You are on page 1of 6

Available online at www.sciencedirect.

com
ScienceDirect
ScienceDirect
Procedia Computer Science 00 (2019) 000–000
Available online at www.sciencedirect.com
Procedia Computer Science 00 (2019) 000–000 www.elsevier.com/locate/procedia
www.elsevier.com/locate/procedia
ScienceDirect
Procedia Computer Science 160 (2019) 509–514

The International Workshop on Digitalization and Servitization within Factory-Free Economy


The International Workshop on Digitalization
(D&SwFFE and2019)
Servitization within Factory-Free Economy
November (D&SwFFE 2019) Portugal
4-7, 2019, Coimbra,
November 4-7, 2019, Coimbra, Portugal
Analytical service for processing behavioral, psychological and
Analytical service for processing behavioral, psychological and
communicative features in the online communication
communicative features in the online communication
Solomiia Fedushkoaa*, Monika Davidekovabb
b
а
Solomiia
Lviv Polytechnic Fedushko *, Monika
National University, Davidekova
12 Bandera str.,79000 Lviv, Ukraine
Faculty of management,
а Comenius
Lviv Polytechnic University
National in Bratislava,
University, Odbojárov
12 Bandera 10, Lviv,
str.,79000 Bratislava, Slovak Republic
Ukraine
b
Faculty of management, Comenius University in Bratislava, Odbojárov 10, Bratislava, Slovak Republic

Abstract
Abstract
The specificity of social services of the Internet communication is rapidly responding to events in society and the
The evaluation
instant specificity of the
social services
events of the of
of a group Internet
users. communication
This method of is rapidlycommunication
Internet responding to events
affectsin
thesociety andand
accuracy the
instant evaluation
truthfulness of the of the events increases
information of a groupthe
ofchances
users. This method
to use of Internet
manipulation communication
techniques affects the accuracy
of communication and
and a source
truthfulness of the information
of diverse information securityincreases thethis
threats. In chances
paper totheuse manipulation
analytics techniques
of social servicesofofcommunication and a source
the internet communication
of diverse
and its userinformation security
classification threats.The
is proposed. In this paper the analytics
recommended of social services
users’ classification of theprojects
helps media internetowners
communication
to create
its user classification
and manage these projects.is proposed. The recommended users’ classification helps media projects owners to create
and manage these projects.
© 2019 The Authors. Published by Elsevier B.V.
© 2019 The Authors. Published by Elsevier B.V.
This
© is an
2019 open
The accessPublished
Authors. article under the CC B.V.
by Elsevier BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Peer-review
This is an under
open responsibility
access article of
under the
theConference
CC Program
BY-NC-ND
Peer-review under responsibility of the Conference Program Chairs.
license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Chairs.
Peer-review under responsibility of the Conference Program Chairs.
Keywords: user classification; social services; medicine; internet communication; wiki project.
Keywords: user classification; social services; medicine; internet communication; wiki project.

1. Introduction
1. Introduction
Given the pace of development of information society and increasingly popular social media communications
Given
among the and
users, pacetoofexpand
development of information
the functionality society andofincreasingly
and mechanisms interaction inpopular social media
them questions communications
automated analysis of
among users,isand
information to expand
relevant and the functionality
urgent. With the and mechanisms
rapid of interaction
accumulation in total
of data, the themcomputerization
questions automated analysis
of the of
business
informationthe
processes, is relevant and urgent.
rapid growth With the of
of productivity rapid accumulation
computers of data, theoftotal
and penetration computerization
Internet of the
in all spheres business
of life data
processes, the rapid growth of productivity of computers and penetration of Internet in all spheres of life data

* Corresponding author. Tel.: +38-095-448-85812.


* E-mail solomiia.s.fedushko@lpnu.ua
address:author.
Corresponding Tel.: +38-095-448-85812.
E-mail address: solomiia.s.fedushko@lpnu.ua
1877-0509 © 2019 The Authors. Published by Elsevier B.V.
This is an open
1877-0509 access
© 2019 Thearticle under
Authors. the CC BY-NC-ND
Published license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
by Elsevier B.V.
Peer-review under
This is an open responsibility
access of the Conference
article under CC BY-NC-NDProgram Chairs.
license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Peer-review under responsibility of the Conference Program Chairs.

1877-0509 © 2019 The Authors. Published by Elsevier B.V.


This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Peer-review under responsibility of the Conference Program Chairs.
10.1016/j.procs.2019.11.056
510 Solomiia Fedushko et al. / Procedia Computer Science 160 (2019) 509–514
2 Author name / Procedia Computer Science 00 (2018) 000–000

analysis to check the validity, reliability and importance, identification of threats and manipulation is required to
maintain information security, effective management of social networks and other virtual communities.
The specificity of social services of the Internet communication is rapidly responding to events in society and the
instant evaluation of the events of a group of users. This method of Internet communication affects the accuracy and
truthfulness of the information increases the chances to use manipulation techniques of communication and a source
of diverse information security threats.
In the Internet communication has become more frequent use of linguistic manipulation technology, technology
impact on mass consciousness of society and develops informational intention, which is mainly aimed at
inexperienced and unsuspecting Internet user. In recent years, active in social network communications methods
deployed network and cyber warfare. Properly structured and prepared the content of the Internet communication
environment are an effective means of targeting the Internet user. The result of this can be suicidal actions, mass
protests, terrorist attacks, major armed clashes, etc.
Without the use of linguistic methods and automated software tasks verification of the participant for
administrators of social media the Internet is difficult and requires substantial financial and time costs. Members of
virtual communities often submit false personal data with the aim-conscious or covert manipulate, mislead other
participants of the social environment of the Internet, creating a fake user account with the necessary characteristics.

2. Related works

Ukrainian analysts in the field of information security and information technologies V.P. Horbulin,
O.G. Dodonov and D.V. Lande [1] pay great attention to his research on modeling of information operations related
to information influence, the result of which is the discovery of some of the information operations that have already
taken place. However, analysts are paying attention to the analysis of the news content of web resources, for this
they use the InfoStream system designed to monitor and integrate news data.
O.G. Korchenko's and S. Gnatyuk [2] research is focused on solving problems of technical protection of
information, risk assessment and safety, protection against cyber-attacks.
A Ukrainian scientist O. Chumachenko and O. Zhitskov [3] insist on the use of intellectual analysis of web data
and allocate such components as: classification, clustering, forecasting, association, visualization, analysis and
detection of deviations, evaluation, analysis of connections, summing up. Scientists offer an algorithm for analyzing
web data based on the use of artificial neural networks.
The problem of ensuring the ability to organize the intellectual system of multi-level information monitoring is
engaged in the works of S. Holub [4]. He offers a new method of intellectual analysis of texts, which allows the
automatization of the searching process for text messages in content based on statistical methods of data processing.
A.I. Petrenko examines the types of patterns that manifest themselves in the process of solving various tasks
related to information analysis (association, classification, sequencing, clustering, forecasting) and investigates the
ADAM system that works in the Grid environment and remotely processes the data.
Issues related to ways of counteracting negative informational influence in virtual communities are investigated
by O.V. Samchishin, V.V. Okhrimchuk and G.D. Nosov in their works; scientists focus on the need for intelligent
data analysis and reduce to the need to develop an effective monitoring system for virtual communities.
American scholars P. Carington, J. Scott, C. Userman [5] pay close attention to the question of social networking
data analysis, compared to other types of social media, considering them the main source of communications on the
Internet. In addition, the Dutch scientist P. Mika, who in his work presents the Flink system for analyzing social
networks, deals with monitoring and information analysis in social networks. Flink uses semantic technology to
analyze personal information from web pages, emails, archives, etc.
Scientists I.A. Tikhomirov, I.V. Sochenkov consider the approach of dynamic content filtering of HTTP-traffic,
which is based on the use of automatic classification of requested documents. The proposed method of classification
of hypertext documents takes into account the relative importance of the terms. The methodology allows you to
make decisions about assigning the text to a class of unwanted topics, as well as determine the level of completeness
and accuracy. Scientists F. Wang, C. Carley, D. Zeng, V. Mao [6] speak about the transition to social computing by
analyzing the data of social media of communication and making certain decisions based on them. They foresee the
Solomiia Fedushko et al. / Procedia Computer Science 160 (2019) 509–514 511
Author name / Procedia Computer Science 00 (2018) 000–000 3

further rapid growth of the impact of social networks on Internet users and consider it necessary to use analytical
methods for extracting strategic information.
The using wiki for computer science course project management and using a wiki to evaluate individual
contribution to a collaborative learning project study Xu, L. [7], Trentin, G. [8], Shih, C., Waugh, M. [9]. The
scientists [10, 11] study social networks as a tools for a higher education institution image creation and for learning
in higher education, also study behavior classification of social news aggregations users, service systems in cloud
[13, 14] and service management [15-17].

3. Development of the social services of the internet communication and online project user classification

The process of managing and monitoring content social media the Internet has become a critical factor in the
success of their development, the safety of participants and motivation of owners. As a result, today is not popular
system for detection of information and communication of threats [12] in the social media of the Internet.
An important share of this toolkit are the tools and techniques verification of the user of social media
communication as individuals with a specific communicative behavior, determining levels of importance, reliability,
and manipulation of information content, written in Slavic languages, which are more complicated to analyze and
have their own specifics. Given the trends and dynamics of development of the social environments of the Internet in
the Ukrainian segment of the global information environment, development of software identification information
and communication of threats is a priority.
Despite the fact that are actively developing data mining methods for automatic analysis of web information
(Web Mining) and the social environment of the Internet, accumulate a large amount of data and are becoming
increasingly popular among Internet users, software detection of threats against their members and owners on the
Internet is still complex name, partial, superficial, and limited to the collation and checking of certain formal features
(e.g., software applications that are designed for video verification test the validity of the metadata and search
participants in social networks and the like). It should be noted that most of the available studies in this area are only
theoretical and the results of these studies have not been tested in practice.
The task of the software complex of methods and means of detecting information and communication threats in
the social media of the Internet is to increase the efficiency of functioning in the social media of the Internet in the
directions:

 increasing the manageability of social environments and improving the resilience to malicious actions by
individual participants in order to destroy a good communicative atmosphere and even impede the functioning of
online environments;
 reduction of threats of violation of the legislation and ethical principles by individual participants in the direction
of inadmissible forms of network communication as those that endangers other participants (internet fraud,
pedophilia, etc.);
 improving the effectiveness of targeted internet advertising and profitability of the project to support the social
environment.

For efficient management of media projects in the work, the methods of user classification are proposed. It is
important to classify the media project managers – admins. Thus, it is proposed that all project managers be
classified into four types: Critic, Advisor, Watchman, and Philosopher.
The main characteristics of this classification are providing advice, deleting articles, writing comments and
correcting content. The wiki-projects users' classification is a complex process that involves several important steps.
The first step in the classification process is to analyze, consolidate and refine the main characteristics of the user
such as, Conflictedness, Staidness, Manipulativeness, and Emotiveness. The set of characteristics depends on the
development scenario and the specifics of each individual project. At the stage of analyzing the profiles of users, the
system forms user profiles of online projects from psychological-behavioral and socio-demographic profiles bases
on the basis of thorough processing of behavioral, psychological and communicative features, as well as social and
demographic characteristics. The scheme of process of wiki-projects users’ classifications is shown in Fig.1.
512 Solomiia Fedushko et al. / Procedia Computer Science 160 (2019) 509–514
4 Author name / Procedia Computer Science 00 (2018) 000–000

USER
CHARACTERISTICS 1
EXTROVERT
SYSTEM OF USER
CLASSIFICATION

USER
CHARACTERISTICS 2
ONLINE

...
ІNTROVERT
PROJECT USERS

USER USER PROFILES


CHARACTERISTICS N
ANALYZER AMBIVERT

Fig. 1. Scheme of process of wiki-projects users classifications.

Classification is tested on wiki projects. Visualization of admins of wiki-projects classification is shown in Fig. 2.

Fig. 2. Visualization of admins classifications of wiki-projects.

According to the psychological and communicative features of the wiki participants, the projects are divided into
the following types: Extrovert, Іntrovert, and Ambivert.
The main characteristics that influence the nature of the classification are: Conflictedness, Staidness,
Manipulativeness, and Emotiveness.
Solomiia Fedushko et al. / Procedia Computer Science 160 (2019) 509–514 513
Author name / Procedia Computer Science 00 (2018) 000–000 5

Fig. 3. Visualization of users classifications of wiki-projects.

The main requirements for the software are functioning on a small set of input data, functioning in a mode close
to real time, high demands for false positives, and transparency of conclusions for the consumer.
The study of information content of social media in the Internet has an applied value; especially the development
of the proposed tool will be useful:
 politicians to target the target audience among social network users and focus voters on the information they
need, prevent counterfeit opponents from voting, and the ability to modify electoral behavior (for example, the
effective use of the Facebook social network in the US presidential candidate D. Trump's election campaign);
 owners and developers of technical facilities for the organization of social media;
 owners of Internet portals, where the number of participants can reach hundreds of thousands or more;
 specialists in PR-technologies for selecting and checking employees, creating a positive image of the company,
responding quickly to inaccurate information about a person or company;
 employees of intelligence agencies who, in the context of intensive information wars, monitor and detect
malicious actions against the state's information space committed by masked professionals in the field of
propaganda and cyberterrorism.
 journalists for quality checking of information content of users (news, photos and video materials) published on
social networks. Using the methods and tools developed, professional media have the opportunity to avoid
spreading unconfirmed information, gossip, false news and fake photographs on their information resources;
 law enforcement and mass media and state security specialists specializing in personal safety in social media in
the Internet, in particular in the areas of pedophilia, techniques for mass manipulation of the public's awareness,
Internet fraud and phishing (obtaining personal data from online participants of the illegal by);
 for marketers and advertisers to create and popularize the brand of the company among Internet users, to select
potential buyers and protect internet resources from internal and external threats, to conduct marketing research
in trading companies;
 sociologists for conducting empirical sociological research, conducting and analyzing the results of the survey
and other method of collecting sociological information;
 psychologists to form a psychological portrait of a patient in social communication environments;
514 Solomiia Fedushko et al. / Procedia Computer Science 160 (2019) 509–514
6 Author name / Procedia Computer Science 00 (2018) 000–000

 ordinary users of social media on the Internet in order to avoid the threat of harmful influence on it of false,
harmful, disinformation content of the communication environment;
 heads of higher educational institutions in order to create a positive information image of universities on the
Internet and to respond quickly to illicit actions by participants of official information resources of educational
institutions, in order to avoid conflicts, misinformation about the teaching staff, administration staff and the
leadership of higher educational institutions;
 to researchers, postgraduates and students for research.

4. Conclusion

To software detection information and communications threats in the social media of the Internet is a demanding
one, because it is the tool in real-time must handle a large array of dynamic information. User should also pay
attention to the constant growth of activity of participants of the popular social mediums of the internet; relentlessly
not always generate high-quality accurate content, resulting in risks for the emergence of information and
communication of threats to the social environments of the Internet or society as a whole. The proposed users’
classification helps media projects owners to create and manage these projects. In the future research, the
behavioral, psychological and communicative features in the online communication will study more detailed for
user profile constriction.

References

[1] Dodonov, A.G., Lande, D.V., Tsyganok, V.V., Andriichuk, O.V., Kadenko, S.V., & Graivoronskaya, A.N. (2019). Information Operations
Recognition: from Nonlinear Analysis to Decision-making. ArXiv, abs/1901.10876.
[2] Gnatyuk S., Kinzeryavyy V., Kyrychenko K., Yubuzova K., Aleksander M., Odarchenko R. (2020) Secure Hash Function Constructing for
Future Communication Systems and Networks. Advances in Artificial Systems for Medicine and Education II. AIMEE 2018. Advances in
Intelligent Systems and Computing, 902. Springer, Cham. 561-569.
[3] Chumachenko, O.I. & Zhitkov, O.I. (2012). Intellectual analysis of web-data. Electronics and Control Systems. International scientific journal
"Electronics and Control Systems", 14-20.
[41] Golub S.V., Kolos P.O. (2011) Features of consciousness of the informative systems of the crisis socioecological monitoring. Information
processing systems, 4, 273-277.
[5] Crossley N., Prell C., Scott J. (2009) Social Network Analysis: Introduction to Special Edition. Methodological Innovations Online, 4 (1), 1-5.
[6] Wang F., Zeng D., Carley K. (2007). Social computing: From social informatics to social intelligence. IEEE Intelligent Systems, 22(2), 79-83.
[7] Xu L. (2007). Project the wiki way: using wiki for computer science course project management. Journal of Computing Sciences inColleges, 22(6), 109-116.
[8] Trentin G. (2009) Using a wiki to evaluate individual contribution to a collaborative learning project. Journal of computer assisted learning, 25(1), 43-55.
[9] Anisimova O., Vasylenko V., Fedushko S. (2019) Social networks as a tool for a higher education institution image creation. CEUR
Workshop Proceedings. Proceedings of the 1st International Workshop on Control, Optimisation and Analytical Processing of Social
Networks (COAPSN-2019), 2392, 54–65. http://ceur-ws.org/Vol-2392/paper5.pdf
[10] Shih, C., Waugh, M. (2011). Web 2.0 Tools for learning in higher education: The presence of blogs, wikis, podcasts, microblogs, Facebook
and Ning. In Society for Information Technology & Teacher Education International Conference. 3345-3352.
[11] Wriggers, W., Olson, W., Remedios, C. (2012). Computational opportunities for remote collaboration and capacity building afforded by
Web 2.0 and cloud computing. Biophysical reviews, 4(3), 153-160.
[12] Fedushko S., Trach O., Kunch Z., Turchyn Y., Yarka U. (2019) Modelling the behavior classification of social news aggregations users.
CEUR Workshop Proceedings. 2019. Proceedings of the 1st International Workshop on Control, Optimisation and Analytical Processing of
Social Networks (COAPSN-2019). 2392, 95–110. http://ceur-ws.org/Vol-2392/paper8.pdf
[13] Poniszewska-Maranda, A., Matusiak, R., Kryvinska, N. (2017) Use of Salesforce Platform for Building Real-Time Service Systems in Cloud,
IEEE International Conference on Services Computing, Honolulu, pp. 491-494.
[14] Penzel, D., Kryvinska, N., Strauss, C., Gregu, M. (2015) The Future of Cloud Computing: A SWOT Analysis and Predictions of
Development, 3rd International Conference on Future Internet of Things and Cloud, Rome, 391-397. doi: 10.1109/FiCloud.2015.102
[15] Engelhardt-Nowitzki, C., Kryvinska, N., Strauss, C. (2011) Strategic Demands on Information Services in Uncertain Businesses: A Layer-
Based Framework from a Value Network Perspective, International Conference on Emerging Intelligent Data and Web Technologies, 131-136.
[16] Izonin, I., Tkachenko, R., Kryvinska, N., Tkachenko, P., & al. (2019) Multiple Linear Regression Based on Coefficients Identification Using
Non-iterative SGTM Neural-like Structure. Advances in Computational Intelligence. Lecture Notes in Computer Science, 11506, 467-479.
[17] Kryvinska, N., M. d. Silva, M. (2016) Foreword of the Thematic Track Quality Aspects in Service Management," 2016 10th International
Conference on the Quality of Information and Communications Technology (QUATIC), Lisbon, 209-209.

You might also like