Ivan Demydov, Najm Ahmad Baydoun, Mykola Beshley, Mykhailo Klymash, Oleksiy Panchenko


This paper presents authors analytical view on social impacts as targeted advertisement into the network environment using Omori tectonic theory for description the processes of audience response evolution. This could be extremely important and useful in the modern world to realize desirable e-Gov informational policy in the circumstances of hybrid treats emergence that is especially relevant for the informational space and reaching a cyber-supremacy. Some mathematical and algorithmic basics were contributed for narrative description of information and communications technologies (ICT) architectural deployment could be used for outer regulation of audience response character by Social Media Marketing (SMM) principles. That could be performed by controlled distribution of specified digital content that contains respective key phrases, for example social advertisements and analyzing respective feed-backs. Some results of the empiric study of live audience response dependence on controlled impacts are discussed. Election processes data and recent media recordings for preliminary proof of the contributed concept feasibility have been analyzed. There were shown using gathered empiric data sets, that the extent of impacts to targeted audience response intensity could be the subject of outer regulation. The index has been contributed for assessment the efficiency of the impact’s propagation inside the audience by calculation of row correlation of keyword occurrence and audience response intensity. The approaches suggested in the article can be useful both for building effective interactive systems of state-society interaction and for detecting manipulative traits when influencing a specific audience


controlled social impact; SMM; ICT; targeted content advertising; e-Gov strategy; cyberspace; tectonic theory

Full Text:



Klimek, P., Bayer, W., Thurner, S. (2011). The blogosphere as an excitable social medium: Richter’s and Omori’s Law in media coverage. Physica A: Statistical Mechanics and Its Applications, 390 (21-22), 3870–3875. doi:

Shinyaeva, T. S., Tarasevich, Y. Y. (2016). Virtual network as excitable medium. Journal of Physics: Conference Series, 681, 012008. doi:

Szell, M., Grauwin, S., Ratti, C. (2014). Contraction of Online Response to Major Events. PLoS ONE, 9 (2), e89052. doi:

Utsu, T., Ogata, Y., S, R., Matsu’ura (1995). The Centenary of the Omori Formula for a Decay Law of Aftershock Activity. Journal of Physics of the Earth, 43 (1), 1–33. doi:

Yoo, S.-C., Shin, I. (2018). Digital Signage Media Creative : A Study for the Media Typology and Advertising Creative Strategy for Digital Signage. The Korean Journal of Advertising, 29 (6), 81–108. doi:

Dunbar, R. I. M., Arnaboldi, V., Conti, M., Passarella, A. (2015). The structure of online social networks mirrors those in the offline world. Social Networks, 43, 39–47. doi:

Correig, A. M., Urquizú, M., Vila, J., Manrubia, S. C. (1997). Aftershock series of event February 18, 1996: An interpretation in terms of self-organized criticality. Journal of Geophysical Research: Solid Earth, 102 (B12), 27407–27420. doi:

Dieterich, J. (1994). A constitutive law for rate of earthquake production and its application to earthquake clustering. Journal of Geophysical Research: Solid Earth, 99 (B2), 2601–2618. doi:

Poniszewska-Maranda, A., Matusiak, R., Kryvinska, N., Yasar, A.-U.-H. (2019). A real-time service system in the cloud. Journal of Ambient Intelligence and Humanized Computing. doi:

De la Prieta, F., Bajo, J., Rodríguez, S., Corchado, J. M. (2016). MAS-based self-adaptive architecture for controlling and monitoring Cloud platforms. Journal of Ambient Intelligence and Humanized Computing, 8 (2), 213–221. doi:

Mladenow, A., Kryvinska, N., Strauss, C. (2012). Towards cloud-centric service environments. Journal of Service Science Research, 4 (2), 213–234. doi:

Kaddouri, A., Guezouri, M., Mbarek, N. (2017). A new inter-cloud service-level guarantee protocol applied to space missions. International Journal of Grid and Utility Computing, 8 (2), 152. doi:

Jiang, L., Feng, G., Qin, S. (2015). Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture. KSII Transactions on Internet and Information Systems, 9 (11), 4268–4290. doi:

Krishna, M. (2019). User-Centric and Information-Centric Networking and Services. CRC Press, 310. doi:

Molnár, E., Molnár, R., Kryvinska, N., Greguš, M. (2014). Web intelligence in practice. Journal of Service Science Research, 6 (1), 149–172. doi:

Peköz, Ü. G. (2018). Product Usage Data Collection and Challenges of Data Anonymization. Lecture Notes on Data Engineering and Communications Technologies, 117–136. doi:

Bauer, C., Kryvinska, N., Strauss, C. (2016). The Business with Digital Signage for Advertising. Lecture Notes in Information Systems and Organisation, 285–302. doi:

Korzh, R., Peleshchyshyn, A. (2013). Formalization of process of forming university’s information image in the social environments on the internet. Eastern-European Journal of Enterprise Technologies, 5 (3 (65)), 4–8.

Korzh, R., Fedushko, S., Peleshchyshyn, A. (2015). Methods for forming an informational image of a higher education institution. Webology, 12 (2).

Korzh, R., Peleshchyshyn, A. (2016). Forming University’s Information Image Based on Image Information Generator. Journal of Multidisciplinary Engineering Science and Technology, 3 (1), 3621–3624.

Witten, I., Frank, E., Hall, M., Pal, C. (2011). Data mining. Burlington, MA: Morgan Kaufmann.

Lehtonen, J. (2011). Characterizing the deep Web. University of Turku.

Cadwalladr, C., Graham-Harrison, E. (2019). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. Available at:

Alsaedi, N., Burnap, P. (2015). Arabic Event Detection in Social Media. Lecture Notes in Computer Science, 384–401. doi:

Burnap, P., Williams, M. L., Sloan, L., Rana, O., Housley, W., Edwards, A. et. al. (2014). Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining, 4 (1). doi:

Pravo na vladu season 6 issue 39 online on 1+1 video (2019). Available at:

Pravo na vladu season 6 issue 36 online on 1+1 video (2019). Available at:

Narayanan, A., Shmatikov, V. (2008). Robust De-anonymization of Large Sparse Datasets. 2008 IEEE Symposium on Security and Privacy (sp 2008). doi:

Salas, J., Domingo-Ferrer, J. (2018). Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges. Mathematics in Computer Science, 12 (3), 263–274. doi:

Weber, R. H. (2010). Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26 (1), 23–30. doi:

Klymash, M., Demydov, I., Beshley, M., Shpur, O. (2016). Features of the cloud services implementation in the national network segment of Ukraine. Information and Telecommunication Sciences, 1, 31–38. doi:

Yu, Q., Huo, H.-W. (2011). Algorithms Improving the Storage Efficiency of Deep Packet Inspection. Journal of Software, 22 (1), 149–163. doi:



  • There are currently no refbacks.

Copyright (c) 2019 Ivan Demydov, Najm Ahmad Baydoun, Mykola Beshley, Mykhailo Klymash, Oleksiy Panchenko

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN 2461-4262 (Online), ISSN 2461-4254 (Print)