Abstract
Heterogeneous differential dependencies of the information security indicator (HDISI) in social media (SM) were analyzed, taking into account the duration of the path between clients (UDPC). The resilience of the information security indicator system (RSIIS) was also determined. The HDISI in SM was developed based on UDPC conditions. It uses modern methods and techniques, including a non-specific method. The conditions of a fixed precondition were formed according to the time grid. This dependency provides a comprehensive explanation of how the previous transformation is replaced by the elapsed period. SM is a set of clients and their types of communication. Clients can be individuals, populations, settlements, or countries. Communication is understood as more than just the transmission and receipt of information. It also includes interaction, the exchange of knowledge and expertise, and discussion. Under the angle of mathematics, the HDISI model based on non-homogeneous differential equations (NDE) was analyzed and its transcendental study was done. The transcendental study of nonlinear HDISI models in SM showed that the characteristics of UDPC significantly affect the information security indicator (ISI) - up to one hundred percent. Phase diagrams (PDs) of ISI were studied, which indicate the highest ISI even at the maximum parameters of malicious actions. For the first time, the analysis of designed HDISI structures was carried out and numerical criteria between the capabilities of UDPC and the measures of ISI, as well as the highest ISI, were obtained, which shows the scientific content of this article.
Reference18 articles.
1. Akhramovych V. et al.: Devising a Procedure to Determine the Level of Informational Space Security in Social Networks Considering Interrelations Among Users. Eastern-European Journal of Enterprise Technologies 1 (9(115)), 2022, 63–74.
2. Akhramovych V.: Method of Calculation of Protection of Information from the Average Length of the Road Between Users in Social Networks. Collection Information Technology and Security 10(2), 2022, 153–164.
3. Gubanov D., Chkhartishvili A.: A Conceptual Approach to the Analysis of Online Social Networks. Large-Scale Systems Control 45, 2013, 222–236.
4. Hanneman R., Riddle M.: Introduction to Social Network Methods [https://faculty.ucr.edu/~hanneman/nettext/C7_Connection.html#distance].
5. Khrashchevskyi R. et al.: Method of Calculating Information Protection from Mutual Influence of Users in Social Networks. International Journal of Computer Network and Information Security – IJCNIS 15(5), 2023, 27–40 [https://doi.org/10.5815/ijcnis.2023.05.03].