<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Increasing, Decreasing and Flat Strategies in Information Warfare</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Keldysh Institute of Applied Mathematics</institution>
          ,
          <addr-line>Miusskaya sq., 4, Moscow, 125047</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The paper studies the mathematical model of information warfare in which each of belligerent parties has the option of choosing between an increasing, decreasing and flat strategies of broadcasting. The broadcasting resource of each of the parties is supposed to be limited. Increasing strategy refers to broadcasting weakly at the start of the campaign and increase the intensity of broadcasting gradually. Similarly, decreasing strategy means broadcasting with high intensity at the start of the campaign and decrease it gradually. Flat strategy refers to constant intensity of broadcasting. Each party faces the question of which strategy is the mast advantageous. We address this problem by making computational experiments with the model of information warfare. Combining three options of the first party with three options of the second party we obtain 9 scenarios. For each of them the numbers of each party's supporters at the end of the warfare is calculated. Which strategy appears to be the best depends on parameters that characterize the intensity of mouth-to-mouth spread of information and deactivation of parties' supporters.</p>
      </abstract>
      <kwd-group>
        <kwd>Mathematical Modeling</kwd>
        <kwd>Computational Experiment</kwd>
        <kwd>Information Warfare</kwd>
        <kwd>Increasing</kwd>
        <kwd>Decreasing and Flat Strategies of Broadcasting</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Information warfare has been an increasingly important topic for mathematicians as
well as social science scholars and practitioners. The constantly growing volume of
literature includes, among others, papers that introduce, develop and analyze
mathematical models.</p>
      <p>
        Mathematical modeling of the dissemination of information in society stems from
rumor models that do not take into account broadcasting by mass media but consider
only the diffusion of information in interpersonal communications. The earliest models
of this kind [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ] were proposed back in 1964 and 1973. The model of competing rumors
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] was proposed basing on their approach and can be considered the earliest model of
information war. It deals with the spread of two competing rumors, considering that if
the spreader of the first rumor meets the spreader of the second rumor, then they switch
Copyright © 2020 for this paper by its authors.
to spread the second rumor. The idea is that the first rumor is false, and the second
contains convincing evidence of its falseness. In this approach, the “winner” of the
information war is set by the researcher by defining that the second rumor is stronger than the
first. An alternative approach [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] assumes that a supporter of the other party cannot be
convinced, thus an individual becomes once and forever a supporter of the party whose
information they internalize earlier. The winner of the confrontation is derived from the
analysis of the model: in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] the so-called “victory condition” was analytically obtained,
i.e. inequality (containing system parameters), which determines which side of the
confrontation has a greater number of supporters when t→∞. Among modern trends in this
area, we also note emphasis on social networks, and agent-based and game theory-based
models [
        <xref ref-type="bibr" rid="ref10 ref5 ref6 ref7 ref8 ref9">5–10</xref>
        ]. In models of this kind the network structure plays an important role as
well as reputations of agents (network nodes). Related empirical studies (for example,
[
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14">11–14</xref>
        ]) can be used in constructing mathematical models of information warfare.
      </p>
      <p>
        Approaches to mathematical modeling of information warfare include the model of
making a decision by individual as for which party to support. The latest versions of this
model [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">15–17</xref>
        ] incorporates the ideas of the agenda-setting [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ].
      </p>
      <p>In this paper we address the problem of choosing a strategy in information warfare.
Suppose two Parties, say X and Y, are engaged in information warfare. During this
extended process each party broadcasts its propaganda via mass media.</p>
      <p>It is supposed that each party has a limited resource for broadcasting. A useful image
would be that a party has enough resource to broadcast, say, 100 units over a campaign
that lasts 25 days. The flat strategy is to release 4 units every day. However, maybe it's
more advantageous to broadcast weakly at the start of the campaign and increase the
intensity of broadcasting gradually. This would be an increasing strategy. Similarly,
decreasing strategies start from powerful broadcasting and decrease the intensity
gradually. The other party has the same types of strategies. The question here is which
strategy is to choose. We approach it with our mathematical model.
2</p>
      <p>
        Model
Take the model of information warfare [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
dX
dt
dY
dt
 x t   x X   N  X  Y   X ,
  y t   yY   N  X  Y   Y ,
      </p>
      <p>X 0  X 0 , Y 0  Y 0.</p>
      <p>Here X and Y are numbers of parties' supporters, N is the total numbers of individuals
in the population. It comprises supporters of X, supporters of Y and unattached
individuals. It is supposed that each party's messages are spread by broadcasting and via
interpersonal communication. The intensity of broadcasting of Party X is given by
function x t  and the intensity of mouth-to-mouth relaying of their message is
characterized by parameter. Similarly,  y t  and  y refer to broadcasting and relaying via
interpersonal communication the message of Party Y. The terms X ,  Y describe
the individuals' shift from supporters to unattached, so that parameter  characterizes
the intensity of this deactivation process. The system is considered at 0  t  T .</p>
      <p>For the sake of simplicity suppose x t  ,  y t  to be linear functions of time:
x t   kxt  lx ,
 y t   kyt  ly .</p>
      <p>In terms of these equations, increasing, decreasing and flat strategies of Party X mean,
respectively, kx  0 , kx  0 , kx  0 , and the same for Party Y. Combing various
strategies by two parties we get scenarios such as "increasing strategy of Party X vs flat
strategy of Party Y" and so on. In comparing various strategies of a party as for which
one is more advantageous given the strategy of the other party fixed, it is necessary to
control that the total broadcasting resource given by</p>
      <p>T
Resourcex   x t  dt ,</p>
      <p>0
is the same across all strategies of Party X, and ditto for Party Y.
3</p>
      <p>Computational Experiment: One of the Parties Has a Greater
Broadcasting Resource
Experiment 1. Let the duration of the warfare be T=4. Parameters x  y  1 and
  0.1. Let the strategies of Party X be
so that Resourcex  8 . Similarly, strategies of Party Y are</p>
    </sec>
    <sec id="sec-2">
      <title>Increasing :</title>
    </sec>
    <sec id="sec-3">
      <title>Flat :</title>
      <p>so that Resourcey  9.6 . The results are presented in Table 1. The dynamics for two
cases is shown in Fig. 1.</p>
      <p>It follows from Table 1 that for each party the increasing strategy is dominated by
the flat strategy, which in turn is dominated by the decreasing strategy. In other words,
under given parameters the decreasing strategy is the most advantageous while the
increasing strategy is the worst one.</p>
      <p>The explanation of this is that mouth-to-mouth spread of messages is more intensive
than the deactivation of partisans, that is x  y   . Given this condition, the idea
of effective campaigning is to take the lead at the start, that is to circulate your message
powerfully at the start of the campaign and let your supporters relay it further to their
interlocutors.
 y t   4.8 1.2t
conjecture gives us the idea of the following experiment.</p>
      <p>Experiment 2. Put T=10, x  y  0.1 and   1 . Let the strategies of Party X be
so that Resourcex  50 . Similarly, strategies of Party Y are
so that Resourcey  60 . The results are presented in Table 2. The dynamics for two
cases is shown in Fig. 2.</p>
      <p>As expected, the best strategy for each party is the increasing one. The intuition behind
the conclusion is like this. Imagine a person who receives a party's message to become
a supporter of this party but gives up their partisanship before relaying the message to
someone else. In this situation there is no sense of wasting much resource to recruit
many supporters at the start of the campaign. More rationally would be to keep your
broadcasting resource until the final burst. This means an increasing strategy.</p>
      <p>An obvious question arises about the intermediate case. We have got that decreasing
strategies tend to be the most advantageous when x  y   whereas increasing
strategies tend to be the most advantageous when x  y   . Thus the intermediate
case is presumably represented by equality x  y   . This is the question of the
following experiment.</p>
      <p>Experiment 3. Put T=15, x  y    1 . Let the strategies of Party X be
so that Resourcex  112.5 . Similarly, strategies of Party Y are</p>
      <p>In this section we consider a situation where Party X circulates a viral message,
which is relayed by individuals more intensively than the message of party Y. On the
other side, Party Y has a greater broadcasting resource.
Fig. 3. Experiment 3. Top left: x t   t,  y t   19.5 1.3t . Top right: x t   7.5 ,
 y t   19.5 1.3t . Bottom left: x t   7.5,  y t   1.3t . Bottom right: x t   t ,
y t   1.3t .</p>
      <p>Experiment 4. Put T=10, x  0.24, y  0.2,   0.8 . Let the strategies of Party X be
so that Resourcex  50 . Similarly, strategies of Party Y are</p>
      <p>Increasing : x t   t,
Flat : x t   5,</p>
      <p>Decreasing : x t   10  t,
Increasing : x t   1.2t,
Flat : x t   6,</p>
      <p>Decreasing : x t   12 1.2t,
so that Resourcey  60 . The results are presented in Table 4. The dynamics for one of
the cases is shown in Fig. 4.
 y t   1.2t
 y t   1.2t . Bottom: x t   t,  y t   1.2t .
Relatively big values of β and small values of γ are favorable for decreasing strategies
and reverse.</p>
      <p>The research was supported by Russian Science Foundation (project No.
20-1120059).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Daley</surname>
            ,
            <given-names>D.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kendall</surname>
            ,
            <given-names>D.G.</given-names>
          </string-name>
          :
          <article-title>Stochastic rumors</article-title>
          .
          <source>Journal of the Institute of Mathematics and its Applications</source>
          ,
          <volume>1</volume>
          ,
          <fpage>42</fpage>
          -
          <lpage>55</lpage>
          (
          <year>1964</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Maki</surname>
            ,
            <given-names>D.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thompson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <source>Mathematical Models and Applications</source>
          , Prentice-Hall, Englewood Cliffs, NJ, USA (
          <year>1973</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Osei</surname>
            ,
            <given-names>G.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thompson</surname>
            ,
            <given-names>J.W.:</given-names>
          </string-name>
          <article-title>The supersession of one rumour by another</article-title>
          .
          <source>J. of Applied Probability</source>
          ,
          <volume>14</volume>
          (
          <issue>1</issue>
          ),
          <fpage>127</fpage>
          -
          <lpage>134</lpage>
          (
          <year>1977</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Mikhailov</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marevtseva</surname>
            ,
            <given-names>N.A.</given-names>
          </string-name>
          :
          <article-title>Models of information struggle</article-title>
          .
          <source>Math. Models Comput. Simul.</source>
          ,
          <volume>4</volume>
          (
          <issue>3</issue>
          ),
          <fpage>251</fpage>
          -
          <lpage>259</lpage>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Chkhartishvili</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gubanov</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Novikov</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          :
          <source>Social Networks: Models of Information Influence, Control and Confrontation</source>
          , vol.
          <volume>189</volume>
          . Springer (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Kozitsin</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chkhartishvili</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marchenko</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norkin</surname>
            ,
            <given-names>D.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osipov</surname>
            ,
            <given-names>S.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uteshev</surname>
            ,
            <given-names>I.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goiko</surname>
            <given-names>V.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Palkin</surname>
            <given-names>R.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Myagkov</surname>
            ,
            <given-names>M.G.</given-names>
          </string-name>
          :
          <article-title>Modeling Political Preferences of Russian Users Exemplified by the Social Network Vkontakte</article-title>
          .
          <source>Mathematical Models and Computer Simulations</source>
          ,
          <volume>12</volume>
          ,
          <fpage>185</fpage>
          -
          <lpage>194</lpage>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Chartishvili</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozitsin</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goiko</surname>
            ,
            <given-names>V.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saifulin</surname>
            ,
            <given-names>E.R.</given-names>
          </string-name>
          :
          <article-title>On an Approach to Measure the Level of Polarization of Individuals' Opinions. Twelfth International Conference "Management of large-scale system development"</article-title>
          <source>(MLSD)</source>
          , Moscow, Russia, pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/MLSD.
          <year>2019</year>
          .
          <volume>8911015</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kozitsin</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marchenko</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goiko</surname>
            ,
            <given-names>V.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Palkin</surname>
            ,
            <given-names>R.V.</given-names>
          </string-name>
          :
          <article-title>Symmetric Convex Mechanism of Opinion Formation Predicts Directions of Users' Opinions Trajectories. Twelfth International Conference "Management of large-scale system development"</article-title>
          <source>(MLSD)</source>
          , Moscow, Russia, pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/MLSD.
          <year>2019</year>
          .
          <volume>8911064</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Chkhartishvili</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gubanov</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          :
          <article-title>Influence Levels of Users and Meta-Users of a Social Network</article-title>
          .
          <source>Automation and Remote Control</source>
          .
          <volume>79</volume>
          (
          <issue>3</issue>
          ),
          <fpage>545</fpage>
          -
          <lpage>553</lpage>
          . doi:
          <volume>10</volume>
          .1134/S0005117918030128 (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Gubanov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Multidimensional Model of Opinion Polarization in Social Networks</article-title>
          .
          <source>Proceedings of the 12th International Conference "Management of Large-Scale System Development" (MLSD)</source>
          . Moscow, Russia: IEEE, pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/MLSD.
          <year>2019</year>
          .
          <volume>8910967</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Akhtyamova</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alexandrov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cardiff</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshulko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Opinion Mining on Small and Noisy Samples of Health-related Texts</article-title>
          .
          <source>Advances in Intelligent Systems and Computing III (Proc. of CSIT-2018)</source>
          , Springer, AISC, vol.
          <volume>871</volume>
          , pp.
          <fpage>379</fpage>
          -
          <lpage>390</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Akhtyamova</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cardiff</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>LM-Based Word Embedding's Improve Biomedical Named Entity Recognition: A Detailed Analysis</article-title>
          .
          <source>Bioinformatics and Biomedical Engineering. IWBBIO 2020. Lecture Notes in Computer Science</source>
          , vol
          <volume>12108</volume>
          . Springer, Cham, doi: 10.1007/978-3-
          <fpage>030</fpage>
          -45385-5_
          <fpage>56</fpage>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Boldyreva</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobolevskiy</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alexandrov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Danilova</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Creating collections of descriptors of events and processes based on Internet queries</article-title>
          .
          <source>Proc. of 14-th Mexican Intern. Conf. on Artif. Intell. (MICAI-2016)</source>
          , LNAI, vol.
          <volume>10061</volume>
          , pp.
          <fpage>303</fpage>
          -
          <lpage>314</lpage>
          , Springer, Cham, (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Boldyreva</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alexandrov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshulko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobolevskiy</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Queries to Internet as a tool for analysis of the regional police work and forecast of the crimes in regions</article-title>
          .
          <source>Proc. of 14-th Mexican Intern. Conf. on Artif. Intell. (MICAI-2016)</source>
          , LNAI, vol.
          <volume>10061</volume>
          , pp.
          <fpage>290</fpage>
          -
          <lpage>302</lpage>
          , Springer, Cham (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Petrov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Proncheva</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Propaganda Battle with Two-Component Agenda</article-title>
          .
          <source>Proc. of the MACSPro Workshop 2019</source>
          . Vienna, Austria, March
          <volume>21</volume>
          -23, CEUR Workshop Proceedings. Vol.
          <volume>478</volume>
          , pp.
          <fpage>28</fpage>
          -
          <lpage>38</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Petrov</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Proncheva</surname>
            ,
            <given-names>O.G.</given-names>
          </string-name>
          :
          <article-title>Modeling Position Selection by Individuals during Informational Warfare with a Two-Component Agenda</article-title>
          .
          <source>Mathematical Models and Computer Simulations</source>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ),
          <fpage>154</fpage>
          -
          <lpage>163</lpage>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Proncheva</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>A Model of Propaganda Battle with Individuals' Opinions on Topics Saliency. 13th International Conference "Management of large-scale system development"</article-title>
          <source>(MLSD)</source>
          , Moscow, Russia, pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/MLSD49919.
          <year>2020</year>
          .
          <volume>9247796</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>McCombs</surname>
            ,
            <given-names>M.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shaw</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          :
          <article-title>The agenda-setting function of mass media</article-title>
          .
          <source>Public opinion quarterly</source>
          ,
          <volume>36</volume>
          (
          <issue>2</issue>
          ),
          <fpage>176</fpage>
          -
          <lpage>187</lpage>
          (
          <year>1972</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>McCombs</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stroud</surname>
            ,
            <given-names>N.J.:</given-names>
          </string-name>
          <article-title>Psychology of agenda-setting effects: Mapping the paths of information processing</article-title>
          .
          <source>Review of Communication Research</source>
          ,
          <volume>2</volume>
          (
          <issue>1</issue>
          ),
          <fpage>68</fpage>
          -
          <lpage>93</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>