THE DEVELOPMENT AND EFFECTIVENESS OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: ANALYZING THE EVOLUTION AND IMPACT OF DATA PROTECTION MEASURES

Authors

  • Bakhtiyor Mirzarakhimov
  • Bobur Shokirov

DOI:

https://doi.org/10.47390/SPR1342V5SI1Y2025N60

Keywords:

Cybersecurity, Artificial Intelligence, Machine Learning, International Policies, Human Factors, Cyber Threats

Abstract

In today's world, as cyber threats become increasingly complex, studying the development and effectiveness of cybersecurity strategies in modern organizations is of great importance. This study analyzes the transition from traditional methods to modern, technology-driven approaches. The advancement of digital technologies necessitates strengthening cybersecurity measures. The research examines the historical evolution of cybersecurity strategies, current trends, and future directions. Additionally, it analyzes the role of artificial intelligence (AI) and machine learning (ML), the impact of international policies, and the significance of human factors.

References

1. Akyesilmen N. Türkiye in the global cybersecurity arena: strategies in theory and practice. Insight Turkey/Summer 2022: Embracing Emerging Technologies, 2022. P - 109. DOI: https://doi.org/10.25253/99.2022243.8

2. Alrubaiq A., & Alharbi T. Developing a cybersecurity framework for e-government project in the Kingdom of Saudi Arabia. Journal of Cybersecurity and Privacy, 2021. 1(2), P - 302-318. DOI: https://doi.org/10.3390/JCP1020017

3. Antunes M., Maximiano, M., Gomes R., & Pinto D. Information security and

cybersecurity management: a case study with SMEs in Portugal. Journal of Cybersecurity and Privacy, 2021. 1(2), P - 219-238. DOI: https://doi.org/10.3390/JCP1020012

4. Bobric G.-D. Study regarding the cyber threats to the national security. Scientific BulletinNicolae Balcescu Land Forces Academy, 2020. 25(1), P - 18-25. DOI: https://doi.org/10.2478/bsaft-2020-0003

5. Cheng E. C. K., & Wang T. Institutional strategies for cybersecurity in higher education institutions. Information,2022. 13(4), P-192. DOI: https://doi.org/10.3390/info13040192

6. George H., & Arnett A. Implementing Cybersecurity Best Practices for Electrical Infrastructure in a Refinery: A Case Study. IEEE Industry Applications Magazine, 2021. 27(4), P - 18-24. DOI: https://doi.org/10.1109/MIAS.2021.3063095

7. Malik A. A., & Tosh D. K. Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. In 2020 29th International Conference on Computer Communications and Networks (ICCCN), 2020. P - 1-6. IEEE. DOI:

https://doi.org/10.1109/ICCCN49398.2020.9209654

8. Nobles C. (2018). The cyber talent gap and cybersecurity professionalizing. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 2(1), P - 42-51. DOI: https://doi.org/10.4018/IJHIOT.2018010104

9. Nugraha A.C., Hidayanto A.N., Indriany H.S., Kurniati H., & Firdaus B.M.A.

Cybersecurity project implementation for resources protection: a case study of the National Narcotics Board. In IOP Conference Series: Earth and Environmental Science, 2022 (Vol. 969, No. 1, p. 012061). IOP Publishing. DOI: https://doi.org/10.1088/1755-1315/969/1/012061

10. Sharma, R.C., & Zamfiroiu, A. Cybersecurity Threats and Vulnerabilities in the Metaverse. In 2023 International Conference on Intelligent Metaverse Technologies & Applications(iMETA), 2023 P - 1-7. DOI: https://doi.org/10.1109/iMETA59369.2023.10294950

11. Shim S. The development of digital technologies and cyber security threats. State and Politics, 2023. 29(1), P - 197-238. DOI: https://doi.org/10.56022/ceas.2023.29.1.197

12. Sia N. C., Hosseinian-Far A., & Toe T. T. Reasons Behind Poor Cybersecurity Readiness of Singapore’s Small Organizations: Reveal by Case Studies. In Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 P - 269-283. Cham: Springer International Publishing. DOI: https://doi.org/10.1007/978-3-030-68534-8_17

13. Tanriverdiyev, E. The state of the cyber environment and national cybersecurity strategy in developed countries. Studia Bezpieczeństwa Narodowego, 2022. - 23(1), P - 19-26. DOI: https://doi.org/10.37055/sbn/149510

14. Varma, P., Nijjer, S., Kaur, B., & Sharma, S. Blockchain for transformation in digital marketing. In Handbook of Research on the Platform Economy and the Evolution of ECommerce, 2022. P - 274-298. IGI Global. DOI: https://doi.org/10.4018/978-1-7998-7545-1.ch012

Downloads

Submitted

2025-02-27

Published

2025-02-27

How to Cite

Mirzarakhimov, B., & Shokirov, B. (2025). THE DEVELOPMENT AND EFFECTIVENESS OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: ANALYZING THE EVOLUTION AND IMPACT OF DATA PROTECTION MEASURES. Ижтимоий-гуманитар фанларнинг долзарб муаммолари Актуальные проблемы социально-гуманитарных наук Actual Problems of Humanities and Social Sciences., 5(S/1), 385–392. https://doi.org/10.47390/SPR1342V5SI1Y2025N60