Mathematical model of information influence on the interaction contractor
DOI:
https://doi.org/10.20535/2411-1031.2016.4.2.109986Keywords:
Information technology, management information influences, information operations, theory of non-coercive interaction.Abstract
With the formation of evidence-based information management influences the use of information technology that could be used in the management information support in the preparation and conduct of military operations, created a mathematical model of information (non-forcible) influence. This mathematical model is based on the theory of non-coercive interaction. Using this theory is a new approach to determining the processes necessary for the effective management of information influence awareness. It creates a new attitude aimed to contractors and information management from the standpoint of not informing the maximum counterparty exposure, but from the standpoint of information necessary action on them. This takes into account not only the means of obtaining information, but also ways to provide this information. They focused on informative (non-forcible) effect on counterparty interaction. The purpose of the reduced model is the development of information technology of information support of the preparation and conduct of military operations. What to combat the enemy in today's hybrid warfare and information support their own forces. That will make it possible to more accurately and efficiently plan the military operations in the area of information influence on the enemy and become a prerequisite for victory over the enemies of our country.
References
N I Konrad. “Sun Tszu. At War”, in Synolohyya, Eds. Moscow, Russia: Ladomir, 1995.
M.B.Kubiavka, “Information actions for formation of necessary awareness of counterparty exposure”, Telecommunication and Informative Technologies, iss. 4, pp. 24-28, 2016.
O.I. Larichev, Teoryya y metodu prynyatyya reshenyy. Eds. Moscow, Russia: Lohos, 2002.
I.G. Chernorutskii, Metodu prynyatyya reshenyy, Eds. St. Petersburg, Russia: BKhV-Peterburh, 2005.
Ia. Neitan, Visualize this: the flowing data guide to design, visualization and statistics. Eds. Moscow, Russia: “Mann, Yvanov y Ferber”, 2013.
Yu.M. Teslia, L.B. Kubiavka, A.O. Mykolenko, and M.B. Kubiavka, “Using information technology influence the preparation and conduct of hostilities”, Modern information technologies in the sphere of security and defense, iss. 2 (20), p. 147-152, 2014.
M.B. Kubiavka, L.B. Kubiavka, and Yu.M. Teslia, ”The possibilities of the theory of non-forcible influence in the military counterintelligence”, ScienceRise, №2/1 (7), pp. 18-22, 2015.
doi: 10.15587 / 2313-8416.2015.37460.
M.B. Kubiavka, L.B. Kubiavka, and Yu.M. Teslia, “Fundamentals of information technology support processes influence the interaction of contractors”, Proceedings of the Military Institute of Kyiv National Shevchenko University, iss. 52, pp. 123-128, 2016.
V. Afanasiev, Social and governance information society. Moscow, Russia: Knowledge, 2005.
Yu.M. Teslia, Introduction to Informatics nature, Kiev, Ukraine: Maklaut, 2010.
“Ethics today”. [Online]. Available: http://www.etica.in.ua/shho-take-dovira-ta-komu-doviryati. Accessed on: Sept., 18, 2016.
Yu.N. Teslia, V.V. Pylypenko, N.L. Popovych, and O.Yu. Chornyy, “The Non-Force Interaction Theory for Reflex System Creation with Application to TV Voice Control”, in Proc. 6th International Conference on Agents and Artificial Intelligence (ICAART 2014), LERIA, France, 2014, pp. 288-296.
Yu.M. Teslia, Non-forcible interaction. Kyiv, Ukraine: Condor, 2005.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Collection "Information technology and security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).