Theoretical Bases of Methods of Counteraction to Modern Forms of Information Warfare
Guardado en:
| Udgivet i: | Computers vol. 14, no. 10 (2025), p. 410-486 |
|---|---|
| Hovedforfatter: | |
| Andre forfattere: | |
| Udgivet: |
MDPI AG
|
| Fag: | |
| Online adgang: | Citation/Abstract Full Text + Graphics Full Text - PDF |
| Tags: |
Ingen Tags, Vær først til at tagge denne postø!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3265850357 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 2073-431X | ||
| 024 | 7 | |a 10.3390/computers14100410 |2 doi | |
| 035 | |a 3265850357 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 231447 |2 nlm | ||
| 100 | 1 | |a Akhat, Bakirov |u Institute of Communication and Space Engineering, Gumarbek Daukeev Almaty University of Power Engineering and Communications, Almaty 050013, Kazakhstan | |
| 245 | 1 | |a Theoretical Bases of Methods of Counteraction to Modern Forms of Information Warfare | |
| 260 | |b MDPI AG |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a This review is devoted to a comprehensive analysis of modern forms of information warfare in the context of digitalization and global interconnectedness. The work considers fundamental theoretical foundations—cognitive distortions, mass communication models, network theories and concepts of cultural code. The key tools of information influence are described in detail, including disinformation, the use of botnets, deepfakes, memetic strategies and manipulations in the media space. Particular attention is paid to methods of identifying and neutralizing information threats using artificial intelligence and digital signal processing, including partial digital convolutions, Fourier–Galois transforms, residue number systems and calculations in finite algebraic structures. The ethical and legal aspects of countering information attacks are analyzed, and geopolitical examples are given, demonstrating the peculiarities of applying various strategies. The review is based on a systematic analysis of 592 publications selected from the international databases Scopus, Web of Science and Google Scholar, covering research from fundamental works to modern publications of recent years (2015–2025). It is also based on regulatory legal acts, which ensures a high degree of relevance and representativeness. The results of the review can be used in the development of technologies for monitoring, detecting and filtering information attacks, as well as in the formation of national cybersecurity strategies. | |
| 653 | |a Public opinion | ||
| 653 | |a Information warfare | ||
| 653 | |a Science | ||
| 653 | |a Residue number systems | ||
| 653 | |a Digital signal processing | ||
| 653 | |a Identification methods | ||
| 653 | |a Humanitarianism | ||
| 653 | |a Signal processing | ||
| 653 | |a Interdisciplinary aspects | ||
| 653 | |a Sociology | ||
| 653 | |a Methods | ||
| 653 | |a False information | ||
| 653 | |a Humanities | ||
| 653 | |a Algorithms | ||
| 653 | |a Artificial intelligence | ||
| 653 | |a Digitization | ||
| 653 | |a Data exchange | ||
| 653 | |a Cybersecurity | ||
| 700 | 1 | |a Ibragim, Suleimenov |u National Engineering Academy of the Republic of Kazakhstan, Almaty 050010, Kazakhstan | |
| 773 | 0 | |t Computers |g vol. 14, no. 10 (2025), p. 410-486 | |
| 786 | 0 | |d ProQuest |t Advanced Technologies & Aerospace Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3265850357/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text + Graphics |u https://www.proquest.com/docview/3265850357/fulltextwithgraphics/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3265850357/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |