Conflict Analysis in the Information Security System: Subject - Subject

Шевченко, Світлана Миколаївна and Жданова, Юлія Дмитрівна and Шевченко, Галина Володимирівна and Негоденко, Олена Василівна and Спасітєлєва, Світлана Олексіївна (2023) Conflict Analysis in the Information Security System: Subject - Subject CEUR Workshop Proceedings., 3421. pp. 56-66. ISSN 1613-0073

[thumbnail of S_Shevchenko_Y_Zhdanova_H_Shevchenko_ta_in_CEUR_3421_FITM.pdf] Text
S_Shevchenko_Y_Zhdanova_H_Shevchenko_ta_in_CEUR_3421_FITM.pdf

Download (634kB)

Abstract

The concept of conflict theory is widely used in various sectors of society. This study examines the problem of using the main provisions of the theory of conflicts in the field of information security. With the development of information technologies, the risk of information conflicts is increasing, which can create threats to the integrity, availability and confidentiality of information, which determines the relevance and importance of this research. The presented work is a continuation of developments describing the applied aspects of the theory of conflict theory in information security systems through the interaction of data streams in the "subject-subject" perspective. It is proposed to analyze the problem at four levels: the level of the individual (criminal – user); business level (internal and/or external violator – company manager); state level (violators/hackers – state institutions, state officials); the level of international relations (states, a group of subjects/hackers – institutions and/or political leaders of another state). Each level is defined as a complex conflict system that has a corresponding structure and stages. It was determined that the main characteristics of an information conflict in cyberspace are: unlimited territory, globality, the problem of attribution, the superiority of attack over defense. It is substantiated that information security systems have all the features of complex conflict systems, which implies the application of the mathematical theory of conflict, namely, the Lotka-Volterra "predator-predator" model and the conflict triad model. The innovative function of information conflict is determined. The concept of conflict theory is widely used in various sectors of society. This study examines the problem of using the main provisions of the theory of conflicts in the field of information security. With the development of information technologies, the risk of information conflicts is increasing, which can create threats to the integrity, availability and confidentiality of information, which determines the relevance and importance of this research.

Item Type: Article
Uncontrolled Keywords: Conflict; information conflict; information security systems; cyber system; cyber conflict; conflict structure; conflict stages; mathematical model of conflict
Subjects: Це архівна тематика Київського університету імені Бориса Грінченка > Статті у наукометричних базах > Scopus
Divisions: Це архівні підрозділи Київського університету імені Бориса Грінченка > Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка
Depositing User: Ю. Д. Жданова
Date Deposited: 17 Jul 2023 11:44
Last Modified: 17 Jul 2023 11:46
URI: https://elibrary.kubg.edu.ua/id/eprint/45683

Actions (login required)

View Item View Item