<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modeling of media influence on personal information security</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vitalii Savchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Halyna Haidur</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svitlana Lehominova</string-name>
          <email>chiarasvitlana77@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Taras Dzyuba</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>State University of Information and Communication Technologies</institution>
          ,
          <addr-line>Solomianska street, 7, 03110, Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska street, 60, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>196</fpage>
      <lpage>206</lpage>
      <abstract>
        <p>With the development of information influence technologies, the problem of personal protection from media information is becoming increasingly important. To study this phenomenon, it is necessary to create realistic models that would give an opportunity to evaluate the influence of information from the media on human behavior. The existing socio-cognitive and statistical models are too generalized and therefore cannot have practical application. The most convenient for research are the models of conformal human behavior, which can connect the position of the media and the behavior of a person depending on this position. On the basis of the conformity model, the authors of the article propose a simple probabilistic model on which they study the nature of media influence on individual behavior. The input parameters of the model are the a priori attitude of the individual to a certain social phenomenon, the degree of independence of the individual's thinking, the position of alternative media in relation to the specified phenomenon, and the degree of the individual's trust in the media. The authors of the article provide a formalized description of the concept of personal information security, as the difference between the deviations of an individual's position under the influence of alternative media. The main means of counteracting the negative influence of the media on personality is the mechanism of changing information flows between two alternatives. The authors determine the appropriate proportion of media change to achieve a given level of personal information security, depending on the position of the individual. Simulation of various scenarios of media flow management confirms the adequacy of the applied model and indicates that a person with a high level of independence, with a well-thought-out media change technology, is able to resist most informational influences and, thereby, ensure their own information security at a given level.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;media information</kwd>
        <kwd>information security</kwd>
        <kwd>personality</kwd>
        <kwd>personal information security</kwd>
        <kwd>conformism</kwd>
        <kwd>information influence 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>With the development of technologies, media information has become a powerful influence on a
person's personal security. Cyberattacks, identity theft, and other security breaches are becoming
more common and people need to take preventative measures to protect both their personal
information and their mental state. A person's ability to recognize and counteract the harmful effects
of information increases his resistance to stress and promotes greater confidence in his own actions
and decisions in conditions of constant information pressure. In this aspect, it is necessary to create
realistic models that would make it possible to evaluate the influence of information from the media
on human behavior. Such models can be a useful tool for analyzing individual security risks and</p>
      <p>0000-0002-3014-131X (V. Savchenko); 0000-0003-0591-3290 (H. Haidur); 0000-0002-4433-5123 (S. Lehominova);
00000001-6607-2507 (T. Dzyuba); 0000-0002-4194-402X (O. Laptiev)
vulnerabilities. This article examines the application of a mathematical model of personal security
under the influence of media information.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem statement</title>
      <p>Personal information security has become a pressing issue in the digital era with the rise of
cyberattacks, data breaches and other security threats. The impact of media information on personal
security is widely recognized, and various forms of media are used to spread misinformation,
influence individual behavior, and facilitate security breaches. To address these issues, many studies
have investigated the relationship between media information and personal security of an individual.
Previous research has highlighted the importance of personal security in the digital age and the role
that media information plays in shaping it. However, there is a need to choose a mathematical model
that could quantify the impact of media information on individual security.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Related works overview</title>
      <p>
        The influence of mass media has long been a subject of study in world science [
        <xref ref-type="bibr" rid="ref12">1 2</xref>
        ]. But, reviewing
the scientific literature, there are gaps in the authors' attempts to develop appropriate mathematical
models.
      </p>
      <p>
        In the article [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the authors investigated the impact of social networks on privacy and security.
The study found that social media users were more likely to engage in risky behavior, such as sharing
personal information online, when they felt their privacy was at risk. Another publication [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
investigated the impact of the media on cyber security incidents. Research has shown that media
coverage of cyber security incidents can increase the likelihood of similar incidents in the future.
There are also publications devoted to the connection between media literacy and personal safety.
In particular, in the article [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], the authors investigated the impact of media literacy on students'
ability to prevent security breaches. The study found that students who received media literacy
training were less likely to be victims of security breaches. At the same time, there is a need for a
more complete understanding of the relationship between media information and individual
security.
      </p>
      <p>
        The article [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] summarizes the empirical data obtained as a result of sociological research and
proposes a model of voter reaction to the influence of mass media during presidential election
campaigns. The main element of the proposed model is the dependence of the number of votes cast
for candidates at various stages of the presidential election on the amount of airtime allocated to
them on state TV channels. Such an approach, although quite realistic, can only be applied after the
elections are over.
      </p>
      <p>
        In the article [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the authors analyze the influence of mass media on the mass audience. Although
the authors explore this topic in considerable depth, they do not provide a simple formalization for
evaluating influence processes, which complicates the practical application of the media influence
model. The authors of the publication [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] propose a probabilistic statistical approach for the
development of heuristic mathematical models of human behavior based on its internal
psychological analysis. However, for an adequate assessment of human behavior, it is necessary to
rely on specific actions, and not on internal psychological analysis, the process and results of which
are practically impossible to subject to qualitative and quantitative assessment.
      </p>
      <p>
        The authors of [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] explore the concept of multi-model thinking, which involves using a set of
models to understand complex phenomena. Multi-model thinking not only increases work efficiency,
but also contributes to success in social life, which allows you to become real experts in assessing
economic and political events. However, the use of the proposed models to formalize the impact of
the results of social research turns out to be quite problematic.
      </p>
      <p>
        A number of our previous works are devoted to the protection of people in social networks. For
example, in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] the security parameters of the personal data of an individual were investigated
197
depending on the topology and mutual influence of social network users. In [11 13], the dependence
of information security of an individual in a social network on the influence of social engineering
methods is considered. The work [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] examines the issue of taking information content into account.
The publications [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ] analyze various methods of social control as a mechanism of
selforganization, as well as the decision-making process in antagonistic digital communications. At the
same time, the individual in all these works is considered as a passive receiver of information that
does not change the line of behavior depending on the source of information. The issue of the impact
of content on changing the line of behavior of an individual, namely its conformity, remains out of
consideration.
      </p>
      <p>
        The work [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] analyzes modern mathematical models of conformity, which are investigated by
the methods of probability theory, game theory, and statistical physics. The work also provides
numerous examples of social and economic situations that can be interpreted as manifestations of
herd behavior. However, within the framework of this study, it is unlikely to be limited only to the
variant of herd behavior, which requires the use of other approaches to building a model of media
influence. The paper [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] investigated the construction of a model of the behavior of an individual
who, when making decisions on certain issues, relies on both his own opinion and the attitude of
surrounding subjects (team). Such an approach can be used to create a general model for evaluating
the impact of media on individual behavior. Its advantages are simplicity and accessibility, as well as
the possibility of expansion, since the author offers only a basis that can be supplemented with other
aspects in the future.
      </p>
      <p>
        The authors of the article [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] develop the model [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and investigate the complex of mutual
influences on the individual based on the solution of the problem of choice, within the team, which
affects the individual's decision-making and evaluate the role of television in election campaigns.
The state of information security of an individual under the influence of mass media is also
investigated, the dependence of team members on the opinion of other participants and television is
taken into account. This makes it possible to determine the conditions for ensuring a person's
information security. In the following article [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], the author proposes a model of personal
information security based on the concept of probabilistic control of conforming behavior. This
approach makes it possible to explore different strategies for managing the influence of media
information on a person and to choose an appropriate information management strategy that
ensures the necessary level of information security of an individual.
      </p>
      <p>There are other models of conforming behavior [21 22], which deeply explore the psychological
features of a person in their relationship with the features of human character, but without taking
into account the influence of media information. The disadvantage of such models is the complexity
of their application for real assessments of information security.</p>
      <p>So, from the conducted consideration, it can be concluded that currently the issue of formalization
of the influence of the media on the behavior of individuals has been studied extremely insufficiently.
The following shortcomings can be noted in the mathematical models proposed by various authors,
in particular:
•
•
•</p>
      <p>Models using a probabilistic statistical approach are overloaded with internal psychological
analysis of the individual, which is difficult to adapt to the influence of the media.
Models of personal protection in social networks consider a person as a stable recipient of
information without taking into account the degree of its relevance.</p>
      <p>Mathematical models of conformity and conforming behavior are the closest, although they
need improvement for the possibility of using media information in them.</p>
      <p>The purpose of this paper is to develop and explore a mathematical model that can provide a
quantitative analysis of the relationship between media information and personal information
security, allowing researchers to develop more effective strategies to promote individual security in
the digital age.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Mathematical model of personal information security</title>
      <p>
        In work [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], the author proposes a model of the behavior of a person who is under the influence of
other people from his environment. The proposed model takes into account: initial beliefs of the
individual; the degree of independence of her thinking and the influence of the environment on the
personality. Thus, the specified model can be used as a basis for a general model for evaluating the
influence of media on individual behavior. When developing a model of conformal behavior of an
individual in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], the basis is communication with other individuals. This is expressed in the
application of appropriate probabilistic indicators of the influence of the environment on the
individual and the reverse influence of the individual on the environment. In contrast to this
approach, the individual's perception of media information has its own characteristics, in particular,
the individual does not directly influence the mass media. In addition, an individual can perceive
secondary influence, when information from the mass media is transmitted to the individual from
other subjects in his environment. Therefore, the basic model of conforming personality behavior
should be improved taking into account the identified features.
      </p>
      <p>
        As in the basic model, we will assume that a person, making a decision on this or that issue, is
guided by both his initial beliefs and the attitude of other subjects from his environment to this issue.
As part of our review, collective opinion will include public opinion expressed in the mass media
(Internet channels, social networks, television, radio, etc.). We'll look at events that can be presented
in binary form, such as "support" or "don't support".The mathematical model [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] is based on two
quantitative assessments of the individual's attitude to the new state:
•
•
      </p>
      <p>Personal a priori attitude to a new state (conviction of the individual), which is described by
the probability of readiness of the individual to move to this state (  ) before the influence
of the media.</p>
      <p>Personal posterior attitude to the new state, which is described by the probability of the final
decision to move to the new state (</p>
      <p>) after media exposure.</p>
      <p>The probabilities   and</p>
      <p>describe exactly the informational component of the process of
transition from the initial to the final state, as they are determined by the influence of the media on
the individual. In the case when the individual is independent in decision-making, he may not be
subject to such influence and then, obviously, his a posteriori attitude will coincide with the a priori
 

independence of the individual   , which is defined as the probability that in a specific situation the
individual behaves as independent. If</p>
      <p>= 1, then the individual's decisions do not depend on
media influence. If</p>
      <p>= 0, then we have an absolute dependence, which means an almost
instantaneous change of the initial beliefs of the individual under the influence of the media.</p>
      <p>
        In contrast to the model of conforming behavior [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], in the following work, we will consider
only the change in personality behavior under the influence of the media. So, as was mentioned, in
a completely independent individual, the posterior probability 






 =1 =   , i.e. with his beliefs. The posterior probability for a completely dependent individual
 =0 can be determined based on the following considerations. We will assume that the influence
of each i-th media on a given individual is determined by the number  
[ ] the probability that
the individual will act as follows from the i-th message of the media. At the same time, we will also
assume that such an influence of the i-th media message on this individual does not depend on the
influence of other alternative media messages. This means that the individual will enter a new state
with probability
      </p>
      <p>[ ]. Then the total probability of transition of a completely dependent
individual to a new state will be equal to


 =1 coincides with the a priori
the personality.
formula for the total probability</p>
      <p>Thus, the posterior probability for an arbitrarily chosen individual can be obtained based on the
 
=   


+ (1 −  
+ (1 −  
) ∑ =1  
)

  =0 =
[ ] 
between the individual and the media.</p>
      <p>Given the given parameters ( 
,</p>
      <p>,  
posterior probability ( 
), which in vector form will have the form</p>
      <p>) from formula (2) it is possible to determine the

  =0 = ∑ =1  
[ ] 
where N is the total number of media messages (or sources); ∑</p>
      <p>[ ] &gt; 0, since a completely dependent individual is affected by any media message.
As you can see,</p>
      <p>[ ] expresses the degree of influence of media on personality. On the other
hand, taking into account ∑
 =1  
[ ] = 1,</p>
      <p>[ ] can also be considered as a distributed level
 
.</p>
      <p>∆ 
( )
=   

+ ( −  
) 
 
,
where  
  and  
is a stochastic matrix ( 
[ ]),  
is a diagonal matrix (
 ),  is a unit matrix,
are vectors with components  
and  
, respectively.</p>
      <p>Personality is constantly under the influence of various media. It is logical to assume that some
media will incline a person to certain decisions, other media, which have an alternative focus, to
alternative decisions. Thus, as can be seen from the previous discussion, the value of  
individual under the influence of different media will vary from some maximum value of   
for an
to a

minimum value of  
can be formulated as follows</p>
      <p>Taking into account the above statements, in general, the model of personal information security
=</p>
      <p>( ) −  
( ) ≤   ,
where</p>
      <p>( ),</p>
      <p>respectively, the maximum and minimum value of  
specified time period t;   is some pre-set spread value of  
(4) is met, namely: the a posteriori probability  
of the individual's transition to a new state under
the influence of the information channel of information influence will remain within certain limits
relative to its a priori probability   .</p>
    </sec>
    <sec id="sec-5">
      <title>5. Simulation and discussion of results</title>
      <p>To keep  
within the given limits</p>
      <p>of the individual, depending on the initial beliefs of   ,
the degree of independence</p>
      <p>and the level of trust in the channel of information influence  
it is necessary to have one's own strategy for managing media influence. To simplify understanding,
we will consider a person who is under the influence of two alternative media. In many cases the
entire set of media messages can be divided into two opposite groups: "agree" or "disagree"; "positive"
during the
high-profile event, which one of the groups will support, and the other will be in opposition to the
first.</p>
      <p>For example, we will consider the scenario of an election campaign, when various media support
"their" presidential candidates, while leveling the ratings of their opponents. So, let's take 2
alternative media: Media 1 and Media 2, which broadcast information about the same Candidate X.
Media 1 determines the support of the Candidate X at the level of 0.9 (that is, believes that such a
candidate will win 90% of the vote in the elections). Media 2 determines the support of the same
Candidate X at the level of 0.1 (believes that this candidate will win only 10% of the vote in the
elections).</p>
      <p>The individual has his own opinion about Candidate X, which is expressed through his initial
beliefs   . Also, an individual has his own degree of personality independence   , which will
determine his ability to be influenced by the media. An individual has the opportunity to choose
between Media 1 and Media 2 in order to stay with his beliefs   as long as possible (this is the
essence of personal information security to stay with his own views as long as possible without
being influenced by the media). With this approach, the key strategy for ensuring the informational
security of the individual will be the change in media exposure between the two alternatives, which
will satisfy formula (4). We will provide separate graphs and comment on possible options for
implementing the "media change" strategy.</p>
      <p>Fig. 1 shows that in the case (  = 0.9,   = 0), when the individual supports Candidate X at a
level that coincides with Media 1, then keeping him in a state of information security is quite a
difficult task as Media 2 will sway him to its side. As soon as Media 2 sways the individual to its side,
the individual changes the source to Media 1 and now Media 1 will sway him to its side. All this
happens due to the degree of independence of such an individual is zero (  = 0) and therefore any
information polarizes his   , that results ∆  = 0.8, which is the maximum value and indicates
the absence of any information security for such an individual.</p>
      <p>Consider the case when the individual's initial beliefs differ from the position of Media 1, for
example, with   = 0.8, and his resistance to informational influence is sufficiently high (  =
0.8). In this case, it can be seen that any influence of Media 2 leads to a change individual's beliefs to
the contrary, but such an influence can be compensated by four inclusions of Media 1 and at the
same time the individual is able to ensure ∆  = 0.16 (Fig. 2).</p>
      <p>In the case when   = 0.2,   = 0.8, the picture will be symmetrical, because in this case our
individual is inclined to the position of Media 2, and at the same time, each influence from Media 1
can be compensated by four influences from Media 2. As in the previous case, the level information
security for an individual is provided at the level of ∆  = 0.16 (Fig. 3).
= 0.8,</p>
      <p>= 0.8.</p>
      <p>According to general logic, an increase in   → 1 will lead to a decrease in ∆  → 0, which
will indicate the achievement of information security of the individual. So, with (  = 0.7,   =
0.9) you can see that ∆  = 0.08. At the same time, the individual on average needs to change
media in a ratio of 2:1 in favor of Media 1. That is, one inclusion of Media 2 can be leveled by 2 3
inclusions of Media 1 (Fig. 4).
= 0.7,</p>
      <p>The general dependence of the information security of the individual ∆  on   and   is shown
in Fig. 5, where it is shown that with the increase of   , the values of ∆  decrease almost linearly
and reach 0 when the value of   = 1.</p>
      <p>At the same time, ∆  almost does not change with a change in the a priori beliefs of the
individual   . In general, this corresponds to the logic of common sense, since the individual's
resistance to external informational influences depends mainly on his internal (innate) qualities or
character traits, and not on the position he occupies in relation to some event. Individual fluctuations
of ∆  values, which can be seen in Fig. 5, due to the fact that the indicated indicators are obtained
as a result of simulation.
on   and   .
of the posterior probability   remains within the given limits of   relative to the initial beliefs
of the individual   . The main mechanism for achieving such a state is the control of the flow of
information coming to the individual from the media.</p>
      <p>The model of personal information security studied in this work is based on the concept of
managing information from the media with probabilistic control and evaluation of the individual's
behavior under the influence of the media. This makes it possible to explore various scenarios of
managing the media's information impact on a person and to choose an appropriate information
flow management technology in order to ensure the necessary level of its information security
∆  .</p>
      <p>Simulation of various scenarios of media flow management confirms the adequacy of the applied
model and indicates that a person with a high level of independence, with a well-thought-out media
change technology, is able to resist most informational influences and, thereby, ensure their own
information security at a given level.</p>
      <p>Future research can refine the model by integrating machine learning to predict behavior
dynamics under media influence and analyze content in real-time. Expanding the model to include
cultural and social factors will enable more personalized strategies for managing information flows,
improving individual information security.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>E.</given-names>
            <surname>Schultz</surname>
          </string-name>
          ,
          <article-title>Information security and the media</article-title>
          ,
          <source>Computers &amp; Security</source>
          <volume>22</volume>
          (
          <year>2003</year>
          )
          <fpage>652</fpage>
          653. doi:
          <volume>10</volume>
          .1016/S0167-
          <volume>4048</volume>
          (
          <issue>03</issue>
          )
          <fpage>00001</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>N.</given-names>
            <surname>Patnayakuni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Patnayakuni</surname>
          </string-name>
          ,
          <string-name>
            <surname>Jatinder N. D. Gupta</surname>
          </string-name>
          ,
          <article-title>Towards a Model of Social Media Impacts on Cybersecurity Knowledge Transfer: An Exploration, in Ritesh Chugh, Harnessing Social Media as a Knowledge Management Tool</article-title>
          , IGI Global, Alabama Univ.,
          <year>2017</year>
          , pp.
          <fpage>249</fpage>
          <lpage>272</lpage>
          . doi:
          <volume>10</volume>
          .4018/978-1-
          <fpage>5225</fpage>
          -0495-5.
          <year>ch012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.</given-names>
            <surname>Ashuri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dvir-Gvisman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Halperin</surname>
          </string-name>
          , Watching Me Watching You:
          <article-title>How Observational Learning Affects Self-disclosure on Social Network Sites?</article-title>
          ,
          <source>Journal of Computer-Mediated Communication</source>
          <volume>23</volume>
          (
          <issue>1</issue>
          ) (
          <year>2018</year>
          )
          <fpage>34</fpage>
          68. doi:
          <volume>10</volume>
          .1093/jcmc/zmx003.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hao Goh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Cho</surname>
          </string-name>
          ,
          <article-title>The impact of a cause effect elaboration procedure on information security risk perceptions: a construal fit perspective</article-title>
          ,
          <source>Journal of Cybersecurity</source>
          <volume>8</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1093/cybsec/tyab026.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] 5</article-title>
          .
          <string-name>
            <given-names>N.</given-names>
            <surname>Higdon</surname>
          </string-name>
          ,
          <article-title>The critical effect: Exploring the influence of critical media literacy pedagogy on</article-title>
          <source>Media Literacy Education</source>
          <volume>14</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . doi:
          <volume>10</volume>
          .23860/JMLE-2022
          <source>-14-1-1.</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Razuvaeva</surname>
          </string-name>
          ,
          <article-title>Models of mass media influence on mass political consciousness</article-title>
          ,
          <source>Scientific notes of the Institute of Journalism</source>
          <volume>18</volume>
          (
          <year>2005</year>
          )
          <article-title>35 40</article-title>
          . URL: http://journlib.univ.kiev.ua/index.php?act=article&amp;article=
          <fpage>1659</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bryant</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Thompson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. W.</given-names>
            <surname>Finklea</surname>
          </string-name>
          , Fundamentals of Media Effects:
          <article-title>Second Edition</article-title>
          . Waveland Press,
          <year>2012</year>
          , 410 p.
          <source>ISBN</source>
          <volume>1478608196</volume>
          ,
          <year>9781478608196</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Petrosyan</surname>
          </string-name>
          ,
          <article-title>Heuristic mathematical models of human behavior as an economic agent, in Institutional economics: management of the formation and development of socio-economic institutions</article-title>
          , Infra-M,
          <year>2022</year>
          , 279 p. doi:
          <volume>10</volume>
          .12737/970.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Page</surname>
          </string-name>
          ,
          <article-title>Model thinking</article-title>
          . How to analyze
          <source>complex phenomena using mathematical models</source>
          ,
          <year>2020</year>
          , 528 p.
          <source>ISBN 978-5-00146-867-7.</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dzyuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Matsko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Novikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Havryliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Polovenko</surname>
          </string-name>
          ,
          <article-title>Time aspect of insider threat mitigation</article-title>
          ,
          <source>Advances in Military Technology</source>
          <volume>19</volume>
          (
          <issue>1</issue>
          ) (
          <year>2024</year>
          )
          <fpage>129</fpage>
          144. doi:
          <volume>10</volume>
          .3849/aimt.
          <year>01830</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>O.</given-names>
            <surname>Laptiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kotenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Samosyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Shuklin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Biehun</surname>
          </string-name>
          ,
          <article-title>Method of Determining Trust and Protection of Personal Data in Social Networks</article-title>
          ,
          <source>International Journal of Communication Networks and Information Security (IJCNIS) 13(1)</source>
          (
          <year>2021</year>
          ) URL: https://www.ijcnis.org/index.php/ijcnis/article/view/4882.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Matsko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I.</given-names>
            <surname>Havryliuk</surname>
          </string-name>
          .
          <source>Method of Calculation of Information Protection from Clusterization Ratio in Social Networks Workshop Proceedengs Information security and information technologies Odesa</source>
          , Ukraine,
          <year>2021</year>
          , URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3200</volume>
          /paper4.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dzyuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Laptiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lukova-Chuiko</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Laptieva</surname>
          </string-name>
          ,
          <source>IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT)</source>
          , Kyiv, Ukraine,
          <year>2021</year>
          ,
          <volume>99</volume>
          105, doi: 10.1109/ATIT54053.
          <year>2021</year>
          .
          <volume>9678599</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H.</given-names>
            <surname>Haidur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gakhov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Marchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Haidur</surname>
          </string-name>
          ,
          <article-title>A conceptual model for detecting phishing attacks based on the use of support vector methods</article-title>
          ,
          <source>Modern information security 2</source>
          (
          <issue>58</issue>
          ) (
          <year>2024</year>
          )
          <fpage>24</fpage>
          33. doi:
          <volume>10</volume>
          .31673/
          <fpage>2409</fpage>
          -
          <lpage>7292</lpage>
          .
          <year>2024</year>
          .
          <volume>020003</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>K.</given-names>
            <surname>Molodetska</surname>
          </string-name>
          ,
          <article-title>Analysis of Modern Approaches to the Transformation of Social Systems in Postmodern Society</article-title>
          , in P. S. Fedushko,
          <string-name>
            <given-names>K.</given-names>
            <surname>Gubíniová</surname>
          </string-name>
          , (eds)
          <article-title>Data-Centric Business and Applications</article-title>
          .
          <source>Lecture Notes on Data Engineering and Communications Technologies</source>
          ,
          <volume>208</volume>
          , Springer, Cham.,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -59131-
          <issue>0</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Fedushko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Molodetska</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <article-title>communication of the online communities users</article-title>
          ,
          <source>Social Network Analysis and Mining</source>
          ,
          <volume>13</volume>
          :
          <fpage>18</fpage>
          (
          <year>2023</year>
          ).
          <source>doi:10.1007/s13278-022-01021 4.</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Breyer</surname>
          </string-name>
          ,
          <article-title>Models of conforming behavior. Part 1</article-title>
          . From philosophy to mathematical models,
          <source>Management problems 1</source>
          (
          <year>2014</year>
          )
          <article-title>2 13</article-title>
          . URL: https://econpapers.repec.org/article/scn009530/14508003.htm.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Krasnoshchokov</surname>
          </string-name>
          ,
          <article-title>The simplest mathematical model of behavior. Psychology of conformity</article-title>
          ,
          <source>Mathematical Modeling</source>
          <volume>10</volume>
          (
          <issue>7</issue>
          ) (
          <year>1998</year>
          ) 76
          <fpage>92</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>O. S.</given-names>
            <surname>Vetlytska</surname>
          </string-name>
          ,
          <article-title>A model for assessing the impact of sociological information on human behavior in the context of its information security</article-title>
          .
          <source>Telecommunications and Information Technologies</source>
          <volume>4</volume>
          (
          <issue>77</issue>
          ) (
          <year>2022</year>
          )
          <fpage>35</fpage>
          45. doi:
          <volume>10</volume>
          .31673/
          <fpage>2412</fpage>
          -
          <lpage>4338</lpage>
          .
          <year>2022</year>
          .
          <volume>043545</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O. S.</given-names>
            <surname>Vetlytska</surname>
          </string-name>
          ,
          <article-title>Model of information security of the individual against the influence of sociological information</article-title>
          .
          <source>Modern information protection 3</source>
          (
          <issue>59</issue>
          ) (
          <year>2024</year>
          )
          <fpage>29</fpage>
          41. doi:
          <volume>10</volume>
          .31673/
          <fpage>2409</fpage>
          -
          <lpage>7292</lpage>
          .
          <year>2024</year>
          .
          <volume>030003</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>C.</given-names>
            <surname>Capuano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Chekroun</surname>
          </string-name>
          , A Systematic Review of Research on Conformity.
          <source>International Review of Social Psychology</source>
          <volume>37</volume>
          (
          <issue>1</issue>
          )
          <fpage>13</fpage>
          (
          <year>2024</year>
          )
          <article-title>1 23</article-title>
          . doi:
          <volume>10</volume>
          .5334/irsp.874.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhuang</surname>
          </string-name>
          ,
          <article-title>Trend Conformity Behavior of Luxury Fashion Products for Chinese Consumers in the Social Media Age: Drivers and Underlying Mechanisms</article-title>
          ,
          <source>Behavioral Sciences</source>
          <volume>14</volume>
          (
          <issue>7</issue>
          ):
          <volume>521</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .3390/bs14070521.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>G. P.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. Yu</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yang</surname>
          </string-name>
          , J. Liu,
          <article-title>Modeling and analyzing of conformity behavior: A fuzzy logic approach</article-title>
          , Optik,
          <volume>125</volume>
          (
          <issue>21</issue>
          ) (
          <year>2014</year>
          ),
          <fpage>6594</fpage>
          <lpage>6598</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ijleo.
          <year>2014</year>
          .
          <volume>07</volume>
          .082.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mohammadpour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mohammad-Djafari</surname>
          </string-name>
          ,
          <article-title>An alternative inference tool to total probability formula and its applications (</article-title>
          <year>2003</year>
          ).
          <source>doi:10.1063/1</source>
          .1835217.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>