Theoretical Bases of Methods of Counteraction to Modern Forms of Information Warfare

Guardado en:
Bibliografiske detaljer
Udgivet i:Computers vol. 14, no. 10 (2025), p. 410-486
Hovedforfatter: Akhat, Bakirov
Andre forfattere: Ibragim, Suleimenov
Udgivet:
MDPI AG
Fag:
Online adgang:Citation/Abstract
Full Text + Graphics
Full Text - PDF
Tags: Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!

MARC

LEADER 00000nab a2200000uu 4500
001 3265850357
003 UK-CbPIL
022 |a 2073-431X 
024 7 |a 10.3390/computers14100410  |2 doi 
035 |a 3265850357 
045 2 |b d20250101  |b d20251231 
084 |a 231447  |2 nlm 
100 1 |a Akhat, Bakirov  |u Institute of Communication and Space Engineering, Gumarbek Daukeev Almaty University of Power Engineering and Communications, Almaty 050013, Kazakhstan 
245 1 |a Theoretical Bases of Methods of Counteraction to Modern Forms of Information Warfare 
260 |b MDPI AG  |c 2025 
513 |a Journal Article 
520 3 |a This review is devoted to a comprehensive analysis of modern forms of information warfare in the context of digitalization and global interconnectedness. The work considers fundamental theoretical foundations—cognitive distortions, mass communication models, network theories and concepts of cultural code. The key tools of information influence are described in detail, including disinformation, the use of botnets, deepfakes, memetic strategies and manipulations in the media space. Particular attention is paid to methods of identifying and neutralizing information threats using artificial intelligence and digital signal processing, including partial digital convolutions, Fourier–Galois transforms, residue number systems and calculations in finite algebraic structures. The ethical and legal aspects of countering information attacks are analyzed, and geopolitical examples are given, demonstrating the peculiarities of applying various strategies. The review is based on a systematic analysis of 592 publications selected from the international databases Scopus, Web of Science and Google Scholar, covering research from fundamental works to modern publications of recent years (2015–2025). It is also based on regulatory legal acts, which ensures a high degree of relevance and representativeness. The results of the review can be used in the development of technologies for monitoring, detecting and filtering information attacks, as well as in the formation of national cybersecurity strategies. 
653 |a Public opinion 
653 |a Information warfare 
653 |a Science 
653 |a Residue number systems 
653 |a Digital signal processing 
653 |a Identification methods 
653 |a Humanitarianism 
653 |a Signal processing 
653 |a Interdisciplinary aspects 
653 |a Sociology 
653 |a Methods 
653 |a False information 
653 |a Humanities 
653 |a Algorithms 
653 |a Artificial intelligence 
653 |a Digitization 
653 |a Data exchange 
653 |a Cybersecurity 
700 1 |a Ibragim, Suleimenov  |u National Engineering Academy of the Republic of Kazakhstan, Almaty 050010, Kazakhstan 
773 0 |t Computers  |g vol. 14, no. 10 (2025), p. 410-486 
786 0 |d ProQuest  |t Advanced Technologies & Aerospace Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3265850357/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3265850357/fulltextwithgraphics/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3265850357/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch