Abstract
The article is devoted to the unification of approaches to the analysis of the public information environment, as well as the coordination of efforts to counter information aggression on a decentralized basis. The purpose of the study is to establish the main features and principles of the formation of an expert-analytical product within the framework of strengthening the security capacity of Ukrainian society. The value of a quick asymmetric information response in the form of discrediting the source, disavowing the information provided and/or using errors or mistakes in the information provided to one’s advantage is characterized. It was emphasized that the targeting of political and security content should also take into account the socio-demographic and behavioral characteristics (data) of the community to which the information is directed. The creativity of the expert-analytical security product is analyzed, which means a creative approach to counter hostile informational provocations and invasions. The importance of the principle of responsiveness, which means the compliance of the appearance of content with time dimensions and the requirements of the political and security situation, is revealed. It was found that the appearance of expert political and security materials should precede the events, be carried out according to the plan of media events, as well as within the framework of crisis situations. It was revealed that the empirical nature of the expert-analytical product involves the use of various models for assessing threats to political security. It is proven that the development of various scenarios of expert public content contributes to the development of the political situation in the future in the desired direction. It has been established that the expert-analytical product of public direction (reports, assessments, analytical summaries, etc.) should not only be broadcast in an accessible (understandable) language. It is assumed that the complexity and completeness of information means its completeness in terms of known and unknown facts. It has been established that the value neutrality of communication messages means avoiding the promotion of ideological messages and motivational components, except when such materials are not included in special promotions and operations. It was found that open discussion leaves the possibility of the information consumer to interactively interact with the text of the message and data. It was concluded that a promising direction of information security activity is asymmetric action in relation to operational massive support of political actions of hostile power institutions on the international arena.
Publisher
Oles Honchar Dnipropetrovsk National University
Reference11 articles.
1. Abe, T., Hayashi, S., Saeki, M. (2013). Modeling security threat patterns to derive negative scenarios. Proceedings of the XXth Asia-Pacific Software Eng. Conference, 1. IEEE, 58-66
2. Agency CIS. (2023). CISA security bulletins. Retrieved May 23, 2024 from https://www.cisa.gov/uscert/ncas/bulletins
3. Aradau, C., Huysmans, J., Neal, A., Voelkner, N. (2014). Introducing critical security methods. Retrieved May 23, 2024 from https://pure.rug.nl/ws/portalfiles/portal/247700599/10.4324_9781315881549_6_chapterpdf.pdf
4. Fredriksen, R., Kristiansen, M., Gran B.A., et al. (2002). The CORAS framework for a model-based risk management process, in: Proceedings. of the 21st International Conference on Computer Safety, Reliability, and Security. Springer. 94-105.
5. Gamma, E., Helm, R., Johnson, R. et al. (1995). Design Patterns: Elements of Reusable Object-oriented Software. Addison Wesley, Boston.