{"title":"Proposing of suggestive influence detection and classification method based on fuzzy logic and feature driven analysis","authors":"Yuliia Nakonechna","doi":"10.20535/tacs.2664-29132023.1.283565","DOIUrl":null,"url":null,"abstract":"This research proposes an approach to identify and classify tools utilized in information operations that aim to exert suggestive influence. The proposed method combines fuzzy sets theory and fuzzy inference methods with a feature-based analysis approach. By employing this approach, the study focuses on identifying and categorizing tools such propaganda, fake, disinformation, manipulation, and artificial narrative. This framework provides a comprehensive and nuanced understanding of the various tactics employed in information operations, allowing for improved analysis and mitigation strategies.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical and applied cybersecurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20535/tacs.2664-29132023.1.283565","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This research proposes an approach to identify and classify tools utilized in information operations that aim to exert suggestive influence. The proposed method combines fuzzy sets theory and fuzzy inference methods with a feature-based analysis approach. By employing this approach, the study focuses on identifying and categorizing tools such propaganda, fake, disinformation, manipulation, and artificial narrative. This framework provides a comprehensive and nuanced understanding of the various tactics employed in information operations, allowing for improved analysis and mitigation strategies.