New Cybersecurity Challenges: Digital Transformation and the Political Implications of their Implementation
The purpose of this article is to analyze modern challenges in the field of cybersecurity and mechanisms for countering cyber threats, assess the problems our country faces in this area, and identify possible solutions. To achieve this goal, the article studies the basic concepts related to cybersp...
| Published in: | Journal of Political Science: Bulletin of Yerevan University |
|---|---|
| Main Author: | Anna Sisoyan |
| Format: | Article |
| Language: | English |
| Published: |
Yerevan State University
2025-07-01
|
| Subjects: | |
| Online Access: | https://journals.ysu.am/index.php/j-pol-sci/article/view/12695 |
Similar Items
Towards the Legal Protection of Critical Infrastructure in Africa Against Cyberwar and Cyberterrorism
by: Bernard Ngalim
Published: (2023-07-01)
by: Bernard Ngalim
Published: (2023-07-01)
Ciberespacio y el Crimen Organizado. Los nuevos desafíos del siglo XXI
by: Gema Sánchez Medero
Published: (2012-07-01)
by: Gema Sánchez Medero
Published: (2012-07-01)
You want peace ? Get ready for war...in cyberspace
by: Zbigniew Witkowski
Published: (2024-12-01)
by: Zbigniew Witkowski
Published: (2024-12-01)
CYBERSECURITY AND ETHICAL, SOCIAL, AND POLITICAL CONSIDERATIONS: WHEN CYBERSECURITY FOR ALL IS NOT ON THE TABLE
by: Karsten WEBER
Published: (2022-03-01)
by: Karsten WEBER
Published: (2022-03-01)
Cyber Pearl Harbor is Not Coming: US Politics Between War and Peace
by: Dominika Dziwisz
Published: (2022-12-01)
by: Dominika Dziwisz
Published: (2022-12-01)
Impact of Cyber Risks and Threats on the Critical Infrastructure Development: Visualization of Scientific Research
by: Aleksy Kwilinski, et al.
Published: (2024-11-01)
by: Aleksy Kwilinski, et al.
Published: (2024-11-01)
Analysis of the ways of improvement of Ukraine – NATO cooperation on cybersecurity issues
by: Volodymyr Shypovskyi, et al.
Published: (2020-04-01)
by: Volodymyr Shypovskyi, et al.
Published: (2020-04-01)
The impact of cyberattacks on the stability of global financial markets as a manifestation of economic terrorism
by: Katarzyna Cyrkun, et al.
Published: (2024-06-01)
by: Katarzyna Cyrkun, et al.
Published: (2024-06-01)
From Offense Dominance to Deterrence: China’s Evolving Strategic Thinking on Cyberwar
by: Tianjiao Jiang
Published: (2019-12-01)
by: Tianjiao Jiang
Published: (2019-12-01)
CYBERSECURITY IN TOURISM AND HOSPITALITY MANAGEMENT RESEARCH: CURRENT ISSUES, TRENDS, AND AN AGENDA FOR FUTURE RESEARCH
by: Maria del Mar Alonso-Almeida, et al.
Published: (2024-06-01)
by: Maria del Mar Alonso-Almeida, et al.
Published: (2024-06-01)
MODERN BUSINESS CYBERSECURITY CHALLENGES AND THE ROLE OF ARTIFICIAL INTELLIGENCE IN COUNTERING THREATS
by: Kostiantyn Zavrazhnyi, et al.
Published: (2024-10-01)
by: Kostiantyn Zavrazhnyi, et al.
Published: (2024-10-01)
DETERMINING THE MAIN CAUSES THAT LEAD TO CYBERSECURITY RISKS IN SMES
by: Andrei-Laurențiu MITROFAN, et al.
Published: (2020-12-01)
by: Andrei-Laurențiu MITROFAN, et al.
Published: (2020-12-01)
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
by: Lee Jarvis, et al.
Published: (2014-04-01)
by: Lee Jarvis, et al.
Published: (2014-04-01)
Cyberattacks and the Erosion of State Sovereignty
by: Ana Maria COSTEA, et al.
Published: (2024-12-01)
by: Ana Maria COSTEA, et al.
Published: (2024-12-01)
The system of cybersecurity bodies in Ukraine
by: Andrii V. Svintsytskyi
Published: (2022-04-01)
by: Andrii V. Svintsytskyi
Published: (2022-04-01)
I.R.I Army cybersecurity effective factors. (Case study: I.R.I Army general staff )
by: Mahdi Mahdavipur, et al.
Published: (2022-08-01)
by: Mahdi Mahdavipur, et al.
Published: (2022-08-01)
A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America
by: Omar Flor-Unda, et al.
Published: (2023-08-01)
by: Omar Flor-Unda, et al.
Published: (2023-08-01)
A Definitional Framework for Cyber Warfare. The Ukrainian Aspect
by: Marek Górka
Published: (2025-09-01)
by: Marek Górka
Published: (2025-09-01)
Modelling Cyberspace to Determine Cybersecurity Training Requirements
by: Adrian Venables
Published: (2021-11-01)
by: Adrian Venables
Published: (2021-11-01)
LAW OF 11 MARCH 2022 ON HOMELAND DEFENSE IMPLICATIONS FOR THE CYBERSECURITY OF POLAND
by: Piotr Kobielski
Published: (2022-11-01)
by: Piotr Kobielski
Published: (2022-11-01)
Cybersecurity in Cyber–Physical Power Systems
by: Luiz Fernando Ribas Monteiro, et al.
Published: (2023-06-01)
by: Luiz Fernando Ribas Monteiro, et al.
Published: (2023-06-01)
Cybersecurity and Security of the Banking Business Under Martial Law
by: Serhii Azarenkov
Published: (2025-04-01)
by: Serhii Azarenkov
Published: (2025-04-01)
Cyber security: the role of the state in protecting society and individual personality in maintaining interethnic peace
by: Viktor Bondarenko
Published: (2020-07-01)
by: Viktor Bondarenko
Published: (2020-07-01)
El Ciberterrorismo en la Legislación Colombiana: Un Análisis Desde la Criminologia
by: Hans Nicolaysen Sanchez, et al.
Published: (2024-05-01)
by: Hans Nicolaysen Sanchez, et al.
Published: (2024-05-01)
Історія міжнародно-правового регулювання питань, пов’язаних із застосуванням комп’ютерних технологій
by: Микола Валерійович Камчатний
Published: (2016-10-01)
by: Микола Валерійович Камчатний
Published: (2016-10-01)
Cyber conflict in the light of article 5 of the North Atlantic treaty
by: Сильвія Лещук
Published: (2019-06-01)
by: Сильвія Лещук
Published: (2019-06-01)
ОЦІНКА БЕЗПЕРЕРВНОСТІ БІЗНЕС-ПРОЦЕСІВ НА ОСНОВІ СИНЕРГІЧНОГО ПІДХОДУ
by: Наталія Звєрцева
Published: (2023-09-01)
by: Наталія Звєрцева
Published: (2023-09-01)
Cybersecurity education for South African school children through the action Cybercrime Prevention Programme: A systematic literature review
by: Olufiropo Emmanuel Alalade, et al.
Published: (2023-12-01)
by: Olufiropo Emmanuel Alalade, et al.
Published: (2023-12-01)
RESENHA DE “CYBER CONFLICT: COMPETING NATIONAL PERSPECTIVES”
by: Thiago Correa Malafaia
Published: (2015-05-01)
by: Thiago Correa Malafaia
Published: (2015-05-01)
Research on Quantitative Prioritization Techniques for Selecting Optimal Security Measures
by: Jang Jisoo, et al.
Published: (2024-01-01)
by: Jang Jisoo, et al.
Published: (2024-01-01)
Cybersecurity Research Meets Science and Technology Studies
by: Myriam Dunn Cavelty
Published: (2018-06-01)
by: Myriam Dunn Cavelty
Published: (2018-06-01)
Cyberterrorism as a global threat: a review on repercussions and countermeasures
by: Saman Iftikhar
Published: (2024-01-01)
by: Saman Iftikhar
Published: (2024-01-01)
A Study on Cyber Target Importance Quantification and Ranking Algorithm
by: Kookjin Kim, et al.
Published: (2022-02-01)
by: Kookjin Kim, et al.
Published: (2022-02-01)
Cybersecurity and Sovereignty in Cyberspace: Challenges and Prospects of International Law
by: С. С. Lazari
Published: (2025-04-01)
by: С. С. Lazari
Published: (2025-04-01)
CURRENT APPROACHES OF DIPLOMACY IN THE CYBERSPACE
by: Radu Constantin MUREȘAN
Published: (2017-06-01)
by: Radu Constantin MUREȘAN
Published: (2017-06-01)
The role of the Cybersecurity Strategy of the Republic of Poland in ensuring cybersecurity
by: Mirosław Karpiuk, et al.
Published: (2023-09-01)
by: Mirosław Karpiuk, et al.
Published: (2023-09-01)
The Level of Cybersecurity of the BRICS Member Countries in International Ratings: Prospects for Cooperation
by: O. Ovchinnikova, et al.
Published: (2023-04-01)
by: O. Ovchinnikova, et al.
Published: (2023-04-01)
EUROPEAN REGIONAL SYSTEM FOR COMBATING CYBERTERRORISM: POLITICAL, INSTITUTIONAL AND LEGAL MECHANISMS
by: Oleksandra Zinchenko
Published: (2021-07-01)
by: Oleksandra Zinchenko
Published: (2021-07-01)
Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions
by: Mohammad Ahmed Alomari, et al.
Published: (2025-01-01)
by: Mohammad Ahmed Alomari, et al.
Published: (2025-01-01)
GENICS: A Framework for Generating Attack Scenarios for Cybersecurity Exercises on Industrial Control Systems
by: InSung Song, et al.
Published: (2024-01-01)
by: InSung Song, et al.
Published: (2024-01-01)
Similar Items
-
Towards the Legal Protection of Critical Infrastructure in Africa Against Cyberwar and Cyberterrorism
by: Bernard Ngalim
Published: (2023-07-01) -
Ciberespacio y el Crimen Organizado. Los nuevos desafíos del siglo XXI
by: Gema Sánchez Medero
Published: (2012-07-01) -
You want peace ? Get ready for war...in cyberspace
by: Zbigniew Witkowski
Published: (2024-12-01) -
CYBERSECURITY AND ETHICAL, SOCIAL, AND POLITICAL CONSIDERATIONS: WHEN CYBERSECURITY FOR ALL IS NOT ON THE TABLE
by: Karsten WEBER
Published: (2022-03-01) -
Cyber Pearl Harbor is Not Coming: US Politics Between War and Peace
by: Dominika Dziwisz
Published: (2022-12-01)
