New Cybersecurity Challenges: Digital Transformation and the Political Implications of their Implementation

Authors

DOI:

https://doi.org/10.46991/JOPS/2025.4.10.110

Keywords:

cybersecurity, cyberspace, cyberwar, cyberattacks, cyberterrorism, cyber dyplomacy, cyber activism, hacking

Abstract

The purpose of this article is to analyze modern challenges in the field of cybersecurity and mechanisms for countering cyber threats, assess the problems our country faces in this area, and identify possible solutions. To achieve this goal, the article studies the basic concepts related to cyberspace, considers real examples of cyber attacks recorded in recent years, and studies the experience, legislative and institutional framework of the leading countries in this area. In this context, the author highlights the structural similarities and differences of the countries in question. The relevance of this article is due to the analysis of new challenges to cybersecurity and the growing scale of application of information technologies in all spheres of human political activity. In the era of digitalization, information is acquiring the status of the most important object, a strategic resource of both the state and any management structure in the political management system. In this context, the relevance of the research topic is manifested in the development of the concept of a knowledge and information society developing on the basis of modern information and communication technologies. Information as a strategic resource requires a special state attitude not only in terms of its development and accumulation, but also protection. The article also analyzes the development of new information technologies, which causes an increase in the technological gap between the increasingly complex requirements for information resource security indicators in all countries and the capabilities of information technologies and software and hardware used to ensure information security.

Author Biography

  • Anna Sisoyan, Armenian

    PhD candidate of the  Chair of Political Science of the Faculty of International Relations at the Yerevan State University

References

Aleksanyan, Ashot. 2024. “Hybrid War against European Political Integration of Armenia: A Dead End or a Springboard on the Way to the EU?.” In: The ‘New’ Geopolitics in the Caucasus What Role for the EU?, edited by Gvantsa Davitashvili, Thomas Kruessmann, and Ivanna Machitidze, 123-144. Hannover; Stuttgart: ibidem-Verlag.

Amador, Tristen et al. 2025. “An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack.” In: Human Aspects of Information Security and Assurance. HAISA 2024. IFIP Advances in Information and Communication Technology, vol 721, edited by Nathan Clarke, and Steven Furnell, 264-277. Springer, Cham. https://doi.org/10.1007/978-3-031-72559-3_18. DOI: https://doi.org/10.1007/978-3-031-72559-3_18

Bartnicki, Adam R., Elżbieta Kużelewska, and Michał Ożóg. 2023. “Information and Information Technologies in the 2022 Russian-Ukrainian War.” In: War in Ukraine. Media and Emotions, edited by Agnieszka Turska-Kawa, Agnieszka Kasińska-Metryka, and Karolina Pałka-Suchojad, 21-41. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-37608-5_3. DOI: https://doi.org/10.1007/978-3-031-37608-5_3

Bellabarba, Giulia. 2024. “NotPetya: Understanding the Destructiveness of Cyberattacks.” Security Outlines, January, 28 2024. Accessed January 21, 2025. https://www.securityoutlines.cz/notpetya-understanding-the-destructiveness-of-cyberattacks/.

Beuran, Razvan. 2025. Cybersecurity Awareness Training. In: Cybersecurity Education and Training. Springer, Singapore, pp. 153-170. https://doi.org/10.1007/978-981-96-0555-2_8. DOI: https://doi.org/10.1007/978-981-96-0555-2_8

Brantly, Aaron F., and Nataliya D. Brantly. 2024. “The Bitskrieg That Was and Wasn’t: The Military and Intelligence Implications of Cyber Operations during Russia’s War on Ukraine.” Intelligence and National Security 39 (3): 475-495. https://doi.org/10.1080/02684527.2024.2321693. DOI: https://doi.org/10.1080/02684527.2024.2321693

Bronk, Chris, Gabriel Collins, and Dan S. Wallach. 2023. “The Ukrainian Information and Cyber War.” The Cyber Defense Review 8 (3): 33-50.

Chihaia, Mihai Sebastian, and Jan Rempala. 2023. “Cyber Diplomacy.” In: The Palgrave Encyclopedia of Global Security Studies, edited by Scott N. Romaniuk, and Péter N. Marton, 260-264. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-74319-6_27. DOI: https://doi.org/10.1007/978-3-319-74319-6_27

Couretas, Jerry M. 2022. Cyber Policy, Doctrine, and Tactics, Techniques, and Procedures (TTPs). In: An Introduction to Cyber Analysis and Targeting. Springer, Cham, pp. 13-36. https://doi.org/10.1007/978-3-030-88559-5_2. DOI: https://doi.org/10.1007/978-3-030-88559-5_2

Elamiryan, Ruben, and Mamikon Margaryan. 2018. “Cyber Security in the Context of Armenia-NATO Cooperation.” Journal of Information Warfare 17 (1): 99-111.

Gibson, William. 1984. Neuromancer. Ace.

Ismailzade, Fariz. 2024. “Digital Diplomacy in Azerbaijan: Lessons Learned and Future Opportunities.” In: Digital Diplomacy in the OSCE Region: From Theory to Practice, edited by Erman Akıllı, Burak Güneş, and Oğuz Güner, 11-19. Springer, Cham. https://doi.org/10.1007/978-3-031-50966-7_2. DOI: https://doi.org/10.1007/978-3-031-50966-7_2

Jøsang, Audun. 2025. Governance and Information Security Management. In: Cybersecurity: Technology and Governance. Springer, Cham, pp. 377-403. https://doi.org/10.1007/978-3-031-68483-8_18. DOI: https://doi.org/10.1007/978-3-031-68483-8_18

Kaster, Sean D., and Prescott C. Ensign. 2022. “Privatized espionage: NSO Group Technologies and its Pegasus spyware.” Thunderbird International Business Review 65 (3): 355-364. https://doi.org/10.1002/tie.22321. DOI: https://doi.org/10.1002/tie.22321

Kayser, Kenneth, Arnesh Telukdarie, and Simon P. Philbin. 2023. “Digital Start-Up Ecosystems: A Systematic Literature Review and Model Development for South Africa.” Sustainability 15 (16), 12513: 1-24. https://doi.org/10.3390/su151612513. DOI: https://doi.org/10.3390/su151612513

Konovalova, Lyudmila G., Nadezda A. Kandrina, and Olesia L. Kazantseva. 2023. “Amendments to the Constitution of the Russian Federation Through the Prism of Social Security.” In: Advances in Natural, Human-Made, and Coupled Human-Natural Systems Research, Volume 1, edited by Svetlana G. Maximova, Roman I. Raikin, Alexander A. Chibilev, and Marina M. Silantyeva, 457-469. Springer, Cham. https://doi.org/10.1007/978-3-030-75483-9_42. DOI: https://doi.org/10.1007/978-3-030-75483-9_42

Kotliar, Dan M., and Elinor Carmi. 2023. “Keeping Pegasus on the Wing: Legitimizing Cyber Espionage.” Information, Communication & Society 27 (8): 1499-1529. https://doi.org/10.1080/1369118X.2023.2245873. DOI: https://doi.org/10.1080/1369118X.2023.2245873

Lamb, George William. 2025. “The UK and EU Security and Defence Relationship Post-Brexit.” In: The New Relationship between the United Kingdom and the European Union, edited by Emmanuel Guinchard, and Carlo Panara, 251-318. Springer, Cham. https://doi.org/10.1007/978-3-031-70652-3_13. DOI: https://doi.org/10.1007/978-3-031-70652-3_13

Li, Hui, and He Bai. 2025. Network Control Message Protocol. In: Principle of Architecture, Protocol, and Algorithms for CoG-MIN: A Sustainably Ecological & Evolutionary Solution for Packet Network System. Springer, Singapore, pp. 197-228. https://doi.org/10.1007/978-981-96-3596-2_10. DOI: https://doi.org/10.1007/978-981-96-3596-2_10

Mizobuchi, Masaki. 2025. “The Other Active Fault Line: Israel, Iran, and the “Axis of Resistance”.” In: “Fragile Stability” as a Political Background of October 7: Current and Foreseeable Issues in the Israeli-Palestinian Conflict, edited by Aiko Nishikida, Chie Ezaki, and Toshiya Tsujita, 205-220. Springer, Singapore. https://doi.org/10.1007/978-981-96-2587-1_12. DOI: https://doi.org/10.1007/978-981-96-2587-1_12

Möller, Dietmar P.F. 2023. Ransomware Attacks and Scenarios: Cost Factors and Loss of Reputation. In: Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices. Springer, Cham, pp. 273-303. https://doi.org/10.1007/978-3-031-26845-8_6. DOI: https://doi.org/10.1007/978-3-031-26845-8_6

Montasari, Reza. 2023. Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom. In: Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity. Springer, Cham, pp. 7-25. https://doi.org/10.1007/978-3-031-21920-7_2. DOI: https://doi.org/10.1007/978-3-031-21920-7_2

Murphy, Graham J. 2024. Introduction: Strolling Through the Sprawl. In: William Gibson’s “Neuromancer”: A Critical Companion. Palgrave Science Fiction and Fantasy: A New Canon. Palgrave Macmillan, Cham, pp. 1-20. https://doi.org/10.1007/978-3-031-56627-1_1. DOI: https://doi.org/10.1007/978-3-031-56627-1_1

Oladimeji, Saheed, and Sean Michael Kerner. 2023. “SolarWinds hack explained: Everything you need to know.” TechTarget, November 3, 2023. Accessed January 21, 2025. https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know.

Özdemir, Gloria Shkurti, and Ahmet Kayhan Yıldız. 2024. “Bringing Diplomacy to the Digital Age: The Implementation and Impact of Digital Diplomacy in the USA.” In: Digital Diplomacy in the OSCE Region: From Theory to Practice, edited by Erman Akıllı, Burak Güneş, and Oğuz Güner, 113-123. Springer, Cham. https://doi.org/10.1007/978-3-031-50966-7_11. DOI: https://doi.org/10.1007/978-3-031-50966-7_11

Paulus, Alexandra. 2024. Introducing Key Concepts and the Analytical Framework. In: Building Bridges in Cyber Diplomacy: How Brazil Shaped Global Cyber Norms. Springer, Cham, pp. 39-61. https://doi.org/10.1007/978-3-031-60387-7_2. DOI: https://doi.org/10.1007/978-3-031-60387-7_2

Poghosyan, Benyamin. 2022. “US Policy in the South Caucasus Prior to and After the 2020 Karabakh War in the Context of the Evolving Regional and International Geopolitics.” Journal of Political Science: Bulletin of Yerevan University 1 (3): 36-50. https://doi.org/10.46991/JOPS/2022.1.3.036. DOI: https://doi.org/10.46991/JOPS/2022.1.3.036

Raghad, Sili Alsahli et al. 2024. “LUBB: Augmented Reality (AR) Application for Learning Transmission Control Protocol/Internet Protocol (TCP/IP) Model.” In: Intelligent Systems and Applications: Proceedings of the 2024 Intelligent Systems Conference (IntelliSys) Volume 2, edited by Kohei Arai, 408-426. Springer, Cham. https://doi.org/10.1007/978-3-031-66428-1_25. DOI: https://doi.org/10.1007/978-3-031-66428-1_25

Reinhold, Thomas. 2024. From Cyberwar to Cyberpeace. In: Towards a Peaceful Development of Cyberspace: De-Escalation of State-Led Cyber Conflicts and Arms Control of Cyber Weapons. Springer Vieweg, Wiesbaden, pp. 51-72. https://doi.org/10.1007/978-3-658-43951-4_6. DOI: https://doi.org/10.1007/978-3-658-43951-4_6

Romano, Simon Pietro. 2024. “Cyber Warfare and Ethical Frontiers: Elevating Conflict to the Digital Frontline of Global Struggles.” In: Mind, Body, and Digital Brains. Integrated Science, vol 20, edited by Flavia Santoianni, Gianluca Giannini, and Alessandro Ciasullo, 231-252. Springer, Cham. https://doi.org/10.1007/978-3-031-58363-6_15. DOI: https://doi.org/10.1007/978-3-031-58363-6_15

Singer, Peter W. and Allan Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know®. New York: Oxford University Press. DOI: https://doi.org/10.1093/wentk/9780199918096.001.0001

Singh, Niraj Kumar, and Sunil Bajeje. 2025. “Hacktivism or Cyber Warfare? Decoding the Motivations Behind Cyber Attacks Targeting Israel.” In: Artificial Intelligence Based Smart and Secured Applications. ASCIS 2024. Communications in Computer and Information Science, vol 2429, edited by Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja, and Pankaj Mudholkar, 206-232. Springer, Cham. https://doi.org/10.1007/978-3-031-86305-9_15. DOI: https://doi.org/10.1007/978-3-031-86305-9_15

Singh, Tarnveer. 2025. State-Sponsored Cyberattacks. In: Cybersecurity, Psychology and People Hacking. Palgrave Studies in Cyberpsychology. Palgrave Macmillan, Cham, pp. 147-150. https://doi.org/10.1007/978-3-031-85994-6_15. DOI: https://doi.org/10.1007/978-3-031-85994-6_15

Spînu, Natalia. 2020. Armenia Cybersecurity Governance Assessment. Geneva: DCAF - Geneva Centre for Security Sector Governance. Accessed January 21, 2025. https://www.dcaf.ch/sites/default/files/publications/documents/ArmeniaCybersecurityGovernanceAssessment.pdf.

Stoddart, Kristan. 2022. Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers. In: Cyberwarfare: Threats to Critical Infrastructure. Palgrave Macmillan, Cham, pp. 351-399. https://doi.org/10.1007/978-3-030-97299-8_6. DOI: https://doi.org/10.1007/978-3-030-97299-8_6

Tabrizchi, Hamed, and Ali Aghasi. 2025. Fundamentals of Cybersecurity. In: Federated Cyber Intelligence: Federated Learning for Cybersecurity. Springer, Cham, pp. 45-74. https://doi.org/10.1007/978-3-031-86592-3_3. DOI: https://doi.org/10.1007/978-3-031-86592-3_3

Tavakkoli, Nasim et al. 2025. “From frontlines to online: examining target preferences in the Russia-Ukraine conflict.” International Journal of Information Security 24 (64): 1-15. https://doi.org/10.1007/s10207-025-00981-w. DOI: https://doi.org/10.1007/s10207-025-00981-w

US Air Force. 2023. “Air Force Doctrine Publication 3-12, Cyberspace Operations.” February 1, 2023. Accessed January 21, 2025. https://www.doctrine.af.mil/Portals/61/documents/AFDP_3-12/3-12-AFDP-CYBERSPACE-OPS.pdf.

Uslu, Safa. 2024. “Data-Informed Diplomacy: Adapting to the Digital Age in International Relations and Implementation in the OSCE Region.” In: Digital Diplomacy in the OSCE Region: From Theory to Practice, edited by Erman Akıllı, Burak Güneş, and Oğuz Güner, 155-166. Springer, Cham. Springer, Cham. https://doi.org/10.1007/978-3-031-50966-7_14. DOI: https://doi.org/10.1007/978-3-031-50966-7_14

Vitel, Philippe, and Henrik Bilddal. 2015. “French Cyber Security and Defence: An Overview.” Information & Security: An International Journal 32 (1): 29-41. https://doi.org/10.11610/isij.3209. DOI: https://doi.org/10.11610/isij.3209

Vogiatzoglou, Plixavra. 2025. “The EU’s Quest for Digital Sovereignty: A Matter of Quantum Innovation?.” Digital Society 4 (16): 1-19. https://doi.org/10.1007/s44206-025-00162-1. DOI: https://doi.org/10.1007/s44206-025-00162-1

Wade, Robert H. 2023. “Conflict Between Great Powers Is Back with Vengeance: The New Cold War Between the US and China Plus Russia.” In: The Political Economy of Emerging Markets and Alternative Development Paths, edited by Judit Ricz, and Tamás Gerőcs, 13-35. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-20702-0_2. DOI: https://doi.org/10.1007/978-3-031-20702-0_2

Williams, Michael R., and Neil C. Rowe. 2025. “Russian Cyber Disinformation Campaigns and Possible Countermeasures.” In: Security and Management and Wireless Networks. CSCE 2024. Communications in Computer and Information Science, vol 2254, edited by Kevin Daimi, Hamid R. Arabnia, and Leonidas Deligiannidis, 344-356. Springer, Cham. https://doi.org/10.1007/978-3-031-86637-1_25. DOI: https://doi.org/10.1007/978-3-031-86637-1_25

Downloads

Published

2025-07-09

Issue

Section

Security Policy

How to Cite

Sisoyan, A. (2025). New Cybersecurity Challenges: Digital Transformation and the Political Implications of their Implementation. Journal of Political Science: Bulletin of Yerevan University, 4(1(10), 110-124. https://doi.org/10.46991/JOPS/2025.4.10.110

Similar Articles

1-10 of 14

You may also start an advanced similarity search for this article.