Abstract

While the world is becoming increasingly interdependent, the countries are evermore dependent on information systems, high-speed communications and artificial intelligence. That is increasing the risks and threats to citizens' privacy, global trade, the resilient of critical infrastructure and even the readiness of the armed forces. Traditional security measures are lagging behind new challenges and they are insufficient to prevent emerging risks. The potential damage that these threats can inflict on security and economy grows tremendously, but countermeasures needs to be sophisticated and thus difficult for implementation. The 21st century instead to be the era of technologies and information revolutions is becoming of synonymous of global risks and uncertainty. This article explore the transformation of relations in cyberspace as a result of globalization and the development of information technologies, that create preconditions for new forms of criminal activity - cyberwar, cyber terrorism and cybercrime. The globalization of social and political processes lead to globalization of crime, which now is transnational. Today becomes more and more obvious the need for conceptual clarity and innovative approaches in security study for cyber threats in modern society. Understanding of interconnection between globalization in cyberspace and increasing insecurity in it as a consequence of that globalization and the relation between new information technology and emerging threats coning with their use is crucial for security of our societies. The article explore cyber security as one of the biggest challenges for today's interconnected world and how to achieve it resilient development and progress .

Highlights

  • All key sectors of the survival of mankind such as security, policy, management, business, finance, transport, infrastructure, post services, telecommunications, medicine and science are closely dependent on information and communication technology (ICT)

  • Individuals, guided by different motives can cause large, damage to critical infrastructure, which seriously challenge the power of institutions of large and small countries in their efforts to protect national security

  • Here again like in other innovations there is a risk Big data to be used for malicious activities – state and corporative espionage, unauthorized obtaining of information or eavesdrop people and restricting their freedom

Read more

Summary

INTRODUCTION

All key sectors of the survival of mankind such as security, policy, management, business, finance, transport, infrastructure, post services, telecommunications, medicine and science are closely dependent on information and communication technology (ICT). The processes of globalization are completely new stage in development of human societies and that creates new dynamism in international relations They change structure of international relation, centers of power and transform basic features of nation state. From governance aspect the result is shift from universal, common to all mankind goals towards particular that serve to the interests of most powerful actors in cyberspace At this stage of human development innovations create new global environment for interactions but in reality it is further development of classic colonialism which from economic and social after World War 2 become “technological” today. One of the challenges that nation state faces in global cyber space is that most of things that happens in it are not under government control Like it or not information revolution is changing the nature of power relations and make them more diffuse. Nation states are still primary political actors on the world stage but their power steadily decrease so they are seeking to acquire new tools for power and influence based on access and possession of valuable or sensitive information and supremacy in information domain

THE INFORMATION REVOLUTION AS FACTOR OF DESTABILIZATION
THE IMPACT OF CIBER GLOBALIZATION ON POLITICS AND INTERNATIONAL RELATIONS
ESTABLISHING PEACE AND STABILITY IN CYBERSPACE
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call