v. 11 n. 58 (2022)
Articles

Destructive information influence and its implementation

Yuliana Naidon
National Academy of the Security Service of Ukraine, Kyiv, Ukraine.
Biografia do Autor

Doctor of Science in Law, Associate Professor, Vice-rector for scientific work, National Academy of the Security Service of Ukraine, Kyiv, Ukraine.

Serhii Naumiuk
Security Service of Ukraine, Kyiv, Ukraine.
Biografia do Autor

Ph.D (Law), Security Service of Ukraine, Kyiv, Ukraine.

Yevhenii Rybynskyi
Security Service of Ukraine, Kyiv, Ukraine.
Biografia do Autor

Ph.D (Law), Security Service of Ukraine, Kyiv, Ukraine.

Olena Kravchenko
National Academy of the Security Service of Ukraine, Kyiv, Ukraine.
Biografia do Autor

Ph.D (Law), National Academy of the Security Service of Ukraine, Kyiv, Ukraine.

Nataliia Buriak
Security Service of Ukraine, Kyiv, Ukraine.
Biografia do Autor

Security Service of Ukraine, Kyiv, Ukraine.

Publicado 2022-11-30

Palavras-chave

  • information security, destructive informational influence, special information operations, national security of Ukraine, democratic society, cyberterrorism.

Como Citar

Naidon, Y., Naumiuk, S., Rybynskyi, Y., Kravchenko, O., & Buriak, N. (2022). Destructive information influence and its implementation. Amazonia Investiga, 11(58), 65–73. https://doi.org/10.34069/AI/2022.58.10.7

Resumo

With the dynamic development of political, economic and military processes, the guarantee of the national security in the information space is an essential element that significantly changes the appropriate functioning of any country. The current state of affairs in the context of the mainstreaming of the Ukrainian factor in the information warfare requires improvements of state institutions to counter Russian Federation destructive informational influence and its special information operations. Taking into account theoretical and applied research on the issue, it is worth mentioning that destructive information impact requires a systematic and integrated approach to problem solving. In the research authors investigate theoretical aspects of destructive informational influence and determine prior directions of the use in information warfare against Ukraine by Russian Federation. Scientific methods of modern epistemology are applied in accordance with the aim of the research. On the methodological basis of the study, the cognitive theory as a fundamental principle is used by experts in the field of information security. The results of analysis of theoretical research aspects of Ukrainian and foreign scholars determine priorities for the enemy to use destructive informational influence on Ukraine and the most vulnerable areas in information space of the country.

Downloads

Não há dados estatísticos.

Referências

Alberts, D., Garstka, J., Hayes, R., & Signori, D. (2001) Understanding Information Age Warfare. CCRP Publication Series. URL: http://www.dodccrp.org/files/Alberts_UIAW.pdf

Chernysh, R., Pogrebnaya, V.L., Montrin, I.I., Koval, T.V., & Paramonova, O.S. (2020). Development of Internet communication and social networking in modern conditions: institutional and legal aspects. Revista San Gregorio (special issues Nov). Url: http://revista.sangregorio.edu.ec/index.php/REVISTASANGREGORIO/article/view/1572

Chernysh, R., Prozorov, A., Tytarenko, Y., Matsiuk, V., & Lebedev, O. (2022). Legal and organizational aspects of destructive information impact counteracting: the experience of Ukraine and the European Union. Amazonia Investiga, 11(54), 169-177. https://doi.org/10.34069/AI/2022.54.06.16

Demyanenko, M. (2017) NATO's experience in creating an effective information and psychological combat system. Resonance, 23, pp. 3-17. URL: http://nbuviap.gov.ua/images/rezonans/2017/rez23.pdf (In Ukranian)

Department of the Army (2003) Psychological Operations Tactics, Techniques, and Procedures. URL: https://irp.fas.org/doddir/army/fm3-05-301.pdf

Dulles, A. (1966). The Secret Surrender. Harper & Row. URL: https://books.google.de/books/about/The_Secret_Surrender.html?id=b3kNAAAAIAAJ&redir_esc=y

Fromm, E. (2019). Escape from freedom / Erich Fromm; translation from English M. Yakovlev. Kharkiv: Book Club «Family Leisure Club», 288 p. URL: https://chtyvo.org.ua/authors/Fromm_Erich/Vtecha_vid_svobody/

Libicki, M. (1995) What is information warfare? Washington: National Defense University Press, 104 p. URL: http://www.dodccrp.org/files/Libicki_What_Is.pdf

MISO (2010). Military Information Support Operations. URL: https://jfsc.ndu.edu/Portals/72/Documents/JC2IOS/Additional_Reading/1C1_JP_3-13-2.pdf

Petryk, V. (2009). The essence of information security of the state, society and the individual. Legal magazine, 5. URL: http://www.justinian.com.ua/article.php?id=3222. (In Ukranian)

Ron, T. (1976). Weapon Systems and Information War / Boeing Aerospace Co. Seattle: WA. URL: https://acortar.link/78jebT

Sitnikova, I. (2022). In russia, they showed a story about the destruction of the «barge with the Ukrainian landing party» near the ZNPP. But actually they fired at the bridge support. Hromadske. URL: https://acortar.link/xczMN9 (In Ukranian)

Sviderska, O. (2018). Digital propaganda and information security risks in the context of the Russian-Ukrainian war. Scientific magazine «Politician». URL: http://politicus.od.ua/ (In Ukranian)

Svitlana, V., Onyshchuk, I.I., Onyshchuk, O.P., & Chernysh, R. (2020). Financial Stability and its Impact on National Security State: Organizational and Legal Aspects. International Journal of Economics and Business Administration, VIII (1), pp. 353-365.

Vlasenko, T.O., Chernysh, R.F., Dergach, A.V., Lobunets, T.V., & Kuryl?, O.B. (2020). Investment Security Management in Transition Economies: Legal and Organizational Aspects. International Journal of Economics and Business Administration, VIII (2), pp. 200-209.