Ðóñ Eng Cn Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Philosophical Thought
Reference:

Cybersecurity and the Evolution of the information space: a phenomenological analysis of the relationship with the metaverse and the digital world

Kochetkova Natal'ya Pavlovna

Assistant; Department of Philosophy and Media Communication; Kazan State Energy University

51 Krasnoselskaya str., Kazan, 420066, Russia, Republic of Tatarstan

kochetkova@mediayug.ru

DOI:

10.25136/2409-8728.2024.7.71055

EDN:

UTGATW

Received:

18-06-2024


Published:

08-07-2024


Abstract: The subject of the study is cybersecurity, within the framework of the modern changing conditions of the information space, which is filled with such phenomena as the metaverse and the digital world. These systems create new threats and problems in the processing, transmission, preservation and confidentiality of data. Assuming that the intersection of cybersecurity, digital transformation (including the metaverse and the digital world) and phenomenological analysis is an important area of research, the paper examines aspects of building cybersecurity in the country. The merger itself is seen as a centrifugal current that cannot be stopped, but must be regulated, which suggests that the transformation of approaches to cybersecurity plays a crucial role in developing effective strategies to overcome the problems that arise in a rapidly changing digital landscape.  The research methods are based on data collection, analysis and synthesis, which revealed key problems. The key method is a phenomenological analysis of the ongoing changes in the information sphere associated with the spread of the phenomena of the metaverse and the digital world, which made it possible to reflect the problems of information processing and insecurity from malicious attacks and propose a new approach to the formation of a cybersecurity system. The scientific novelty of the article lies in an integrated approach to studying the relationship of cybersecurity, the evolution of the information space and such new concepts, like the metaverse and the digital world. The transition to the latter is the next stage in the development of the information space, which can be traced in the gradual expansion of ecosystems and personal information platforms. All this suggests the need to expand the system of providing personal information, as well as data that gets into unsecured information networks. At the same time, domestic cybersecurity systems are being criticized, which indicates the need to find new solutions. One of these options may be a phenomenological approach to the study of data. The study shows how the use of phenomenological research methods allows us to take a fresh look at the capabilities of domestic developers to strengthen cybersecurity measures and adapt them to rapidly changing digital landscapes.


Keywords:

cybersecurity, information landscape, metaverse, vulnerability of child safety, technology, digital world, sociometry, phenomenology, evolution of the information space, data privacy

This article is automatically translated. You can find original text of the article here.

Introduction

In a digital society, people are increasingly losing control over the events happening around them. This phenomenon is confirmed by the flood of information flows that exceed the cognitive capabilities of critical analysis and reflection. Consequently, the ethical implications associated with the use of technology are becoming increasingly obvious and urgent. First of all, computers and robotic systems demonstrate superiority over human capabilities in performing precise and computable tasks such as playing chess, logical thinking, identifying patterns and performing mathematical calculations, etc.

In an increasingly digitized society, people gradually lose their sense of independence and control over events taking place in their immediate environment.

This leads to the fact that people are not in demand. There are concerns that the development of technology will lead to an increase in the unemployment rate. Secondly, AI (artificial intelligence) is becoming part of the social sphere, and its capabilities to influence humans have not been fully explored. In this context, it is not surprising that analysts talk about the danger posed by AI and cyberspace in general [1. pp.129-140]

Researchers who use the sociometric method in their work point out that today there is such a trend as the polarization of public opinion, which allows philosophers, psychologists and even lawyers to understand how the beliefs of a modern person are formed and what factors influence our worldview. This information allows us to determine the tactics of working with people, organizing appropriate work on the development of algorithms that establish various forms of information attacks [2. pp.16-20].

Closure in the information bubble and the information landscape creates the illusion of reality and transparency, which each person can control independently. The transparency of algorithms, the empirical and phenomenological research method allow scientists to understand how the information space functions and how to protect modern humanity from controversial, harmful and problematic topics that can be a threat not only to consciousness, but also to society as a whole. So, more than 10 years ago, Edward Snowden, considering issues of privacy and ethics, pointed out that the possibilities of humanity to influence the development of technology and the dissemination of information are minimal and consist only in a thorough analysis of incoming information, which generally illustrates the relevant anthropological and epistemological dimension of this issue. (Edward Snowden: Ten years after the revelations //https://www.securitylab.ru/analytics/538861.php )

The work uses a phenomenological method that allows us to study cybersecurity in the context of a semantic metaverse – the idea of a multitude of parallel worlds where everyone can have their own laws and rules. In this context, cybersecurity is a way to protect information and data from external threats and attacks, as well as guarantee their integrity and confidentiality.

The scientific novelty of the article lies in an integrated approach to the study of the complex relationship between cybersecurity, the evolution of the information space and the emerging concepts of the metaverse and digital. The main problem discussed in the article is the need for constant monitoring and adaptation of cybersecurity measures in response to the dynamic nature of the information space, especially as it expands into the metaverse and digital spheres.

The purpose of this work is to study the features of the evolution of the information space based on phenomenological research methods.

The author hypothesizes that:

1. The rapid evolution of the information space and technologies such as AI and the metaverse requires a dynamic and adaptive approach to cybersecurity.

2. Phenomenological research methods can offer valuable insights for understanding and solving complex cybersecurity issues in the context of the digital and metaverse worlds.

The work focuses on the idea that the intersection of cybersecurity, digital transformation (including the metaverse and the digital world) and phenomenological analysis is an important area of research. This merger is crucial for developing effective strategies to overcome the challenges that arise in a rapidly changing digital landscape.

Results

The philosophical approach to information saturation of space is rather ambiguous. On the one hand, there is a possibility of leveling the role of man and the exaltation of the machine and the possibilities of innovation. On the other hand, humanity must develop and strive for new goals, achieve them, revise existing norms and thus transform. This is evolution. In the last decade, such phenomena of the information space as the metaverse and digital have become increasingly important. The metaverse is a virtual three–dimensional world in which people interact through an avatar to perform a wide range of actions. Such activities can range from leisure activities and games to professional and commercial interactions, financial transactions, or even medical interventions such as surgery. Although the exact extent and impact of the metaverse on society and the economy are still unknown, a number of opportunities and risks can already be assessed. Large technology companies are expanding their activities in the metaverse, including through mergers and acquisitions.

It is expected that business in the metaverse will rely mainly on cryptocurrencies and non-interchangeable tokens, which raises a number of issues of information protection and cybersecurity (for example, how to obtain user consent or protect avatars from identity theft). In the metaverse environment, there is scope for a wide range of illegal and harmful actions and practices, for example, misleading advertising, theft of intellectual property. Moreover, digital immersion in the metaverse can have serious negative health consequences, especially for vulnerable groups such as minors, who may need special protection. Finally, the accessibility and inclusiveness of the metaverse remain areas where progress has yet to be made to create an environment of equal opportunity [3. pp.112-129].

From a philosophical point of view, the metaverse is an opportunity for a person to go beyond their own capabilities and gain access to new worlds, a system of perception and transmission of various kinds of information. In this way, the system of cognition of oneself and the world is expanding, on the one hand, and on the other, to completely escape from reality. And if we talk about the phenomenological analysis of this context, then there is a tendency to exacerbate the need to broaden one's horizons, but the information space is most often saturated with unverified content and, as a result, it is necessary to check and regulate it, as well as to comprehend it from a critical point of view, which should be facilitated by filtering tools for incoming data. But, control over the information flow may limit developers in the process of moving to a new level of the world — digital.

In the context of the emerging concept of the digital world, which represents the convergence of the physical and digital spheres, the study of cybersecurity and its implications for the future of human interaction with technology is of paramount importance. As the digital world continues to evolve and shape our cultural, social, and philosophical landscapes, it is imperative to explore the role of modern technology in creating a secure digital environment. Although research in this area is still at an early stage, philosophers have already determined that the main goal of cybersecurity in the digital world should not be to disable information systems and artificial intelligence, but to explore vulnerabilities that can become pressure points and subsequently lead to negative consequences for humans. Researchers who emphasize the importance of developing the digital world also point out the need to create accessible security measures for all people. In this context, the security of digital environments for the future of society lies in creating a safe environment for interaction in this new space. At this stage of development, for both developers and theorists, this topic is becoming an increasingly urgent task that has not yet found its final solution [4. pp.11-13].

Considering the transition from the metaverse to the digital, it can be noted that modern human perception is not yet ready for a complete transition to virtual systems. Therefore, it is only through individual development, an increase in the general national culture and the level of perception that we can assume that humanity will prepare for the transition to digital. However, it is already necessary to consider security issues today, preventing the onset of serious consequences of the transition to the digital world [5. pp.50-59].

That is why it is important to understand the relationship between cybersecurity, the information space, the metaverse and the digital world and develop appropriate strategies and measures to protect digital infrastructure. This is the only way to ensure security and stability in the modern world, where information plays an increasingly important role.

A phenomenological analysis of the relationship between cybersecurity and the metaverse and the digital world allows us to understand how these concepts interact with each other and what challenges and opportunities they pose to humanity. Thus, a phenomenological analysis of the relationship between cybersecurity with the metaverse and the digital world allows us to understand the complexity and multilevel nature of the problem of information protection in the modern world and develop effective strategies to ensure the security of the information space.

A phenomenological analysis of the relationship between cybersecurity and the evolving information space reveals the growing problem of recognizing the goals of criminal structures. As the need to constantly strengthen the protection of information systems and data increases, caused by the rapid development of technology and the emergence of new threats, it becomes obvious that modern technologies themselves often serve as a tool used by criminal organizations. Accordingly, law enforcement agencies and Governments are unable to effectively counter these attackers, which underscores the urgent need for a proactive and adaptive approach to cybersecurity in an ever-changing threat landscape. Therefore, it can be assumed that the further way to combat cybercrime lies precisely in the informatization of phenomenological analysis systems, which will become the basis for verifying information received by a particular service. D. A. Kambulov notes that even today the fight against cybercrime is diverse and includes various "tools that organizations use to protect against cybersecurity threats" [6. pp.1661-1667].

Of course, analysts based on phenomenology regularly highlight the importance of understanding the relationship between the processes of innovation development and their implementation in everyday life with the general evolution of the information space and its impact on the metaverse and the digital world. However, as the current situation shows, at this stage there is an idea of spreading the essence of the metaverse and its possible transition to digital, which is reflected in the propaganda of the constituent elements of this artificial system.

Consequently, achieving the stages of formation of the metaverse and the transition to digital under the influence of technology is an exciting process of development and improvement, and it is not surprising that it has become the goal of many organizations and even countries, however, the issue of threats that it carries is not taken into account.

In the conditions of modern Russia, the rejection of some foreign innovative products has led to the creation by domestic developers of their own metaverse, an example of which is the Beber ecosystem. This ecosystem not only seeks to unite the real world and virtual space, but also represents a practical business model that seeks to protect its users while recognizing its limitations, which indicates a long path to the realization of the digital world (Fig. 2). Currently, only Yandex can compete with Sberbank in this field. Moreover, both companies are puzzled by the possibilities of organizing an effective security system for their customers.

The content and maintenance of these custom metaverses depends on the interests of the client, covering a wide range of areas - from entertainment and the need for interaction beyond social networks to creating immersive experiences in specific spaces that promote activities such as learning and self-development. Therefore, it can be assumed that in the future there will be a convergence of ecosystems of Yandex, Sberbank, Gazprom,Mail.ru " and others into a single meta-review characterized by the attributes of a fictional world, with a focus on learning, development and provision of social networks [7. pp. 41-45].

Cybersecurity issues are uncompromising and open, which indicates the importance of this aspect for the company. However, this example can be considered an isolated one, since in many ways the domestic information system is seriously lagging behind global trends. A vivid illustration of this discrepancy is the catastrophic failure of SDEC, a well-known courier organization that faced a malware attack on May 26, 2024 and failed to effectively mitigate its consequences. In this regard, the administration announced a week-long suspension of delivery services, leaving customers perplexed about the connection between problems on the site and the physical distribution of goods. In fact, the activities of SDEK largely depend on information systems that control all processes - from accepting orders to their delivery and delivery. This highlights the alarmingly low level of cybersecurity and the gradual transition of these systems to innovative digital forms.

It should be noted that the strengthening of cybersecurity measures can be interpreted as an act of human self-organization, marking the transition to a higher level of cultural development and the creation of a system that meets individual interests. This system will be structured through the use of personal social networks that will provide access to existing content, although adapted to the specific requirements of each user. Assuming the accuracy of the phenomenological analysis, it can be assumed that in the coming era, humanity will rely on a kind of "federal network", access to which will be carried out through individual social networks, including a number of filters and limiters and at the same time determining the needs and requests of a particular user.

At the same time, in today's Internet-connected world, cybersecurity protection has undergone rapid development. Due to the widespread use of rapidly developing technologies such as the Internet of Things and cloud computing, huge amounts of data are generated and collected. Although the information received is processed and can be used to better meet the relevant business needs, it also poses great problems for cybersecurity and privacy protection [8. pp.29-63].

The phenomenological analysis allows us to explore the challenges and opportunities that arise in connection with the metaverse and the digital world and identify a number of important aspects of work in the field of cybersecurity.

Firstly, the modern world is becoming increasingly dependent on digital technologies and information systems. However, the growing importance of the information space has created new threats to cybersecurity, which requires a critical approach to the information and content that people face.

Secondly, more and more organizations and States are facing cyber attacks and cybercrimes, which underlines the importance of protecting information resources. Nevertheless, the legal aspects do not meet the needs of the time, which underlines the need for further close interaction on the part of the individual, society as a whole and the state as a legislator and defender.

In the context of the transformative impact of the digital age on the conduct of political warfare by nation States, critical phenomenology suggests a marked shift in the prioritization of security issues in democratic countries. This requires discussing issues related to the level of innovation in the States themselves, as well as ways to work on the safety of all stakeholders. Examples of the use of cyberspace by state and non-state actors can be likely attacks with the subsequent undermining of democratic elections, encouraging the spread of violence, and even challenges to the sovereignty and values of democratic states, which has an extremely destabilizing effect [9. pp.17-23].

Successful political warfare campaigns also force voters to question the results of democratic elections and whether special interests or foreign powers were a decisive factor in the outcome. This causes serious damage to the political legitimacy of democracies, which depends on the ability of voters to trust electoral processes and results free from harmful influence – assumed or real [10. pp.19-21]. At the same time, the high activity of the mass media and the blogosphere, superimposed on social tension during the electoral period, can influence the process of delegitimization of the political mode [11. c.257].

In democratic societies, the fundamental principles of individual freedom and the right to participate in political discourse pose serious obstacles to effectively countering the pervasive threat of political war. At the same time, modern governments often do not give priority attention to the urgent tasks of combating cyber threats, since they themselves use a wide range of scientific and technological achievements to implement their own plans. As a result, society turns out to be vulnerable and is forced to navigate in an unguarded information space, without having sufficient training to confront this new and menacing danger. The problems that this new political war using digital technologies creates for democracies will increase with the development of machine learning and the advent of digital tools such as "deep fakes". What both domestic [12. pp.9-10] and foreign researchers are trying to say [13. p. 250].

From a phenomenal point of view, modern technological advances have allowed people to interact with the metaverse by immersing themselves in digital realms and virtual environments. However, these capabilities have simultaneously opened up new vulnerabilities and threats to individual security. Cyber attacks, hacking and cyber espionage are becoming more common in the modern world, while a significant part of the population believes that these issues are within the competence of the government. Governments, on the other hand, perceive these funds as the most important tools with which they can achieve their desired goals.

In fact, the Internet is becoming more and more saturated with information every day, and it is also becoming the main means of data exchange and communication, which does not guarantee the safety of anyone. And, due to the fact that every day there is a process of improving AI and IP, the opportunities provided by the digital space are growing, which indicates that the level of threat to cybersecurity is also increasing [14. pp.30-37].

These facts indicate that the evolution of information systems and the digital space has a widespread impact on various segments of society. However, if all stakeholders do not prioritize the integration of cybersecurity measures within the framework of technological progress and their deployment in various cloud architectures, the prospects for further improvement of the socio-economic structure seem bleak. This statement is primarily due to two factors: firstly, the undermining of trust in both political institutions and the reliability of information content; secondly, the constant ethical dilemmas, which, despite being the subject of constant discussion at various levels, remain unresolved.

Discussion of the results

AI-based cybersecurity analytics has been integrated into the latest versions of firewall technology. These advanced firewalls include automated systems for detecting network intrusions, categorizing encrypted data traffic, detecting malicious software, and other security features. The inclusion of artificial intelligence allows these critical security measures to operate with greater speed, accuracy and adaptability compared to traditional firewalls. In the field of cryptography, AI-based solutions are beginning to help researchers optimize algorithm development and can significantly reduce cryptanalysis efforts, such as searching for differential traces, which is crucial in differential cryptanalysis [15. pp.2019-2043].

Recently, the idea of a generative opposing network has been applied to build an automatic encryption algorithm, which makes the first step towards creating an intelligent security solution without human intervention [16. pp.439-454]. On the contrary, human privacy is under threat due to artificial intelligence-based systems. It is expected that the growth of cyber attacks using AI will lead to an explosive increase in network penetration, identity theft and the epidemic spread of intelligent computer viruses [17. pp.7029-7035].

Thus, another future trend is to protect against attacks using modern technologies using methods based on shell data systems and intelligent programs, which may lead to an arms race based on IP and AI.

AI—based security solution is one of the fastest growing fields that brings together researchers from different fields such as machine learning, statistics, big data analysis and cryptography to combat modern cybersecurity threats.

However, in many ways, all these areas determine the work of foreign developers, which indicates the need to stimulate domestic AI production.

In this regard, it is important to emphasize that the level of domestic developments is inferior to foreign ones, which is commensurate with the level of Russians' introduction into cyberspace. Of course, today the younger generation is experiencing a greater influence on the perception of the world from social networks, as well as created new forms of virtual reality. While the average retiree is very skeptical about the proposals of the BEAC metaverse, young and middle-aged people are actively using the potential of these technologies. A sociometric analysis of how technologies are changing perceptions of the metaverse and the relationship with it shows that Russian society is changing slowly (compared to European or Asian), but these changes also reflect the consumer mindset of people (Fig.1). And this is despite the fact that today there are known side effects from the use of Internet achievements. And they concern both health and the environment.

Fig.1 Results of sociometric analysis on the dynamics of the use of information space

As shown in Figure 1, after 2019, the process of handling and applying information data accelerated worldwide and, of course, countries faced new challenges after the pandemic, such as cybercrime, fraud and new ways of thinking. In the context of the ongoing evolution of cyberspace, it is necessary to note the concerted efforts of domestic developers in their quest to improve productivity and security. However, a critical analysis of the current landscape reveals a potential discrepancy between the achievements of these developers and the sophisticated methods used by attackers such as scammers and cybercriminals. Despite the significant efforts made by Russian programmers in recent years to increase the level of cybersecurity of domestic consumers, as evidenced by the data presented in table 1, the rapid pace of technological progress and the adaptive nature of cyber threats require a constant and proactive approach to ensuring the security of the digital sphere.

Table 1

Activities of a cybersecurity company in the Russian Federation

Cybersecurity Companies

The period of work

Product Features

Kaspersky Lab

On the market since 1997

More than 20 information security solutions are distributed to various devices and systems, protection is developing due to the function of integrative solutions. Innovations developed by the company are able to identify system vulnerabilities and interact between different components of the information infrastructure

Security Code

On the market since 1995

Specializes in network security issues, work in the field of cryptography and the preservation of state secrets, which determines the scope of distribution to government agencies

Security Vision

It appeared on the market in 2010

Specializes in working with large financial institutions (banks, commercial companies, etc.). specializes in improving security systems as part of the changes taking place in the digital world

Infotex

It was founded in 1991

Develops a cryptographic protection system, as well as systems aimed at detecting threats to automated systems

D.A. Litvinov notes that "Cyber attacks have become more frequent over the past 10-15 years ....", but at the same time foreign agents are striving to "prohibit the actions of Kaspersky Corporation"[18. pp.76-82] and this suggests that Russian developments, in general, can act internationally the level.

The cybersecurity industry in Russia is characterized by a dichotomy between companies seeking to meet international standards and those focused on niche areas or not widely recognized by users. Prices for security systems offered by these organizations vary significantly and range from several thousand to hundreds of millions of rubles, depending on the target segment of consumers. This price spread reflects the perceived value and interest in the products on the market. On the other hand, as the example with the failure of the SDEC showed, the effectiveness of security costs is justified by the presence of an automatic update system, which is usually provided by cloud solutions. Thus, investments in safety programs developed by domestic specialists are considered justified, although concerns about their operational reliability and compliance with international standards continue to raise concerns among customers.

At the same time, cybersecurity software is only part of the overall digitalization, which means that it is perceived as an integral part of the work of computer systems that have long been items of general consumption. A. Kakaeva, I. Kakaev, O. Sakhedova and G. Korpyaeva indicate that today such systems as: "threat analytics, machine learning, behavioral analysis and zero-trust architecture" and this list is growing every day, but their application depends primarily on the people themselves and the decisions they make [19. pp.1-8]

If earlier the consumer attitude to the world and material goods was considered as a simple stage in the development of society, now this issue has become one of the central ones in the context of educating the younger generation in order to restore lost values. The pervasive influence of the digital environment on human behavior and cognitive processes has manifested itself in a negative attitude towards work, real life and social expectations. At the same time, synthetic ideals have emerged that promote selfishness, narcissism and various forms of self-expression, which negatively affects the formation of law-abiding and responsible citizens.

The current state of affairs can be partly explained by a decrease in government interference in the information flow. The Russian Federation is a prime example illustrating the transformative impact of the law passed in 2022 prohibiting the dissemination of false information in social cyberspace. Thus, the prevailing themes of easy financial gain were replaced by the concepts of active work and personal development. Moreover, the discourse around political issues has been replaced by statistical analyses of military operations and the spread of anti-Russian sentiments, which are often devoid of logical sequence [20. pp.200-212].

This way of influencing the content of the information landscape not only influenced the perception of reality, but also changed the attitude towards the government. And the policy of transparency of information, carried out taking into account the role of man in the modern information world, made it possible to form a system of nationwide support for both the government and its policies.

And it is important to note that the created information filtering systems, which are superimposed on social networks and interaction systems, can be used in other areas, such as protecting private data and preserving the safe space of children and youth.

But, at this stage, it is part of projects that may be within the framework of state interests.

Conclusion

In conclusion, it should be noted that it is necessary to constantly monitor and adapt cybersecurity measures in the context of an ever-evolving information space and technologies. To achieve this goal, it is necessary to use the following levers of public administration.

1. Improvement of the legislative framework regarding cybercrimes and attacks.

2. Full-fledged interaction between government programs and IT companies in the field of developing security systems accessible to the public.

3. Financing developments in the field of Internet security through contests and competitions among students and schoolchildren who can offer modern solutions based on their needs.

4. Promote the ideas of a critical approach to understanding incoming information, as well as ideas about the need to filter data.

Given the key role of cybersecurity in the modern information space and the ability of phenomenological analysis to study this phenomenon in the context of the metaverse, this approach can become the basis for more effective development of new cybersecurity systems. These systems will not only protect information from external threats and attacks, but also ensure its integrity and confidentiality.

The subsequent transition to the digital world system will also become an important stage in the development of digital systems and technologies, which will need to be studied from a critical point of view, which requires a phenomenological analysis and concretization of possible threats and negative influences.

Consequently, the prospects for further research in the field of cybersecurity and the evolution of the information space extend to a wide range of issues that cover both the ideas of anticipating criminal elements and predicting possible directions of negative influence on people's consciousness. As a result, these topics should be studied from both psychological and philosophical points of view, which allows for a multifaceted approach to their study.

References
1. Sarker, I.H. (2024). Cybersecurity and threat analysis based on artificial intelligence. Discover Artificial Intelligence, 1, 129-140. doi:10.1007/s44163-024-00129-0
2. Annaeva, A. R., Ashirov, G. D., Ataev, G. N., & Babaev, N. B. (2023). Analysis of current cyber threats and methods of personal data protection in the digital world. IN SITU, 10, 16-20.
3. Sinitsyn, A., & Kovaleva, E. (2019). Trends and challenges in the field of Internet security and protection of medical data. International Journal of Cybersecurity and Cryptography, 7(4), 112-129.
4. Yazgeldiev, Sh., Kerimov, A., & Babaniyazov, B. (2023). Internet security and personal data protection: trends and challenges in the digital age. IN SITU, 7, 11-13.
5. Khoreva, L. V., Kuchumov, A.V., & Shraer, A.V. (2023). Transformation of the path of the modern consumer of tourist services in the digital environment. Professorial Journal. Series: Recreation and Tourism, 4(20), 50-59. doi:10.18572/2686-858X-2023-20-4-50-59
6. Kambulov, D. A. (2021). Solutions for cybersecurity. StudNet, 7, 1661-1667.
7. Lukyanchikova, A.S. (2024). Features of the promotion of fashion brands in the metaverse. Questions of media business, 1, 41-45. doi:10.24412/3034-1930-2024-0050
8. Clarke, R., & Knake, R. (2010). Cyber war: the next threat to national security and what to do about it. HarperCollins Publishers, 4, 29-63. doi:10.5860/selection.48-2963
9. Klokova, U.R. (2022). The main directions of strengthening the cybersecurity of the Russian Federation. Peoples' Friendship University of Russia (RUDN), 12, 17-23.
10. Arrykova, G. K., Begchaeva, D. K., Berdiev, K. C., & Berdiev, O. S. (2023). Ensuring cybersecurity in the era of the Internet of Things: challenges and prospects. IN SITU, 10, 19-21.
11. Churashova, E. A. (2020). Accusatory discourse as a means of delegitimization (on the example of the Republic of Belarus). Philosophy and culture of the information Society: The eighth international scientific and practical conference. St. Petersburg, November 20-22, 2020. St. Petersburg State University of Aerospace Instrumentation (pp. 257-259).
12. Datseva, E. G., & Kuropyatnikova, A. Y. (2022). Privacy in the era of big data.A young scientist, 4(399), 9-10.
13. Rothrock, R., & Clarke, R. A. (2018). Digital resilience: Is your company ready for the next cyber threat. Nicholas Brealey Publishing.
14. Litvinenko, I. L., & Smirnov, I. I. (2019). Fundamentals of the digital Economy. AD ALTA: Journal of Interdisciplinary Research, 1(7), 30-37.
15. Chen, J., Su, C.,& Yan, Z. (2019). Cybersecurity analytics and privacy protection based on artificial intelligence.Security and Communication Networks, 185(91), 2019-2043. doi:10.1155/2019/1859143
16. Patersonth Hanley, L. (2020). Political Warfare in the Digital Age: Cyber-subversion, Information Operations and "deep fakes". The Australian Journal of International Relations, 4(74), 439-454.
17. Raimundo, R., & Rosario, A. (2021). The impact of artificial intelligence on the security of data systems: a literature review. Sen sors, 1, 7029-7035.
18. Litvinov, D.A. (2019). Assessment of Russia's cybersecurity policy and possible options for its improvement. Bulletin of Science and Education, 19-2(73), 76-82.
19. Kakaeva, A., Kakaev, I., Sakhedova, O., & Korpyaeva, G. (2024). Innovative approaches to cybersecurity. A world scientist, 24, 1-8.
20. Buevich, A.P., Buevich, S.Yu., Varvus, S.A., Sergeeva, A.E., & Karamova, O.V. (2022). The impact of digitalization on the role of the state in the modern world.