- Anemon Muş Alparslan Üniversitesi Sosyal Bilimler Dergisi
- Cilt: 13 Sayı: 3
- An Examination of the Historical Development of Cybersecurity in the Context of International Securi...
An Examination of the Historical Development of Cybersecurity in the Context of International Security Studies: The Case of Turkey
Authors : Gürkan Gündüz
Pages : 1988-2023
Doi:10.18506/anemon.1776172
View : 28 | Download : 78
Publication Date : 2025-12-30
Article Type : Research Paper
Abstract :In today\\\'s world, technological developments are reaching ever greater proportions, and while this progress brings many advantages in terms of making life easier, it also causes new problems. Advances in information technology, in particular, affect every area of life, especially the protection of information and documents. This process gives rise to very serious security issues in the digital realm and necessitates the adoption of appropriate countermeasures. Among these countermeasures, cybersecurity is paramount. This is because this process jeopardizes the security of the entire world, not just a specific region. Considering all these reasons, cybersecurity is on the agenda of most developed and developing countries and has become indispensable in ensuring the security of the digital world. The importance of the concept of cybersecurity has paved the way for many academic studies in this field. The article titled \\\"An Examination of the Historical Development of Cybersecurity in the Context of International Security Studies: The Case of Turkey\\\" was prepared with the aim of contributing to the literature. The purpose of this study is to reveal how cybersecurity, which has played a significant role in people\\\'s lives since the 1990s, has developed. In line with this objective, the study aims to reveal the stages through which cybersecurity has passed, both globally and in Turkey, to reach its current state. Prepared by conducting a literature review and drawing on numerous scientific works, this article employs document analysis and comparative analysis methods.Keywords : Artificial Intelligence, Asymmetric Threat, Cyber Security, Security Technologies, Intelligence
ORIGINAL ARTICLE URL
