Сообщение

Modeling the Interface of an Information System and Instructions for Working with It, Taking into Account the Deviation of User Behavior

 
 orcid Grigory Moiseenko

Ministry of Defense of the Russian Federation,
Moscow, 119160, Russian Federation

DOI 10.31854/2307-1303-2025-13-4-1-14

EDN SFRRWR

 Full text

XML JATS

Abstract

Problem statement. Unintentional violations by a user of instructions for working with an information system, leading to information security threats (unintentional insider incidents), are a serious issue in the field of information security. The main cause of such violations is that, due to a certain psycho-emotional state of the user, a deviation in behavior occurs, and the user may make mistakes both in choosing and in working with system interface elements: for example, entering confidential data into "open" fields. The aim of this work is to describe a software tool for modeling, developed based on the author's system interface model and instructions. Research methods: computer modeling, software engineering, experiment. The result: in addition to the very fact of creating a software tool, its operability has been proven in terms of modeling the interface in an information system and instructions for working with it, as well as the visibility of the resulting graphical representation. The practical significance lies in the fact that this tool allows you to implement a method to counteract the deviation of user behavior by solving the optimization problem of clarifying instructions in terms of the specification of the description of interface elements; at the same time, this task is multi-criteria, since increasing the content of instructions leads to the opposite effect – complicating its perception by humans.

Keywords

unintentional insider, behavior deviation, modeling, software tool, experiment

Reference for citation

Moiseenko G. Modeling the Interface of an Information System and Instructions for Working with It, Taking into Account the Deviation of User Behavior // Telecom IT. 2025. Vol. 13. Iss. 4. PP. 1‒14 (in Russian). DOI: 10.31854/2307-1303-2025-13-4-1-14. EDN: SFRRWR

References

1. Buinevich M., Moiseenko G. Threat to information resources security by violating the rules of work with the information system // Proceedings of the St. Petersburg International Conference and the St. Petersburg Interregional Conference "Regional Informatics and Information Security" (Saint Petersburg, October 23–25, 2024). St. Petersburg, 2024. PP. 78–79. EDN: JRRYNA

2. Kovtunovich M. G., Markachev K. E. Information stress // Psychological Science and Education. 2008. Vol. 13. Iss. 5. PP. 83–91. EDN: JXDPBX

3. Moiseenko G. Review of methods of formalizing job descriptions (according to domestic research) // National Security and Strategic Planning. 2024. Iss. 4 (48). PP. 35–42. DOI: 10.37468/2307-1400-2024-4-35-42. EDN: EVKBGL

4. Buinevich M. V., Moiseenko G. Yu. The instructions "resistant" increasing as a way to counter unintentional insiding // Voprosy Kiberbezopasnosti. 2024. Iss. 6 (64). PP. 108–116. DOI: 10.21681/2311-3456-2024-6-108-116. EDN: HRNCWF

5. Tsaregorodtsev A. V., Romanovskiy S. V., Volkov S. D., Samoylov V. E. Digital products' information security risk management in the organization financial ecosystem // Modeling, Optimization and Information Technology. 2020. Vol. 8. Iss 4 (31). DOI: 10.26102/2310-6018/2020.31.4.038. EDN: SKZBBF

6. Kurta P. A. Interaction of the user with the information system. Part 1. Scheme of interaction and classification of disadvantages // News of ETU. 2020. Iss. 8–9. PP. 35–45. EDN: VLVMXL

7. Abdullin T. I., Baev V. D., Buinevich M. V., Burzunov D. D., Vasilieva I. N., et al. Digital Technologies and Information Security Issues. St. Petersburg: Saint Petersburg State Economic University Publ., 2021. 163 p. EDN: NXZPBQ

8. Buynevich M. V., Izrailov K. E. Author's metric for assessing proximity of programs: application for vulnerability search using genetic de-evolution // Software & Systems. Vol. 38. Iss. 1. PP. 89–99. DOI: 10.15827/0236-235X.149.089-099. EDN: RAPDHK

9. Vostryh A. Algorithm for assessing the efficiency of visual aesthetics of interfaces of specialized software products used by emergency services // National Security and Strategic Planning. 2024. Iss. 3 (47). PP. 77–89. DOI: 10.37468/2307-1400-2024-3-77-89. EDN: BEEHGJ

10. Danilova M. V., Mollon J. D. Color discrimination and color categories // Experimental Psychology (Russia). 2010. Vol. 3. Iss. 3. PP. 39–56. EDN: MWKCAD

11. Buinevich M., Moiseenko G. Combining of heterogeneous destructive impact on the information system and countering attacks (on Example by Insider Activity and DDoS-attack) // Telecom IT. 2023. Vol. 11. Iss. 3. PP. 27‒36. (in Russian) DOI: 10.31854/2307-1303-2023-11-3-27-36. EDN: LWQWNX

 

cc-by This article is distributed under a license Creative Commons Attribution 4.0 License.

cc0  The metadata of the article is distributed under a license CC0 1.0 Universal


 

 
войти

Авторизация