New Cybersecurity Challenges: Digital Transformation and the Political Implications of their Implementation
DOI:
https://doi.org/10.46991/JOPS/2025.4.10.110Keywords:
cybersecurity, cyberspace, cyberwar, cyberattacks, cyberterrorism, cyber dyplomacy, cyber activism, hackingAbstract
The purpose of this article is to analyze modern challenges in the field of cybersecurity and mechanisms for countering cyber threats, assess the problems our country faces in this area, and identify possible solutions. To achieve this goal, the article studies the basic concepts related to cyberspace, considers real examples of cyber attacks recorded in recent years, and studies the experience, legislative and institutional framework of the leading countries in this area. In this context, the author highlights the structural similarities and differences of the countries in question. The relevance of this article is due to the analysis of new challenges to cybersecurity and the growing scale of application of information technologies in all spheres of human political activity. In the era of digitalization, information is acquiring the status of the most important object, a strategic resource of both the state and any management structure in the political management system. In this context, the relevance of the research topic is manifested in the development of the concept of a knowledge and information society developing on the basis of modern information and communication technologies. Information as a strategic resource requires a special state attitude not only in terms of its development and accumulation, but also protection. The article also analyzes the development of new information technologies, which causes an increase in the technological gap between the increasingly complex requirements for information resource security indicators in all countries and the capabilities of information technologies and software and hardware used to ensure information security.
References
Aleksanyan, Ashot. 2024. “Hybrid War against European Political Integration of Armenia: A Dead End or a Springboard on the Way to the EU?.” In: The ‘New’ Geopolitics in the Caucasus What Role for the EU?, edited by Gvantsa Davitashvili, Thomas Kruessmann, and Ivanna Machitidze, 123-144. Hannover; Stuttgart: ibidem-Verlag.
Amador, Tristen et al. 2025. “An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack.” In: Human Aspects of Information Security and Assurance. HAISA 2024. IFIP Advances in Information and Communication Technology, vol 721, edited by Nathan Clarke, and Steven Furnell, 264-277. Springer, Cham. https://doi.org/10.1007/978-3-031-72559-3_18.
Bartnicki, Adam R., Elżbieta Kużelewska, and Michał Ożóg. 2023. “Information and Information Technologies in the 2022 Russian-Ukrainian War.” In: War in Ukraine. Media and Emotions, edited by Agnieszka Turska-Kawa, Agnieszka Kasińska-Metryka, and Karolina Pałka-Suchojad, 21-41. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-37608-5_3.
Bellabarba, Giulia. 2024. “NotPetya: Understanding the Destructiveness of Cyberattacks.” Security Outlines, January, 28 2024. Accessed January 21, 2025. https://www.securityoutlines.cz/notpetya-understanding-the-destructiveness-of-cyberattacks/.
Beuran, Razvan. 2025. Cybersecurity Awareness Training. In: Cybersecurity Education and Training. Springer, Singapore, pp. 153-170. https://doi.org/10.1007/978-981-96-0555-2_8.
Brantly, Aaron F., and Nataliya D. Brantly. 2024. “The Bitskrieg That Was and Wasn’t: The Military and Intelligence Implications of Cyber Operations during Russia’s War on Ukraine.” Intelligence and National Security 39 (3): 475-495. https://doi.org/10.1080/02684527.2024.2321693.
Bronk, Chris, Gabriel Collins, and Dan S. Wallach. 2023. “The Ukrainian Information and Cyber War.” The Cyber Defense Review 8 (3): 33-50.
Chihaia, Mihai Sebastian, and Jan Rempala. 2023. “Cyber Diplomacy.” In: The Palgrave Encyclopedia of Global Security Studies, edited by Scott N. Romaniuk, and Péter N. Marton, 260-264. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-74319-6_27.
Couretas, Jerry M. 2022. Cyber Policy, Doctrine, and Tactics, Techniques, and Procedures (TTPs). In: An Introduction to Cyber Analysis and Targeting. Springer, Cham, pp. 13-36. https://doi.org/10.1007/978-3-030-88559-5_2.
Elamiryan, Ruben, and Mamikon Margaryan. 2018. “Cyber Security in the Context of Armenia-NATO Cooperation.” Journal of Information Warfare 17 (1): 99-111.
Gibson, William. 1984. Neuromancer. Ace.
Ismailzade, Fariz. 2024. “Digital Diplomacy in Azerbaijan: Lessons Learned and Future Opportunities.” In: Digital Diplomacy in the OSCE Region: From Theory to Practice, edited by Erman Akıllı, Burak Güneş, and Oğuz Güner, 11-19. Springer, Cham. https://doi.org/10.1007/978-3-031-50966-7_2.
Jøsang, Audun. 2025. Governance and Information Security Management. In: Cybersecurity: Technology and Governance. Springer, Cham, pp. 377-403. https://doi.org/10.1007/978-3-031-68483-8_18.
Kaster, Sean D., and Prescott C. Ensign. 2022. “Privatized espionage: NSO Group Technologies and its Pegasus spyware.” Thunderbird International Business Review 65 (3): 355-364. https://doi.org/10.1002/tie.22321.
Kayser, Kenneth, Arnesh Telukdarie, and Simon P. Philbin. 2023. “Digital Start-Up Ecosystems: A Systematic Literature Review and Model Development for South Africa.” Sustainability 15 (16), 12513: 1-24. https://doi.org/10.3390/su151612513.
Konovalova, Lyudmila G., Nadezda A. Kandrina, and Olesia L. Kazantseva. 2023. “Amendments to the Constitution of the Russian Federation Through the Prism of Social Security.” In: Advances in Natural, Human-Made, and Coupled Human-Natural Systems Research, Volume 1, edited by Svetlana G. Maximova, Roman I. Raikin, Alexander A. Chibilev, and Marina M. Silantyeva, 457-469. Springer, Cham. https://doi.org/10.1007/978-3-030-75483-9_42.
Kotliar, Dan M., and Elinor Carmi. 2023. “Keeping Pegasus on the Wing: Legitimizing Cyber Espionage.” Information, Communication & Society 27 (8): 1499-1529. https://doi.org/10.1080/1369118X.2023.2245873.
Lamb, George William. 2025. “The UK and EU Security and Defence Relationship Post-Brexit.” In: The New Relationship between the United Kingdom and the European Union, edited by Emmanuel Guinchard, and Carlo Panara, 251-318. Springer, Cham. https://doi.org/10.1007/978-3-031-70652-3_13.
Li, Hui, and He Bai. 2025. Network Control Message Protocol. In: Principle of Architecture, Protocol, and Algorithms for CoG-MIN: A Sustainably Ecological & Evolutionary Solution for Packet Network System. Springer, Singapore, pp. 197-228. https://doi.org/10.1007/978-981-96-3596-2_10.
Mizobuchi, Masaki. 2025. “The Other Active Fault Line: Israel, Iran, and the “Axis of Resistance”.” In: “Fragile Stability” as a Political Background of October 7: Current and Foreseeable Issues in the Israeli-Palestinian Conflict, edited by Aiko Nishikida, Chie Ezaki, and Toshiya Tsujita, 205-220. Springer, Singapore. https://doi.org/10.1007/978-981-96-2587-1_12.
Möller, Dietmar P.F. 2023. Ransomware Attacks and Scenarios: Cost Factors and Loss of Reputation. In: Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices. Springer, Cham, pp. 273-303. https://doi.org/10.1007/978-3-031-26845-8_6.
Montasari, Reza. 2023. Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom. In: Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity. Springer, Cham, pp. 7-25. https://doi.org/10.1007/978-3-031-21920-7_2.
Murphy, Graham J. 2024. Introduction: Strolling Through the Sprawl. In: William Gibson’s “Neuromancer”: A Critical Companion. Palgrave Science Fiction and Fantasy: A New Canon. Palgrave Macmillan, Cham, pp. 1-20. https://doi.org/10.1007/978-3-031-56627-1_1.
Oladimeji, Saheed, and Sean Michael Kerner. 2023. “SolarWinds hack explained: Everything you need to know.” TechTarget, November 3, 2023. Accessed January 21, 2025. https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know.
Özdemir, Gloria Shkurti, and Ahmet Kayhan Yıldız. 2024. “Bringing Diplomacy to the Digital Age: The Implementation and Impact of Digital Diplomacy in the USA.” In: Digital Diplomacy in the OSCE Region: From Theory to Practice, edited by Erman Akıllı, Burak Güneş, and Oğuz Güner, 113-123. Springer, Cham. https://doi.org/10.1007/978-3-031-50966-7_11.
Paulus, Alexandra. 2024. Introducing Key Concepts and the Analytical Framework. In: Building Bridges in Cyber Diplomacy: How Brazil Shaped Global Cyber Norms. Springer, Cham, pp. 39-61. https://doi.org/10.1007/978-3-031-60387-7_2.
Poghosyan, Benyamin. 2022. “US Policy in the South Caucasus Prior to and After the 2020 Karabakh War in the Context of the Evolving Regional and International Geopolitics.” Journal of Political Science: Bulletin of Yerevan University 1 (3): 36-50. https://doi.org/10.46991/JOPS/2022.1.3.036.
Raghad, Sili Alsahli et al. 2024. “LUBB: Augmented Reality (AR) Application for Learning Transmission Control Protocol/Internet Protocol (TCP/IP) Model.” In: Intelligent Systems and Applications: Proceedings of the 2024 Intelligent Systems Conference (IntelliSys) Volume 2, edited by Kohei Arai, 408-426. Springer, Cham. https://doi.org/10.1007/978-3-031-66428-1_25.
Reinhold, Thomas. 2024. From Cyberwar to Cyberpeace. In: Towards a Peaceful Development of Cyberspace: De-Escalation of State-Led Cyber Conflicts and Arms Control of Cyber Weapons. Springer Vieweg, Wiesbaden, pp. 51-72. https://doi.org/10.1007/978-3-658-43951-4_6.
Romano, Simon Pietro. 2024. “Cyber Warfare and Ethical Frontiers: Elevating Conflict to the Digital Frontline of Global Struggles.” In: Mind, Body, and Digital Brains. Integrated Science, vol 20, edited by Flavia Santoianni, Gianluca Giannini, and Alessandro Ciasullo, 231-252. Springer, Cham. https://doi.org/10.1007/978-3-031-58363-6_15.
Singer, Peter W. and Allan Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know®. New York: Oxford University Press.
Singh, Niraj Kumar, and Sunil Bajeje. 2025. “Hacktivism or Cyber Warfare? Decoding the Motivations Behind Cyber Attacks Targeting Israel.” In: Artificial Intelligence Based Smart and Secured Applications. ASCIS 2024. Communications in Computer and Information Science, vol 2429, edited by Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja, and Pankaj Mudholkar, 206-232. Springer, Cham. https://doi.org/10.1007/978-3-031-86305-9_15.
Singh, Tarnveer. 2025. State-Sponsored Cyberattacks. In: Cybersecurity, Psychology and People Hacking. Palgrave Studies in Cyberpsychology. Palgrave Macmillan, Cham, pp. 147-150. https://doi.org/10.1007/978-3-031-85994-6_15.
Spînu, Natalia. 2020. Armenia Cybersecurity Governance Assessment. Geneva: DCAF - Geneva Centre for Security Sector Governance. Accessed January 21, 2025. https://www.dcaf.ch/sites/default/files/publications/documents/ArmeniaCybersecurityGovernanceAssessment.pdf.
Stoddart, Kristan. 2022. Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers. In: Cyberwarfare: Threats to Critical Infrastructure. Palgrave Macmillan, Cham, pp. 351-399. https://doi.org/10.1007/978-3-030-97299-8_6.
Tabrizchi, Hamed, and Ali Aghasi. 2025. Fundamentals of Cybersecurity. In: Federated Cyber Intelligence: Federated Learning for Cybersecurity. Springer, Cham, pp. 45-74. https://doi.org/10.1007/978-3-031-86592-3_3.
Tavakkoli, Nasim et al. 2025. “From frontlines to online: examining target preferences in the Russia-Ukraine conflict.” International Journal of Information Security 24 (64): 1-15. https://doi.org/10.1007/s10207-025-00981-w.
US Air Force. 2023. “Air Force Doctrine Publication 3-12, Cyberspace Operations.” February 1, 2023. Accessed January 21, 2025. https://www.doctrine.af.mil/Portals/61/documents/AFDP_3-12/3-12-AFDP-CYBERSPACE-OPS.pdf.
Uslu, Safa. 2024. “Data-Informed Diplomacy: Adapting to the Digital Age in International Relations and Implementation in the OSCE Region.” In: Digital Diplomacy in the OSCE Region: From Theory to Practice, edited by Erman Akıllı, Burak Güneş, and Oğuz Güner, 155-166. Springer, Cham. Springer, Cham. https://doi.org/10.1007/978-3-031-50966-7_14.
Vitel, Philippe, and Henrik Bilddal. 2015. “French Cyber Security and Defence: An Overview.” Information & Security: An International Journal 32 (1): 29-41. https://doi.org/10.11610/isij.3209.
Vogiatzoglou, Plixavra. 2025. “The EU’s Quest for Digital Sovereignty: A Matter of Quantum Innovation?.” Digital Society 4 (16): 1-19. https://doi.org/10.1007/s44206-025-00162-1.
Wade, Robert H. 2023. “Conflict Between Great Powers Is Back with Vengeance: The New Cold War Between the US and China Plus Russia.” In: The Political Economy of Emerging Markets and Alternative Development Paths, edited by Judit Ricz, and Tamás Gerőcs, 13-35. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-20702-0_2.
Williams, Michael R., and Neil C. Rowe. 2025. “Russian Cyber Disinformation Campaigns and Possible Countermeasures.” In: Security and Management and Wireless Networks. CSCE 2024. Communications in Computer and Information Science, vol 2254, edited by Kevin Daimi, Hamid R. Arabnia, and Leonidas Deligiannidis, 344-356. Springer, Cham. https://doi.org/10.1007/978-3-031-86637-1_25.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Anna Sisoyan

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
