell>-</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">Type 5. Models of imitative behavior</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell></row><row><cell cols="2">Type 6. 𝑃  *  -social influence models</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Type 7. Models of «diffusion of innova-</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">tions» associated with the social opinion</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>formation</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">4. Oltarzhevskiy's Methods [11]</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>-</cell></row><row><cell cols="2">5. Ryabiy's, Khatyan's, Bagatsky's</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>Method</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">6. The Ministry of Russian Federation</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">for the Affairs of Civil Defence,</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Emergency Situations and Disaster</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Relief Methodology [12]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 2 .</head><label>2</label><figDesc>Influence of newspaper named "Facty"</figDesc><table><row><cell></cell><cell>0</cell><cell>1</cell><cell>2</cell><cell>3</cell></row><row><cell></cell><cell>x</cell><cell>x</cell><cell>x</cell><cell>x</cell></row><row><cell></cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1</cell></row><row><cell></cell><cell>1</cell><cell>3</cell><cell>4</cell><cell>5</cell></row><row><cell>D</cell><cell>n/a</cell><cell>2</cell><cell>3</cell><cell>4</cell></row><row><cell>i</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 3 .</head><label>3</label><figDesc>Effectiveness of Influence of newspaper named "Facty"</figDesc><table><row><cell></cell><cell></cell><cell>0 1 w</cell><cell>1 1 w</cell><cell>2 1 w</cell><cell>3 1 w</cell></row><row><cell cols="2">The value of influence</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">effectiveness presented in</cell><cell>18</cell><cell>28</cell><cell>34</cell><cell>33</cell></row><row><cell>%</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>E</cell><cell>Pi</cell><cell>n/a</cell><cell cols="2">14 11,3</cell><cell>9</cell></row><row><cell cols="2">1</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 4 .</head><label>4</label><figDesc>Influence of newspaper named "Segodnya"</figDesc><table><row><cell></cell><cell>0</cell><cell>1</cell><cell>2</cell><cell>3</cell></row><row><cell></cell><cell>x</cell><cell>x</cell><cell>x</cell><cell>x</cell></row><row><cell></cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>2</cell></row><row><cell></cell><cell>1</cell><cell>3</cell><cell>4</cell><cell>5</cell></row><row><cell>D</cell><cell>n/a</cell><cell>2</cell><cell>3</cell><cell>4</cell></row><row><cell>i</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_6"><head>Table 5 .</head><label>5</label><figDesc>Effectiveness of Influence of newspaper named "Segodnya"</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell>0</cell><cell>1</cell><cell>2</cell><cell>3</cell></row><row><cell></cell><cell></cell><cell></cell><cell>w</cell><cell>w</cell><cell>w</cell><cell>w</cell></row><row><cell></cell><cell></cell><cell></cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>2</cell></row><row><cell cols="3">The value of influence</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">effectiveness presented in</cell><cell>11</cell><cell>14</cell><cell>18</cell><cell>20</cell></row><row><cell>%</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>E</cell><cell>Pi</cell><cell></cell><cell>n/a</cell><cell>7</cell><cell>6</cell><cell>5</cell></row><row><cell></cell><cell>2</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="7">6. Influence of newspaper named "Komsomolska Pravda"</cell></row><row><cell></cell><cell></cell><cell>0</cell><cell>1</cell><cell>2</cell><cell>3</cell></row><row><cell></cell><cell></cell><cell>x</cell><cell>x</cell><cell>x</cell><cell>x</cell></row><row><cell></cell><cell></cell><cell>3</cell><cell>3</cell><cell>3</cell><cell>3</cell></row><row><cell></cell><cell></cell><cell>1</cell><cell>3</cell><cell>4</cell><cell>5</cell></row><row><cell cols="2">D</cell><cell>n/a</cell><cell>2</cell><cell>3</cell><cell>4</cell></row><row><cell></cell><cell>i</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_7"><head>Table 7 .</head><label>7</label><figDesc>Effectiveness of Influence of newspaper named "Komsomolska Pravda"</figDesc><table><row><cell></cell><cell></cell><cell>0</cell><cell>1</cell><cell>2</cell><cell>3</cell></row><row><cell></cell><cell></cell><cell>w</cell><cell>w</cell><cell>w</cell><cell>w</cell></row><row><cell></cell><cell></cell><cell>3</cell><cell>3</cell><cell>3</cell><cell>3</cell></row><row><cell cols="2">The value of influence</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">effectiveness presented in</cell><cell>9</cell><cell>24</cell><cell>28</cell><cell>34</cell></row><row><cell>%</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>E</cell><cell>Pi</cell><cell>n/a</cell><cell>12</cell><cell>9,3</cell><cell>8,5</cell></row><row><cell cols="2">3</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_8"><head>Table 8 .</head><label>8</label><figDesc>Influence of newspaper named "Dzerkalo tyzhnia"</figDesc><table><row><cell></cell><cell>0</cell><cell>1</cell><cell>2</cell><cell>3</cell></row><row><cell></cell><cell>x</cell><cell>x</cell><cell>x</cell><cell>x</cell></row><row><cell></cell><cell>4</cell><cell>4</cell><cell>4</cell><cell>4</cell></row><row><cell></cell><cell>1</cell><cell>3</cell><cell>4</cell><cell>5</cell></row><row><cell>D</cell><cell>n/a</cell><cell>2</cell><cell>3</cell><cell>4</cell></row><row><cell>i</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_9"><head>Table 9 .</head><label>9</label><figDesc>Effectiveness of Influence of newspaper named "Dzerkalo tyzhnia"</figDesc><table><row><cell></cell><cell></cell><cell>0 4 w</cell><cell>1 4 w</cell><cell>2 4 w</cell><cell>3 4 w</cell></row><row><cell cols="2">The value of influence</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">effectiveness presented in</cell><cell>10</cell><cell>20</cell><cell>30</cell><cell>40</cell></row><row><cell>%</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>E</cell><cell>Pi</cell><cell>n/a</cell><cell>10</cell><cell>10</cell><cell>10</cell></row><row><cell></cell><cell>4</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Processes of interactive social communications management in the conditions of an information society development</title>
		<author>
			<persName><forename type="first">A</forename><surname>Peleshchyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sierov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Berezko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Peleshchyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Tymovchak-Maksymets</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Monography</title>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Search for discussion pages in social networks by global search engines</title>
		<author>
			<persName><forename type="first">A</forename><surname>Peleshchyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Huminskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Tymovchak-Maksymets</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ukrainian Scientific Journal of Information Security</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="181" to="187" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Definition of recommendations for information impact on the virtual community structure</title>
		<author>
			<persName><forename type="first">A</forename><surname>Peleshchyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Korzh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Huminskiy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ukrainian Scientific Journal of Information Security</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="264" to="273" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Model and methods for protection of structured social group from negative information-psychological impact</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shiyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><surname>Yaremchyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ukrainian information security research journal</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="311" to="317" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Method of protecting a person from negative informational and psychological influence on the basis of activity typology</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shiyan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information security</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">15</biblScope>
			<biblScope unit="page" from="92" to="99" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Method of protection of unstructured social group from negative informational and psychological influence on the basis of human activity types</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shiyan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information security</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">16</biblScope>
			<biblScope unit="page" from="169" to="175" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Models of influence in social networks</title>
		<author>
			<persName><forename type="first">D</forename><surname>Gubanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Novikov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Chkhartishvili</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">UBS</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="205" to="281" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Social networks: models of informational influence, control and confrontation</title>
		<author>
			<persName><forename type="first">D</forename><surname>Gubanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Novikov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Chkhartishvili</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<pubPlace>Moscow</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The model of PR-impact detection by means of Internet mass-media</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ryabyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Hatyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bagatskуy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ukrainian Scientific Journal of Information Security</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="131" to="139" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Mass media as a channel of manipulative influence on society</title>
		<author>
			<persName><forename type="first">Yu</forename><surname>Polishchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Seilova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ukrainian Scientific Journal of Information Security</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="301" to="308" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Fundamentals and methods of modern corporate media</title>
		<author>
			<persName><forename type="first">D</forename><surname>Oltarzhevsky</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Free Press Center</publisher>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<ptr target="http://89.mchs.gov.ru/upload/site61/docment_file/HjSxq5ASwk.pdf,lastac-cessed2019/" />
		<title level="m">Methods of evaluating the effectiveness of the use of various media to promote a culture of life safety</title>
				<imprint>
			<date>03/01</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Method of quantitative evaluation of the negative informational and psychological influence of mass media on public opinion</title>
		<author>
			<persName><forename type="first">Yu</forename><surname>Polishchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8th International Scientific Conference ICS-2018</title>
				<meeting><address><addrLine>Lviv; Lviv</addrLine></address></meeting>
		<imprint>
			<publisher>Lviv Polytechnic Publishing</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="96" to="97" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Information-psychological security of society in the context of information warfare</title>
		<author>
			<persName><forename type="first">Polishchuk</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zhmurko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Monography. Akademia Techniczno-Humanistyczna</title>
				<meeting><address><addrLine>Bielsko-Biała</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
