IJCNIS Vol. 17, No. 5, 8 Oct. 2025
Cover page and Table of Contents: PDF (size: 812KB)
PDF (812KB), PP.1-14
Views: 0 Downloads: 0
Information Confrontation, Information Warfare, Model, Ontological Model, Subject, Object, Information Impact, System, Set, Subset, Interconnection
The information stage of human society development which began at the end of the last century results in the fact that the state of information security has become directly dependent not only on the information processing technical systems and features but also on the perception of information at the level of individual psychological qualities. The use of information aggression and special information operations including those performed in modern geopolitics at the international and domestic levels for population management, during electoral campaigns is gaining enormous scope. The tasks of early information impact detection, situation development modeling in the information space necessitate the development of specialized models reproducing information confrontation. The major contradiction in the development of such models is that the more relevant and adaptive these models are the more complex and resource-intensive they become. At the same time, oversimplifying the information confrontation process makes such models inconsistent with real risks. This article gives a brief overview of modern information confrontation models and concepts. It is described the basic principles of the construction of an information confrontation ontological model: such key elements as subjects, objects, actual impacts, and the basic characteristics of each element are identified. An attempt has been made to develop a universal information confrontation ontological model. It has been also proposed a multipart tuple of information confrontation representation. This article is the beginning of a separate research project on information confrontation modeling, which will be further developed in papers to follow.
Andrii Gizun, Vladyslav Hriha, Ruslana Ziubina, "Fundamental Principles of the Information Confrontation Ontological Model Construction", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.5, pp.1-14, 2025. DOI:10.5815/ijcnis.2025.05.01
[1]S.N. Hriniaiev, RAND Corporation Experts on an Information Strategy. http://attend.to/commi
[2]Terms and definitions. http://lektsii.com/2-119431.html.
[3]Ye.D. Skulysh, History of information and psychological confrontation: textbook. Scientific-ed. Department of National Academy of the Security Service of Ukraine, 2012, 212 p.
[4]A.V. Dudatiev, Information Security of Sociotechnical Systems in the Conditions of Information War, Information Technology and Computer Engineering.3 (22), 2011, pp. 75-79.
[5]V.A. Lipkan, Yu.Ye. Maksymenko and V.M. Zhelikhovskyi, Information Security of Ukraine in the Conditions of European Integration. KNT, 2006, 280 p.
[6]M.M. Prysiazhniuk, I.V. Pampukha and V.M. Petryk, Basic concepts and features of conducting special information operations, http://nbuv.gov.ua/UJRN/Znpviknu_2014_46_19
[7]Information-analytical activity. http://megalib.com/content/2014_51_Ponyattya_i_sytnist_informaciinih_viin.html
[8]Ye.A. Makarenko, M.M. Ryzhkov, M.A. Ozhevan, International Information Security: Contemporary Challenges and Threats. Tsentr vilnoi presy, 2006, 916 p.
[9]International information security as an actual problem of modern times. https://naub.oa.edu.ua/2010/mizhnarodna-informatsijna-bezpeka-yak-aktualna-problema-suchasnosti/
[10]R.V. Hryshchuk, I.O. Kankin & V.V. Okhrimchuk, Technological Aspects of Information Confrontation at the Current Stage. Protection of Information. 17(1), 2015, pp. 80-86.
[11]A.V. Manoilo, Objects and subjects of information confrontation. http://www.cryptography.ru/
[12]V.V. Tsyganov, S.N. Bukharin, V.V. Vasin, Intellectual mechanisms of information warfare. Problems of management. part 1. pp. 25-30.
[13]A.V. Dudatiev, Complex Information Security of Sociotechnical Systems: Impact and Protection Models. VNTU, 2017, 128 p.
[14]A.I. Gizun, V.S. Hriha, Analysis of modern information and psychological impact theories in terms of information confrontation. Security of information. 22(3), 2016, pp. 272-282.
[15]CEPA. http://infowar.cepa.org/
[16]L. Cox, Planning for psychological operations: a proposal..Air Command and Staff College, Maxwell Air Force Base, 1997, 89 р.
[17]V.L. Buriachok, Possibility of security assurance against information-psychological influence based on the universal ontology method. Modern information security №4, 2013, pp. 57-67.
[18]L.S. Johnson, Toward a Functional Model of Information Warfare. Center for the Study of Intelligence, 1997, 8 p.
[19]R.W. Pew, Modeling Human and Organizational Behavior: Application to Military Simulations. National Academy Press, 1998, 418 p.
[20]J. Jormakka, Modelling Information Warfare as a Game. Journal of Information Warfare. 4(12), 2005, 25 р.
[21]B. Hutchinson, Information Warfare: Using the Viable System Model as a framework to attack organizations. Australasian Journal of Information Systems. 9(2). 2002. pp. 1-10.
[22]B. Van Niekerk, The Information Warfare Life Cycle Model. SA Journal of Information Management. 13, 2011, pp. 1-9.
[23]V. Ostroukhov, To the problem of Ukraine`s information security assurance. National security, political management, №4, 2008, pp. 135-141.
[24]T.M. Dziuba, The state`s information security in the military sphere: scientific method. edition NUOU, 2012, 264 p.
[25]A. Gizun, V. Hriha, M. Roshchuk, Y. Yevchenko and Z. Hu, Method of informational and psychological influence evaluation in social networks based on fuzzy logic. CEUR Workshop Proceedings, 2019, http://ceur-ws.org/Vol-2392/paper1.pdf.
[26]B. Zahran, J. AL-Azzeh, A. Gizun, V. Hriha and B. Bystrova, Developing an expert system for assessment of information psychological influence, Indonesian Journal of Electrical Engineering and Computer Science, 15(3), 2019, pp. 1571-1577.
[27]M.P. Karpinskyi, A.O. Korchenko and A.I. Gizun, An integrated model for crisis presentation and a formalized procedure for building standards for identifying parameters.Legal, regulatory and metrological support for the information security system in Ukraine, №1 (29), 2015, pp. 76-85.