Destructive information influence and its implementation

Keywords: information security, destructive informational influence, special information operations, national security of Ukraine, democratic society, cyberterrorism.

Abstract

With the dynamic development of political, economic and military processes, the guarantee of the national security in the information space is an essential element that significantly changes the appropriate functioning of any country. The current state of affairs in the context of the mainstreaming of the Ukrainian factor in the information warfare requires improvements of state institutions to counter Russian Federation destructive informational influence and its special information operations. Taking into account theoretical and applied research on the issue, it is worth mentioning that destructive information impact requires a systematic and integrated approach to problem solving. In the research authors investigate theoretical aspects of destructive informational influence and determine prior directions of the use in information warfare against Ukraine by Russian Federation. Scientific methods of modern epistemology are applied in accordance with the aim of the research. On the methodological basis of the study, the cognitive theory as a fundamental principle is used by experts in the field of information security. The results of analysis of theoretical research aspects of Ukrainian and foreign scholars determine priorities for the enemy to use destructive informational influence on Ukraine and the most vulnerable areas in information space of the country.

Downloads

Download data is not yet available.

Author Biographies

Yuliana Naidon, National Academy of the Security Service of Ukraine, Kyiv, Ukraine.

Doctor of Science in Law, Associate Professor, Vice-rector for scientific work, National Academy of the Security Service of Ukraine, Kyiv, Ukraine.

Serhii Naumiuk, Security Service of Ukraine, Kyiv, Ukraine.

Ph.D (Law), Security Service of Ukraine, Kyiv, Ukraine.

Yevhenii Rybynskyi, Security Service of Ukraine, Kyiv, Ukraine.

Ph.D (Law), Security Service of Ukraine, Kyiv, Ukraine.

Olena Kravchenko, National Academy of the Security Service of Ukraine, Kyiv, Ukraine.

Ph.D (Law), National Academy of the Security Service of Ukraine, Kyiv, Ukraine.

Nataliia Buriak, Security Service of Ukraine, Kyiv, Ukraine.

Security Service of Ukraine, Kyiv, Ukraine.

References

Alberts, D., Garstka, J., Hayes, R., & Signori, D. (2001) Understanding Information Age Warfare. CCRP Publication Series. URL: http://www.dodccrp.org/files/Alberts_UIAW.pdf

Chernysh, R., Pogrebnaya, V.L., Montrin, I.I., Koval, T.V., & Paramonova, O.S. (2020). Development of Internet communication and social networking in modern conditions: institutional and legal aspects. Revista San Gregorio (special issues Nov). Url: http://revista.sangregorio.edu.ec/index.php/REVISTASANGREGORIO/article/view/1572

Chernysh, R., Prozorov, A., Tytarenko, Y., Matsiuk, V., & Lebedev, O. (2022). Legal and organizational aspects of destructive information impact counteracting: the experience of Ukraine and the European Union. Amazonia Investiga, 11(54), 169-177. https://doi.org/10.34069/AI/2022.54.06.16

Demyanenko, M. (2017) NATO's experience in creating an effective information and psychological combat system. Resonance, 23, pp. 3-17. URL: http://nbuviap.gov.ua/images/rezonans/2017/rez23.pdf (In Ukranian)

Department of the Army (2003) Psychological Operations Tactics, Techniques, and Procedures. URL: https://irp.fas.org/doddir/army/fm3-05-301.pdf

Dulles, A. (1966). The Secret Surrender. Harper & Row. URL: https://books.google.de/books/about/The_Secret_Surrender.html?id=b3kNAAAAIAAJ&redir_esc=y

Fromm, E. (2019). Escape from freedom / Erich Fromm; translation from English M. Yakovlev. Kharkiv: Book Club «Family Leisure Club», 288 p. URL: https://chtyvo.org.ua/authors/Fromm_Erich/Vtecha_vid_svobody/

Libicki, M. (1995) What is information warfare? Washington: National Defense University Press, 104 p. URL: http://www.dodccrp.org/files/Libicki_What_Is.pdf

MISO (2010). Military Information Support Operations. URL: https://jfsc.ndu.edu/Portals/72/Documents/JC2IOS/Additional_Reading/1C1_JP_3-13-2.pdf

Petryk, V. (2009). The essence of information security of the state, society and the individual. Legal magazine, 5. URL: http://www.justinian.com.ua/article.php?id=3222. (In Ukranian)

Ron, T. (1976). Weapon Systems and Information War / Boeing Aerospace Co. Seattle: WA. URL: https://acortar.link/78jebT

Sitnikova, I. (2022). In russia, they showed a story about the destruction of the «barge with the Ukrainian landing party» near the ZNPP. But actually they fired at the bridge support. Hromadske. URL: https://acortar.link/xczMN9 (In Ukranian)

Sviderska, O. (2018). Digital propaganda and information security risks in the context of the Russian-Ukrainian war. Scientific magazine «Politician». URL: http://politicus.od.ua/ (In Ukranian)

Svitlana, V., Onyshchuk, I.I., Onyshchuk, O.P., & Chernysh, R. (2020). Financial Stability and its Impact on National Security State: Organizational and Legal Aspects. International Journal of Economics and Business Administration, VIII (1), pp. 353-365.

Vlasenko, T.O., Chernysh, R.F., Dergach, A.V., Lobunets, T.V., & Kurylо, O.B. (2020). Investment Security Management in Transition Economies: Legal and Organizational Aspects. International Journal of Economics and Business Administration, VIII (2), pp. 200-209.
Published
2022-11-30
How to Cite
Naidon, Y., Naumiuk, S., Rybynskyi, Y., Kravchenko, O., & Buriak, N. (2022). Destructive information influence and its implementation. Amazonia Investiga, 11(58), 65-73. https://doi.org/10.34069/AI/2022.58.10.7
Section
Articles
Bookmark and Share