The elements of user interaction in social networks are considered: it is shown that the method of analysis of user interactions is based on assumptions when the magnitude of the influence depends on the centrality of users in the social network; the greater the consonance, the higher the nature of the influence, the interaction is a nonlinear function; it is indicated that interaction is a process that has a time interval, the linear model of protection of the information protection system from user interaction is considered; the obtained equations of protection are the equation of a harmonic oscillator with damping amplitude, the iteration of oscillations of the protection system in the pre-resonant, resonant and post-resonant zones is shown.
The article is devoted to the topical issue of identifying information threats in virtual communities of social networks and mechanisms for counteracting such threats. The process of organization of monitoring and content analysis of virtual communities in social networks is studied. The technology of detecting information threats of virtual communities in social networks and methods of their assessment have been developed. An approach to finding pages of discussions on social networks based on the Louvain method is proposed. The technology of determining the degree of information threat of the virtual community in social networks and ways to counteract the information threats of the virtual community have been developed.
This article reviews the role of digital skills in the digital economy as one of the elements of Ukraine's cybersecurity systems. The author examines the process of formation of digital skills of citizens and defines the concept of «digital skills». The author has named the base list of digital skills. View cyberspace as an environment for the exchange of information and data of socio-technical systems. The technical risks that are characteristic of cyberspace have been called: violation of the integrity and accessibility of information and communication infrastructure, adverse technological advances, fraud and data theft, cyber-attacks. The author analyzes the main legal documents of the national security system. Highlights the low level of skills in information and cyber security in Ukraine, which forms the basis for the formation of non-admission to the state and the storage of other risks and threats in cyberspace. Considers the strategic goals of the national cybersecurity system of Ukraine. The emphasis is on the characteristic power properties of instability in the modern world: variability, uncertainty, complexity, and ambiguity. Offers its definition of «rethinking» and extends it to «product rethinking» and «personal rethinking». Separates elements for the formation of digital competencies in information and cybersecurity. Explains the topic of new specialized cybersecurity and lists them: auditor of strategic (including information and cyber) infrastructure, telecommunications security specialist, cyber insurance agent, Internet of Things cybersecurity specialist, digital reputation security manager, Specialist in cybersecurity of Artificial intelligence.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.