Abstract

The research deals with questions of information warfare in virtual social environments of the Internet. In the work, statutory and legal documents of the Russian Federation in the domain of information protection are analyzed. Particularities of the Internet-based virtual social environments are discussed: the popularity of virtual social environments among users, the existence of users’ virtual identities, the network structure of information dissemination on the Internet, isotropy of virtual social environments, process capacities for manipulating users. The authors put forward the sociological substantiation for the mathematical model of information dissemination in virtual social environments having the network model of information dissemination; the conceptual description of the process is suggested. Although the state makes significant efforts at the legislative level for preventing the harmful information action on its citizens on the Internet, there is a number of particularities of virtual social environments which allow completing them only in part. The research findings can be of interest for specialists dealing with problems of information warfare and information security of virtual social environments.

References

  • Azarian DA, Pronchev GB (2016) Modern Internet technology and security of the person. Young scientist, 3: 61-63.
  • Chernaya A (2018) Targeting on Facebook: How to find your audience for advertising. Tricks you didn’t know about. TexTerra. 25.06.2018. URL: https://texterra.ru/blog/targeting-v-facebook-kak-nakhodit-svoyu-auditoriyu-dlya-reklamy-priemy-o-kotorykh-vy-ne-znali.html
  • Constitution (1993) Russian Constitution. Adopted by popular vote on December 12, 1993 with changes approved in the all-Russian vote on July 1, 2020. President of Russia. URL: http://kremlin.ru/acts/constitution
  • Davydov A (2008) Internet rumors led to mass hysteria. NTV.RU. URL: https://www.ntv.ru/novosti/132672
  • Decree (2015) Decree of the President of the Russian Federation of December 31, 2015 No. 683. President of Russia. URL: http://www.kremlin.ru/acts/bank/40391
  • Decree (2016) Decree of the President of the Russian Federation of December 05, 2016 No. 646. President of Russia. URL: http://www.kremlin.ru/acts/bank/41460
  • FL (2010) Federal Law No. 390-FZ of December 28, 2010 “On security”. President of Russia. URL: http://www.kremlin.ru/acts/bank/32417
  • FL (2015) Federal Law of July 13, 2015 No. 264-FZ “On Amendments to the Federal Law “On Information, Information Technologies and on Information Protection” and Articles 29 and 402 of the “Civil Procedure Code of the Russian Federation”. Rossiyskaya Gazeta - Federal Issue No. 154 (6725) of July 16, 2015. URL: https://rg.ru/2015/07/16/informacia-dok.html
  • FSTEC (1992) Protection against unauthorized access to information. Terms and definitions. Approved by the decision of the Chairman of the State Technical Commission of Russia on March 30, 1992. FSTEC Russia. URL: https://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty/114-spetsialnye-normativnye-dokumenty/386-rukovodyashchij-dokument-reshenie-predsedatelya-gostekhkomissii-rossii-ot-30-marta-1992-g3
  • FSTEC (2006) GOST R 50922-2006. Information protection. Detection, prevention, and liquidation of consequences computer attacks and computer incident response. Terms and definitions. FSTEC Russia. URL: https://fstec.ru/component/attachments/download/2770
  • Goncharova IV, Pronchev GB, Monakhov DN, Vasenina IV, Zubova OG (2017) Remote Banking Services for the Visually Impaired in Britain as a Tool for Creating Barrier-Free Environment. Eurasian Journal of Analytical Chemistry, 12(7): 1405–1414.
  • Google (2009) Personalized Search for everyone. Google Blog. URL: https://googleblog.blogspot.com/2009/12/personalized-search-for-everyone.html
  • Gostinform (2005) Recommendations for standardization R 50.1.053-2005. Information technologies. Basic terms and definitions in scope of technical protection of information. Gostinform.ru. URL: https://gostinform.ru/normativnye-dokumenty-po-texnicheskomu-regulirovaniyu-i-metrologii/50-1-053-2005-obj43284.html
  • Korablev MN, Lontsov VV, Pronchev GB (2010) Protection of confidential information on social networks of the Internet. Sociology, 4: 33-45.
  • Livejournal (2009) Comment on Dmitry Medvedev’s blog on the Livejournal.com to the video message “On the Great Patriotic War, historical truth and our memory”. Livejournal.com. 07.05.2009. URL: http://community.livejournal.com/blog_medvedev/25564.html?thread=463-3308#t4633308
  • Lyubimov AP, Shchitov AN (2017) RGAIS-the leader in the profiles of training in the field of protection of intellectual property rights. Representative power-XXI century, 4: 18-20.
  • Lyubimov AP, Shchitov AN (2018) Modern scientific and technological priorities of the Russian Academy of Sciences. Representative power-XXI century, 7: 26-33.
  • Mikhailov AP, Petrov AP, Pronchev GB, Proncheva OG (2018) Modeling a Decrease in Public Attention to a Past One-Time Political Event. Doklady Mathematics, 97(3): 247-249. https://doi.org/10.1134/S1064562418030158.
  • Novikov VK, Galushkin IB, Aksenov SV (2017) Information security and information protection. Organizational and legal basis. Edited by V. K. Novikov. Moscow: Hotline-Telecom.
  • Orekhov I (2019) For the Internet-chatter will have to answer. Komsomolskaya Pravda, 17.10.2019. URL: https://www.kp.ru/daily/27043.4/4108154
  • Osipov GV (2000) Social myth-making and social practice. Moscow: Norma.
  • Osipova NG, Elishev SO, Pronchev GB (2018) Mass information media and propaganda mouthpiece as a tool for manipulating and social inequality factor among the young people. Astra Salvensis, 6: 541–550.
  • Osipova NG, Sinykov AV, Elishev SO, Kanevsky PS, Trofimov SV (2018) A social portrait of the modern Russian student. By results of a research at sociological faculty of Lomonosov Moscow State University. Moscow: FGBUN ISPI of RAS.
  • Petrov A, Mikhailov A, Pronchev G, Proncheva O (2018) Using search queries to analyze public attention to one-time political events. In: Proceedings of 2018 11th International Conference “Management of large-scale system development”. MLSD 2018, Art. 8551806. https://doi.org/10.1109/MLSD.2018.8551806.
  • Petrov A, Proncheva O (2019) Propaganda Battle with Two-Component Agenda. CEUR Workshop Proceedings, 2478: 28-38. URL: http://ceur-ws.org/Vol-2478
  • Petrov A, Proncheva O (2020) Modeling Position Selection by Individuals during Informational Warfare with a Two-Component Agenda. Mathematical Models and Computer Simulations, 12(2): 154-163.
  • Pronchev GB (2013) Remote access educational information system. In: Technology to build education systems with specified properties: Materials of III International scientific-practical conference, 12 – 13 November 2012. Moscow, 284-286.
  • Pronchev GB (2020) On the features of virtual social environments of the Internet that contribute to social deviations. Education and law, 3: 200-208.
  • Pronchev GB, Monakhov DN, Proncheva NG, Mikhailov AP (2018) Contemporary virtual social environments as a factor of social inequality emergence. Astra Salvensis, 6: 207-216.
  • Pronchev GB, Muravyov VI (2011) Social networks as a factor in Russia’s transition to innovative development. Sociology, 3: 36-56.
  • Pronchev GB, Proncheva NG, Goncharova IV (2019) Modern management of media environment: negative effects for the society of today. Journal of Environmental Treatment Techniques, 7(4): 836-840.
  • Rambler (2019) Google and Yandex almost do not comply with the law on the “right to oblivion”. Rambler.Ru. 15.03.2019. URL: https://news.rambler.ru/internet/41878242-google-i-yandex-pochti-ne-vypolnyayut-zakon-o-prave-na-zabvenie
  • Razumovskaya M, Zaitseva NA, Larionova AA, Chudnovskiy AD, Breusova EA (2018) Prospects for applying various forms of organizational integration to improve the quality of education. Astra Salvensis, 6: 348-362.
  • Schiller HI (1973) The Mind Managers. Boston: Beacon Press.
  • Schiller HI (1976) Communication and Cultural Domination. London: Routledge.
  • Sivukhin DV (1980) General course of physics. Moscow: Science.
  • Solovyev AA, Sheiafetdinova NA, Zavadskaya LN, Krainov VI, Kharlamov PV, Kovalev KS (2020) Internet and Personal Data as Factors of Influence on Legal Culture. Modern Law, 1: 16-22.
  • Soltovets E, Chigisheva O, Dmitrova A (2020) The role of mentoring in digital literacy development of doctoral students at British universities. Eurasia Journal of Mathematics, Science and Technology Education, 16(4): em1839.
  • Strielkowski W, Chigisheva O (2018) Research functionality and academic publishing: Gaming with altmetrics in the digital age. Economics and Sociology, 11(4): 306-316.
  • Usacheva OA (2012) Civil mobilization networks. Social Sciences and Contemporary World, 6: 35-42.
  • Vasenina IV, Kuleshova, NS, Pronchev GB (2018) Verbal aggression in virtual social environments. Astra Salvensis, 6: 29-37.
  • Vesti (2009) Vesti.net: officials learn blogs. Vesti.Ru. 25.11.2009. URL: http://www.vesti.ru/doc.html?id=327682
  • Volkogonov DA (1983) Psychological warfare: Subversive actions in regional societies. consciousnesses. Moscow. Voenizdat.
  • Wearesocial (2020) Digital 2020. URL: https://wearesocial.com/digital-2020
  • Willard N (2003) Off-campus, harmful online student speech. Journal of School Violence, 2(1): 65-93.
  • Zaitseva NA, Larionova AA, Shapovalov NI, Povorina EV, Takhumova OV, Zhukova MA, Dvornikova TA (2020) Regulatory aspects and problems of personnel certification taking into account the requirements of professional standards. International Journal of Psychosocial Rehabilitation, 24(03): 2179-2188.

License

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.