<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Cyber Hygiene, Kyiv, Ukraine, November</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Bifurcation Prediction Method for the Emergence and Development Dynamics of Information Conflicts in Cybernetic Space</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>Aktau</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>30</volume>
      <issue>2019</issue>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The article discusses the solution to the problem of predicting the occurrence and dynamics of the development of information conflicts in cybernetic space. The frequency of occurrence of an analysis unit in the blogosphere was chosen as an indicator reflecting this process. The analysis of information threats is considered as a multifactorial process that reflects all spheres of society's life. The superposition of multifactorial trends obtained by non-linear optimization convolution gives a model that can have bifurcation points. The developed technique is aimed at searching for bifurcation intervals for planning effective methods of counteracting negative information influences.</p>
      </abstract>
      <kwd-group>
        <kwd>bifurcation forecasting</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>information conflicts</kwd>
        <kwd>cyberspace</kwd>
        <kwd>information security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        To date, a significant increase in the role of informational influence to achieve the
economic, political, military goals of any power has become apparent. Information
influences have been conducted all the time since the existence of mankind and its
socio-political structure. At the same time, the active development of information
technology in the last decade has led to a qualitatively new understanding of the
development and use of information impacts. The consequence of this was the
emergence of hybrid confrontations. Asymmetric hybrid actions produce sometimes
unexpected results even for the aggressor, as evidenced by recent local wars,
conflicts, revolutions, etc. [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ].
      </p>
      <p>A separate, specific area of distribution of means of informational impact is
cybernetic space. Its popularization, globality, efficiency, relatively low
controllability, novelty and dynamism of development, a variety of forms, methods
and genres of information supply, new social communicative forms and psychological
consequences generated by it form new challenges for information security along with
existing threats.</p>
      <p>Effective opposition to information impacts (IW) is possible in the case of the
organization of coordinated, creative and dynamic systematic work to implement the
tasks of quickly identifying, protecting and countering information threats (IE) that
cause information conflicts (IC). Timely and adequate response to identified IU
requires accurate data about: their level of danger and priority in neutralization;
development trend and dynamics; critical time points and intervals of development
dynamics. This makes it possible to rationalize the distribution of forces and means of
counteraction against goals, objectives and time, as well as to increase the adequacy
of planned and implemented measures to neutralize identified DIs and prevent them
from developing into dangerous infrareds. This task is especially relevant in
conditions of a high density of occurrence flux, dynamics of development and
transformation of IR, which is typical for cyberspace.</p>
      <p>In this regard, the urgent task is to develop effective approaches to predicting the
emergence and development of information conflict in cybernetic space.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of existing approaches</title>
      <p>An analysis of practical approaches to solving the problems of forecasting infrared in
cyberspace shows a rather low level of automation, which does not provide high
indicators of efficiency, reliability and completeness of measures to neutralize them.
At the same time, there is a fairly wide range of publications devoted to the issues of
modeling informational influences generated by processes and social phenomena.
[59]. The well-known approaches have many positive aspects, however, they are based
on decomposition analysis and forecasting of each individual information security,
which somewhat contradicts the complexity of the reaction of the target to these
threats.</p>
      <p>
        The task of forecasting the occurrence and dynamics of the development of
information conflicts in cyber space can be classified as a task of statistical analysis.
Methods known in this field are based on processing experimental redundancy of
temporal or parametric data using recurrent or posterior methods of smoothing
(estimating) the parameters of the process under study, but actually the parameters of
approximating models [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The models thus formed possess prognostic properties of
the analysis of the processes under study. Despite the variety of specific smoothing
algorithms (polynomial smoothing by recursive procedures, the classical least squares
method), nonlinear smoothing by modified forms of least squares, etc.) they are all
based on the use of smooth, monotone functions that satisfy the Dirichlet conditions
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Practice shows that the processes of occurrence and the dynamics of changes in
information conflicts as information and social processes have a mixed,
monotonouspeak character with the emergence of qualitatively new reactions (processes), while
developing alternatives. This circumstance requires finding ways to build adequate
models of the process of the emergence and development of IC in the field of
synergetic methods using fractal representations, catastrophe theory and the search for
bifurcation phenomena [
        <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
        ].
      </p>
      <p>The aim of the article is to develop a bifurcation forecasting technique for the
occurrence and dynamics of the development of information conflicts in cyber space.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Research methods and key findings</title>
      <p>
        We will implement the solution to the problem of forecasting the occurrence and
dynamics of the development of information conflicts in cyber space according to the
classical scheme: observation of the process under study and measurement of its
characteristics (accumulation of experimental data); synthesis of a mathematical
model and determination of its parameters consistent with experimental data;
predicting the dynamics of the development of the investigated process in accordance
with the adopted model [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In this regard, the most important stage is the synthesis
(construction, definition) of a mathematical model for predicting the occurrence and
dynamics of the development of information conflicts in cyber space, which is
characterized by a high degree of adequacy. The article is devoted to the solution of
this problem.
      </p>
      <p>
        To build an adequate model of the process under study, it is necessary, first of all,
to study it in detail, formalize and describe with highlighting the features and patterns.
As the basic concepts in the field of information security, the article uses the
terminology that has a generally accepted interpretation [
        <xref ref-type="bibr" rid="ref14 ref16">14,16</xref>
        ], that they reflect is
illustrated by the diagram in Fig. 1.
      </p>
      <sec id="sec-3-1">
        <title>Information space</title>
      </sec>
      <sec id="sec-3-2">
        <title>Cybernetic space</title>
        <p>The subject of information exposure</p>
        <sec id="sec-3-2-1">
          <title>Information Impact</title>
          <p>Information weapon
Object of informational impact</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>Information conflict</title>
        </sec>
        <sec id="sec-3-2-3">
          <title>Crisis situation</title>
        </sec>
        <sec id="sec-3-2-4">
          <title>Information Security</title>
          <p>Information Threats
Information Security</p>
          <p>Provider</p>
          <p>The key category of informational (informational-psychological) influences (IPV)
is the individual, i.e. directly the object of IW. In this case, the main goal and result of
informational impact is the generation of informational conflict (IW) to change the
beliefs, behavior and actions of the target.</p>
          <p>The mechanisms of the emergence and development of information conflicts in
cyber space.</p>
          <p>The procedural description of the emergence and development of information
conflict. The information conflict is generated by the information content of the
directed content, intended for the transformation of consciousness or modification of
the actions of the object of influence. In turn, information content has the property to
develop, modify and transform in cyberspace after evaluating (viewing, primary
perception) by its object of influence. We will call the development and modification
of information generated in the consciousness of the object of influence the required
opinion, and the degree of perception of information - the stability of opinion. The
development and modification of information content is associated with the
psychological aspects of the perception of information by an individual, which
include receiving information, understanding it, creating an emotional reaction and
transmitting this content, reinforced by one’s own emotions, through cyberspace to
other individuals. As a result, with the correct management of the information impact,
a certain resonance of opinions can be achieved, which is the result of cognitive
dissonance (the result is information conflict), which consists in the perception or
antipathy of information content by the target, the ability to cause a positive or
negative reaction, etc.</p>
          <p>
            Information and information-psychological impact is implemented in a sequence
of well-known stages, reflecting a diagram of the change in the frequency of
occurrence of information content in the information environment [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ]:
1. Information stage – the creation of a relevant or resonant informational
occasion;
2. Stage of activation – popularization of an information occasion;
3. Achievement of the goals of IW by bringing the informational occasion to
informational conflict – the target stage;
4. The final stage is the consolidation of the goals of IW.
          </p>
          <p>The scale ratio of the duration of the IPV stages is also characterized by the
scheme in Fig. 2.</p>
          <p>Content
Frequency
Information</p>
          <p>conflict
1
2
3
4</p>
          <p>Time
IPV stages</p>
          <p>Thus, we have a monotonous trend in the frequency of occurrence of target
content in cybernetic space.</p>
          <p>
            Traditional approaches to describing the dynamics of change and predicting the
development of information conflicts are based precisely on a similar representation
and description of the process of implementing IPV. That is, in the form of a
onedimensional, one-factor, and monotone model [
            <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17">14-17</xref>
            ]. In this case, the object of
influence is abstracted to the level of the “black box” which is characterized only by a
reaction to IPV. The law of reaction change is most often chosen by the simplest one
linear or non-linearly monotonic. This approach greatly simplifies the analysis of IPV
processes and is based on the principles of trivial empirical practice, which does not
reflects the underlying processes of IPV. This circumstance leads to the planning and
implementation of counteraction processes after the fact, i.e. in the form of a reaction
to IR. As a result, we have the principle of permanent situational reactions to
individual manifestations of IPV with a constant shortage and inefficient use of forces
and means to implement counteraction to negative information influences. In the
practice of counteracting negative IPV, the time interval for exposure and
counteraction is limited to only a few months [
            <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17 ref18">14-18</xref>
            ]. This circumstance contradicts
modern concepts and practices of conducting hybrid aggressive actions, when
information exposure is conducted continuously, and the peak manifestations of
individual forms of IPV are only stages of escalation to achieve the goals of exposure
mainly at the local level [
            <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
            ].
          </p>
          <p>
            Thus, the traditional model representation of IPV does not explain the reasons and
does not allow to determine the characteristics of the reaction of society to such an
impact. When and how does a change of opinions and the behavior of objects of
influence occur. What informational reason is priority in neutralizing, how they are
formed into a single plan, and what ultimate goal they pursue. At the same time, there
are many well-known approaches of in-depth analysis of processes in complex social
and sociotechnical systems, successful examples of using synegetics methods to
describe self-organization processes in them, productive multidimensional data
mining based on OLAP and Data Mining technologies. In this regard, the article
shows the possibility of using system analysis, methods of synergetics, statistical data
processing, multi-criteria optimization, data mining, general scientific methods for
studying social phenomena for bifurcation forecasting of the occurrence and
dynamics of information conflicts in cyber space [
            <xref ref-type="bibr" rid="ref12 ref13 ref3">3,12,13</xref>
            ].
          </p>
          <p>Patterns of development of information conflicts as a reaction of the object of
influence on IPV. The forecasting process of the emergence and development of
information conflicts in cyberspace, in fact, is the reaction of an individual, group or
society to information in general and to IPV in particular. Therefore, for the formation
of an adequate model of this process and the choice of its class, a detailed analysis of
what is happening in society after an informational stuffing is necessary.</p>
          <p>
            Informational impact belongs to the sphere of “soft” influences and is
procedurally more consistent with chaos theory as applied to social phenomena
[
            <xref ref-type="bibr" rid="ref13 ref19 ref20">13,19,20</xref>
            ]. In this perspective, society is seen as a complex system to which the
methods and categories of system analysis and synergetics are applicable. In addition,
taking into account the specifics of the process of informational impact, modern
society can be considered as a complex sociotechnical system. Then, the development
of society and the social phenomena occurring in it should be considered as a process
of self-organization with respect to the attractor system (national idea, value
orientations of society and an individual individual, moral laws, traditions, etc.) [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ].
The dynamics of this development is described by phase trajectories. In the simplest
cases, the level of reachability and approaching the attractor, its essence, value and
relevance determine the stable and critical sections of the development of society.
Stable conditions of society are characterized by monotonous, well-predicted
dynamics. Critical sections in the development of society can be characterized by
complex nonlinear dynamics, have bifurcation points (sections) that generate phase
transitions, jumps and stratifications of phase trajectories - chaos in a sociosystem.
Sustainable sectors are characterized by a consistent smooth evolution of society, and
critical, various qualitative transitions, including revolution. The presence of areas
and points of bifurcation in the development of society is a natural process, without
which the phenomena of stagnation and degradation are possible. The presence of
bifurcations means an alternative to development after the stage of asymptotic
saturation - a qualitative transition in evolution. It can be positive or negative up to a
change in the attractor system. Near the points of bifurcation transitions (bifurcation
regions), the sociosystem is in an extremely unstable state. At the same time, ultralow
impacts on society, under certain conditions, can give rise to catastrophic reactions
and fluctuations – to chaos [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ]. Subsequently, the system, under the influence of
internal or external control mechanisms, or according to the laws of self-organization,
follows the old one or acquires a new phase trajectory tending to a system of
attractors. The specifics of the phase trajectory is determined by the nature and tasks
of control, self-organization, and the attractor system (see Fig. 3).
          </p>
          <p>Phase trajectory of the
development of
sociotechnical system</p>
          <p>The revolutionary
development of the
socio</p>
          <p>technical system</p>
          <p>The evolutionary
development of the
sociotechnical system</p>
          <p>Alternative change of phase
trajectory in the development</p>
          <p>of socio-technical system
Bifurcation point</p>
          <p>
            The lifetime of the
sociotechnical system
In the presence of mechanisms of internal or external influence, we have the
phenomena of controlled chaos. Similar processes exhibit analogies in many
phenomena of the animate and inanimate nature of the macro and micro worlds and
are described by the fundamental mathematical methods of synergetics [
            <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
            ]. The
applicability of synergetic methods is possible only for systems that provide
conditions for self-organization and self-development [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]. The sociotechnical system
certainly satisfies these conditions.
          </p>
          <p>Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons</p>
          <p>It can be reasonably assumed that the IW process, in the formalization used, has
for the purpose of bringing the sociotechnical system (or its individual elements - the
individual, their groups, etc.) to the area of bifurcation, intercepting internal control
and bringing society to the required attractors by given phase trajectory. Thus,
bringing society to instability - chaos and its management is the essence of the IW
process and the achievement of its goals. Such formalization of the IW process
certainly entails its abstract description and moves away from practical terminology,
but provides the possibility of a mathematical description with the subsequent
automation of the stages of neutralizing negative IW. In the future, this will make it
possible to obtain adequate, operational, accurate and optimal solutions to the
mathematical problems of identification, forecasting, resource allocation, planning
and evaluation, which are the basis for the steps to counteract the negative
information impact</p>
          <p>
            Advanced research devoted to the study of the modern IPV paradigm is based on
the representation of the object of influence (modern society) as a complex social or
sociotechnical system [
            <xref ref-type="bibr" rid="ref21 ref22">21,22</xref>
            ]. From the perspective of IPV, society can be
represented as a complex hierarchical structure with feedback, with memory and
selfregulation. The system can be in stable and unstable states, which can give
asymmetric IPV results depending on the state of the system. Minor impacts can
cause avalanche-like processes if the system is unstable. The latter circumstance is
exacerbated by the emergence and development of cyberspace in the last decade,
which, in fact, forms a sociotechnical system in which huge flows of publicly
available information circulate. It is cyberspace, today, that is the prevailing field of
realizing IW.
          </p>
          <p>
            The above allows us to make an important assumption, which are essential for
predicting the emergence and dynamics of the development of information conflicts
in cyber space. The presence of mechanisms of self-regulation and self-organization
of society as a reaction to IPV leads to the need to consider not bifurcation points, as
applied to the description of phenomena in a complex social or sociotechnical system,
but about bifurcation sites (or intervals) [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ].
          </p>
          <p>
            The root cause in the field of ensuring information security, the emergence of
social biffurcation processes are information threats. In turn, information threats can
cover critical areas of the individual, individual groups, society - the state as a whole
(see Fig. 4): political; economic; social; spiritual; legal; personal; national security
and defense [
            <xref ref-type="bibr" rid="ref23 ref24">23,24</xref>
            ]. This is one of the options where information threats are realized,
no less important is the consideration of threats to the value orientations of society
and the national interests of the state.
          </p>
          <p>political
personal</p>
          <p>
            economic
national security
and defense
legal
social
spiritual
Each of these areas may have a hierarchical structure in the form of areas and
subareas, for example, the field of national security and defense may include:
environmental security; energy independence; information security (information
protection, information-psychological, cybernetic), etc. In turn, each of the critical
areas of activity is characterized by the specifics of the object of influence: an
individual (ordinary citizen, middle management, decision-maker at the level of
organization, state institution, society as a whole); a group of people (by social
(cultural, spiritual) interests, corporate structure, organization); the state as a whole;
interstate entities, unions, etc. For these hierarchical structures, it is possible to
formulate a list of indicators (signs) of information threats on the basis of which key
phrases of units for analyzing the content of cyberspace information messages are
generated. Thus, we have the hierarchy of Table 1, which is a methodological basis
for constructing relevant classifiers of information threats, for example, in the form of
implementations considered in publications [
            <xref ref-type="bibr" rid="ref23 ref24">23,24</xref>
            ].
          </p>
          <p>security</p>
          <p>and
defense</p>
          <p>Safety
energy
independence
Information</p>
          <p>Security
protection of
information
psychological
information
cybernetic</p>
          <p>structure,
organization</p>
          <p>
            society
interstate entities,
unions
Considering the classification structure of information threats of Table 1 in the time
domain, we obtain the problem of bifurcation prediction of the occurrence and
dynamics of the development of information conflicts in cybernetic space from the
mathematical point of view as the task of multidimensional, multivariate statistical
analysis of a large amount of time-varying information. To do this, it is proposed to
use general scientific methods of system analysis, synergetics, statistical data
processing, multi-criteria optimization, data mining with OLAP and Data Mining
technologies [
            <xref ref-type="bibr" rid="ref25">25</xref>
            ]. A multidimensional display of the dynamics of the development of
IC allows us to assess the level of threats, for example, according to a three-level
classification, indicated schematically in Fig. 5.
          </p>
          <p>r
e
i
f
i
s
s
a
l
C
t
a
e
r
h
T</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>Threat level</title>
        <p>Political
Economic</p>
        <p>Social
Spiritual</p>
        <p>Legal
Personal
National Security
and Defense</p>
        <p>Individual</p>
        <p>Group
Social
90%</p>
      </sec>
      <sec id="sec-3-4">
        <title>Threat level</title>
      </sec>
      <sec id="sec-3-5">
        <title>Observation interval</title>
      </sec>
      <sec id="sec-3-6">
        <title>Prediction Interval</title>
        <p>90%
30%
30%
60%
30%</p>
        <p>Threat Prediction
</p>
        <p>Change trends
</p>
        <p>Dynamics of change
</p>
        <p>Threat level</p>
        <p>Tim
Formalizing the problem of predicting the occurrence and dynamics of the
development of information conflicts in cyber space.</p>
        <p>
          Prediction is the process of reaction (response) of society to the information
impacts exerted on it, distributed in cyberspace. The essence of formalization is to
describe the processes occurring in the social environment, generated by
informational impact, by mathematical categories. To this end, it is proposed that the
real subject area of social phenomena be displayed by methods of the theory of
complex synergetic systems with the subsequent formation of statistical mathematical
models that describe the dynamics of IC. Such a process has an analogy with operator
methods for solving complex nonlinear modeling problems in combination with
abstraction techniques and reduction-induction mechanisms for using simulation
results [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>To formalize the task of predicting the occurrence and dynamics of the
development of information conflicts in the cybernetic space, three strata are used to
sequentially map the real social stratum and the processes occurring in it into abstract
categories - system and model strata (see Fig. 6).</p>
        <p>l
a
c
it
a
m
e
h
t
a
faom ledo
iton m
a
m
r
o
f
e
h
T</p>
        <p>Social stratum
System stratum</p>
        <p>Subject categories</p>
        <p>Ontology
Infology
s
lt
u
s
e
r
n
o
til
a
u
m
i
s
f
o
n
o
it
a
c
iirf
e
V</p>
        <p>Model stratum
Fig. 6. Decomposition of the IR simulation problem
A social (real) stratum has the properties of a natural adequate display of the process
of informational impact, while the forecasting of the generated phenomena is possible
only by subjective empirical or heuristic approaches. The accuracy and efficiency of
such a prognostic approach is quite low and is determined by subjective competence
and experience. The popularity of using such a forecast can be explained by poor
knowledge of the real subject area or by the difficulty of formalizing the forecasting
problem and creating mathematical models of the processes under study.</p>
        <p>
          The system (intermediate) stratum leads to the introduction of abstractions of the
first level, but in compliance with the adequacy of the display of the real social
stratum. The emergence of abstractions of the first level is due to the transformation
of real social processes into subjective knowledge about them, the capabilities of
system analysis methods. This stratum is necessary to describe the systemic
synergetic properties of society and the processes occurring in it - the whole is greater
than the sum of the parts. The conditionality of using the theory of complex systems
and synergetic methods for a system stratum is confirmed by the results of studies by
many authors studying complex processes in social and economic fields, in technical
systems, objects of animate and inanimate nature [
          <xref ref-type="bibr" rid="ref12 ref13 ref21 ref22">12, 13, 21, 22</xref>
          ].
        </p>
        <p>At the level of the system stratum, we will consider society with its hierarchical
state structure, which is in interaction with cyberspace as a complex sociotechnical
system. The processes of state (intrasystem) management implemented in such a
system give it the properties of a cybernetic system. Then the information impact on
the socio-technical system should be considered as an interfering effect or external, in
relation to public administration (see Fig. 7).</p>
        <p>Complex socio-technical system</p>
        <p>Subject of
management</p>
        <p>Management object</p>
        <p>Cybernetic system
Elements of the socio-technical system are individuals and their associations (groups).
Between the elements of the socio-technical system there are complex concentric
informal (family, online communities, labor collective, network structures, interest
clubs, non-traditional religious communities, foundations, etc.) and hierarchical state,
formal (state institutions, official parties, traditional religion, etc.) communication.
Then the processes occurring in such sociotechnical systems are described and
explained by the categories and laws of synergetics.</p>
        <p>The development of the system is characterized by a phase trajectory. The
direction of development is determined by the system of attractors. The processes of
evolutionary development of a sociotechnical system along a predetermined phase
trajectory relative to a given attractor system are the result of internal control actions
and self-organization processes. The revolutionary processes of the development of
the sociotechnical system, accompanied by bifurcation processes, catastrophes with a
change or stratification of phase trajectories, a change in the system of attractors can
be generated by external control processes with possible resonance of internal
processes of self-organization. As the latter, in this paper, we consider the information
impact.</p>
        <p>The model stratum has the properties of a rigorous mathematical description of the
process of predicting the occurrence and dynamics of the development of information
conflicts in the form of statistical mathematical models generated using the
bifurcation phenomena of synergetics. This stratum gives rise to second-level
abstractions due to the limitations and simplifications of the generated mathematical
models. However, the accuracy and operational characteristics of forecasting results
will be higher than the results obtained in the social stratum. The subjectivity of
model results is determined only at the level of formation of the system and model
strata and can be estimated and reduced a priori. This circumstance is the advantage
of using modeling methods to predict the occurrence and dynamics of the
development of information conflicts in the cybernetic space under conditions of a
high density of occurrence flux, the dynamics of the development and transformation
of IR.</p>
        <p>
          The used analogies of the categories of sociology, complex technical systems, and
the provisions of the theory of synergetics summarized in Table 2 are conditional and
proven in numerous well-known publications [
          <xref ref-type="bibr" rid="ref12 ref13 ref21 ref22">12,13,21,22</xref>
          ].
        </p>
        <p>Sociology
Individual, group</p>
        <p>Social
Communicative</p>
        <p>mechanisms
Community development</p>
        <p>Values, goals
Revolutionary processes</p>
        <p>Social device
Thus, the process of the emergence and development of information threats and
conflicts that grow into CS, generated by the target information impact, which is
realized in the global cyber space of the Internet network and undergoes a change in
the mood, judgment and behavior of the affected objects - the individual, individual
social groups or population, is subjected to modeling generally. As a controlled
indicator (measure) of the simulated process, the number of publications (messages)
containing a key phrase (analysis unit) from the list of information threats on sites of
various classes was selected.</p>
        <p>
          As a parameter that numerically characterizes the dynamics of the development of
the КС, the number of information messages K ijk on global Internet sites containing
an information unit ik at a time j will be used. By an information unit we mean a
word or phrase whose content (content) reflects a topic, concept or event that
generates a CS [
          <xref ref-type="bibr" rid="ref23 ref24">23,24</xref>
          ].
        </p>
        <p>Modeling of CS is carried out unitarily for each CS and their classes with their
subsequent aggregation. The behavior of aggregated CSs is supposed to be built
according to the biffurcation model, which after the bifurcation point can reflect
(stratification, positive or negative dynamics of development) the result of IPV - a
change in moods, judgments, behavior in the object of influence, which can generate
a new active topic (themes) and CS, respectively.</p>
        <p>The generated model should provide a high degree of accuracy in predicting the
development of CS for the formation of decisions about: the most dangerous CS and
information content at the current and given point in time, the dynamics of changes in
CS in time; the current and forecasted state of a specific and (or) all emerging CS;
quantitative characteristics of the COP and their changes for a given time interval;
time of the bifurcation points of the CS This information is used for the purpose of:
rational allocation of resources for monitoring the COP by topic and information
source; planning effective measures to neutralize the negative information impact;
warning (decreasing) the level of bifurcation processes in the moods, judgments and
behavior of the object of influence. Accordingly, the accuracy of estimating and
predicting the CS affects the effectiveness of these measures, which, in turn, is
determined by the adequacy of the selected mathematical model and the accuracy of
determining its parameters.</p>
        <p>Thus, the bifurcation forecasting technique for the occurrence and dynamics of the
development of information conflicts in cyber space should contain a set of stages.
1. Monitoring cyberspace.</p>
        <p>1.1. Definition of the list of sources of IW in cyberspace for monitoring
information threats (list of information sites and (or) social services).</p>
        <p>1.2. Setting key phrases - units of analysis for each field of activity of the IW
object in accordance with the classifier of information threats (see table. 00).</p>
        <p>1.3. Accumulation of an array of “raw” data — the frequency (frequency growth
dynamics) of the appearance of analysis units with discreteness during a given period
of monitoring information threats.</p>
        <p>2. Initial processing of monitoring results - OLAP analysis.</p>
        <p>2.1. According to the monitoring results, for each unit of analysis, the Hirsch
index is calculated. In the future, units of analysis with positive values of the Hirsch
index — active threats with an upward trend — are subject to monitoring and storage.</p>
        <p>2.2. If there is a sample of monitoring results in 10 measurements or more (at least
3 days with recording of the monitoring results three times a day), its statistical
analysis is carried out (determination of the statistical characteristics of the sample of
measurements). The stage is realized by sequentially enumerating polynomial models
up to m  2n and including ( m, n - the order of the polynomial model and the
number of measurements in the sample, respectively).</p>
        <p>2.3. If there are monitoring results for 7 days, a weighted average estimate of the
frequency of occurrence of analysis units per day is calculated and the raw data array
is replaced with weighted average estimates to reduce the amount of stored
information.</p>
        <p>3. Secondary processing of monitoring results - Data Mining analysis.
3.1. Polynomial-nonlinear smoothing and prediction of each unit of analysis.
3.2. Formation of a convolution model using a nonlinear compromise scheme.
3.3. Prediction of convolution, identification of bifurcation processes, intervals,
points.</p>
        <p>3.4. The study of convolution into critical units of analysis (critical threats) in the
appearance of bifurcation processes, intervals, points.</p>
        <p>4. Formation of recommendations to neutralize threats
4.1. Formation of recommendations on the list of critical units of analysis (critical
threats) necessary for operational neutralization.</p>
        <p>4.2. Determining the type of information threat by the time interval of their
implementation (action, operation, war).</p>
        <p>4.3. Repeat paragraphs 1,2,3 to clarify all calculation results with an increase in
the forecast time interval and growth of the experimental sample for analysis.</p>
        <p>4.4. Presentation of the results of using the methodology: results of forecasting
units of analysis; convolution bifurcation prediction; time characteristics of intervals
and bifurcation points; critical threats necessary to neutralize.</p>
        <p>
          The mathematical basis of the existing methodology covers the methods of pattern
recognition, the theory of statistical analysis, mathematical modeling and
multicriteria optimization, as well as synergetic methods of self-organization and
catastrophe theory [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. Their implementation for the specific tasks of detection and
bifurcation forecasting of the development of information threats is described in
[2729].
        </p>
        <p>The specificity of the proposed methodology is a multivariate analysis of trends in
the development of individual threats with their aggregation into a single functional. It
is precisely this approach that characterizes the identification of intervals leading to
bifurcation processes.</p>
        <p>
          To formulate a generalized optimality criterion for the convolution model
(Section 3.2 of the methodology), a nonlinear compromise scheme will be used in
accordance with the convolution of Professor A. Voronin [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]. Compared with other
optimization schemes [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], convolution has the following advantages: optimization
problems are solved if there are restrictions within which the unimodality of the
function of the generalized criterion is guaranteed; relatively small computational
complexity of the solution search algorithm.
        </p>
        <p>
          To form a convolution model (Section 3.2 of the methodology), a non-linear
scheme of trade-offs by Professor A. Voronin is used. [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]. Then the threat indicator
the frequency of the appearance of the analysis unit in cyberspace is a factor, and their
multitude in accordance with the classifier - generates multifactor. From the threat
indicator, you can go to the criterion is minimized. That is, the repetition rate of the
unit of analysis should approach to a minimum, which ensures the prevention of
occurrence or reduction of the level of information conflict. This reflects the desired
scenario for the development of information impacts in the face of opposition to it.
So, the non-linear scheme of compromises reflects the process of information
counteraction in the form of multivariate analysis.
        </p>
        <p>
          Convolution for discretely defined particular criteria looks [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]
        </p>
        <p>b
Y ( y0 )   0l 1  y0l 1  min , (1)</p>
        <p>l1
where l  1...b – is the number of partial criteria for optimality of the system
included in the convolution;
0l – is normalized weight coefficient; y0l – is normative particular optimality
criterion.</p>
        <p>Rationing of particular criteria is carried out to build a single scale for considering
each criterion and to avoid their dominance and absorption.</p>
        <p>The multifactor model (1) in its dynamics of development over time can be
considered as a phase trajectory of the development of society (see Table 2) under the
action of a vector of informational influences in various industries (see Table 1, Fig.
5). And, therefore, the nature of the change in the phase trajectory can have a model
of the type shown in Fig. 2 at a low level of information threats and the form of Fig. 3
at a high level of them. An example of the application of the proposed methodology is
aimed at confirming the formulated hypothesis.</p>
        <p>An example of using the proposed methodology</p>
        <p>For a calculated example, the monitoring of changes in three current threats from
various areas of society has been carried out. Monitoring of their changes has been
implemented for twenty days. Based on the results of processing samples of discrete
data, polynomial models are obtained with the dynamics of change shown in
Figs. 8, 10.</p>
        <p>0,2
0,18
0,16
0,14
0,12
0,1
0,08
0,06
0,04
0,02</p>
        <p>0
0,3
0,25
0,2
0,15
0,1
0,05
0
0,2
0,18
0,16
0,14
0,12
0,1
0,08
0,06
0,04
0,02
0
K ijk</p>
        <p>ik
K j
1
2
4
3
5
3
j
j
Ряд1
Ряд2
Ряд3
Ряд1
Ряд2
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20</p>
        <p>1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20</p>
        <p>Fig. 9. Aggregated Data
1</p>
        <p>2
1
3
5
7
9
1
1
0,25
0,2
0,15
0,1
0,05
0</p>
        <p>5
1 2 3 4 5 6 7 8 9 10 11 12
j
Р1
At the same time, the dynamics of the change in the frequency of occurrence of the
analysis unit with numbers 1,2 (the corresponding curves in Fig. 8,10) had a gentle
monotonically increasing character, and with number 3 - a pronounced asymptote.
The use of convolution (1) for the aggregation of these curves 1, 2, and 1, 2, 3 is
shown in Fig. 9,11. Curves 4 of Fig. 9,11 represent a convolution of monotonic
factors of 1.2. Curves 5 - reflect the convolution of monotonic and asymptotic factors.
Figure 8-11 shows the normalized data. This simplified example gives the obvious
result of displaying a multifactorial aggregated curve of monotone and asymptotic
threats. A reverse analysis of the reasons leading to the asymptotic nature of the
aggregated curve allows us to identify threats that must be neutralized first. Thus, the
hypothesis put forward on the possibility of bifurcation prediction of the occurrence
and dynamics of the development of information conflicts in cyber space through the
use of aggregate nonlinear convolution is confirmed. The proposed approach is
especially productive in conditions of significant flux density and dynamics of
changes in information threats. A subsequent analysis of the dynamic properties of the
aggregated curves for a sufficient amount of experimental data will provide high
accuracy, efficiency and completeness in preventing critical situations.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>The article proposes a methodology for bifurcation forecasting of the occurrence and
dynamics of the development of information conflicts in cybernetic space. In this
case, the process of informational impact is considered as a reaction of a complex
system to an external impact described by synergetic approaches. The search for
bifurcation intervals is based on the analysis of the phase trajectory of a change in the
state of the system as an aggregated value of the frequency of occurrence of an
analysis unit, an indicator of information threats in various areas of society. Unlike
the known ones, the proposed approach allows us to comprehensively predict and
analyze both factors and the consequences of informational impact. The considered
calculation example confirms the effectiveness of the proposed solutions.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Gorbulin</surname>
            <given-names>V.P.</given-names>
          </string-name>
          <article-title>Searching for asymmetric answers: cyberspace in a hybrid war // Mirror of the week</article-title>
          .
          <source>- No. 1031</source>
          ,
          <string-name>
            <surname>February</surname>
          </string-name>
          20 - February 27 -
          <year>2015</year>
          . - Access mode: [https://zn.ua/internal/v-poiskah
          <article-title>-asimmetrichnyh-otvetovkiberprostranstvo-v-gibridnoy-voyne-_</article-title>
          .html].
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Gorbulin</surname>
            <given-names>V.P.</given-names>
          </string-name>
          <article-title>Hybrid war: everything is just beginning</article-title>
          ... // Mirror of the week. - No. 1086,
          <string-name>
            <surname>March</surname>
          </string-name>
          25 - April 1. -
          <fpage>2016</fpage>
          . - Access mode: [https://zn.ua/internal/gibridnaya-voyna
          <article-title>-vse-tolko-nachinaetsya-_</article-title>
          .html].
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Gorbulin</surname>
            <given-names>V.P.</given-names>
          </string-name>
          <string-name>
            <surname>Bifurcation</surname>
            <given-names>Point</given-names>
          </string-name>
          // Mirror of the Week. - No. 1116,
          <string-name>
            <surname>November</surname>
          </string-name>
          5 - November 11. -
          <fpage>2016</fpage>
          . - Access mode: [https://zn.ua/internal/tochka-bifurkacii-_.html].
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Gorbulin</surname>
            <given-names>V.P.</given-names>
          </string-name>
          “Values of society” and “hybrid world”
          <article-title>: crisis of the protection model // Mirror of the week</article-title>
          .
          <source>- No. 1149</source>
          ,
          <string-name>
            <surname>June</surname>
          </string-name>
          24 - June 30. -
          <fpage>2017</fpage>
          . - Access mode: [https://zn.ua/internal/cennosti-obschestva
          <article-title>-igibridnyy-mir-krizis-</article-title>
          <string-name>
            <surname>modeli-</surname>
          </string-name>
          zaschity-
          <volume>252420</volume>
          _.html].
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Gorbulin</surname>
            <given-names>V.P.</given-names>
          </string-name>
          <article-title>Information operation and security of suspension: threaten, protidia</article-title>
          , model: monograph / V.P.
          <string-name>
            <surname>Gorbulin</surname>
            ,
            <given-names>O.G.</given-names>
          </string-name>
          <string-name>
            <surname>Dodonov</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          <string-name>
            <surname>Lande</surname>
          </string-name>
          .
          <article-title>-</article-title>
          K .:
          <string-name>
            <surname>Intertekhnologiya</surname>
          </string-name>
          ,
          <year>2009</year>
          .-- 164 p.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Lande</surname>
            <given-names>D.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Snarsky</surname>
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bezsudnov</surname>
            <given-names>I.V.</given-names>
          </string-name>
          <string-name>
            <surname>Internet</surname>
          </string-name>
          <article-title>: Navigation in complex networks: models and algorithms</article-title>
          . M .:
          <source>Book House "LIBROCOM"</source>
          ,
          <year>2009</year>
          . - 264 p.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Gubanov</surname>
            <given-names>D.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Novikov</surname>
            <given-names>D.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chkhartishvili</surname>
            <given-names>A.G.</given-names>
          </string-name>
          <string-name>
            <surname>Social</surname>
          </string-name>
          <article-title>Networks: Models of Information Influence, Management</article-title>
          and Confrontation / Ed. Corr. RAS
          <string-name>
            <given-names>D.A.</given-names>
            <surname>Novikov</surname>
          </string-name>
          . - M.:
          <source>Publishing house of physical and mathematical literature</source>
          ,
          <year>2010</year>
          . - 228 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Rastorguev</surname>
            <given-names>S.P.</given-names>
          </string-name>
          <string-name>
            <surname>Information war</surname>
          </string-name>
          . - M.: Radio and Communications,
          <year>1999</year>
          .- 416 p.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Petukhov</given-names>
            <surname>Yu</surname>
          </string-name>
          .A.
          <article-title>Modeling of social and political processes: a training manual</article-title>
          . - Nizhny
          <string-name>
            <surname>Novgorod</surname>
          </string-name>
          ,
          <fpage>2015</fpage>
          - 141 p.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>Bobalo</given-names>
            <surname>Yu</surname>
          </string-name>
          . Ya.
          <article-title>Monitoring of objects in the minds of April unapproachability of information technology / Bobalo Yu</article-title>
          . Ya.,
          <string-name>
            <given-names>Danik</given-names>
            <surname>Yu</surname>
          </string-name>
          . G.,
          <string-name>
            <surname>Pisarchuk</surname>
            <given-names>O.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komarova L</surname>
          </string-name>
          .O. and
          <string-name>
            <surname>thatshi</surname>
          </string-name>
          . -
          <string-name>
            <surname>Monograph</surname>
          </string-name>
          . - Lviv: Kolo,
          <fpage>2015</fpage>
          -
          <lpage>360</lpage>
          c.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Pisarchuk</surname>
            <given-names>O.O.</given-names>
          </string-name>
          <article-title>Non-linear and bug-testing model of process in ceruvann systems with ruhom / Pisarchuk O</article-title>
          .O.,
          <string-name>
            <surname>Kharchenko</surname>
            <given-names>V.P.</given-names>
          </string-name>
          -
          <string-name>
            <surname>Monograph</surname>
          </string-name>
          .
          <article-title>-</article-title>
          K.:
          <article-title>Institut obdarovano ї ditini</article-title>
          ,
          <year>2015</year>
          . - 248 p.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Haken</surname>
            <given-names>G</given-names>
          </string-name>
          . Synergetics / G. Haken;
          <article-title>trans. from English under the editorship of Yu</article-title>
          .L.
          <string-name>
            <surname>Klimantovich</surname>
            ,
            <given-names>S. M.</given-names>
          </string-name>
          <string-name>
            <surname>Osovets</surname>
          </string-name>
          . - M.:
          <string-name>
            <surname>Mir</surname>
          </string-name>
          ,
          <fpage>1980</fpage>
          - 404 p.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Ivakhnenko</surname>
            <given-names>A. G.</given-names>
          </string-name>
          <article-title>Decision-making on the basis of self-organization / A</article-title>
          . G. Ivakhnenko,
          <string-name>
            <given-names>Yu. P.</given-names>
            <surname>Zaichenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. D.</given-names>
            <surname>Dmitriev</surname>
          </string-name>
          . - M.:
          <string-name>
            <surname>Sov</surname>
          </string-name>
          . Radio,
          <year>1979</year>
          .-
          <fpage>280</fpage>
          s.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Zharkov Y.M.</surname>
          </string-name>
          <article-title>Informational and psychological warfare (evolucy and priority</article-title>
          ): Monograph. / Ya.M.
          <string-name>
            <surname>Zharkov</surname>
            ,
            <given-names>V.M.</given-names>
          </string-name>
          <string-name>
            <surname>Petrik</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          <article-title>Prisyazhnyuk ta іn</article-title>
          ..
          <source>- К .: ПАТ "Віполь"</source>
          ,
          <year>2013</year>
          . - 248 p.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Petrik</surname>
            <given-names>V.M.</given-names>
          </string-name>
          <article-title>Suggestive technologies of manpulative infusion: man</article-title>
          . pos_b. / V.M.
          <string-name>
            <surname>Petrik</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.M. Prisyazhnyuk</surname>
            ,
            <given-names>L.F.</given-names>
          </string-name>
          <string-name>
            <surname>Kompantseva</surname>
          </string-name>
          , Є.D.
          <string-name>
            <surname>Skulish</surname>
            ,
            <given-names>O.D.</given-names>
          </string-name>
          <string-name>
            <surname>Boyko</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          <string-name>
            <surname>Ostroukhov</surname>
          </string-name>
          , for ag.
          <source>red Є</source>
          .D.
          <string-name>
            <surname>Skulisha</surname>
          </string-name>
          . - 2nd
          <string-name>
            <surname>view</surname>
          </string-name>
          .
          <article-title>-</article-title>
          K .:
          <source>ZAT "VIPOL"</source>
          ,
          <year>2011</year>
          . - 248 p.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Bychenok</surname>
            <given-names>N.N.</given-names>
          </string-name>
          <article-title>Information security of the state in the military sphere: scientific method</article-title>
          . Edition / H.H.
          <string-name>
            <surname>Bychenok</surname>
            ,
            <given-names>T.M.</given-names>
          </string-name>
          <string-name>
            <surname>Dziuba</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          <string-name>
            <surname>Ros</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          <string-name>
            <surname>Vitkovsky</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          <string-name>
            <surname>Vishchun - K .: NUOU</surname>
          </string-name>
          ,
          <year>2012</year>
          .264 p.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Petrik</surname>
            <given-names>M.V.</given-names>
          </string-name>
          <article-title>Sutnіst і special features and special operations іnformatsіynyh operations and aktsіі іnformatsіynogo infusion / M.V. Petrik // Advanced information technology in the field of security and defense</article-title>
          . - No.
          <volume>3</volume>
          (
          <issue>6</issue>
          ),
          <year>2009</year>
          . - S.
          <fpage>71</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Markov</surname>
            <given-names>A.A.</given-names>
          </string-name>
          <article-title>The concept and characteristic of information risks, dangers and threats in modern post-industrial society / A.A</article-title>
          . Markov // Vestn. Volgogr.
          <article-title>state un-that</article-title>
          .
          <source>Ser. 7</source>
          ,
          <string-name>
            <surname>Philos</surname>
          </string-name>
          .
          <year>2010</year>
          . No.
          <volume>1</volume>
          (
          <issue>11</issue>
          ) - S.
          <fpage>123</fpage>
          -
          <lpage>129</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lepsky</surname>
            <given-names>V.E.</given-names>
          </string-name>
          <article-title>Technologies of controlled chaos - weapons of destruction of the subjectivity of development // Access mode</article-title>
          [http://spkurdyumov.ru/what/texnologii-upravlyaemogo-haosa].
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Mamlie</surname>
            <given-names>K.</given-names>
          </string-name>
          <article-title>Points of bifurcation. controlled chaos, as the source of postmodern Access mode</article-title>
          [http://communitarian.ru/publikacii/novyy_mirovoy_poryadok_metody/toch ki_ bifurkatsii_1968_upravlyaemyy_khaos_kak_istok_postmoderna_ /].
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Polyarush</surname>
            <given-names>O.O.</given-names>
          </string-name>
          <article-title>The paradigm of informational and psychological influences on social systems</article-title>
          . / O.O. Polyarush / Інформаційна bezpeka people, suspensions, powers. - No.
          <volume>1</volume>
          (
          <issue>1</issue>
          ),
          <year>2009</year>
          . - S.
          <fpage>21</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Malakhov V.M. Environmental</surname>
          </string-name>
          <article-title>Engineering: a monograph in three volumes</article-title>
          . Volume 1 / V.M.
          <string-name>
            <surname>Malakhov</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          <string-name>
            <surname>Gritsenko</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          <string-name>
            <surname>Druzhinin</surname>
          </string-name>
          : Novosibirsk. SSGA -
          <year>2012</year>
          .-- 271 p.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Logunov</surname>
            <given-names>A.B.</given-names>
          </string-name>
          <article-title>The updated classifier of information threats, taking into account the opinions of experts of the scientific and technical sphere in the field of information security / A.B</article-title>
          .
          <string-name>
            <surname>Logunov</surname>
            ,
            <given-names>E.A.</given-names>
          </string-name>
          <string-name>
            <surname>Marishev</surname>
          </string-name>
          , N.A. Mironov // Innovation and Expertise.
          <source>2015. Issue</source>
          <volume>2</volume>
          (
          <issue>15</issue>
          ), pp.
          <fpage>132</fpage>
          -
          <lpage>140</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <article-title>Threats to information security in crises and conflicts of the XXI century</article-title>
          / Ed. -
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Zagorsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.P.</given-names>
            <surname>Romashkina. - M.: IMEMO</surname>
          </string-name>
          <string-name>
            <surname>RAS</surname>
          </string-name>
          ,
          <year>2015</year>
          .-- 151 p.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Pisarchuk</surname>
            <given-names>O.O.</given-names>
          </string-name>
          <article-title>Bagatrix criteria mathematical models of situational management and self-organization in folding information systems / Pisarchuk O</article-title>
          .O.,
          <string-name>
            <given-names>Danik</given-names>
            <surname>Yu</surname>
          </string-name>
          .G.,
          <string-name>
            <surname>Shestakov</surname>
            <given-names>V.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokolov</surname>
            <given-names>K.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>that іnshі</surname>
          </string-name>
          . -
          <string-name>
            <surname>Monograph</surname>
          </string-name>
          . -
          <source>Zhytomyr: PP "Ruta"</source>
          ,
          <year>2016</year>
          . - 232 p.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Voronin</surname>
            <given-names>A. N.</given-names>
          </string-name>
          <article-title>Multicriteria solutions: models and methods: monograph /</article-title>
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Voronin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Yu. K.</given-names>
            <surname>Ziatdinov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Kuklinsky</surname>
          </string-name>
          .
          <article-title>-</article-title>
          K.: NAU,
          <year>2011</year>
          .-- 348 p.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akhmetova</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sydorenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Polishchuk</given-names>
            <surname>Yu</surname>
          </string-name>
          .,
          <string-name>
            <surname>Petryk</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Quantitative Evaluation Method for Mass Media Manipulative Influence on Public Opinion</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          , Vol.
          <volume>2362</volume>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>83</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>A.</given-names>
            <surname>Peleschyshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Klynina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <article-title>Legal Mechanism of Counteracting Information Aggression in Social Networks: from Theory to Practice</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2019</year>
          , Vol.
          <volume>2392</volume>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>121</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Fedushko</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Syerov</given-names>
            <surname>Yu</surname>
          </string-name>
          .,
          <string-name>
            <surname>Tesak</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Onyshchuk</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melnykova</surname>
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2020</year>
          )
          <article-title>Advisory and Accounting Tool for Safe and Economically Optimal Choice of Online Self-Education Services</article-title>
          .
          <source>Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN</source>
          <year>2019</year>
          ), Lviv, Ukraine, November
          <volume>29</volume>
          ,
          <year>2019</year>
          .
          <article-title>CEUR-WS.org, Vol2588</article-title>
          . pp.
          <fpage>290</fpage>
          -
          <lpage>300</lpage>
          . http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2588</volume>
          /paper24.pdf
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Aleksander</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Vorona</surname>
          </string-name>
          , Yu. Polishchuk,
          <string-name>
            <given-names>J.</given-names>
            <surname>Akhmetova</surname>
          </string-name>
          ,
          <article-title>Network-centric Approach to Destructive Manipulative Influence Evaluation</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>