The role of cybersecurity in world politics

Cover Page

Cite item


The purpose of this paper is to investigate a significant and increasing role of cybersecurity in world politics. Cybersecurity threats are one of the main national security, public safety, and economic challenges every nation faces in XXI century. Cyberspace is a defining feature of modern life. Individuals and communities worldwide connect, socialize, and organize themselves in and through cyberspace. The existence of numerous cyber security issues on various spheres of life naturally increase political interest in resolving them. The need for cybersecurity is growing ranging from particular cases to national and international - becoming the main problem of diplomacy and world politics. Based on the different national approaches, cybersecurity is seen as the instrument to gain national interests. All countries believe that cybersecurity is an instrument to achieve state’s national interest, since more of the modern theories are focus in the material gain. Meanwhile, some countries see cybersecurity as the tool to influence the adversaries’ perception. This condition build based on the enormous destruction power of cyberattacks. In contrast with the two main approaches, the national security institutions emphasize to the idea, not the material gain. The difference between these national security approaches is the way to use this instrument is used in order to gain the objectives. Indeed, cybersecurity has an important and special role in the world politics.

About the authors

Vladimir Tigranovich Tsakanyan

Peoples’ Friendship University of Russia (RUDN University)

Moscow, Russia


  1. Anderson, R., Barton, C., Boehme, R., Clayton, R., van Eeten, M. J. G., Levi, M., Moore, T. & Savage, S. (2012). Measuring the cost of cybercrime. URL: papers/ Anderson_WEIS2012.pdf (accessed: 13.12.2016)
  2. Arquilla, J. (1999). Ethics and Information Warfare. In Strategic Appraisal: The Changing Role of Information in Warfare. Ed. by Z. Khalilzad, J. White & A. Marsall. Santa Monica: RAND Corporation
  3. Bell, D. (1979). The Social Framework of the Information Society). In: The Computer Age: A Twenty-Year View. Ed. by M. L. Dertouzos & J. Moses. Cambridge, Mass
  4. Buzan, B., Wæver O. & et al. (1998). Security: A new framework for Analysis. Boulder: Lynne Rienner Publishers
  5. Chobanyan, V. A., & Shahalami, I. Y. (2013). Analysis and synthesis of the requirements for safety systems of objects of critical information infrastructure. Issues of cybersecurity. 1 (1), 17-27
  6. Denning, D. (2000). Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services. US House of Representatives. URL: documents/pdf/CYBERTERRORISM.pdf (accessed: 04/20/14)
  7. For a discussion of the military revolution that emerged between the two world wars. (1996). In: Military Innovation in the Interwar Period. Ed. by W. Murray & A. R. Millett. Cambridge: Cambridge University Press
  8. Freedman, L. (1998). International Security: Changing Targets. Foreign Policy, 110, 48-63
  9. Matveev, B. (2013). Status and prospects of development of national information security industry in 2014. Cybersecurity, 1(1), 61-64
  10. Metz, S., & Kievit, J. (1995). Strategy and the Revolution in Military Affairs: From Theory to the Police. Strategic Studies Institute. URL: display.cfm?PubID=236 (accessed: 04.27.14)
  11. Rosenzweig, P. (2010). The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence. Deterring Cyberattacks: Informing Strategies and Developing Options. National Research Council, 245-269
  12. Robinson, N., Disley, E., Potoglou, D., Reding, A., May Culley, D., Penny, M., Botterman, M., Carpenter, G., Blackman, C. & Millard, J. (2012). Feasibility study fora European cyber crime centre. Santa Monica, CA: RAND Corporation
  13. Sheehan, M. (2005). International Security: and Analytical Survey. London: Lynne Rienner Publishers
  14. Singer, P. & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press
  15. Weiss, G. W. (1996). The Farewell Dossier: Duping the Soviets. CIA Studies in Intelligence. URL: studies/96unclass/farewell.htm (accessed: 13.09.2016)

Copyright (c) 2017 Tsakanyan V.T.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies