Phenomenological model of information operation in social networking services

Kateryna Molodetska, Yuriy Tymonin, Oleksandr Markovets, Andrii Melnychyn


In modern conditions, social networking services have become the users’ leading channel of communication, which are called actors. Therefore, social networking services are used by intruders to gain benefits in the information space of virtual communities for further influence on political and social processes in the state. In the article the phenomenological model of information operation in social networking services is developed. The model allows to take into account the processes of development of social networking services through the formation of new relationships between actors and the formation of virtual communities. At the same time, behind the model are the processes of degradation of social networking services that are associated with the dissipation of content. The developed model is used for experimental research of real information operation in social networking services. The obtained results will increase the efficiency and effectiveness of counteracting the threats to information security of the state in social networking services by the relevant departments.


social networking services; actors; information operation; content; threat; information security of the state


R. Shailendra, et al. “Social network security: Issues, challenges, threats, and solutions,” Information sciences, vol. 421, pp. 43–69, 2017. Available: 10.1016/j.ins.2017.08.063.

S. E. Chang, A. Y. Liu and W. C. Shen, “User trust in social networking services: A comparison of Facebook and LinkedIn,” Computers in Human Behavior, 69, pp. 207-217, 2017.

A. Peleshchyshyn, O. Markovets, V. Vus and S. Albota, “Identifying specific roles of users of social networks and their influence methods,” in Proc. of 2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018, pp. 39–42, 2018.

R. Hryshchuk and Yu. Danyk, Fundamentals of cybernetic security, ZhNAEU, Zhytomyr, 2016, 636 p. (in Ukrainian).

K. Molodetska, Yu. Tymonin and I. Melnychuk, “The conceptual model of information confrontation of virtual communities in social networking services,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 1043-1052, 2020.

O. Trach and A.Peleshchyshyn, “Functional-network model of tasks performance of the virtual communities life cycle directions,” in Proc. of the 11th International Scientific and Technical Conference, CSIT 2016, pp. 108-110, 2016.

R. Hryshchuk, K. Molodetska and Yu. Serov, “Method of improving the information security of virtual communities in social networking services,” in Proc. 1st International Workshop Control, Optimization and Analytical Processing of Social Networks, vol. 2392, pp. 23–41, 2019. Available:

V. V. Lysenko and K. C. Desouza, “Moldova's internet revolution: Analyzing the role of technologies in various phases of the confrontation,” Technological forecasting and social change, 79(2), pp. 341-361, 2012.

Sunday Times, Exposed: Russian Twitter Bots Tried to Swing General Election for Jeremy Corbyn, 2018, [Online]. Available:

C. Matlack and R. Williams, France to Probe Possible Russian Influence on Yellow Vest Riots, 2018, [Online]. Available:

T. Bilushchak, M. Komova and A. Peleshchyshyn, “Development of method of search and identification of historical information in the social environment of the internet,” in Proc. of the 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2017, pp. 196-199, 2017.

I. Kayes and A. Iamnitchi, “Privacy and security in online social networks: A survey,” Online Social Networks and Media, 3, pp. 1-21, 2017.

R. Hryshchuk and K. Molodetska, “Synergetic Control of Social Networking Services Actors’ Interactions” in Recent Advances In Systems, Control And Information Technology, vol. 543, pp. 34-42, 2017.

M. Weskida and R. Michalski, “Finding Influentials in Social Networks using Evolutionary Algorithm,” Journal of Computational Science, vol. 31, pp. 77-85, 2018.

J. Wan, X. Chen, Y. Du and M. Jia, “Information propagation model based on hybrid social factors of opportunity, trust and motivation,” Neurocomputing, vol. 333, pp. 169-184, 2018.

S. Wasserman and K. Faust, Social Network Analysis: Methods and Applications, Cambridge university press, Cambridge, England, 1994.

J. M. Epstein, Generative Social Science: Studies in Agent-Based Computational Modeling. Princeton University Press, Princeton, USA, 2012.

V. P.Horbulin, O. H. Dodonov and D. V. Lande, Information operations and safety of society: threats, opposition, modeling, Intertechnology, Kyiv, 2009. (in Ukrainian).

M. Hosseini-Pozveh, K. Zamanifar and A. R. Naghsh-Nilchi, “Assessing information diffusion models for influence maximization in signed social networks,” Expert Systems with Applications, 119, pp. 476-490, 2019.

D. Dang-Pham, S. Pittayachawan and V. Bruno, “Investigation into the formation of information security influence: Network analysis of an emerging organisation,” Computers & Security, 70, pp. 111-123, 2017.

I. V. Il'in, A. D. Ursul and T. A. Ursul, Global evolutionism: Ideas, problems, hypotheses, Izd-vo Moskovskogo universiteta, 2012, 616 p. (in Russian).

Yu. Tymonin, Yu. Brodskyi, “Hybrid phenomenological model of dynamic chaos,” in Transformation of ukrainian society and its elite in the context of civilization development of Europe, Zhytomyr, Ukraine, November 16, 2018, pp. 116-120. (in Ukrainian).

S. W. Rohrer, R. A. Director, Introduction to System Theory, McGraw-Hill, International edition, 1972, 300 p.

T. Kuzio, Why Independence for Ukraine’s Orthodox Church Is an Earthquake for Putin, 2018, [Online]. Available:

Total views : 6 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics