{"id":7943,"date":"2021-08-31T19:00:05","date_gmt":"2021-08-31T16:00:05","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=7943"},"modified":"2021-09-29T14:14:14","modified_gmt":"2021-09-29T11:14:14","slug":"metod-kompyuternogo-prognozuvannya-povedinky-propagandysta-pry-zvorotnomu-psyhologichnomu-vplyvi","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=7943","title":{"rendered":"\u041c\u0435\u0442\u043e\u0434 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u043f\u043e\u0432\u0435\u0434\u0456\u043d\u043a\u0438 \u043f\u0440\u043e\u043f\u0430\u0433\u0430\u043d\u0434\u0438\u0441\u0442\u0430 \u043f\u0440\u0438 \u0437\u0432\u043e\u0440\u043e\u0442\u043d\u043e\u043c\u0443 \u043f\u0441\u0438\u0445\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u043e\u043c\u0443 \u0432\u043f\u043b\u0438\u0432\u0456"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041c\u0415\u0422\u041e\u0414 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u041e\u0413\u041e \u041f\u0420\u041e\u0413\u041d\u041e\u0417\u0423\u0412\u0410\u041d\u041d\u042f \u041f\u041e\u0412\u0415\u0414\u0406\u041d\u041a\u0418 \u041f\u0420\u041e\u041f\u0410\u0413\u0410\u041d\u0414\u0418\u0421\u0422\u0410 \u041f\u0420\u0418 \u0417\u0412\u041e\u0420\u041e\u0422\u041d\u041e\u041c\u0423 \u041f\u0421\u0418\u0425\u041e\u041b\u041e\u0413\u0406\u0427\u041d\u041e\u041c\u0423 \u0412\u041f\u041b\u0418\u0412\u0406<\/p>\n<p style=\"text-align: center;\">METHOD FOR COMPUTER PREDICTION OF THE PROPAGANDIST&#8217;S BEHAVIOR UNDER THE REVERSE PSYCHOLOGICAL INFLUENCE<\/p>\n<p><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 51-57. \u041d\u043e\u043c\u0435\u0440: \u21163, 2021 (297)<\/strong> <a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/08\/11-2.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u042f. \u0412. \u0422\u0410\u0420\u0410\u0421\u0415\u041d\u041a\u041e<br \/>\n\u0427\u0435\u0440\u043a\u0430\u0441\u044c\u043a\u0438\u0439 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nYaroslav V. TARASENKO<br \/>\nCherkasy State Technological University<br \/>\n<strong>DOI:<\/strong>\u00a0<a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2021-297-3-51-57\">https:\/\/www.doi.org\/10.31891\/2307-5732-2021-297-3-51-57<\/a><br \/>\n<strong>\u041d\u0430\u0434\u0456\u0439\u0448\u043b\u0430 \/ Paper received :\u00a0 <\/strong>19.04.2021 \u0440<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430 \/ Paper Printed : <\/strong>30.06.2021 \u0440<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e \u043c\u0435\u0442\u043e\u0434 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u043f\u043e\u0432\u0435\u0434\u0456\u043d\u043a\u0438 \u043f\u0440\u043e\u043f\u0430\u0433\u0430\u043d\u0434\u0438\u0441\u0442\u0430 \u043f\u0440\u0438 \u0437\u0432\u043e\u0440\u043e\u0442\u043d\u043e\u043c\u0443 \u043f\u0441\u0438\u0445\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u043e\u043c\u0443 \u0432\u043f\u043b\u0438\u0432\u0456. \u0412 \u0445\u043e\u0434\u0456 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0431\u0443\u043b\u043e \u0432\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u043e \u043c\u0435\u0442\u043e\u0434 \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u043f\u043e\u0432\u0435\u0434\u0456\u043d\u043a\u0438 \u043b\u044e\u0434\u0438\u043d\u0438 \u0432 \u0441\u043e\u0446\u0456\u0430\u043b\u044c\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436\u0430\u0445, \u0449\u043e \u0434\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0432\u0438\u0440\u0456\u0448\u0438\u0442\u0438 \u0437\u0430\u0434\u0430\u0447\u0443 \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043d\u044f \u0442\u043e\u0447\u043d\u043e\u0441\u0442\u0456 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u043f\u043e\u0432\u0435\u0434\u0456\u043d\u043a\u0438 \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u0438\u043a\u0430 \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u043f\u0440\u043e\u0442\u0438\u0434\u0456\u0457 \u0434\u0435\u0441\u0442\u0440\u0443\u043a\u0442\u0438\u0432\u043d\u0456\u0439 \u043f\u0440\u043e\u043f\u0430\u0433\u0430\u043d\u0434\u0456. \u0420\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0438 \u0435\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u0443 \u0434\u043e\u0432\u043e\u0434\u044f\u0442\u044c \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u0442\u0430 \u0432\u0438\u0441\u043e\u043a\u0443 \u0442\u043e\u0447\u043d\u0456\u0441\u0442\u044c \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443, \u044f\u043a\u0430 \u043d\u0430 4% \u0432\u0438\u0449\u0435 \u0437\u0430 \u0442\u043e\u0447\u043d\u0456\u0441\u0442\u044c \u0431\u0430\u0437\u043e\u0432\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443 \u0442\u0430 \u0437\u0430 \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u043e\u043c \u0437\u0440\u043e\u0441\u0442\u0435 \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u043f\u0440\u043e\u0442\u0438\u0434\u0456\u0457 \u0434\u0435\u0441\u0442\u0440\u0443\u043a\u0442\u0438\u0432\u043d\u0456\u0439 \u043f\u0440\u043e\u043f\u0430\u0433\u0430\u043d\u0434\u0456.<br \/>\n\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430: \u043f\u0441\u0438\u0445\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u0439 \u0432\u043f\u043b\u0438\u0432, \u043f\u0440\u043e\u0442\u0438\u0434\u0456\u044f \u043f\u0440\u043e\u043f\u0430\u0433\u0430\u043d\u0434\u0456, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043f\u0441\u0438\u0445\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0435 \u043f\u0440\u043e\u0442\u0438\u0431\u043e\u0440\u0441\u0442\u0432\u043e, \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u0434\u0456\u0439 \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u0438\u043a\u0430, \u043f\u0441\u0438\u0445\u043e\u043b\u0456\u043d\u0433\u0432\u0456\u0441\u0442\u0438\u0447\u043d\u0438\u0439 \u043f\u043e\u0440\u0442\u0440\u0435\u0442, \u043f\u0440\u043e\u0444\u0430\u0439\u043b\u0456\u043d\u0433.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>It was solved the actual problem of improving the accuracy of computer prediction of the malefactor&#8217;s behavior under the conditions of counteracting destructive propaganda, which allowed, taking into account the psycholinguistic study of the propagandist&#8217;s behavior, to take into account the peculiarities of the reverse psychological influence on him in order of building the most effective strategy for countering information propaganda. At the same time, the profiling approach has been improved to adapt it to the possibility of predicting the propagandist&#8217;s behavior in order to increase the efficiency of further use of a specialized quantum-semantic psycholinguistic analysis method. The method of predicting human behavior in social networks has been improved on the basis of the quantum-semantic psycholinguistic analysis method for the English-language text of propaganda discourse to take into account the peculiarities of information warfare in predicting. It was improved the forecasting accuracy for more efficient distribution of probabilistic estimates of the forecast in order to identify the most probable options for further malefactor&#8217;s actions. To prove the effectiveness and accuracy of the developed method, an evaluation of its functioning was conducted. The operation of some key modules of the advanced method was investigated experimentally. It was revealed an increase in the average accuracy of the malefactor&#8217;s actions prediction by 1% before the beginning of counteraction to the information and psychological influence and by 4% after the beginning of counteraction. It is expected to increase the percentage of efficiency in the application of the method in the process of counteracting destructive propaganda in the real conditions of the reverse psychological influence. The results of the study can be used by the subjects of combating destructive information and psychological influence in the further adjusting general strategy of counteraction to information propaganda in order to protect citizens from destructive information influence.<br \/>\nKeywords: psychological influence, counter propaganda, information-psychological warfare, predicting the malefactor\u2019s actions, psycholinguistic portrait, profiling.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>On the decision of the National Security and Defense Council of Ukraine from December 29, 2016 \u00abAbout the Doctrine of information security of Ukraine\u00bb : Decree of the President of Ukraine from February 25, 2017 \u211647\/2017 [Electronic resource]. \u2013 Available at : https:\/\/zakon.rada.gov.ua\/laws\/show\/47\/2017#Text. \u2013 (accessed on: May 03, 2021).<\/li>\n<li>Kobilnyk B.Yu. The role of information and psychological influences in information warfare \/ B.Yu. Kobilnyk, A.I. Hizun \/\/ Current challenges and achievements in the field of cybersecurity: proceedings of the Ukrainian scientific-practical conference (Kropyvnytskyi, November 23-25, 2016). \u2013 P. 28-29.<\/li>\n<li>Tarasenko Ya.V. Using the principles of quantum linguistics in information warfare \/ Ya.V. Tarasenko \/\/ Ukrainian Scientific Journal of Information Security. \u2013 2019. \u2013 \u2116 25 (2). \u2013 P. 96-103. \u2013 DOI: https:\/\/doi.org\/10.18372\/2225-5036.25.13671.<\/li>\n<li>Silverman B.G. Artificial intelligence and human behavior modeling and simulation for mental health conditions \/ B.G. Silverman, N. Hanrahan, L. Huang et al. \/\/ Artificial Intelligence in Behavioral and Mental Health Care. \u2013 2016. \u2013 P. 163-183. \u2013 DOI: https:\/\/doi.org\/10.1016\/b978-0-12-420248-1.00007-6.<\/li>\n<li>Kilany M. Towards a Computational Human Behavioral Model \/ M. Kilany, A. Adl, A.E. Hassanien, T.\u00a0Kim \/\/ 3rd International Conference on Computer, Information and Application (Yeosu, South Korea, May 21-23, 2015). \u2013 P. 42-45. \u2013 DOI: https:\/\/doi.org\/10.1109\/CIA.2015.18.<\/li>\n<li>Wagner A. Psychological modeling of humans by assistive robots \/ A. Wagner, E. Briscoe \/\/ Human Modelling for Bio-Inspired Robotics. \u2013 2017. \u2013 P. 273-296. \u2013 DOI: https:\/\/doi.org\/10.1016\/B978-0-12-803137-7.00011-2.<\/li>\n<li>Pentlan A. Modeling and Prediction of Human Behavior \/ A. Pentland, A. Liu \/\/ Neural Computation. \u2013 1999. \u2013 \u2116 11 (1). \u2013 P. 229-242. \u2013 DOI: https:\/\/doi.org\/10.1162\/089976699300016890.<\/li>\n<li>Phan N. A deep learning approach for human behavior prediction with explanations in health social networks: Social restricted boltzmann machine (srbm+) \/ N. Phan, D. Dou, B. Piniewski, D. Kil \/\/ Social Network Analysis and Mining. \u2013 2016. \u2013 \u2116 6 (1) [Electronic resource]. \u2013 Available at : https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC6368350\/. \u2013 (accessed on: May 05, 2021). \u2013 DOI: https:\/\/doi.org\/10.1007\/s13278-016-0379-0.<\/li>\n<li>Jenkins A.C. Predicting human behavior toward members of different social groups \/ A.C. Jenkins, P. Karashchuk, L. Zhu, M. Hsu \/\/ Proceedings of the National Academy of Sciences of the United States of America. \u2013 2018. \u2013 \u2116 115 (39). \u2013 P. 9696-9701. \u2013 DOI: https:\/\/doi.org\/10.1073.<\/li>\n<li>Plonsky O. Predicting human decisions with behavioral theories and machine learning \/ O. Plonsky, R.\u00a0Apel, E. Ert, et al. \/\/ eprint arXiv:1904.06866. \u2013 2019 [Electronic resource]. \u2013 Available at : https:\/\/arxiv.org\/abs\/1904.06866. \u2013 (accessed on: May 06, 2021).<\/li>\n<li>Davahli M.R. Identification and prediction of human behavior through mining of unstructured textual data \/ M.R. Davahli, W. Karwowski, E. Gutierrez et al. \/\/ Symmetry. \u2013 2020. \u2013 \u2116 12 (11). \u2013 P. 1902. \u2013 DOI: https:\/\/doi.org\/10.3390\/sym12111902.<\/li>\n<li>\u0410\u0444\u0430\u043d\u0430\u0441\u044c\u0435\u0432\u0430 \u041e.\u0420. \u041a\u0440\u0438\u043c\u0438\u043d\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0438\u043d\u0434\u0438\u0432\u0438\u0434\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u043e\u0433\u043e \u043f\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \/ \u041e.\u0420. \u0410\u0444\u0430\u043d\u0430\u0441\u044c\u0435\u0432\u0430, \u041e.\u0412. \u0413\u043b\u0435\u0431\u0430 \/\/ \u041c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u044b\u0439 \u043d\u0430\u0443\u0447\u043d\u043e-\u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0439 \u0436\u0443\u0440\u043d\u0430\u043b. \u2013 2017. \u2013 \u2116 03 (57). \u2013 \u0427\u0430\u0441\u0442\u044c \u2013 \u0421. 118-121. \u2013 DOI: https:\/\/doi.org\/10.23670\/IRJ.2017.57.109.<\/li>\n<li>Halustian O.A. Forming a psychological profile of an unidentified person according to the characteristics of his written text \/ O.A. Halustian, L.M. Zakharenko, V.O. Kazmirenko ; under the general ed. of O.I. Motliakh. \u2013 Kyiv: National Academy of Internal Affairs, 2020. \u2013 68 p.<\/li>\n<li>Tarasenko Ya.V. The content analysis method of the semantic particle in texts with psycholinguistic influence signs \/ Ya.V. Tarasenko \/\/ Control, Navigation and Communication Systems. Academic Journal. \u2013 2019. \u2013 \u2116 6 (58). \u2013 P.\u00a092-96. \u2013 DOI: https:\/\/doi.org\/10.26906\/SUNZ.2019.6.092.<\/li>\n<li>Tarasenko Ya. The quantum-semantic psycholinguistic analysis method for the english-language text of propaganda discourse \/ Ya. Tarasenko \/\/ Advanced Information Systems. \u2013 2019. \u2013 \u2116 3 (4). \u2013 P. 62-68. \u2013 DOI: https:\/\/doi.org\/10.20998\/2522-9052.2019.4.09.<\/li>\n<li>Tarasenko Ya. Content-criteria of psycholinguistic portrait\u2019s semantic category for researching the group propaganda \/ Ya. Tarasenko \/\/ Ukrainian Scientific Journal of Information Security. \u2013 2020. \u2013 \u2116 26 (1). \u2013 P. 5-13. \u2013 DOI: https:\/\/doi.org\/10.18372\/2225-5036.26.14526.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/7943"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7943"}],"version-history":[{"count":6,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/7943\/revisions"}],"predecessor-version":[{"id":8285,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/7943\/revisions\/8285"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}