The Role of Cyberattacks in Political and Economic Stability

Transforming National and International Approaches

Autores/as

DOI:

https://doi.org/10.26512/lstr.v18i2.59089

Palabras clave:

Financial Sector. International Cooperation. National Strategy. Hacktivism. Phishing. Cybersecurity. Political Stability.

Resumen

[Purpose] The purpose of the study was to identify the main aspects of threats in the cyber sphere to determine recommendations for improving cyber resilience.

[Methodology/approach/design] The study used materials from the Centre for Strategic and International Studies (CSIS), reports and publications from Arctic Wolf and UpGuard, cyber resilience indices from MixMode, and publications from the Global Organised Crime Index. The research methods were case studies, statistical analysis, and analysis of official documents.

[Findings] The study found that cyber incidents as a phenomenon have been known since at least the early 2000s, but the main increase in activity began after 2015. In addition, the intensity of cybercrime was influenced by international events, such as the 2008 crisis, the coronavirus epidemic in 2020, or the full-scale Russian invasion of Ukraine in 2022. Government structures are among the most common targets of cybercriminals. In this context, cyber warfare, cyber espionage, and hacktivism can be used. It has also been studied that, in the context of the economic consequences of cyber threats, the main target of criminals can be cloud storage, because the volume of data stored in them increases every year. In addition, losses from cybercrimes in 2018 were estimated at 600 billion dollars, and by the mid-2020s they were estimated to have reached approximately 9.2 trillion dollars. The exact number of cyber incidents is extremely difficult to track due to their geographical disparity. In this regard, large companies and corporations are strengthening their cyber resilience, an example of which is the activities of JPMorgan Chase. In the context of individual countries, developed economies are the most resistant to cyber incidents, while in developing countries the situation with cyber resilience is much worse. At the national level, one of the most successful cyber security strategies is the Finnish model. It is also important that the draft resolution “United Nations (UN) Convention against Cybercrime” was approved at the international level. As a result, the international community continues to face threats of cyber incidents, but more and more initiatives are being taken to minimise the risks of cyber threats.

[Practical implications] The findings highlight the need for adaptive cybersecurity strategies, particularly in cloud storage protection and national infrastructure. They support the importance of strengthening cyber resilience in developing countries, adopting best practices from successful models (e.g., Finland), and enhancing international coordination.

[Originality/value] The study provides a longitudinal analysis of cybercrime trends in relation to major global events, and links the rise in cyber incidents to geopolitical and economic disruptions.

Descargas

Los datos de descargas todavía no están disponibles.

Biografía del autor/a

Aizhana Myrsalieva, Limited Liability Company “Inmobiles”

Postgraduate Student, Head of the Department of Industry Economics, Limited Liability Company “Inmobiles”, 720040, 197/1 Tynystanov Str., Bishkek, Kyrgyz Republic. E-mail: myrsalievaaizhana@gmail.com.

Elia Abdrakhmanova, Optima Bank

Postgraduate Student, Head of OAO Optima Bank, 720044, 95/1 Chingyz Aitmatov Ave., Bishkek, Kyrgyz Republic. E-mail: e-abdrakhmanova@outlook.com.

Daniyar Suiunduk uulu, Department of Constitutional and Municipal Law, Nazaraliev Medical Centre

Postgraduate Student, Head of the Department of Constitutional and Municipal Law, Nazaraliev Medical Centre, 724330, 84 Bolshevik Str., Bishkek, Kyrgyz Republic. E-mail: d_suiundukuulu@hotmail.com.

Maksatbek Moldomyrzaev , Department of Political Institutions, Processes and Technologies, Design and Construction Company “Dream Architect”

Postgraduate Student, General Manager of the Department of Political Institutions, Processes and Technologies, Design and Construction Company “Dream Architect”, 720017, 195 Bokonbaev Str., Bishkek, Kyrgyz Republic. E-mail: m.moldomyrzaev@outlook.com.

Citas

ABDYGALYM, B., SAMBETBAYEVA, M., YERIMBETOVA, A., NEKESSOVA, A., TASBOLATULY, N., SMAILOV, N., & NAZYMKHAN, A. (2025). NLP Models for Military Terminology Analysis and Detection of Information Operations on Social Media. Computers, 14(11), 485. https://doi.org/10.3390/computers14110485

AHMAD, W., RASOOL, A., JAVED, A.R., BAKER, T., & JALIL, Z. (2021). Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics, 11(1), 16. https://doi.org/10.3390/electronics11010016

AKSHATAEVA, Z., BAIZHANOVA, K., BEISEBAEVA, S., SHERIMKULOVA, G., NURAHMETOVA, G., & KHAMZINA, Z. (2016). The framework of social security system public management in Kazakhstan. International Journal of Environmental and Science Education, 11(18), 11645-11657. https://www.researchgate.net/publication/311603436_The_framework_of_social_security_system_public_management_in_Kazakhstan

ALIKHANOV, A.A. (2023). Economic security in the context of digitalisation as the basis for sustainable development of the regional economy. News of Universities of Kyrgyzstan, 1, 122-126.

ALIKHANOV, A.A., & GYYAZOV, A.T. (2023). Theoretical foundations of ensuring economic security of the state from the point of view of sources of threats in the conditions of digitalisation. Science, New Technologies and Innovations of Kyrgyzstan, 4, 171-176.

Arctic Wolf. (2025). Top government cyberattacks. https://arcticwolf.com/resources/blog/notable-cyber-attacks-on-government-agencies/

ASHRAF, C. (2021). Defining cyberwar: Towards a definitional framework. Defense & Security Analysis, 37(3), 274-294. https://doi.org/10.1080/14751798.2021.1959141

AYUPOVA, Z. K., & SERALIYEVA, A. M. (2015). New criminal procedure code of the republic of Kazakhstan and the problems of the liberation of procedural economy, effectiveness and efficiency. Criminology Journal of Baikal National University of Economics and Law, 9(1), 144-153. https://doi.org/10.17150/1996-7756.2015.9(1).144-153

BAIMUHAMEDOV, M. F., ATANOV, S. K., ZHUNUSOV, K. M., ZHIKEYEV, A. A., BUGUBAEVA, A. U., & BULAEV, A. G. (2019). System of cryptographic protection of information based on deterministic chaos. International Journal of Innovative Technology and Exploring Engineering, 8(12), 4495-4498. https://doi.org/10.35940/ijitee.L3527.1081219

BARLYBAYEV, A., & TURGINBAYEVA, A. (2025). Development and Implementation of an Advanced Fuzzy Expert System for the Assessment of Information Security Risks. Journal of Computational and Cognitive Engineering, 4(4), 570-580. https://doi.org/10.47852/bonviewJCCE52024683

BARLYBAYEV, A., SHARIPBAY, A., SHAKHMETOVA, G., & ZHUMADILLAYEVA, A. (2024). Development of a Flexible Information Security Risk Model Using Machine Learning Methods and Ontologies. Applied Sciences (Switzerland), 14(21), 9858. https://doi.org/10.3390/app14219858

CAVELTY, M.D., & WENGER, A. (2022). Cyber security politics: Socio-technological transformations and political fragmentation. London: Routledge. https://doi.org/10.4324/9781003110224

CAVELTY, M.D., ERIKSEN, C., & SCHARTE, B. (2023). Making cyber security more resilient: Adding social considerations to technological fixes. Journal of Risk Research, 26(7), 801-814. https://doi.org/10.1080/13669877.2023.2208146

Centre for Strategic and International Studies (CSIS). (2024). Significant cyber incidents. https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents

Check Point Research (2025). AI Security Report 2025. https://www.checkpoint.com/resources/items/report-ai-security-report-2025

CHEN, S., HAO, M., DING, F., JIANG, D., DONG, J., ZHANG, S., GUO, Q., & GAO, C. (2023). Exploring the global geography of cybercrime and its driving forces. Humanities and Social Sciences Communications, 10(1), 71. https://doi.org/10.1057/s41599-023-01560-x

CHIGADA, J., & MADZINGA, R. (2021). Cyberattacks and threats during COVID-19: A systematic literature review. South African Journal of Information Management, 23(1), 1-11. https://doi.org/10.4102/sajim.v23i1.1277

CHNG, S., LU, H.Y., KUMAR, A., & YAU, D. (2022). Hacker types, motivations and strategies: A comprehensive framework. Computers in Human Behavior Reports, 5, 100167. https://doi.org/10.1016/j.chbr.2022.100167

ÇIFCI, H. (2024). Analysis of Türkiye’s cybersecurity strategies: Historical developments, scope, content and objectives. Sakarya University Journal of Science, 28(1), 204-219. https://doi.org/10.16984/saufenbilder.1249760

CNN. (2016). What was in the DNC email leak? https://edition.cnn.com/2016/07/24/politics/dnc-email-leak-wikileaks/index.html

CODREANU, C.M. (2022). Using and exporting digital authoritarianism: Challenging both cyberspace and democracies. Europolity: Continuity and Change in European Governance, 16(1), 39-65.

Cybersecurity Strategy of the Kyrgyz Republic for 2019-2023. (2019). https://cbd.minjust.gov.kg/15479/edition/962966/ru

Cybersecurity Ventures (2025). The world will store 200 Zettabytes of data by 2025. https://cybersecurityventures.com/the-world-will-store-200-zettabytes-of-data-by-2025/

DAHAN, E., AVIV, I., & KIPERBERG, M. (2025). Trust Domain Extensions Guest Fuzzing Framework for Security Vulnerability Detection. Mathematics, 13(11), 1879. https://doi.org/10.3390/math13111879

Data Breach Investigations Report. (2011). https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/verizon-breach-report-incidents-are-up-eresource-1-a-3559.pdf

Data Breach Investigations Report. (2015). https://doi.org/10.13140/RG.2.1.4205.5768

Data Breach Investigations Report. (2020). https://pmc.ncbi.nlm.nih.gov/articles/PMC7380945/pdf/main.pdf

DAWOOD, Y. (2021). Combatting Foreign election interference: Canada’s electoral ecosystem approach to disinformation and cyber threats. Election Law Journal: Rules, Politics, and Policy, 20(1), 10-31. https://doi.org/10.1089/elj.2020.0652

DEVANNY, J., MARTIN, C., & STEVENS, T. (2021). On the strategic consequences of digital espionage. Journal of Cyber Policy, 6(3), 429-450. https://doi.org/10.1080/23738871.2021.2000628

Economist.kg. (2024). Cybersecurity under threat: What crimes are most often committed in Kyrgyzstan, according to the Ministry of Internal Affairs. https://economist.kg/novosti/2024/03/13/kibierbiezopasnost-pod-ughrozoi-kakiie-priestuplieniia-chashchie-vsiegho-soviershaiut-v-kr-rasskazali-v-mvd/

ESET Research. (2023). A year of wiper attacks in Ukraine. https://www.welivesecurity.com/2023/02/24/year-wiper-attacks-ukraine/

Euronews. (2023). Russia warns of “retaliatory measures” over Finland’s NATO membership. https://www.euronews.com/2023/04/04/russia-warns-of-retaliatory-measures-over-finlands-nato-membership

Europol. (2025). EU Serious and Organized Crime Threat Assessment 2025 – AI‑driven cybercrime and organized crime trends report. https://apnews.com/article/europe-crime-europol-ai-security-cyber-attack-846847536f6feb2bbb423943fd96e1f1

FALOWO, O.I., POPOOLA, S., RIEP, J., ADEWOPO, V.A., & KOCH, J. (2022). Threat actors’ tenacity to disrupt: Examination of major cybersecurity incidents. IEEE Access, 10, 134038-134051. https://doi.org/10.1109/ACCESS.2022.3231847

Familoni, B.T., & SHOETAN, P.O. (2024). Cybersecurity in the financial sector: A comparative analysis of the USA and Nigeria. Computer Science & IT Research Journal, 5(4), 850-877. https://doi.org/10.51594/csitrj.v5i4.1046

Financial Times. (2024). JPMorgan suffers wave of cyber attacks as fraudsters get “more devious”. https://www.ft.com/content/cd287352-cb3b-48d8-a85b-668713b80962

Gartner. (2023). Gartner forecasts global security and risk management spending to grow 14% in 2024. https://www.gartner.com/en/newsroom/press-releases/2023-09-28-gartner-forecasts-global-security-and-risk-management-spending-to-grow-14-percent-in-2024

Global Organized Crime Index. (2025). Financial and cyber‑dependent crimes lead the expansion in global organized crime. Global OC Index (GI‑TOC). https://ocindex.net/report/2025/section2/

GULYAS, O., & KISS, G. (2023). Impact of cyber-attacks on the financial institutions. Procedia Computer Science, 219, 84-90. https://doi.org/10.1016/j.procs.2023.01.267

History. (2023). Cold war history. https://www.history.com/topics/cold-war/cold-war-history

Increase in the number of cyberattacks in 2024 and beyond. (2024). https://expert.com.ua/176744-zrostannya-kilkosti-kiberatak-u-2024-roci-i-u-podalshomu-zhytti.html

International Monetary Fund (IMF). 2024. The last mile: Financial vulnerabilities and risks. https://www.imf.org/en/Publications/GFSR/Issues/2024/04/16/global-financial-stability-report-april-2024

International Policy Digest. (2022). How social media is fueling divisiveness. https://intpolicydigest.org/how-social-media-is-fueling-divisiveness/

Interpol. (2025). Operation Sentinel: Interpol‑led cybercrime crackdown results in 574 arrests across Africa and highlights rising cybercrime activity. https://www.tomshardware.com/tech-industry/cyber-security/interpol-led-cybercrime-crackdown-results-in-574-arrests-in-19-african-nations-decrypts-six-ransomware-variants-operation-sentinel-disrupts-rings-that-caused-usd21-million-in-losses-recovers-usd3-million

JAVAID, A. (2023). Cybersecurity: A new realm in national security of Pakistan. Research Journal of Human and Social Aspects, 1(4), 52-64.

KARASHEVA, Z., ASSANOVA, S., NURAKHMETOVA, G., & NURANOVA, R. (2024). Digital (Electronic) Paid Provision of Services in the Field of Legal Activity. Revista de Direito, Estado e Telecomunicacoes, 16(1), 25-41. https://doi.org/10.26512/lstr.v16i1.46160

KAYODE-AJALA, O. (2023). Establishing cyber resilience in developing countries: An exploratory investigation into institutional, legal, financial, and social challenges. International Journal of Sustainable Infrastructure for Cities and Societies, 8(9), 1-10.

KOVÁCS, L., & TERTÁK, E. (2024). Financial literacy is the best protection from cybercrime. Economy and Finance, 11(1), 7-28. https://doi.org/10.33908/EF.2024.1.2

Law of the Kyrgyz Republic No. 121 “On Cybersecurity of the Kyrgyz Republic”. (2024). https://cbd.minjust.gov.kg/4-5371/edition/13381/ru

LIU, Y. (2024). Cybersecurity risks and countermeasures in digital communication systems. Probe-Media and Communication Studies, 6(2), 29-32. https://doi.org/10.59429/pmcs.v6i2.6492

MCAFEE. (2018). Economic impact of cybercrime – No slowing down. Washington: Centre for Strategic and International Studies (CSIS).

MCBRIDE, M. (2024). The theft of democracy in post-communist Europe: Democratic backsliding through the lens of organized crime and populist politics. Open Journal of Political Science, 14(4), 653-678. https://doi.org/10.4236/ojps.2024.144036

MELAND, P.H., BERNSMED, K., WILLE, E., RØDSETH, Ø.J., & NESHEIM, D.A. (2021). A retrospective analysis of maritime cyber security incidents. International Journal on Marine Navigation and Safety of Sea Transportation, 15(3), 519-530. https://doi.org/10.12716/1001.15.03.04

Microsoft. (2022). Microsoft identified a unique destructive malware. https://x.com/MsftSecIntel/status/1482543129454686215

MILON, M.N.U., GHOSE, P., PINKY, T.C., TABASSUM, M.N., HASAN, M.N., & KHATUN, M. (2024). An in-depth PRISMA based review of cybercrime in a developing economy: Examining sector-wide impacts, legal frameworks, and emerging trends in the digital era. Edelweiss Applied Science and Technology, 8(4), 2072-2093.

Ministry for Foreign Affairs of Finland. (2023). Cyber security and the cyber domain. https://um.fi/cyber-security-and-the-cyber-domain

MixMode. (2024). Global cybercrime report 2024: Which countries face the highest risk? https://mixmode.ai/blog/global-cybercrime-report-2024-which-countries-face-the-highest-risk/

MORGAN, S. (2015). IBM’s CEO on hackers: “Cybercrime is the greatest threat to every company in the world”. https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/

National Statistical Committee of the Kyrgyz Republic. (2024). Criminal. https://stat.gov.kg/en/statistics/prestupnost/

North Atlantic Treaty Organisation (NATO). (2023). Finland joins NATO as 31st Ally. https://www.nato.int/cps/po/natohq/news_213448.htm

OYADEYI, O.O., OYADEYI, O.A., & BELLO, R.O. (2024). Cybercrime in the Asia-Pacific region: A case study of Commonwealth APAC Countries. Commonwealth Cyber Journal, 2(9), 130-160.

PAANANEN, R., SOIKKELI, M., ARO, M., KUUSISTO, T., RUSILA, T., & TUULENSUU, T. (2024). Finland’s Cyber Security Strategy 2024-2035. Helsinki: Publications of the Finnish Government.

Parliamentary Assembly of the Mediterranean. (2024). The impact of disinformation, misinformation, fake news and foreign interference on democratic systems. https://pam.int/wp-content/uploads/2024/10/EN-Background-paper-on-disinformation-and-fake-news-Jan-2024.pdf

PETCHENKO, I. (2024). The number of cybercrimes in Kyrgyzstan has increased, but statistics are classified. https://24.kg/proisshestvija/299706_chislo_kiberprestupleniy_vkyirgyizstane_uvelichilos_nostatistika_zasekrechena/

PETRAKOV, D. S., SMIRNOV, D. I., GERASIMENKO, N. N., MEDETOV, N. A., & JIKEEV, A. A. (2019). Implementation of software for data processing of X-ray optical measurements for the analysis of structural parameters. Journal of Applied Crystallography, 52, 186-192. https://doi.org/10.1107/S1600576718016837

Radio Free Europe (RFE). (2022). Iranian state TV streaming site targeted with dissident message. https://www.rferl.org/a/iran-hackers-dissident-message-tv/31683161.html

Resolution of the Kyrgyz Republic “On the Coordination Centre for Ensuring Cybersecurity of the State Committee for National Security of the Kyrgyz Republic”. (2023). https://cbd.minjust.gov.kg/159852/edition/1207958/ru

Reuters. (2016). Behind Democrats’ email leak, U.S. experts see a Russian subplot. https://www.reuters.com/article/world/behind-democrats-email-leak-us-experts-see-a-russian-subplot-idUSKCN10609J/

REXHEPI, B. R., KUMAR, A., GOWTHAM, M. S., RAJALAKSHMI, R., PAIKARAY, M. D., & ADHIKARI, P. K. (2023). An Secured Intrusion Detection System Integrated with the Conditional Random Field For the Manet Network. International Journal of Intelligent Systems and Applications in Engineering, 11(3s), 14-21. https://www.ijisae.org/index.php/IJISAE/article/view/2526

RIZZONI, F., MAGALINI, S., CASAROLI, A., MARI, P., DIXON, M., & COVENTRY, L. (2022). Phishing simulation exercise in a large hospital: A case study. Digital Health, 8. https://doi.org/10.1177/20552076221081716

SASI, S., & SWARNA JYOTHI, L. (2019). A novel public key crypto system based on Bernstein polynomial on Galois fields 2m to secure data on CFDP. Smart Innovation, Systems and Technologies, 105, 639-647. https://doi.org/10.1007/978-981-13-1927-3_67

SASI, S., SUBBU, S. B. V., MANOHARAN, P., & ABUALIGAH, L. (2023). Design and implementation of secured file delivery protocol using enhanced elliptic curve cryptography for class I and class II transactions. Journal of Autonomous Intelligence, 6(3). https://doi.org/10.32629/jai.v6i3.740

SHANDLER, R., & GOMEZ, M. A. (2023). The hidden threat of cyber-attacks – Undermining public confidence in government. Journal of Information Technology & Politics, 20(4), 359-374. https://doi.org/10.1080/19331681.2022.2112796

SHANDLER, R., DOR, G., & CANETTI, D. (2022.) The insidious political consequences of cyberattacks. https://ucigcc.org/blog/the-insidious-political-consequences-of-cyberattacks/

SMAILOV, N., KADYROVA, R., ABDULINA, K., URALOVA, F., KUBANOVA, N., & SABIBOLDA, A. (2025). Application of facial recognition technologies for enhancing control in information security systems. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Srodowiska, 15(3), 55-58. https://doi.org/10.35784/iapgos.7073

State Personal Data Protection Agency under the Cabinet of Ministers of the Kyrgyz Republic. (2025). About the agency. https://dpa.gov.kg/ru/about

Statista. (2025). Estimated cost of cybercrime worldwide 2018-2029. https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide

Strategy for the protection of cyberspace in Kyrgyzstan. (2024). https://digital.gov.kg/activities/strategiya-zashhity-kiberprostanstva-v-kyrgyzstane/

TASHEVA, I. (2021). Cybersecurity post-COVID-19: Lessons learned and policy recommendations. European View, 20(2), 140-149. https://doi.org/10.1177/17816858211059250

Tempo. (2023). List of developed and developing countries in the world. https://en.tempo.co/read/1818198/list-of-developed-and-developing-countries-in-the-world

TZAVARA, V., & VASSILIADIS, S. (2024). Tracing the evolution of cyber resilience: A historical and conceptual review. International Journal of Information Security, 23(3), 1695-1719. https://doi.org/10.1007/s10207-023-00811-x

United Nations (UN) Convention against Cybercrime. (2024). https://documents.un.org/api/symbol/access?j=N2442674&t=pdf

United Nations (UN). 2024. Making the digital and physical world safer: Why the Convention against Cybercrime matters. https://news.un.org/en/story/2024/12/1158526

UpGuard. (2024). What is Ransomware as a service? https://www.upguard.com/blog/what-is-ransomware-as-a-service

UpGuard. (2025). The impact of cybercrime on the economy. https://www.upguard.com/blog/the-impact-of-cybercrime-on-the-economy

WIDODO, M., ADAM, S., HSB, P.H., PRAYITNO, A.H., & BHASKORO, A. (2024). International legal dynamics in combating cybercrime: Challenges and opportunities for developing countries. Global International Journal of Innovative Research, 2(1), 314-321. https://doi.org/10.59613/global.v2i1.49

World Bank Group. (2024). Global growth is stabilizing for the first time in three years. https://www.worldbank.org/en/news/press-release/2024/06/11/global-economic-prospects-june-2024-press-release

World Bank Group. (2025). GDP growth (annual %). https://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG

World Cybercrime Index. (2024). World‑first cybercrime threat ranking highlights key global cybercrime hotspots. PLOS ONE/UNSW/University of Oxford research. https://www.unsw.edu.au/newsroom/news/2024/04/World-first-Cybercrime-Index-ranks-countries-by-cybercrime-threat-level

World Economic Forum. (2024). Global cybersecurity outlook 2024 (Report). Geneva: World Economic Forum. https://www.weforum.org/publications/global-cybersecurity-outlook-2024/

ZHANZHUMENOV, R., SARGAZIN, ZH., & ESDAULETOV, N. (2022). Information policy in mass media space: case study of central Asia. Bulletin of the Jusup Balasagyn Kyrgyz National University, 14(3), 36-43. https://balasagynbulletin.com/en/journals/tom-14-3-2022/informatsionnaya-politika-v-prostranstvye-sryedstv-massovoy-informatsii-na-primyerye-tsyentralnoy-azii

ZHUMALIEV, A. (2022). The role of the media in updating the image of a political leader and destructive methods of its formation. Bulletin of the Jusup Balasagyn Kyrgyz National University, 14(1), 191-199. https://balasagynbulletin.com/en/journals/tom-14-1-2022/rol-smi-v-aktualizatsii-obraza-politicheskogo-lidera-i-destruktivnyye-priyemy-ego-formirovaniya

ZWILLING, M., KLIEN, G., LESJAK, D., WIECHETEK, Ł., CETIN, F., & BASIM, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. https://doi.org/10.1080/08874417.2020.1712269

Descargas

Publicado

2026-05-11

Cómo citar

MYRSALIEVA, Aizhana; ABDRAKHMANOVA, Elia; SUIUNDUK UULU, Daniyar; MOLDOMYRZAEV , Maksatbek. The Role of Cyberattacks in Political and Economic Stability: Transforming National and International Approaches. Law, State and Telecommunications Review, [S. l.], v. 18, n. 2, p. 355–385, 2026. DOI: 10.26512/lstr.v18i2.59089. Disponível em: https://periodicostestes.bce.unb.br/index.php/RDET/article/view/59089. Acesso em: 22 may. 2026.