=Paper= {{Paper |id=Vol-3909/Paper_15.pdf |storemode=property |title=Modeling of Media Influence on Personal Information Security |pdfUrl=https://ceur-ws.org/Vol-3909/Paper_15.pdf |volume=Vol-3909 |authors=Vitalii Savchenko,Halyna Haidur,Svitlana Lehominova,Taras Dzyuba,Oleksandr Laptiev |dblpUrl=https://dblp.org/rec/conf/iti2/SavchenkoHLDL24 }} ==Modeling of Media Influence on Personal Information Security== https://ceur-ws.org/Vol-3909/Paper_15.pdf
                                Modeling of media influence on personal information
                                security
                                Vitalii Savchenko1, , Halyna Haidur1 , Svitlana Lehominova1 , Taras Dzyuba1 and
                                Oleksandr Laptiev2,
                                1
                                    State University of Information and Communication Technologies, Solomianska street, 7, 03110, Kyiv, Ukraine
                                2
                                    Taras Shevchenko National University of Kyiv, Volodymyrska street, 60, Kyiv, 01033, Ukraine


                                                   Abstract
                                                   With the development of information influence technologies, the problem of personal protection from
                                                   media information is becoming increasingly important. To study this phenomenon, it is necessary to create
                                                   realistic models that would give an opportunity to evaluate the influence of information from the media on
                                                   human behavior. The existing socio-cognitive and statistical models are too generalized and therefore
                                                   cannot have practical application. The most convenient for research are the models of conformal human
                                                   behavior, which can connect the position of the media and the behavior of a person depending on this
                                                   position. On the basis of the conformity model, the authors of the article propose a simple probabilistic
                                                   model on which they study the nature of media influence on individual behavior. The input parameters of
                                                   the model are the a priori attitude of the individual to a certain social phenomenon, the degree of
                                                   independence of the individual's thinking, the position of alternative media in relation to the specified
                                                   phenomenon, and the degree of the individual's trust in the media. The authors of the article provide a
                                                   formalized description of the concept of personal information security, as the difference between the
                                                   deviations of an individual's position under the influence of alternative media. The main means of
                                                   counteracting the negative influence of the media on personality is the mechanism of changing information
                                                   flows between two alternatives. The authors determine the appropriate proportion of media change to
                                                   achieve a given level of personal information security, depending on the position of the individual.
                                                   Simulation of various scenarios of media flow management confirms the adequacy of the applied model
                                                   and indicates that a person with a high level of independence, with a well-thought-out media change
                                                   technology, is able to resist most informational influences and, thereby, ensure their own information
                                                   security at a given level.

                                                   Keywords
                                                   media information, information security, personality, personal information security, conformism,
                                                   information influence 1



                                1. Introduction
                                With the development of technologies, media information has become a powerful influence on a
                                person's personal security. Cyberattacks, identity theft, and other security breaches are becoming
                                more common and people need to take preventative measures to protect both their personal
                                information and their mental state. A person's ability to recognize and counteract the harmful effects
                                of information increases his resistance to stress and promotes greater confidence in his own actions
                                and decisions in conditions of constant information pressure. In this aspect, it is necessary to create
                                realistic models that would make it possible to evaluate the influence of information from the media
                                on human behavior. Such models can be a useful tool for analyzing individual security risks and




                                Information Technology and Implementation (IT&I-2024), November 20-21, 2024, Kyiv, Ukraine
                                 Corresponding author.
                                 These authors contributed equally.
                                   savitan@ukr.net (V. Savchenko); gaydurg@gmail.com (H. Haidur); chiarasvitlana77@gmail.com (S. Lehominova);
                                iwartar@gmail.com (T. Dzyuba); alaptev64@ukr.net (O. Laptiev)
                                    0000-0002-3014-131X (V. Savchenko); 0000-0003-0591-3290 (H. Haidur); 0000-0002-4433-5123 (S. Lehominova); 0000-
                                0001-6607-2507 (T. Dzyuba); 0000-0002-4194-402X (O. Laptiev)
                                              © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).



                                                                                                                                                                                        196
CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
vulnerabilities. This article examines the application of a mathematical model of personal security
under the influence of media information.

2. Problem statement

Personal information security has become a pressing issue in the digital era with the rise of cyber-
attacks, data breaches and other security threats. The impact of media information on personal
security is widely recognized, and various forms of media are used to spread misinformation,
influence individual behavior, and facilitate security breaches. To address these issues, many studies
have investigated the relationship between media information and personal security of an individual.
Previous research has highlighted the importance of personal security in the digital age and the role
that media information plays in shaping it. However, there is a need to choose a mathematical model
that could quantify the impact of media information on individual security.

3. Related works overview
The influence of mass media has long been a subject of study in world science [1 2]. But, reviewing
the scientific literature, there are gaps in the authors' attempts to develop appropriate mathematical
models.
    In the article [3], the authors investigated the impact of social networks on privacy and security.
The study found that social media users were more likely to engage in risky behavior, such as sharing
personal information online, when they felt their privacy was at risk. Another publication [4]
investigated the impact of the media on cyber security incidents. Research has shown that media
coverage of cyber security incidents can increase the likelihood of similar incidents in the future.
There are also publications devoted to the connection between media literacy and personal safety.
In particular, in the article [5], the authors investigated the impact of media literacy on students'
ability to prevent security breaches. The study found that students who received media literacy
training were less likely to be victims of security breaches. At the same time, there is a need for a
more complete understanding of the relationship between media information and individual
security.
    The article [6] summarizes the empirical data obtained as a result of sociological research and
proposes a model of voter reaction to the influence of mass media during presidential election
campaigns. The main element of the proposed model is the dependence of the number of votes cast
for candidates at various stages of the presidential election on the amount of airtime allocated to
them on state TV channels. Such an approach, although quite realistic, can only be applied after the
elections are over.
    In the article [7], the authors analyze the influence of mass media on the mass audience. Although
the authors explore this topic in considerable depth, they do not provide a simple formalization for
evaluating influence processes, which complicates the practical application of the media influence
model. The authors of the publication [8] propose a probabilistic statistical approach for the
development of heuristic mathematical models of human behavior based on its internal
psychological analysis. However, for an adequate assessment of human behavior, it is necessary to
rely on specific actions, and not on internal psychological analysis, the process and results of which
are practically impossible to subject to qualitative and quantitative assessment.
    The authors of [9] explore the concept of multi-model thinking, which involves using a set of
models to understand complex phenomena. Multi-model thinking not only increases work efficiency,
but also contributes to success in social life, which allows you to become real experts in assessing
economic and political events. However, the use of the proposed models to formalize the impact of
the results of social research turns out to be quite problematic.
    A number of our previous works are devoted to the protection of people in social networks. For
example, in [10] the security parameters of the personal data of an individual were investigated
                                                                                                   197
depending on the topology and mutual influence of social network users. In [11 13], the dependence
of information security of an individual in a social network on the influence of social engineering
methods is considered. The work [14] examines the issue of taking information content into account.
The publications [15, 16] analyze various methods of social control as a mechanism of self-
organization, as well as the decision-making process in antagonistic digital communications. At the
same time, the individual in all these works is considered as a passive receiver of information that
does not change the line of behavior depending on the source of information. The issue of the impact
of content on changing the line of behavior of an individual, namely its conformity, remains out of
consideration.
    The work [17] analyzes modern mathematical models of conformity, which are investigated by
the methods of probability theory, game theory, and statistical physics. The work also provides
numerous examples of social and economic situations that can be interpreted as manifestations of
herd behavior. However, within the framework of this study, it is unlikely to be limited only to the
variant of herd behavior, which requires the use of other approaches to building a model of media
influence. The paper [18] investigated the construction of a model of the behavior of an individual
who, when making decisions on certain issues, relies on both his own opinion and the attitude of
surrounding subjects (team). Such an approach can be used to create a general model for evaluating
the impact of media on individual behavior. Its advantages are simplicity and accessibility, as well as
the possibility of expansion, since the author offers only a basis that can be supplemented with other
aspects in the future.
    The authors of the article [19] develop the model [18] and investigate the complex of mutual
influences on the individual based on the solution of the problem of choice, within the team, which
affects the individual's decision-making and evaluate the role of television in election campaigns.
The state of information security of an individual under the influence of mass media is also
investigated, the dependence of team members on the opinion of other participants and television is
taken into account. This makes it possible to determine the conditions for ensuring a person's
information security. In the following article [20], the author proposes a model of personal
information security based on the concept of probabilistic control of conforming behavior. This
approach makes it possible to explore different strategies for managing the influence of media
information on a person and to choose an appropriate information management strategy that
ensures the necessary level of information security of an individual.
    There are other models of conforming behavior [21 22], which deeply explore the psychological
features of a person in their relationship with the features of human character, but without taking
into account the influence of media information. The disadvantage of such models is the complexity
of their application for real assessments of information security.
    So, from the conducted consideration, it can be concluded that currently the issue of formalization
of the influence of the media on the behavior of individuals has been studied extremely insufficiently.
The following shortcomings can be noted in the mathematical models proposed by various authors,
in particular:

   •    Models using a probabilistic statistical approach are overloaded with internal psychological
        analysis of the individual, which is difficult to adapt to the influence of the media.
   •    Models of personal protection in social networks consider a person as a stable recipient of
        information without taking into account the degree of its relevance.
   •    Mathematical models of conformity and conforming behavior are the closest, although they
        need improvement for the possibility of using media information in them.

   The purpose of this paper is to develop and explore a mathematical model that can provide a
quantitative analysis of the relationship between media information and personal information
security, allowing researchers to develop more effective strategies to promote individual security in
the digital age.
                                                                                                 198
4. Mathematical model of personal information security
In work [18], the author proposes a model of the behavior of a person who is under the influence of
other people from his environment. The proposed model takes into account: initial beliefs of the
individual; the degree of independence of her thinking and the influence of the environment on the
personality. Thus, the specified model can be used as a basis for a general model for evaluating the
influence of media on individual behavior. When developing a model of conformal behavior of an
individual in [19], the basis is communication with other individuals. This is expressed in the
application of appropriate probabilistic indicators of the influence of the environment on the
individual and the reverse influence of the individual on the environment. In contrast to this
approach, the individual's perception of media information has its own characteristics, in particular,
the individual does not directly influence the mass media. In addition, an individual can perceive
secondary influence, when information from the mass media is transmitted to the individual from
other subjects in his environment. Therefore, the basic model of conforming personality behavior
should be improved taking into account the identified features.
    As in the basic model, we will assume that a person, making a decision on this or that issue, is
guided by both his initial beliefs and the attitude of other subjects from his environment to this issue.
As part of our review, collective opinion will include public opinion expressed in the mass media
(Internet channels, social networks, television, radio, etc.). We'll look at events that can be presented
in binary form, such as "support" or "don't support".The mathematical model [20] is based on two
quantitative assessments of the individual's attitude to the new state:

     •        Personal a priori attitude to a new state (conviction of the individual), which is described by
              the probability of readiness of the individual to move to this state (𝐴𝑝𝑟 ) before the influence
              of the media.
     •        Personal posterior attitude to the new state, which is described by the probability of the final
              decision to move to the new state (𝑃𝑝𝑜𝑠𝑡 ) after media exposure.

   The probabilities 𝐴𝑝𝑟 and 𝑃𝑝𝑜𝑠𝑡 describe exactly the informational component of the process of
transition from the initial to the final state, as they are determined by the influence of the media on
the individual. In the case when the individual is independent in decision-making, he may not be
subject to such influence and then, obviously, his a posteriori attitude will coincide with the a priori
𝐴𝑝𝑟 = 𝑃𝑝𝑜𝑠𝑡 .
   Another characteristic that should be taken into account in the future is the degree of
independence of the individual 𝐼𝑛𝑑 , which is defined as the probability that in a specific situation the
individual behaves as independent. If 𝐼𝑛𝑑 = 1, then the individual's decisions do not depend on
media influence. If 𝐼𝑛𝑑 = 0, then we have an absolute dependence, which means an almost
instantaneous change of the initial beliefs of the individual under the influence of the media.
   In contrast to the model of conforming behavior [21], in the following work, we will consider
only the change in personality behavior under the influence of the media. So, as was mentioned, in
                                                                      𝐼𝑛𝑑 =1
a completely independent individual, the posterior probability 𝑃𝑝𝑜𝑠𝑡         coincides with the a priori
 𝐼       =1
  𝑛𝑑
𝑃𝑝𝑜𝑠𝑡         = 𝐴𝑝𝑟 , i.e. with his beliefs. The posterior probability for a completely dependent individual
 𝐼       =0
   𝑛𝑑
𝑃𝑝𝑜𝑠𝑡  can be determined based on the following considerations. We will assume that the influence
of each i-th media on a given individual is determined by the number 𝐸𝑚𝑒𝑑𝑖𝑎[𝑖] the probability that
the individual will act as follows from the i-th message of the media. At the same time, we will also
assume that such an influence of the i-th media message on this individual does not depend on the
influence of other alternative media messages. This means that the individual will enter a new state
with probability 𝑃𝑚𝑒𝑑𝑖𝑎[𝑖] . Then the total probability of transition of a completely dependent
individual to a new state will be equal to
                                                                                                          199
                                 𝐼
                                 𝑛𝑑
                               𝑃𝑝𝑜𝑠𝑡
                                     =0
                                           = ∑𝑁
                                              𝑖=1 𝐸𝑚𝑒𝑑𝑖𝑎[𝑖] 𝑃𝑚𝑒𝑑𝑖𝑎[𝑖] ,
                                                                                                   (1)

   where N is the total number of media messages (or sources); ∑𝑁      𝑖=1 𝐸𝑚𝑒𝑑𝑖𝑎[𝑖] = 1 [22] and all
𝐸𝑚𝑒𝑑𝑖𝑎[𝑖] > 0, since a completely dependent individual is affected by any media message.
   As you can see, 𝐸𝑚𝑒𝑑𝑖𝑎[𝑖] expresses the degree of influence of media on personality. On the other
hand, taking into account ∑𝑁𝑖=1 𝐸𝑚𝑒𝑑𝑖𝑎[𝑖] = 1, 𝐸𝑚𝑒𝑑𝑖𝑎[𝑖] can also be considered as a distributed level


the personality.
   Thus, the posterior probability for an arbitrarily chosen individual can be obtained based on the
formula for the total probability

                                     𝑛𝑑𝐼     =1            𝑛𝑑     𝐼   =0
                           𝑃𝑝𝑜𝑠𝑡 = 𝑃𝑝𝑜𝑠𝑡 𝐼𝑛𝑑 + (1 − 𝐼𝑛𝑑 )𝑃𝑝𝑜𝑠𝑡             =
                                                                                                (2)
                        = 𝐴𝑝𝑟 𝐼𝑛𝑑 + (1 − 𝐼𝑛𝑑 ) ∑𝑁 𝑖=1 𝐸𝑚𝑒𝑑𝑖𝑎[𝑖] 𝑃𝑚𝑒𝑑𝑖𝑎[𝑖] .
   Formula (2) is a model of the individual's behavior under the influence of the media in general,
with the simplifications that have been adopted. Unlike the model of conforming behavior, this model
takes into account the level of trust in the media and the peculiarities of the information exchange
between the individual and the media.
   Given the given parameters (𝐴𝑝𝑟 , 𝐼𝑛𝑑 , 𝑃𝑚𝑒𝑑𝑖𝑎 ) from formula (2) it is possible to determine the
posterior probability (𝑃𝑝𝑜𝑠𝑡 ), which in vector form will have the form

                         𝑃𝑝𝑜𝑠𝑡 = 𝑨𝑝𝑟 𝑰𝑛𝑑 + (𝑼 − 𝑰𝑛𝑑 )𝑬𝑚𝑒𝑑𝑖𝑎 𝑷𝑚𝑒𝑑𝑖𝑎 ,                               (3)
    where 𝑬𝑚𝑒𝑑𝑖𝑎 is a stochastic matrix (𝐸𝑚𝑒𝑑𝑖𝑎[𝑖] ), 𝑰𝑛𝑑 is a diagonal matrix (𝐼𝑛𝑑 ), 𝑼 is a unit matrix,
𝑨𝑝𝑟 and 𝑷𝑚𝑒𝑑𝑖𝑎 are vectors with components 𝐴𝑝𝑟 and 𝑃𝑚𝑒𝑑𝑖𝑎 , respectively.
    Personality is constantly under the influence of various media. It is logical to assume that some
media will incline a person to certain decisions, other media, which have an alternative focus, to
alternative decisions. Thus, as can be seen from the previous discussion, the value of 𝑃𝑝𝑜𝑠𝑡 for an
                                                                                                 𝑀𝐴𝑋
individual under the influence of different media will vary from some maximum value of 𝑃𝑝𝑜𝑠𝑡         to a
                      𝑀𝐼𝑁
minimum value of 𝑃𝑝𝑜𝑠𝑡 .
    Taking into account the above statements, in general, the model of personal information security
can be formulated as follows

                                           𝑀𝐴𝑋 (𝑡)
                               ∆𝑃𝑝𝑜𝑠𝑡 = 𝑃𝑝𝑜𝑠𝑡          𝑀𝐼𝑁 (𝑡)
                                                    − 𝑃𝑝𝑜𝑠𝑡    ≤ 𝐿𝑖𝑚 ,                               (4)
              𝑀𝐴𝑋 (𝑡), 𝑀𝐼𝑁 (𝑡)
    where 𝑃𝑝𝑜𝑠𝑡        𝑃𝑝𝑜𝑠𝑡       respectively, the maximum and minimum value of 𝑃𝑝𝑜𝑠𝑡 during the
specified time period t; 𝐿𝑖𝑚 is some pre-set spread value of 𝑃𝑝𝑜𝑠𝑡 .
    That is, it will be possible to talk about the information security of an individual when condition
(4) is met, namely: the a posteriori probability 𝑃𝑝𝑜𝑠𝑡 of the individual's transition to a new state under
the influence of the information channel of information influence will remain within certain limits
relative to its a priori probability 𝐴𝑝𝑟 .

5. Simulation and discussion of results
To keep 𝑃𝑝𝑜𝑠𝑡 within the given limits 𝐿𝑖𝑚 of the individual, depending on the initial beliefs of 𝐴𝑝𝑟 ,
the degree of independence 𝐼𝑛𝑑 and the level of trust in the channel of information influence 𝐸𝑚𝑒𝑑𝑖𝑎 ,
it is necessary to have one's own strategy for managing media influence. To simplify understanding,
we will consider a person who is under the influence of two alternative media. In many cases the
entire set of media messages can be divided into two opposite groups: "agree" or "disagree"; "positive"
or "negative", etc. Thus, it is possible to group all the media into two opposite groups regarding some


                                                                                                         200
high-profile event, which one of the groups will support, and the other will be in opposition to the
first.
    For example, we will consider the scenario of an election campaign, when various media support
"their" presidential candidates, while leveling the ratings of their opponents. So, let's take 2
alternative media: Media 1 and Media 2, which broadcast information about the same Candidate X.
Media 1 determines the support of the Candidate X at the level of 0.9 (that is, believes that such a
candidate will win 90% of the vote in the elections). Media 2 determines the support of the same
Candidate X at the level of 0.1 (believes that this candidate will win only 10% of the vote in the
elections).
    The individual has his own opinion about Candidate X, which is expressed through his initial
beliefs 𝐴𝑝𝑟 . Also, an individual has his own degree of personality independence 𝐼𝑛𝑑 , which will
determine his ability to be influenced by the media. An individual has the opportunity to choose
between Media 1 and Media 2 in order to stay with his beliefs 𝐴𝑝𝑟 as long as possible (this is the
essence of personal information security to stay with his own views as long as possible without
being influenced by the media). With this approach, the key strategy for ensuring the informational
security of the individual will be the change in media exposure between the two alternatives, which
will satisfy formula (4). We will provide separate graphs and comment on possible options for
implementing the "media change" strategy.
    Fig. 1 shows that in the case (𝐴𝑝𝑟 = 0.9, 𝐼𝑛𝑑 = 0), when the individual supports Candidate X at a
level that coincides with Media 1, then keeping him in a state of information security is quite a
difficult task as Media 2 will sway him to its side. As soon as Media 2 sways the individual to its side,
the individual changes the source to Media 1 and now Media 1 will sway him to its side. All this
happens due to the degree of independence of such an individual is zero (𝐼𝑛𝑑 = 0) and therefore any
information polarizes his 𝑃𝑝𝑜𝑠𝑡 , that results ∆𝑃𝑝𝑜𝑠𝑡 = 0.8, which is the maximum value and indicates
the absence of any information security for such an individual.
    Consider the case when the individual's initial beliefs differ from the position of Media 1, for
example, with 𝐴𝑝𝑟 = 0.8, and his resistance to informational influence is sufficiently high (𝐼𝑛𝑑 =
0.8). In this case, it can be seen that any influence of Media 2 leads to a change individual's beliefs to
the contrary, but such an influence can be compensated by four inclusions of Media 1 and at the
same time the individual is able to ensure ∆𝑃𝑝𝑜𝑠𝑡 = 0.16 (Fig. 2).
    In the case when 𝐴𝑝𝑟 = 0.2, 𝐼𝑛𝑑 = 0.8, the picture will be symmetrical, because in this case our
individual is inclined to the position of Media 2, and at the same time, each influence from Media 1
can be compensated by four influences from Media 2. As in the previous case, the level information
security for an individual is provided at the level of ∆𝑃𝑝𝑜𝑠𝑡 = 0.16 (Fig. 3).




Figure 1: Simulation results at 𝐴𝑝𝑟 = 0.9, 𝐼𝑛𝑑 = 0.
                                                                                                      201
Figure 2: Simulation results at 𝐴𝑝𝑟 = 0.8, 𝐼𝑛𝑑 = 0.8.

                                             𝑦𝑖𝑒𝑙𝑑𝑠                                  𝑦𝑖𝑒𝑙𝑑𝑠
According to general logic, an increase in 𝐼𝑛𝑑 →     1 will lead to a decrease in ∆𝑃𝑝𝑜𝑠𝑡 →  0, which
will indicate the achievement of information security of the individual. So, with (𝐴𝑝𝑟 = 0.7, 𝐼𝑛𝑑 =
0.9) you can see that ∆𝑃𝑝𝑜𝑠𝑡 = 0.08. At the same time, the individual on average needs to change
media in a ratio of 2:1 in favor of Media 1. That is, one inclusion of Media 2 can be leveled by 2 3
inclusions of Media 1 (Fig. 4).




Figure 3: Simulation results at 𝐴𝑝𝑟 = 0.2, 𝐼𝑛𝑑 = 0.8.

                                                                                                202
Figure 4: Simulation results at 𝐴𝑝𝑟 = 0.7, 𝐼𝑛𝑑 = 0.9.

The general dependence of the information security of the individual ∆𝑃𝑝𝑜𝑠𝑡 on 𝐴𝑝𝑟 and 𝐼𝑛𝑑 is shown
in Fig. 5, where it is shown that with the increase of 𝐼𝑛𝑑 , the values of ∆𝑃𝑝𝑜𝑠𝑡 decrease almost linearly
and reach 0 when the value of 𝐼𝑛𝑑 = 1.
    At the same time, ∆𝑃𝑝𝑜𝑠𝑡 almost does not change with a change in the a priori beliefs of the
individual 𝐴𝑝𝑟 . In general, this corresponds to the logic of common sense, since the individual's
resistance to external informational influences depends mainly on his internal (innate) qualities or
character traits, and not on the position he occupies in relation to some event. Individual fluctuations
of ∆𝑃𝑝𝑜𝑠𝑡 values, which can be seen in Fig. 5, due to the fact that the indicated indicators are obtained
as a result of simulation.




Figure 5: Dependence of personal information security ∆𝑃𝑝𝑜𝑠𝑡 on 𝐴𝑝𝑟 and 𝐼𝑛𝑑 .

                                                                                                      203
   The average values of 𝐴𝑝𝑟 for different values of 𝐼𝑛𝑑 are shown in Table 1. As can be seen,
sufficiently low values of ∆𝑃𝑝𝑜𝑠𝑡 < 0.2 are observed at high values of 𝐼𝑛𝑑 > 0.7, which once again
confirms the conclusions made earlier.

Table 1
Average values of ∆𝑃𝑝𝑜𝑠𝑡 depending on 𝐼𝑛𝑑

          𝐼𝑛𝑑     0.0          0.1     0.2    0.3         0.4      0.5    0.6      0.7     0.8    0.9      1.0
        ∆𝑃𝑝𝑜𝑠𝑡    0.80     0.70       0.61    0.52        0.45     0.37   0.29     0.23    0.15   0.08    0.00

As can be seen from the previous discussion, in order to remain with his beliefs, the individual must
manipulate the information from the media by timely changing Media 1 to Media 2 and vice versa,
when these media force the individual to change his beliefs, moving away from their initial value.
Therefore, an interesting question is how often it is necessary to change sources of information to
ensure information security? To investigate this issue, let's turn to the developed model again and
determine the ratio of media change depending on 𝐴𝑝𝑟 and 𝐼𝑛𝑑 . The results of the study are shown
in Table 2.
As can be seen from Table 2, at low values of 𝐼𝑛𝑑 , the change of media is carried out uniformly in an
equal proportion between Media 1 and Media 2. When 𝐼𝑛𝑑 increases, in order to minimize ∆𝑃𝑝𝑜𝑠𝑡 ,
the individual must more often choose the media that is closer in position to the beliefs of the
individual himself. Otherwise, the minimum ∆𝑃𝑝𝑜𝑠𝑡 is not ensured. In the case when the individual
does not have clear initial beliefs 𝐴𝑝𝑟 ≈ 0.5, the media change is carried out proportionally evenly
(in our example 10/10).

Table 2
Dependence of the need to change the media on 𝐴𝑝𝑟 and 𝐼𝑛𝑑 to reach the minimum ∆𝑃𝑝𝑜𝑠𝑡

  𝐴𝑝𝑟      0.1           0.2          0.3           0.4           0.5        0.6          0.7       0.8          0.9
          Media     Media             Media     Media             Media    Media          Media    Media      Media
  𝐼𝑛𝑑
         1    2    1    2            1    2    1    2            1    2   1    2         1    2   1    2     1    2
  0.0    10 10     10 10             10 10     10 10             10 10    10 10          10 10    10 10      10 10
  0.1    2 18      10 10             10 10     10 10             10 10    10 10          10 10    10 10      13 7
  0.2    1 19      7 13              10 10     10 10             10 10    10 10          10 10    13 7       15 5
  0.3    1 19      7 13              10 10     10 10             10 10    10 10          10 10    13 7       16 4
  0.4    1 19      7 13              10 10     10 10             10 10    10 10          10 10    13 7       16 4
  0.5    1 19      6 14              7 13      10 10             10 10    10 10          13 7     14 6       17 3
  0.6    1 19      5 15              7 13      10 10             10 10    10 10          13 7     15 5       17 3
  0.7    1 19      5 15              7 13      10 10             10 10    12 8           13 7     15 5       18 2
  0.8    1 19      4 16              6 14      8 12              10 10    12 8           14 6     16 4       18 2
  0.9    1 19      4 16              6 14      8 12              10 10    12 8           14 6     16 4       19 1
  1.0    1 19      3 17              5 15      8 12              10 10    12 8           15 5     17 3       19 1


6. Conclusions
In order to ensure the personal information security of an individual, it is necessary to solve the
problem of assessing changes in his behavior under the influence of information from the media. At
the same time, the main goal will be to achieve such an indicator of independence of the individual
𝐼𝑛𝑑 , which would, with any efforts of the media, make it possible to ensure that the resulting value

                                                                                                                       204
of the posterior probability 𝑃𝑝𝑜𝑠𝑡 remains within the given limits of 𝐿𝑖𝑚 relative to the initial beliefs
of the individual 𝐴𝑝𝑟 . The main mechanism for achieving such a state is the control of the flow of
information coming to the individual from the media.
    The model of personal information security studied in this work is based on the concept of
managing information from the media with probabilistic control and evaluation of the individual's
behavior under the influence of the media. This makes it possible to explore various scenarios of
managing the media's information impact on a person and to choose an appropriate information
flow management technology in order to ensure the necessary level of its information security
∆𝑃𝑝𝑜𝑠𝑡 .
    Simulation of various scenarios of media flow management confirms the adequacy of the applied
model and indicates that a person with a high level of independence, with a well-thought-out media
change technology, is able to resist most informational influences and, thereby, ensure their own
information security at a given level.
    Future research can refine the model by integrating machine learning to predict behavior
dynamics under media influence and analyze content in real-time. Expanding the model to include
cultural and social factors will enable more personalized strategies for managing information flows,
improving individual information security.

Declaration on Generative AI
The authors have not employed any Generative AI tools.

References
[1] E. Schultz, Information security and the media, Computers & Security 22 (2003) 652 653.
    doi:10.1016/S0167-4048(03)00001-4.
[2] N. Patnayakuni, R. Patnayakuni, Jatinder N. D. Gupta, Towards a Model of Social Media Impacts
    on Cybersecurity Knowledge Transfer: An Exploration, in Ritesh Chugh, Harnessing Social
    Media as a Knowledge Management Tool, IGI Global, Alabama Univ., 2017, pp. 249 272.
    doi:10.4018/978-1-5225-0495-5.ch012.
[3] T. Ashuri, S. Dvir-Gvisman, R. Halperin, Watching Me Watching You: How Observational
    Learning Affects Self-disclosure on Social Network Sites?, Journal of Computer-Mediated
    Communication 23(1) (2018) 34 68. doi:10.1093/jcmc/zmx003.
[4] Z. Hao Goh, M. Hou, H. Cho, The impact of a cause effect elaboration procedure on
    information security risk perceptions: a construal fit perspective, Journal of Cybersecurity
    8(1) (2022). doi:10.1093/cybsec/tyab026.
[5] 5. N. Higdon, The critical effect: Exploring the influence of critical media literacy pedagogy on
                                                                                     Media Literacy
    Education 14(1) (2022) 1-13. doi:10.23860/JMLE-2022-14-1-1.
[6] O. O. Razuvaeva, Models of mass media influence on mass political consciousness, Scientific
    notes       of     the    Institute      of    Journalism      18      (2005)      35 40.    URL:
    http://journlib.univ.kiev.ua/index.php?act=article&article=1659.
[7] J. Bryant, S. Thompson, B. W. Finklea, Fundamentals of Media Effects: Second Edition. Waveland
    Press, 2012, 410 p. ISBN 1478608196, 9781478608196.
[8] D. S. Petrosyan, Heuristic mathematical models of human behavior as an economic agent, in
    Institutional economics: management of the formation and development of socio-economic
    institutions, Infra-M, 2022, 279 p. doi:10.12737/970.
[9] S. Page, Model thinking. How to analyze complex phenomena using mathematical models, 2020,
    528 p. ISBN 978-5-00146-867-7.



                                                                                                     205
[10] V. Savchenko, T. Dzyuba, V. Savchenko, O. Matsko, I. Novikova, I. Havryliuk, V. Polovenko,
     Time aspect of insider threat mitigation, Advances in Military Technology 19(1) (2024) 129 144.
     doi:10.3849/aimt.01830.
[11] O. Laptiev, V. Savchenko, A. Kotenko, V. Akhramovych, V. Samosyuk, G. Shuklin, A. Biehun,
     Method of Determining Trust and Protection of Personal Data in Social Networks, International
     Journal of Communication Networks and Information Security (IJCNIS) 13(1) (2021)          URL:
     https://www.ijcnis.org/index.php/ijcnis/article/view/4882.
[12] V. Savchenko, V. Akhramovych, O. Matsko, and I. Havryliuk. Method of Calculation of
     Information Protection from Clusterization Ratio in Social Networks                  Workshop
     Proceedengs Information security and information technologies
     Odesa, Ukraine, 2021,         URL: https://ceur-ws.org/Vol-3200/paper4.pdf.
[13] V. Savchenko, V. Akhramovych, T. Dzyuba, S. Laptiev, N. Lukova-Chuiko and T. Laptieva,

                         IEEE 3rd International Conference on Advanced Trends in Information
     Theory (ATIT), Kyiv, Ukraine, 2021, 99 105, doi: 10.1109/ATIT54053.2021.9678599.
[14] H. Haidur, S. Gakhov, V. Marchenko, K. Haidur, A conceptual model for detecting phishing
     attacks based on the use of support vector methods, Modern information security 2(58) (2024)
     24 33. doi:10.31673/2409-7292.2024.020003.
[15] K. Molodetska, Analysis of Modern Approaches to the Transformation of Social Systems in
     Postmodern Society, in P.            S. Fedushko, K. Gubíniová, (eds) Data-Centric Business and
     Applications. Lecture Notes on Data Engineering and Communications Technologies, 208,
     Springer, Cham., 2024. doi:10.1007/978-3-031-59131-0_4.
[16] S. Fedushko, K. Molodetska, Y.
     communication of the online communities users, Social Network Analysis and Mining, 13:18
     (2023). doi:10.1007/s13278-022-01021 4.
[17] V. V. Breyer, Models of conforming behavior. Part 1. From philosophy to mathematical models,
     Management               problems             1            (2014)           2 13.          URL:
     https://econpapers.repec.org/article/scn009530/14508003.htm.
[18] P. S. Krasnoshchokov, The simplest mathematical model of behavior. Psychology of conformity,
     Mathematical Modeling 10(7) (1998) 76 92.
[19] O. S. Vetlytska, A model for assessing the impact of sociological information on human behavior
     in the context of its information security. Telecommunications and Information Technologies
     4(77) (2022) 35 45. doi:10.31673/2412-4338.2022.043545.
[20] O. S. Vetlytska, Model of information security of the individual against the influence of
     sociological information. Modern information protection 3(59) (2024) 29 41. doi:10.31673/2409-
     7292.2024.030003.
[21] C. Capuano, P. Chekroun, A Systematic Review of Research on Conformity. International
     Review of Social Psychology 37(1) 13 (2024) 1 23. doi:10.5334/irsp.874.
[22] Y. Chen, J. Zhuang, Trend Conformity Behavior of Luxury Fashion Products for Chinese
     Consumers in the Social Media Age: Drivers and Underlying Mechanisms, Behavioral Sciences
     14(7):521 (2024). doi:10.3390/bs14070521.
[23] G. P. Wang, S. Yu Chen, X. Yang, J. Liu, Modeling and analyzing of conformity behavior: A fuzzy
     logic approach, Optik, 125(21) (2014), 6594 6598. doi:10.1016/j.ijleo.2014.07.082.
[24] A. Mohammadpour, A. Mohammad-Djafari, An alternative inference tool to total probability
     formula and its applications (2003). doi:10.1063/1.1835217.




                                                                                                206