<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>and Peculiarities of System Design for Their Countermeasures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Markovets</string-name>
          <email>oleksandr.v.markovets@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola Buchyn</string-name>
          <email>mykola.a.buchyn@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anastasiia Kovalchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Taras Basyuk</string-name>
          <email>Taras.M.Basyuk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Russian Federation, Ukraine.</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Bandery Str. 12, 79013 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article includes the analysis of the peculiarities of the using information technologies by Russian Federation in the context of conducting information-psychological special operations in Ukraine at the present stage. Russian information-psychological operations' in Ukraine essence, peculiarities, aims, subjects, objects and distribution channels are disclosed. The periodization of the transformation stages of Russian information-psychological operations against Ukraine is disclosed. The role of modern media in spreading key messages in the context of conducting information-psychological operations in Ukraine is shown. The design of the system for analyzing posts in social media using an object-oriented approach was carried out. Informational technologies, information-psychological operations, messengers, information warfare, information security, cybersecurity, social media, manipulations, propaganda, 0813-0785 (T. Basyuk) ORCID: 0000-0001-8737-5929 (O. Markovets); 0000-0001-9087-5123 (M. Buchyn); 0000-0002-8462-8705 (A. Kovalchuk); 0000-0003Proceedings</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The confrontation between states is an integral element of modern international system. Since the
emergence of the first political entities its leaders sought to find new effective methods of neutralizing
and subjugate opponents. The development of information technologies and increasing role of
information in society caused the advent of new techniques of information flows manipulating, which
allow changing the object’s of influence mind, values and even the model of behavior.</p>
      <p>Information-psychological special operations (next – IPOs) were an important part of states’
foreign policy yet in the XX century. Over the time the role of IPOs as an instrument of achieving
governments’ hidden purpose has only been increasing. Information influence was mostly used in the
USA and the USSR. After the collapse the Soviet Union became an active subject of conducting
information-psychological operations. The state didn’t only become the successor of the USSR, but
also inherited and developed all the propaganda methods of waging information warfare against its
geopolitical opponents.</p>
      <p>One of the vivid examples of waging hybrid warfare is Russian information warfare against
Ukraine, in the frames of which the government of the Russian Federation systematically exerts
influence on Ukrainian political leadership and population. In this context the research of the essence
and
peculiarities of information-psychological operations conducted by</p>
      <sec id="sec-1-1">
        <title>Russia will allow to understand the official Moscow’s key goals and objectives in Ukraine as well as highlight information</title>
        <p>2023 Copyright for this paper by its authors.
CEUR</p>
        <p>ceur-ws.org
methods of its implementations for further development of techniques to counter Russian information
aggression.</p>
        <p>The purpose of the study – is to carry out a comprehensive analysis of the problem of Russian
information and psychological special operations in Ukraine and the features of designing a system
for countering them.</p>
        <p>Research hypothesis – the Russian Federation is currently actively using information and
psychological special operations against Ukraine, which pose a significant threat to national security
and require the design of a system to counter them.</p>
        <p>The following methods were used during the research: logical: analysis, synthesis, induction,
deduction; general scientific: historical - to highlight the evolution of Russia's use of IPOs methods in
Ukraine; systemic - for consideration of IPOs as a complete system of forms and methods of
information influence; structural and functional - to clarify the structure of the IPOs and the
peculiarities of the impact of their individual elements: comparative - to compare the goals and means
of the IPOs of the Russian Federation in Ukraine from 2000 to today; modeling – for designing a
system to counteract Russia's use of IPOs against Ukraine; empirical: the method of document
analysis - to determine the regulatory and legal regulation of information influence in the Russian
Federation; qualitative and quantitative content analysis - to identify the key messages of Russian
propaganda and disinformation at the current stage.</p>
        <p>The work includes an introduction, analysis of the source base, the main part, which includes 4
subsections and highlights the main results of the research, conclusions, a list of used literature.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>Despite the novelty, information-psychological special operations became the object of research
for many scientists, experts and specialists in the field of information technologies. Taking into
account the applied nature and the modernity of the described events, the source base of our research
includes both scientific publications and analytical materials or news, which reveal certain facts about
the use of information-psychological special operations by the Russian Federation.</p>
      <p>
        Literature on the topic of the research can be divided into two groups. The first concerns the
disclosure of general concepts, related to information-psychological operations or related categories.
Thus group includes the researches of information-psychological special operations as one of the
modern instruments of geopolitical confrontation [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]; information-psychological struggle and its
peculiarities [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]; theoretical approaches to defining information-psychological special operations [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ];
information-psychological influence, its exerting and methods of counteracting [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]; analysis and
implementation of information-psychological operations in the context of waging hybrid warfare [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ];
information-psychological special operations as a challenge to states’ security and protection [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ];
psychological operations, its techniques, tactics and procedures of realization [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        This group of sources should also include research on the specifics of information-psychological
special operations and mechanisms of countering informational and psychological influence. In this
context, it is worth mentioning the works devoted to the issue of information security in the frames of
waging a hybrid war and the role of journalism in it [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]; research on information resistance as a
mean of countering socio-psychological strategies of information warfare [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]; analysis of the
information war on a global scale and its cognitive effects [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]; research of the mechanisms of
countering fake information, which is the key to ensuring the information security of any state [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ];
research of information as a modern geopolitical weapon [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]; analysis of behavior in social networks
and manipulation of public opinion [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], etc.
      </p>
      <p>Considering the fact, that the information-psychological special operations are most widely and
effectively used to correct the results of the will of citizens during elections, a number of literary
sources refer to the analysis of the impact of information-psychological special operations on the
election process and democracy, and especially in the context of the security threats during the use of
electronic voting [17], [18].</p>
      <p>Another group of literary sources refer to the practice of information-psychological operations
conducted by the Russian Federation. On the one side, this group includes the literature, which
generally characterize the Russian Federation as the subject of information-psychological special
operations at the present [19], [20], [21]; reveals the anatomy of Russian disinformation [22];
examines Russian Internet policy as network authoritarianism and the mechanism of using
information as a geopolitical tool [23]; reveals Russia's information war against the West through the
Russian government's use of hacking, propaganda and election manipulation [24]. On the other side,
this group also consists of researches of peculiarities of conducting information-psychological special
operations against Ukraine. In particular, it goes about the general analysis of Russian information
campaigns against Ukraine [25]; research of the reasons of an aggressive behavior and the full-scale
invasion on the territory of Ukraine on the 24th of February 2022 [26]; disclosure of the features of
disinformation in the media space during the war in Ukraine, aimed at forming the opinion that the
culprit of Russia's invasion of Ukraine is the USA, NATO and Ukrainian society [27]; field studies of
disinformation during the Russian-Ukrainian war through the prism of the perception and opinion of
the Ukrainian population regarding the manipulation of information [28], etc.</p>
      <p>The basis of the source base of the research are the works of Ukrainian and foreign researches,
analytical reports of NATO, field manuals of the Armed Forces of the USA, legislation of the Russian
Federation as well as publications of the online newspapers. At the same time, despite considerable
attention to the problem of the information and psychological influence of the Russian Federation in
foreign countries, the studying of the Russian IPO in Ukraine from the 2000s to now remains
fragmented, and therefore requires deeper and more careful analysis.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Results and Discussion</title>
    </sec>
    <sec id="sec-4">
      <title>3.1. Concepts and types of information-psychological operations</title>
      <p>Information- psychological special operations is one of the examples of selective and purposeful
use of information flows in order to influence the target audience. It should be mentioned, that in
foreign sources (mostly English-language) the separate forms and abbreviations of the concept are
used: «PSYOPS» - psychological operations and «IO» - information operations, as well as «IPO»
information-psychological operation.</p>
      <p>
        The evolution of the means of information and psychological influence as well as differences in its
exerting in different states caused the emergence of various approaches to definition of the concept
“information-psychological special operations”. The origin of the term is associated with the creation
of the propaganda division led by the military intelligence of the American Expeditionary Force in
1918, and its first used – with the surrender messages sent to the Japanese mainland in 1945. The term
remained generic for decades, despite the fact its components were actively used by the countries of
the world [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        The official definition of “psychological operations” was firstly established in the field manual of
the Armed Forces of the USA in 1979. It was mentioned, that the psychological operation
encompasses political, military, economic and ideological actions, which are planned and conducted
with the aim of creating in neutral, friendly and hostile foreign groups emotions, attitudes or behavior,
favorable for the achievement of national goals [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        One of the modern definitions, suggested by Ukrainian researchers V. Zhadko and Y.
Kharytonenko explains IPOs as the planned use of technologies and means of spreading information
for influencing the people’s mind in a broad sense; and as an instrument of influence, which is
practically used during combat operations with the aim to demoralize opponent – in narrow sense [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
According to the statements of Russian scientists A. Manoilo, A. Petrenko, D. Frolov, V. Veprintsev
IPOs – the complex of measures to manipulate the information flows in order to achieve advantage
over the enemy. Ukrainian researcher H. Pocheptsov explains such operations as communicative
technologies, which change the behavior and the mind of people by influencing psychological state of
the target audience [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>Definition of IPOs
Political, military, economic, ideological actions</p>
      <p>Goal of the IPOs</p>
      <p>Creation of emotions, attitudes or behavior,
Planned use of technologies and means of</p>
      <p>spreading information
Instrument of influence during combat</p>
      <p>operations
Complex of measures of the information flows</p>
      <p>manipulations
Communicative technologies
which is favorable for the achievement of</p>
      <p>national goals</p>
      <p>Influencing the people’s mind</p>
      <p>Demoralization of the opponents</p>
      <p>Achievement the advantage over the enemy
Change of the people’s behavior by influencing
the target audience’s psychological state</p>
      <p>
        One more definition was suggested by NATO and the US Ministry of Defense. It separates the
concepts “psychological” (PSYOP) and “information” (IO) operations. ІО is explained as integral use
of information possibilities during combat operations in order to influence, obstruct, corrupt and usurp
decision-making of actual and potential adversaries with the simultaneous protection of the domestic
one. IO is first of all military activities in information space, which has exactly defined goals, and also
includes offensive and defensive measures aimed at influencing the opponents decisions and
manipulating information and information systems. Instead psychological operations are the
preplanned activities, which involve the use of communication methods and the other resources on the
target audience to influence their attitude, behavior, perception and interpretation of the reality. It is
emphasized that PSO is build on a certain psychological theme (a prepared narrative or idea), and the
greater the sensitivity of the target audience to the topic or tool of PSYOP, the greater the probability
of success of the operation. In accordance to the mentioned above, PSYOPs are conducted in
peacetime, and IO – during military operations [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Influence, obstruction,
corrupting, usurping the
decisionmaking with the simultaneous
protection of the domestic one.</p>
      <p>Manipulation of information
Context of application</p>
      <p>During military operations</p>
      <p>Psychological operations
Pre-planned activity, which</p>
      <p>includes application of
communicative methods</p>
      <p>Influence on the target
audience’s attitudes, behavior,
perception and interpretation of</p>
      <p>the reality.</p>
      <p>Preparation and spreading the
narratives and ideas</p>
      <p>Peacetime</p>
      <p>In our opinion, information-psychological special operations should be understood as the complex
of particular actions, which has relevant information spreading and interpretation, involves
manipulation, misrepresentation, and aims to shape the object’s certain emotional and psychological
state and reactions, needed by the subject.</p>
      <p>It should be mentioned, the term IPOs is often used in the context together with the concept
“information warfare”, which unlike IPOs is more strategic in nature. Thus, it can be argued that
information warfare is a complex of information and psychological special operations.</p>
      <p>
        Modern researchers distinguish offensive and defensive IPOs (although a significant part of such
operations is mixed). By the goals and orientation, the operations aimed at making the decisions
required by the customer, obtaining or demonstrating compromising material, disrupting the political
system and/or society, as well as destabilizing the opponent are also identified. Short-term (up to 2
weeks), medium-term (up to a month) and long-term (more than 4 weeks) are distinguished by the
criterion of duration [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        In the Allied Doctrine on Psychological Operations, developed by NATO, the following categories
of IPOs are defined: strategic (planned operations to gain support and strengthen cooperation with
friendly and neutral audiences as well as weaken the capabilities and desire of enemy audiences to
carry out aggressive actions); crisis (operations, which are the part of the settlement of crisis situations
and are conducted to create a favorable atmosphere and desire for cooperation between the parties to
the conflict and the civilian population); military (as part of combat operations against a defined target
audience in order to defeat the enemy or eliminate his desire to continue aggression) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
3.2. Goals, methods and forms of conducting information-psychological
special operations
      </p>
      <p>
        According to the statements of V. Horbulin, the main goal of IPOs is the manipulation of the target
audience’s consciousness. And the tasks can be the following: changing or fixing in the people’s
consciousness particular views and ideas, misinforming and intimidating the population, as well as
weakening the existing beliefs, which form the basis of society. Another scientists V. Petryk
distinguishes such goals as: inducement to make decision beneficial to the initiator, obtaining
compromising material for its further use and destabilization of the social/political/economic order
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Considering the fact, that IPOs are conducted in both peace- and wartime, the following
distribution of operation tasks can be made. In peacetime: destabilization of socio-political situation in
the country; demoralization of the civilian population and the military; creating and aggravating
contradiction between political forces, creating prerequisites for a social explosion. In wartime:
undermining the psychological and morale of the opponent’s army; creation and exacerbation of
contradictions between the military, society and political forces; supporting the opposition and
inciting it to confront the authorities [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Based on the analyzed approaches to defining IPOs, the following goals of the
informationpsychological special operations can be distinguished (see Figure 1).</p>
      <p>Spreading
disinformatio</p>
      <p>n
Inducement
to make the
particular
decisions</p>
      <p>Demoralization
of society</p>
      <p>Change of the</p>
      <p>basic
society’s
values
Main goals
of IPOs</p>
      <p>Intimidation</p>
      <p>Destabilizatio
n of the
society</p>
      <p>Ensuring
victory in the
elections to
the right
politicians
Shaping the
subject’s
positive
image</p>
      <p>Shaping the
opponents’
negative
external
image</p>
      <p>
        The subjects of IPOs are the people and sources, which are directly engaged in exerting
information and psychological influence, in particular: political authorities and state special services,
media, non-governmental organizations, Internet-platform etc. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        The objects of IPOs (or the target audience) are the people or groups of people, whom the
specified influence is directed to. According to the US Field Statute “Psychological Operations,
Tactics, Techniques and Procedures”, published in 2003 there exist several types of the objects of
influence (see Table 4) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
Key communicators
      </p>
      <p>Characteristics of the objects of IPOs</p>
      <p>Small social groups, families and companies
Political or governmental structures, organizations and</p>
      <p>associations
Large groups of people who share certain demographic</p>
      <p>characteristics
A group of people identified only by a common geographic area
Individuals or small groups who may have significant power over</p>
      <p>others
Persons to whom members of the target audience address for the</p>
      <p>information or its interpretation</p>
      <p>The choice of the target audience varies depending on the type and purpose of the IPOs. In
general, the targets of IPOs are: military personnel (both authorities and soldiers), political leaders and
representatives of governmental structures, civilians, religious, ethnic and cultural groups, business
representatives, mass media, academic groups, public activists and non-governmental organizations.
The subjects of IPOs can influence both the audience in a foreign state and their own.</p>
      <p>
        The effectiveness of IPOs mostly depends on the right choice of channels for the distribution of
the narratives needed for the subjects. Among the main channels of spreading information for the
IPOs are the following (see Figure 2) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]:
      </p>
      <p>Television
Radio
Programs and</p>
      <p>special
applications</p>
      <p>Printed media</p>
      <p>Main
channels
(ways)
of spreading
information in</p>
      <p>IPOs</p>
      <p>Distributed
printed
materials</p>
      <p>Social media
Online
platforms
Specially
trained
communicator
s</p>
      <p>Outdoor
advertising</p>
      <p>
        Through these channels such methods of IPOs as disinformation, propaganda, psychological
pressure, spread of rumors, diversification of public opinion are applied [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Each of the mentioned
IPOs methods has its own characteristics and specific forms of practical application (see Table 5).
      </p>
      <p>mass activities of people.</p>
      <p>Purposeful distraction of the
political authorities’ attention of
the state (by artificially drawing
attention to a certain range of
problems), which prevent it from
concentrating on solving urgent
and important issues for the</p>
      <p>state and society.</p>
      <p>Intimidation of the object and
influence on his psyche forcing
him to act accordingly to a
certain pattern of behavior.</p>
      <p>Dissemination of information
(mostly disinformation) among
the masses though unofficial
channels to complicate the
object’s activities.</p>
      <p>Destabilization of the country or region;
Intensification of opposition movements;</p>
      <p>Publicity of scandalous court</p>
      <p>proceedings;</p>
      <p>Introduction of sanctions, etc.</p>
      <p>Dissemination of information about
existing or false threats;</p>
      <p>Blackmailing
Committing acts of terrorism and mass</p>
      <p>massacres;</p>
      <p>Taking hostages, etc.;
Dissemination of information to</p>
      <p>demoralize;
Dissemination of information to</p>
      <p>intimidate;
Dissemination of information to
disintegrate</p>
      <p>IPOs are often conducted during elections and are used as one of the forms of foreign interference
in the election process. It can be explained by the important role, the elections play in the
development of a democratic society, being the main attribute, indicator and catalyst of democracy
[29]. On the other hand, the results of elections define the strategic direction of each state’s
development. Thus, external influence on the election process and its results allows the aggressor to
achieve its global goals by conducting IPOs. It is especially common in terms of using
informationcommunicative technologies and electronic voting in particular, which must be reliably protected
from foreign information influence [17], [18].</p>
      <p>
        Fighting IPOs is an important issue for each state. However, the difficulty of сountering IPOs is in
the actual absence of the possibility of prosecuting the object of informational-psychological
operations as the characteristic features of information-psychological influence are its latency and the
absence of direct proves of aggression, with the simultaneous infliction of significant damage to the
target object without declaring was or terminating diplomatic relations. Another difficulty is an
identification of the primary sources of influence and determining the true intentions, means and
methods of the subjects’ actions [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Legal regulation of the information sphere as a mechanism for countering IPOs is also difficult.
This can be explained, in particular, by the low efficiency of such a mechanism. In addition, the high
level of legal regulation of the information sphere has a negative impact on the level of democracy
and freedom of speech, limiting, in this way, the possibilities for countering IPOs in democratic
countries.</p>
      <p>
        The implementation of countermeasures against informational and psychological influence at the
state level can be carried out by the implementation of counteroperations aimed at the opponents or
the implementation by specially developed state security policy. The negative impact can be
neutralized by conducting information-explanatory campaigns for the population, using all available
channels of information dissemination; delivering truthful information to citizens and the international
community about the actions of country’s political leaders and its military structures; monitoring the
information space and immediate responding to the identified active and potential subjects of
influence; the unification of society around national values and the integration of citizens for the joint
fight against external threats; forming positive image of the state and its political authorities, etc. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>However, some of the most effective and universal mechanisms for counteracting informational
and psychological influence are a high level of consciousness and culture of citizens, a high level of
awareness and intelligence of individuals, in particular, their information literacy, a high level of
critical thinking. These make individuals significantly less vulnerable to IPSO, minimize the
effectiveness of informational and psychological influence
.</p>
      <p>Formation of the
security strategy
Public exposure
of the evidence
of IPOs</p>
      <p>Informationexplanatory
campaigns
Mechanisms of
counteraction to</p>
      <p>IPOs</p>
      <p>Conducting
counteroperation</p>
      <p>Monitoring of
information</p>
      <p>space
Formation of
national values</p>
      <p>Formation of the
state’s positive
image</p>
    </sec>
    <sec id="sec-5">
      <title>3.3. The peculiarities operations in Ukraine of</title>
    </sec>
    <sec id="sec-6">
      <title>Russian information-psychological special</title>
      <p>After the collapse of the USSR, despite the factual end of the confrontation between the Soviet
Union and the USA, the competition in information sphere was increasing. At the times of B.
Yeltsyn’s presidency several strategic documents were published, in which it was mentioned, that
information and psychological operations became an integral element of the national security strategy.</p>
      <p>The new era of understanding the advantages of waging “information wars” started with the
coming to power in Russia of V. Putin in early 2000s. In the following years, a number of strategic
security documents, which highlighted the presence of information threats to Russia from other states,
seeking to dominate in the global information space in influence the government and the population
was noted. These documents also declared the need for countering the other states’ use of
technologies to achieve aggressive military and political goals as well as the key role of information
activities in Russian security strategy.</p>
      <p>The main reason for Russia's active use of IPOs at the current stage lies in the geopolitical interests
and imperial ambitions of the current Russian political elite. The effort to be one of the poles of
influence and to increase its dominance on the planet is realized, including, due to the spread of
informational and psychological influence both on its own audience and on the population of other
countries of the world.</p>
      <p>Since the restoration of Ukrainian independence, the country has also been informationally
influenced by the Russian Federation. Having studied the peculiarities of Russian IPOs in Ukraine
(including conducting content-analysis of Russian media), we consider it appropriate to define 4 main
periods: 2000-2007; 2008-2013; 2014-2021; from 2022 – till now.</p>
      <p>The beginning of the mentioned periodization from 2000, and not from 1991 (the period of the
collapse of the USSR), in our opinion, can be explained by the fact that during the presidency of B.
Yeltsin, the Russian political elite paid less attention to foreign policy interests due to the numerous
internal political problems. However, with V. Putin coming to power in Russia in 2000, imperial
foreign policy ambitions began to dominate. This led to the active use of IPOs. Therefore, the period
from 1991 to 2000, in the context of the issues we are investigating, can be considered a preparatory
stage for Russia’s future use of IPOs in general, and against Ukraine, in particular.</p>
      <p>
        2000-2007 years can be characterized as the stage of conceptual understanding and strategic
planning of the Russian further actions. V. Putin set the goal of “restoring the former great power”.
Since the early XX century the Russian Federation has been introducing hard “vertical” power and
making long-term investments in controlled media and non-governmental organizations, which could
be used as the instruments of soft power. In 2000s a significant part of Ukrainian heads of media
holdings had close ties with the Russian Federation. For example, New Channel and STB were owned
by the Russian Alfa Group and Lukoil, and in 2006 the UA. Inter Media Group Limited company was
sold to the Russian billionaire A. Abramov. In 2000-2005 the director of the ICTV Channel’s
information service was Russian journalist D. Kiselyov, who was the host of political talk-show
“National Interest” at the same time. A significant part of the TV programs and films broadcast by
Ukrainian channels was created together with Russian media groups of even borrowed: for a certain
time the Inter Channel aired the new programs of the First Channel, and Ukrainian TET was filled
with the content of Russian STS. Print mass media wasn’t left out the attention of the Russian
Federation: such newspapers as “Kommersant”, “Arguments and Facts”, “Komsomolsk Truth” were
actively published in Ukraine [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>During 2004-2007 years in the rhetoric of the Russian political elite, theses, saying that Ukraine
and Russian are parts of the same Orthodox civilization appear. Numerous public organizations,
including: Russian Movement of Ukraine, Russian Movement of the Crimes, Slavic Committee of
Ukraine, Russian Community, Ukrainian branch of the Institute of CIS Countries as well we
International Eurasian Movement (headed by A. Dugin) promoted such ideas. The aims of these
organizations were to impose pro-Russian views, spread dissatisfaction with Ukrainian policies
among Russian-speaking population, form a negative attitude of Ukrainians towards the integration
into the EU and NATO, conduct public actions and create the Russian image as the guarantor of the
protection of the Russian-speaking population, etc.</p>
      <p>
        The ideas of historic, cultural and religious unity of Ukraine and Russia were supported by the
representatives of the Russian Orthodox Church, the Ukrainian Orthodox Church of the Moscow
Patriarchate, “Black Hundred”, “United Fatherland”, the “Union of Orthodox Peoples”, etc. The
latter’s members actively spread the information, discrediting Ukraine in the Internet and participated
in mass protests [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>The coverage of the event of the Orange Revolution of 2004-2005 by the Russian media deserves
special attention. In October-December 2004, print and online publications accused the USA of
financing actions on the Independence Square and “interfering in the country’s foreign affairs”. In
addition, it was noted that the revolution was organized by Western supporters of V. Yushchenko and
did not reflect the interest of Russian-speaking part of the population [30].</p>
      <p>Until 2008-2009 it was possible to notice only some of the elements of Russian IPOs, which were
mostly aimed at maintaining the citizens’ loyalty to the Russian Federation, and so-called “reflexive
control” over the Ukrainian political elite, conducted by economic blackmailing (the
RussianUkrainian gas conflicts can be considered a vivid example of it).</p>
      <p>The intensification of Ukraine-EU interaction during the presidency of V. Yushchenko also
contributed to the increase in tension between the parties. In 2008 the Russian media criticized
Ukraine, claiming that “there is no basic order” there, and “the country’s acceptance into NATO and
the EU will mean the destabilization of the entire West”. Russian mass media began to broadcast
narratives about the destructiveness of European values and the threat of potential economic collapse
in Ukraine after the signing of the Association Agreement, simultaneously raising the issue of the
status of Russian language [25].</p>
      <p>Similar thesis actively circulated in the Ukrainian information space during the presidency term of
V. Yanukoych in 2010-2013. In the articles of Russian edition “Arguments and Facts in Ukraine”
there were phrases that “the integration of Ukraine into the EU will have serious negative impact on
the relations between Ukraine and Russia”, “Kyiv’s desire to “sit on two chairs” is vile”, “after
signing the Agreement, Ukraine will lose the right to vote and decide what laws to adopt, what tariffs
to set and how to interact with other unions – everything will be decided by the European
Commission”, “Russian-speaking population will not only suffer from great economic problems, but
also will become a victim of assimilation – a large piece is being separated from our common
civilizational space”, “in case of Ukraine’s accession to the EU, the Customs Union will take
protective measure, which will increase the deficit of Kyiv’s balance of payments to 15-16 billion
dollars. In 6 months, the state will become a bankrupt”. In 2012-2013 so-called “Internet-trolls” were
added to the list of means of Russian information influence, acting to create a positive coverage of
Russian government’s activities and suppress the opposition and discredit Western countries [19].</p>
      <p>The new era of Russian IPOs started in the beginning of 2014. Taking advantage of the moment of
internal tension in the country, Russian incited the population of the Crimea to revolt against the
“Kyiv regime” and lobbied for its interests in the governmental structures of the autonomous republic.
Since mid-January 2014, with the support of the Russian community of Crimea and the political party
“Russian Unity” self-defense units were formed on the territory of the peninsula as a force of popular
resistance. These units were financed by Russian political structures and supposed to oppose the
“banderians” and advocate the creation of Ruthenia in case of a coup d'état. On February 20, 2014 the
operation to seize Crimea by the “little green men” began and was actually completed by March 1st.
On the same day the self-proclaimed Head of the Council of Ministers of Crimea S. Aksyonov
appealed to the President of the Russian Federation with a request to contribute to the establishment
of “peace and tranquility”, and the Parliament of Russia adopted a decision on sending troops to the
territory of Ukraine. According to the version of Russian media, the seizure of administrative
buildings was carried out by “groups of people without identification marks” and the protests took
place between the “supporters” and the “opponents” of the new government in Ukraine. What is more
important, the latter demanded the extension of the powers of the autonomous republic and the repeal
of the law introducing the Ukrainian language as the only state language on its territory [21].</p>
      <p>In the frames of its informational operation Russian also limited the access of the Crimean
population to Ukrainian media: on March 6, 5th Channel, 1+1, Crima-24 were disconnected. Instead
of them Russia broadcast Russia-1. On March 9, all the Ukrainian television stations were switched
off. The President of the Russian Federation argued the feasibility of holding referendum and the
subsequent accession of Crimea to Russia in the following way: “Crimea has the same right to leave
Ukraine as Ukraine had – to leave the USSR”, “the Ukrainian authorities violate the rights of people
who speak Russian and Crimean Tatar”, “there is no legitimate executive power in Ukraine as the
current government is controlled by nationalists, Russophobes and anti-Semites” [31].</p>
      <p>The next period of Russian IPOs followed the beginning of hostilities in the east of Ukraine. The
scenario of the events was similar to the one used before in Crimea: Russia created and financed the
organizations and people’s militias, which opposed the current Ukrainian government. The absence of
identification marks, both in Crimea and in the east of Ukraine, gave Russia the opportunity to defend
the thesis, that the hostilities are internal civil conflict in Ukraine. The Russian government spread
propaganda accusing Ukrainian forces of shelling peaceful cities in Donbas. Therefore, Russian
disinformation channels increased their influence first of all among the population of Lughansk and
Donetsks People’s Republics and it continued to accuse the Ukrainian government in aggression. The
information campaigns of the Russian Federation were also used against the representatives of the
Armed Forces of Ukraine. The soldiers and military authorities received text messages, which
encouraged them to surrender, saying Ukrainian government does not need them.</p>
      <p>At the same time Russian sought to legitimize its actions in front of international community and
domestic audience. Thus, the annexation of Crimea and the proclamation of the so-called Lughansk
and Donetsks People’s Republics was positioned by the Russian government as “the right to
selfdetermination of peoples”. The President and the Russian representatives in international
organizations appealed to the provisions of the UN Charter and the Kosovo case, responding to
accusation with the thesis, that Western states apply double standards [25].</p>
      <p>In addition to militaries, international community and the population of the occupied territories,
Russian continued to put pressure on the residents of the rest of Ukrainian territory by launching a
cyber war. Since November 2013 (in addition to the active operations of the “bot farms”) Russian
hackers have systematically carried out attacks on state institutions, enterprises, energy companies,
and even ordinary websites and TV channels to obtain state information, destabilize the work of
structures and exert psychological influence on the population [30].</p>
      <p>On January 12, 2022 the Russian Federation made a number of demands to NATO. One of them
concerned the Alliance’s refusal of expansion and, in particular, the provision of guarantees that
Ukraine would not become a member of the organization. NATO’s refusal prompted the Russian
Federation to aggressive rhetoric. The state accused the bloc in threatening its national security [31].
In the media, Russia-NATO relations were described in the following way: “The relations between
Moscow and the Alliance are at critically low level on the background of terrorist threats, the
unfolding of arms race and the complete degradation of the security architecture in Europe… NATO’s
repeated disregard of Russian side’s initiatives regarding de-escalation creates the preconditions for
the emergence of conflicts and undermines the basics of security”. On February 21, V. Putin
recognized the independence of the Lughansk and Donetsk Republics, and in the morning of February
24, 2022 he announced the beginning of a special military operation in Ukraine. The “Special military
operation” was justified by the need to protect the residents of the Lughansk and Donetsk Republics
from the “genocide by the Kyiv regime” and its goals were defined as “demilitarization” and
“denazification” of Ukraine [26].</p>
      <p>Russian
authorities;
Cultural and</p>
      <p>religious
organizations;</p>
      <p>Pro-Russian
structures in</p>
      <p>Ukraine;</p>
      <p>Media (print
media, television,
radio, Internet);
Russian cultural</p>
      <p>heritage;
Political and
economic
blackmail;
Activities of
nongovernmental
organizations;
Propaganda in the</p>
      <p>media;
Impact through
soft power.</p>
      <p>Russian authorities;
Cultural and religious
organizations;</p>
      <p>Pro-Russian
structures in Ukraine;</p>
      <p>Law enforcement
structures of</p>
      <p>Ukraine;
Media (print media,
television, radio,</p>
      <p>Internet);</p>
      <p>Special Internet
“trolls” and “bots”.</p>
      <p>Political and
economic blackmail;</p>
      <p>Activities of
nongovernmental
organizations;
Propaganda in the
media (including
social media);</p>
      <p>Suppression of
groups disloyal to the
Russian Federation;</p>
      <p>Aggravation of
contradictions in</p>
      <p>Ukrainian society
regarding the vector</p>
      <p>of foreign policy
Russia and</p>
      <p>Ukraine are
brotherly nations
with a common
history and</p>
      <p>culture;</p>
      <p>Ukraine is the
“younger brother”
of Russia;</p>
      <p>EU policies and
values are immoral;
Ukrainian economy
will not withstand</p>
      <p>European
integration;
Joining the Customs
Union is a guarantee
of stability and</p>
      <p>Ukrainian military</p>
      <p>personnel;
International
community;
Russian authorities;
Cultural and religious</p>
      <p>organizations;
Pro-Russian structures</p>
      <p>in Ukraine;
Media (print media,
television, radio,</p>
      <p>Internet);
Special Internet “trolls”</p>
      <p>and “bots”;
Russian special military</p>
      <p>division;</p>
      <p>Representatives of
foreign countries loyal</p>
      <p>to Russia.</p>
      <p>Political blackmail;
Activities of
nongovernmental
organizations;
Propaganda and
disinformation in</p>
      <p>media;
Suppression of groups
disloyal to the Russian</p>
      <p>Federation;
False flag operations:</p>
      <p>Provocations;
Activities of agents of
influence and internet</p>
      <p>trolls;</p>
      <p>Cyber attacks;
Psychological pressure
on military personnel</p>
      <p>and civilians;
Propaganda and
disinformation on
international</p>
      <p>platforms;</p>
      <p>The annexation of</p>
      <p>Crimea is completely
legal and complies with</p>
      <p>the norms of
international law;
ATO is nothing but a
civil war in Ukraine;
Ukraine is waging a war
against the civilian</p>
      <p>Residents of the
occupied territories;</p>
      <p>International
community;
Russian authorities;
Cultural and religious</p>
      <p>organizations;
Media (print media,
television, radio,</p>
      <p>Internet);
Special Internet “trolls”</p>
      <p>and “bots”;
Russian special military</p>
      <p>division;</p>
      <p>Representatives of
foreign countries loyal
to Russia.</p>
      <p>Saboteurs;
Threats of using
nuclear weapons;
Psychological pressure
on military personnel
and civilians;</p>
      <p>Intimidation;
Propaganda and
disinformation in</p>
      <p>media;</p>
      <p>Provocations;
Activities of agents on
influence and internet</p>
      <p>trolls;
Propaganda and
disinformation on
international</p>
      <p>platforms;</p>
      <p>Cyber-attacks;
Persecution of
proUkrainian activists;</p>
      <p>Diversions.</p>
      <p>Ukraine is an aggressor
country, that posed</p>
      <p>threat to Russia;
Ukraine must be
de</p>
      <p>Nazified and
demilitarized;
Russia is fighting</p>
      <p>against NATO;
Ukrainian political</p>
      <p>Ukraine and
Russia are united
by strong
economic
connections;
Economic collapse
awaits Ukraine</p>
      <p>without the
support of Russia.</p>
      <p>development;</p>
      <p>Euromaidan is
organized by Nazis
and Bandera people;
population of the</p>
      <p>L/DPR;</p>
      <p>Ukrainian political
authorities are corrupt
and ineffective;
authorities are
exacerbating the
conflict and do not
want to sit down at the
negotiating table.</p>
      <p>The strategy of Russian IPOs in Ukraine (including the ones, which were used after the February
24, 2022) was based on 4 main information technologies (so-called “4 Ds”): demoralization,
discreditation, destabilization, disinformation [20]. Demoralization of the army was achieved by
conducting cyber-attacks on the information networks of the Armed Forces, state structures, and
Ukrainian mass media. Through damaged communication channels Russian propaganda broadcast
“classic” messages, discrediting the image of the Ukrainian authorities as well as encouraging military
to lay down the arms and surrender. The influence on the civilian population of Ukraine was carried
out by the use of manipulative techniques in the mass media, in particular, through social media, in
which the Internet trolls and bots actively continued their activities. The new tasks of the latter were
discrediting the Ukrainian government and its ability to counter aggression, positioning the power of
the Russian Federation and inciting internal conflicts in the country. One more element of the
demoralization of Ukrainian civilians was the direct use of psychological pressure, which prompted
them to consider the possibility of ending the war at any cost. The examples of the pressure are
dropping bombs on the theater in Mariupol and the Kramatorsk railway station, the actions of the
occupying forces in the captured territories, shelling the colony in Olenivka and residential buildings
in the cities, causing damage to critical infrastructure, etc.</p>
      <p>Among the information technologies, used by Russian in its IPOs in Ukraine, the following should
be highlighted [20].</p>
      <p>Replacing general terms with a
negative meaning with those that are</p>
      <p>perceived positively or neutrally.</p>
      <p>Accusing the enemy of what they are</p>
      <p>accused of.</p>
      <p>Creating a message that evokes a
strong emotion and calls for its</p>
      <p>distribution.</p>
      <p>Quoting famous people to support</p>
      <p>arguments.</p>
      <p>Dissemination of information in order
to create negative and panicky
moods among the population.</p>
      <p>The formation of a certain stereotype
in public consciousness
hostilities in the East of Ukraine = civil</p>
      <p>war;
foreigners fighting in Ukraine =</p>
      <p>mercenaries.</p>
      <p>Description of the crimes of the
Russians in Buch as a production.</p>
      <p>The intentions of the Russian
Federation regarding mass shelling.</p>
      <p>Report of the French TV channel TF1.</p>
      <p>The announcement that Ukraine</p>
      <p>plans to create a squad of
"punishers" who will kill citizens loyal</p>
      <p>to the Russian Federation.</p>
      <p>Creating an image of Ukrainian
servicemen as "militants" and
"neoThe primacy effect</p>
      <p>Rationalization</p>
      <p>Priority distribution of the version
that will reach a large audience and
have a better chance of dominating</p>
      <p>public opinion.</p>
      <p>Denying one's guilt and striving to
prove one's right with logical
arguments</p>
      <p>Nazis".</p>
      <p>Russia is at war with NATO.</p>
      <p>The Russian Federation started a war
in Ukraine because of a threat from</p>
      <p>NATO.</p>
      <p>The methods of Russian IPOs after the beginning of the full-scale invasion have remained
unchanged since 2014: disinformation, cyber-attacks, provocations, activities of agents of influence,
spreading rumors, psychological pressure, etc.</p>
      <p>Social media and communication platforms became an important tool for spreading IPOs by
Russia. In this context, the authors conducted a content analysis of several pro-Russian Telegram
channels regarding the level and characteristics of the spread of IPOs in Ukraine after the beginning
of the full-scale invasion. The content analysis was carried out during the first half of 2023.</p>
    </sec>
    <sec id="sec-7">
      <title>Designing a system for analyzing posts in social media</title>
      <p>The conducted analysis shows, that the number of users of social media and Telegram channels is
about 5 billion today, and this number continues to grow. These statistics clearly show that virtual
platforms for communication of interaction are very popular and have a huge audience. This means
that extremely large volumes of public information are created in such places, which can and should
be monitored. Carrying out such processed manually is extremely difficult. For this, you need to hire
Open</p>
      <p>Ukraine|
Открытая
Украина
There is no
information
+
+
+
+
+
+
+</p>
      <sec id="sec-7-1">
        <title>There is no information 903 944</title>
        <p>whole departments that would select the necessary messages, so this process is very expensive and
inefficient. In this case, it is proposed to create a system of analysis of posts in social media for
effective monitoring of possible illegal actions.</p>
        <p>In order to effectively design software, it is necessary to design it using an object-oriented
approach and deep neutral networks [32]. Therefore, we will start specifying that functioning by
constructing a diagram of use cases [33]. This diagram is used to represent a system as a set of actors
that interact with each other through use cases. The diagram of options for using the designed system
is presented in Figure 4.</p>
        <p>Since the system is planned to be developed using an object-oriented paradigm, the next step is to
create a class diagram. Figure 5 shows the class diagram of the designed system.</p>
        <p>As we can see in Figure 5, the system consists of the following main classes:
• Posts – an entity class that stores post data;
• User – an entity class that stores information about the user;
• DBContext – a class needed to create and work with a database based on the Entity
Framework;
• UserRepository – a class designed to provide methods for basic operations with the user table
in the database;
• PostsRepository - a class that is designed to provide methods for basic operations with the
table of posts in the database;
• UnitOfWork – the main task of this class is to ensure the display of changes in the database in
the form of a transaction;
• PostsWorker – responsible for working with posts from social media and their further
presentation in the form of an ontology [34];
• FileWorker – required for reading, saving and parsing data;
• WebAPIController – provides web controllers that process client http requests;
• SocialMedia – needed to organize access to social media.</p>
        <p>In order to understand the features of the display of objects involved in the system and the order of
message transmission between them, a sequence diagram was developed. For the designed system, the
sequence diagram is shown in Figure 6.</p>
        <p>As you can see from Figure 6, we have four main objects that interact, in particular:
• User – a person who uses the system.
• System is a software tool that implements the basic business logic.
• DataBase – a place where all data necessary for functioning is stored.
• SocialMedia - is not an internal object of the system, but the system interacts with it as it
sends a request to receive the necessary posts.</p>
        <p>The next stage in the design process is the creation of the system architecture. In general, the
following options can be chosen:
• Monolithic application - all processes take place on the user's device. The advantage of this
approach is a smaller number of requests, so the disadvantage is that all calculations take place on
the user's device, which leads to an additional load on the client side. This can lead to undesirable
delays related to the performance of the platform.
• Client-server application - the system is divided into two main components - this is the server
side, where all business logic and data storage is implemented; the server itself can be represented
by several machines that will share the load among themselves; the client side is an application
that is installed on the user's device and provides him with an interface for interacting with the
system. This approach requires a greater number of requests. But it also has significant advantages,
which are the possibility of easy scaling, since all calculations and requests are processed by a
separate physical component. If necessary, their number and as the result performance can be
increased. The specified architecture also allows reducing the load on the user's personal device.
which will only visualize the received data from the server.</p>
        <p>In view of the conducted analysis, it was decided to use the client-server method of building the
system architecture, which will give it flexibility, scalability and reduce the load on the client side. An
example of such an architecture is presented in Figure 7.</p>
        <p>The next stage of the research will be the construction of a system for analyzing posts in social
media using modern software tools.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>4. Conclusions</title>
      <p>The development of information technologies and increasing of role of information contributed to
the emergence of ways for states to use information flows in order to achieve certain political goals.
Therefore, IPOs have become an important tool for influencing the domestic and foreign audiences. In
Ukrainian studies the concept “IPOs” is defined as a planned use of technologies and means of
information dissemination and as a tool of influence on society. Western terminology separates
informational and psychological operations, which are carried out during military operations and
peacetime, respectively.</p>
      <p>The purpose of IPOs is to manipulate the consciousness of the target object in order to change its
beliefs, impose a certain model of behavior or make a decision beneficial to the object. Subjects in
such operations are any people and sources, that directly exert influence (e. g. political authorities,
mass media, non-governmental organizations, special services, etc.). Instead, the object is those at
who this influence is aimed (e. g. military or political authorities, civilian population, religious or
ethnic groups, mass media, public activities, etc.). Disinformation, propaganda, diversification of
public opinion, psychological pressure, rumors, etc., are among the methods of influence.</p>
      <p>Russia’s intensive use of information and psychological influence practices began in the 2000s.
Since then, the Russian Federation has enshrined the need to conduct information campaigns abroad
in the legislature, explaining it by a threat from Western countries and the need for protection of the
Russian information space in the states of the post-Soviet space. Modern Russian information and
psychological operations are directed both inside the state and at the audience of foreign countries.
Russian citizens are forced to be loyal to the authorities, limiting their access to foreign sources of
information at the legislative level, suppressing any manifestations of opposition and broadcasting
propaganda through mass media. Instead, foreign audience is exposed through a wide range of “active
measure” that include disinformation, sabotage, underground and intelligence activities, etc.</p>
      <p>Russian IPOs in Ukraine are a vivid example of Russian information technologies in the
postSoviet space, which, according to the statements of Russian authorities, should remain Moscow’s
sphere of influence. Prior to the intensification of the state’s cooperation with the EU and NATO, the
Russian government mainly used soft power, emphasizing the unity of historical and cultural heritage.
In 2008, after the invasion of Georgia, the Russian government intensively worked to increase its
influence over the Ukrainian community and prevent its European integration, broadcasting
propaganda about the "economic consequences of joining the Union." The Revolution of Dignity and
the destabilization of the political situation in the country were used by Russia to carry out a number
of foreign flag operations, the annexation of Crimea and the declaration of L/DPR. The beginning of
the anti-terrorist operation and the continuation of Ukraine's course to join the EU was characterized
by the use of new methods of pressure on the country, in particular cyber-attacks, psychological
pressure on the military and the civilian population, and disinformation through the media and
diplomacy. After the start of the full-scale invasion, the IPSO focused on disinformation and
demoralization of Ukrainian society, pushing it to end the war on Moscow's terms.</p>
    </sec>
    <sec id="sec-9">
      <title>5. References</title>
      <p>[17] O. Markovets, M. Buchyn, Threats of the implementation of e-voting and methods of their
neutralization, CEUR Workshop Proceedings 3296 (2022) 29-39. URL:
https://ceur-ws.org/Vol3296/paper3.pdf.
[18] M. Buchyn, A. Helesh, B. Shubyn, Information Security During Electronic Voting: Threats and
Mechanisms for Ensuring, in: 2021 IEEE 4th International Conference on Advanced Information
and Communication Technologies (AICT), Lviv, Ukraine, 2021, pp. 266-269. doi:
10.1109/AICT52120.2021.9628971.
[19] C. Paul, M. Matthews The Russian “Firehose of Falsehood” Propaganda Model', RAND</p>
      <p>Corporation, 2016. URL: https://www.rand.org/pubs/perspectives/PE198.html.
[20] PSYOPS Are Russia’s Way to Save On Conventional Weapons – DI. Instytut masovoi
informatsii, 2023. URL:
https://imi.org.ua/en/news/psyops-are-russia-s-way-to-save-onconventional-weapons-di-i50384.
[21] Units of psychological operations of the Russian army [Pidrozdily psykholohichnykh operatsii
rosiiskoi armii], Military, 2020. URL:
https://mil.in.ua/uk/articles/pidrozdily-psyhologichnyhoperatsij-rosijskoyi-armiyi/. [in Ukrainian]
[22] G. Colom-Piella, The anatomy of Russian disinformation, Historia y Comunicación Social 25(2)
(2020). doi: https://doi.org/10.5209/hics.63373.
[23] N. Maréchal, Networked Authoritarianism and the Geopolitics of Information: Understanding
Russian Internet Policy, Media and Communication 5(1) (2017). doi:
https://doi.org/10.17645/mac.v5i1.808.
[24] M. Wehner, Hacking, propaganda and electoral manipulation. Moscow’s information war on the
West, EUROZINE, 2017. URL:
https://www.eurozine.com/hacking-propaganda-and-electoralmanipulation-2/.
[25] Analysis of Russia’s Information Campaign Against Ukraine, The NATO StratCom Centre of
Excellence, 2015. URL:
https://stratcomcoe.org/cuploads/pfiles/russian_information_campaign_public_12012016fin.pdf.
[26] E. Lazareva, Why Putin started military operation against Ukraine, 2022. URL:
https://ura.news/articles/1036284030. [in Ukrainian]
[27] M. Musiał-Karg, A. Łukasik-Turecka, Disinformation in the media space during the war in
Ukraine. How did Kremlin’s fake news blame Ukraine, the USA and NATO for the invasion, in:
The War in Ukraine. (Dis)information – Perception – Attitudes, 2023, pp.13-38.
[28] L. Martín-Romo, M. Oliveros-Mediavilla, E. Vaquerizo-Domínguez, Perception and opinion of
the Ukrainian population regarding information manipulation: A field study on disinformation in
the Ukrainian war, Profesional de la informacion 32(4) (2023). URL:
https://revista.profesionaldelainformacion.com/index.php/EPI/article/view/87245/63445.
[29] M. Buchyn, Peculiarities and problems of measuring the level of democratic elections, Balkan</p>
      <p>Social Science Review 21 (2023) 105–125. doi: 10.46763/BSSR2321105b.
[30] S. Ctetsenko, Russia and cyber attacks. Ukraine shared cyber defense experience with Czech
colleagues [Rosiia i kiberataky. Ukraina podilylasia dosvidom kiberzakhystu z cheskymy
kolehamy], Radio Svoboda, 2018. URL: https://www.radiosvoboda.org/a/29656549.html. [in
Ukrainian]
[31] Russia formulated the response to the US and NATO regarding “security guarantees” [Rosiia
sformuliuvala vidpovid SShA i NATO shchodo “harantii bezpeky”], Ukrainska pravda, 2022.</p>
      <p>URL: https://www.pravda.com.ua/news/2022/02/14/7323955/. [in Ukrainian]
[32] O. Mediakov T.Basyuk, Specifics of Designing and Construction of the System for Deep Neural
Networks Generation, CEUR Workshop Proceedings 3171 (2022) 1282–1296. URL:
https://ceur-ws.org/Vol-3171/paper94.pdf.
[33] P. Mrzyglocki, UML Summarized: Key Concepts and Diagrams for Software Engineers,</p>
      <p>Architects and Designers, Independently published, 2023.
[34] T. Basyuk, A.Vasyliuk, Approach to a subject area ontology visualization system creating,
CEUR Workshop Proceedings 2870 (2022) 528–540. URL:
https://ceur-ws.org/Vol2870/paper39.pdf.
[35] J. Esterkin, Client-server architecture. URL:
https://openclassrooms.com/en/courses/6397806design-your-software-architecture-using-industry-standard-patterns/6896156-client-serverarchitecture.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Ya</surname>
          </string-name>
          . Derkachenko,
          <article-title>Information-psychological operations as a modern tool of geopolitics [Informatsiino-psykholohichni operatsii yak suchasnyi instrument heopolityky]</article-title>
          ,
          <source>GOAL</source>
          ,
          <year>2016</year>
          . URL: https://goal-int.
          <article-title>org/informacijno-psixologichni-operacii-yak-suchasnij-instrumentgeopolitiki/</article-title>
          . [in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V. M.</given-names>
            <surname>Petryk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Bed</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Prysiazhniuk</surname>
          </string-name>
          ,
          <article-title>Information and psychological confrontation [Informatsiino-psykholohichne protyborstvo]</article-title>
          , 2nd ed.,
          <source>PAT «VIPOL»</source>
          , Kyiv. [in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Yu</surname>
          </string-name>
          . Tverdokhlib,
          <article-title>Theoretical approach to the research of information and psychological operations [Teoretychni pidkhody do doslidzhennia informatsiino-psykholohichnykh operatsii], Epistemological studies in Philosophy, Social and</article-title>
          Political Sciences,
          <volume>2</volume>
          (
          <issue>2</issue>
          ) (
          <year>2019</year>
          )
          <fpage>122</fpage>
          -
          <lpage>131</lpage>
          . URL: https://visnukpfs.dp.ua/index.php/PFS/article/view/983/1404. [in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Umanets</surname>
          </string-name>
          ,
          <article-title>Information-psychological influence: concepts, peculiarities of implementation and countermeasures [Informatsiino-psykholohichni vplyvy: poniattia, osoblyvosti realizatsii ta sposoby protydii]</article-title>
          ,
          <source>TNU Vernadskoho 33(2)</source>
          (
          <year>2022</year>
          )
          <fpage>106</fpage>
          -
          <lpage>112</lpage>
          . URL: http://psych.vernadskyjournals.in.ua/journal/3_2022/18.pdf. [in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>I. Yu. Yuzova,</surname>
          </string-name>
          <article-title>Analysis of organization and conducting information-psychological operations during hybrid warfare [Analiz orhanizatsii ta vedennia informatsiino-psykholohichnykh operatsii pry vedenni hibrydnoi viiny]</article-title>
          ,
          <source>KhNU im. I. Kozheduba</source>
          <volume>2</volume>
          (
          <issue>64</issue>
          ) (
          <year>2020</year>
          )
          <fpage>40</fpage>
          -
          <lpage>44</lpage>
          . [in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Vejvodova</surname>
          </string-name>
          ,
          <article-title>Information and Psychological Operations as a Challenge to a Security and Defence</article-title>
          ,
          <source>Vojenske rozhledy 3</source>
          (
          <year>2019</year>
          )
          <fpage>83</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>[7] An overview of psychological operations (PSYOP)</article-title>
          , Federal Research Division, Library of Congress, Washington DC,
          <year>1989</year>
          . URL: https://apps.dtic.mil/sti/pdfs/ADA302389.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <source>[8] AJP-3.10</source>
          .
          <article-title>1 (A) Allied Joint Doctrine for Psychological Operations</article-title>
          . NATO/PfP Unclassified publication,
          <year>2007</year>
          . URL: https://info.publicintelligence.net/NATO-PSYOPS.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <source>[9] FM 3-05.301/MCRP 3-40.6A Psychological Operations</source>
          , Tactics, Techniques and Procedures. Headquarters. Department of the Army, Washington DC,
          <year>2003</year>
          . URL: https://irp.fas.org/doddir/army/fm3-05-301.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>FM</surname>
            33-1
            <given-names>Psychological</given-names>
          </string-name>
          <string-name>
            <surname>Operations</surname>
          </string-name>
          . Headquarters. Department of the Army, Washington DC,
          <year>1979</year>
          . URL: https://irp.fas.org/doddir/army/fm33-
          <fpage>1</fpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Zhadko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Klymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kulias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Markiv</surname>
          </string-name>
          ,
          <article-title>Hybrid warfare and jourmalism. Issues of information security [Hibrydna viina i zhurnalistyka. Problemy informatsiinoi bezpeky], Kyiv, NPU im</article-title>
          . M. P. Drahomanova,
          <year>2018</year>
          . [in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lebid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Vashyst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nazarov</surname>
          </string-name>
          ,
          <article-title>Information Resilience as a Means of Countering the SocioPsychological Strategies of Information Wars</article-title>
          ,
          <source>International Journal of Media &amp; Information Literacy</source>
          <volume>7</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>157</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>T.</given-names>
            <surname>Clack</surname>
          </string-name>
          , R. Johnson, The World Information War. Western Resilience, Campaigning, and
          <string-name>
            <given-names>Cognitive</given-names>
            <surname>Effects</surname>
          </string-name>
          , Routledge, London,
          <year>2021</year>
          . doi: https://doi.org/10.4324/9781003046905.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Svintsytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Semeniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ufimtseva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Irkha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Suslin</surname>
          </string-name>
          ,
          <article-title>Countering fake information as a guarantee of state information security</article-title>
          ,
          <source>Security Journal</source>
          <volume>36</volume>
          (
          <year>2023</year>
          )
          <fpage>427</fpage>
          -
          <lpage>442</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Olchowski</surname>
          </string-name>
          , How to Weaponise Information, in Disinformation,
          <source>Narratives and Memory Politics in Russia and Belarus</source>
          , Routledge, NY,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Xia</surname>
          </string-name>
          ,
          <article-title>Social network behavior and public opinion manipulation</article-title>
          ,
          <source>Journal of Information Security and Applications</source>
          ,
          <volume>64</volume>
          (
          <year>2022</year>
          ). doi: https://doi.org/10.1016/j.jisa.
          <year>2021</year>
          .
          <volume>103060</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>