Cyberpolitik Journal http://cyberpolitikjournal.org/index.php/main <p><em>Cyberpolitik</em> Journal - A Peer Review International E-Journal on Cyberpolitics, Cybersecurity and Human Rights - is the first academic journal study in cyberpolitics and cyber security in Turkey. The main mission of our journal is to contribute to the literature of this important field which is in its infancy stage in the international relations literature of Turkey.</p> <p> </p> <p>The goal of the <em>Cyberpolitik</em> Journal is to contribute to the discipline of international relations both nationally and internationally, by analyzing the technological developments, the state's political and security policies, its legal systems and more importantly its democratic structures. From this point of view, the main purpose of the <em>Cyberpolitik </em>Journal is to contribute to a better understanding of the relationship between cyberspace and international relations. Although <em>Cyberpolitik</em> Journal focuses on cyber policy, other important issues such as society, security, peace, international relations, international law and human rights will also be critically analyzed in the journal.</p> en-US nezmen@yahoo.com (Nezir AKYEŞİLMEN) murat.bugan@gmail.com (Murat Buğan) Fri, 25 Jul 2025 15:45:31 +0300 OJS 3.2.1.1 http://blogs.law.harvard.edu/tech/rss 60 THE ETHICS OF CYBERSECURITY http://cyberpolitikjournal.org/index.php/main/article/view/215 Mehmet ŞENCAN Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/215 Fri, 25 Jul 2025 00:00:00 +0300 ETHICS OF ARTIFICIAL INTELLIGENCE CASE STUDIES AND OPTIONS FOR ADDRESSING ETHICAL CHALLENGES http://cyberpolitikjournal.org/index.php/main/article/view/216 Merve Ayse KIZILASLAN Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/216 Fri, 25 Jul 2025 00:00:00 +0300 ARTIFICIAL INTELLIGENCE (AI) AND CYBERSECURITY http://cyberpolitikjournal.org/index.php/main/article/view/213 Amirudin Abdul WAHAB Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/213 Fri, 25 Jul 2025 00:00:00 +0300 ARTIFICIAL INTELLIGENCE (AI) AND INSTITUTIONAL RELIGION http://cyberpolitikjournal.org/index.php/main/article/view/214 Bilal SAMBUR Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/214 Fri, 25 Jul 2025 00:00:00 +0300 NAVIGATING THE DIGITAL TURN: SECURITY, ETHICS, AND TRANSFORMATION http://cyberpolitikjournal.org/index.php/main/article/view/206 Kamil TARHAN Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/206 Fri, 25 Jul 2025 00:00:00 +0300 THE ENHANCEMENT OF CYBERSECURITY AND ECONOMIC GROWTH: PANEL DATA ANALYSIS http://cyberpolitikjournal.org/index.php/main/article/view/207 <p>This study aims to comprehensively analyze how economic growth influences cybersecurity investments and policies in contemporary economies where digitalization is spreading at an accelerated pace. In an era characterized by mounting direct and indirect expenses stemming from cyber threats to the global economy, there is a pressing need to elucidate the correlation between cybersecurity and macroeconomic performance quantitatively. The present study examines the relationship between cybersecurity capacity and economic growth using a multidimensional nested panel data analysis method, which utilizes annual data for 171 countries in the IDI. The study also reveals that cybersecurity isn’t just a technical issue but one of the main determinants of macroeconomic stability. In nations undergoing digital transformation, cybersecurity infrastructure is as strategically significant as traditional infrastructure investments. This study examines the relationship between economic growth and cybersecurity. The findings suggest that there is a statistically significant and positive relationship between cybersecurity and economic growth. The objective of this study is to provide policymakers with strategic recommendations by highlighting the critical role of economic growth in cybersecurity, supported by quantitative data.</p> Gül Nazik ÜNVER, Şerife Deniz KOLAT Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/207 Fri, 25 Jul 2025 00:00:00 +0300 THE EVALUATION OF THE DIGITAL DIVIDE WITHIN THE APPROACH OF HISTORICAL MATERIALISM http://cyberpolitikjournal.org/index.php/main/article/view/209 <p>Siber uzay insan hayatını kolaylaştırıcı etkiler yaratmakla birlikte insanlar ve devletler arasındaki mevcut eşitsizliklere yenilerini de eklemektedir. Bahse konu eşitsizliklerden biri olan dijital bölünme, siber uzaya erişim ve siber tekniklerin kullanılmasındaki farklılıkları ifade etmektedir. Dijital bölünmeye ilişkin literatür, kavramın ortaya çıkışına ve farklı seviye ayrımlar çerçevesinde eşitsizlik yaratan sonuçlarına odaklanmıştır. Ancak bu çalışma, siber uzayın maddi bir temele sahip olmasının dijital bölünmeyi sürekli olarak yeniden ürettiğini ileri sürmektedir. Siber tekniklerin günümüzde önemli bir üretici güç haline gelmesi ile dijital alandaki üretim ilişkileri, alt-yapının üst-yapıyı belirlemesi ve sınıf kategorizasyonun varlığı dijital bölünmeyi oluşturan temel nedenleri belirtmektedir. Başka bir anlatımla, dijital bölünme maddi ilişkilere dayanan yapısal bir olgu olarak kavranmalıdır. Dolayısıyla çalışmada tarihsel materyalizm yaklaşımı çerçevesinde dijital bölünme analiz edilmiş ve mevcut düzenin değişim potansiyeli tartışılmıştır.&nbsp;</p> Emre ARSLANTAŞ Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/209 Fri, 25 Jul 2025 00:00:00 +0300 THE RISE OF LLMS IN BUREAUCRACY AND MILITARY DECISION-MAKING AND THE CYBERSECURITY IMPERATIVE http://cyberpolitikjournal.org/index.php/main/article/view/210 <p>Large Language Models (LLMs) are rapidly transforming decision-making processes across bureaucratic and military institutions. Their ability to synthesize data, simulate complex scenarios, and generate real-time strategic insights is driving adoption in public sector settings, with initiatives like OpenAI’s “ChatGPT Gov” already deployed across U.S. federal agencies. However, the integration of LLMs into core governance and defense infrastructures introduces profound risks. Beyond technical concerns such as data poisoning, adversarial attacks, and insider misuse, these models also raise normative challenges, escalation bias in military applications, erosion of institutional accountability, and dependency on opaque corporate infrastructures. This article critically examines the operational use of LLMs in bureaucratic and military domains, analyzes the cybersecurity and geopolitical risks they pose, and frames their adoption within broader debates on technological sovereignty, corporate power, and data colonialism. Lastly, the article provides several recommendations that can offer some insight into how states, particularly middle and regional powers, can reclaim agency, enhance institutional resilience, and push for more effective regulatory frameworks in the face of accelerating LLM integration and corporate dominance.</p> Gloria Shkurti OZDEMIR Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/210 Fri, 25 Jul 2025 00:00:00 +0300 THE EVOLUTION OF THE ALLIANCE CONCEPT IN CYBERSPACE: A CONCEPTUAL REVIEW http://cyberpolitikjournal.org/index.php/main/article/view/211 <p>The classical realist approach considers the multi-actor, borderless, and hyper-anarchic nature of cyberspace. Supported by a qualitative literature review, the analysis shows that states cannot alone deter and neutralize cyber threats; therefore, flexible cooperation mechanisms involving the public sector, private companies, and international organizations have become essential. The key to enabling such cooperation is developing a new and broader definition of alliance that goes beyond traditional security theories. In this context, the study aims to contribute to the literature by examining the concept of cyber alliance and its characteristics, which cannot be explained through classical security paradigms.</p> Onur YILMAZ Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/211 Fri, 25 Jul 2025 00:00:00 +0300 CONSUMER PROTECTION IN THE MALAYSIAN DIGITAL MARKETPLACE: FROM RISKS AND CONCERNS TO A LAW REFORM http://cyberpolitikjournal.org/index.php/main/article/view/212 <p>This paper examines the evolution of consumer protection law in Malaysia's rapidly expanding digital marketplace. With 96.4% of Malaysian households having internet access and over 78,000 entities engaged in e-commerce transactions, the digital economy now accounts for more than one-fifth of Malaysia's GDP. However, this growth has created new consumer protection challenges, with the Ministry of Domestic Trade and Cost of Living receiving nearly 8,000 e-commerce-related complaints by September 2024. The study analyses key consumer risks in digital transactions, including information asymmetry, fraudulent practices, automated decision-making systems, and limited redress mechanisms. It traces the critical 2007 amendment to the Consumer Protection Act 1999, which extended coverage to electronic transactions, and examines the comprehensive Consumer Protection (Electronic Trade Transaction) Regulations 2024. The study reveals that Malaysia has developed a sophisticated, multifaceted regulatory framework that addresses e-commerce challenges through established legal principles and emerging regulations. The paper highlights the duties imposed on online marketplace suppliers and operators, including information disclosure requirements, error rectification mechanisms, and enhanced record-keeping obligations. The study concludes that strengthening digital literacy among consumers remains crucial for effective regulatory enforcement and creating a secure digital marketplace environment.</p> Sonny ZULHUDA Copyright (c) 2025 https://creativecommons.org/licenses/by-nc-sa/4.0 http://cyberpolitikjournal.org/index.php/main/article/view/212 Fri, 25 Jul 2025 00:00:00 +0300