ZAMONAVIY TASHKILOTLARDA KIBERXAVFSIZLIK STRATEGIYALARINING SHAKLLANISHI VA SAMARADORLIGI: MAʼLUMOTLARNI HIMOYA QILISH CHORALARINING RIVOJLANISHI VA NATIJADORLIGI TAHLILI

Mualliflar

  • Baxtiyor Mirzaraximov
  • Bobur Shokirov

Kalit so'zlar

https://doi.org/10.47390/SPR1342V5SI1Y2025N60

Kalit so'zlar

Kiberxavfsizlik, Sunʼiy intellekt, Mashinaviy oʻrganish, Xalqaro siyosatlar, Inson omili, Kiber tahdidlar

Annotasiya

Bugungi kunda kiber tahdidlar yanada murakkablashib borayotganligi sababli, zamonaviy tashkilotlarda kiberxavfsizlik strategiyalarining rivojlanishi va samaradorligini oʻrganish muhim ahamiyat kasb etadi. Ushbu tadqiqot anʼanaviy usullardan zamonaviy, texnologiyaga asoslangan yondashuvlarga oʻtish jarayonini tahlil qiladi. Raqamli texnologiyalarning rivojlanishi kiberxavfsizlik choralarini mustahkamlashni talab etmoqda. Tadqiqotda kiberxavfsizlik strategiyalarining tarixiy taraqqiyoti, zamonaviy tendensiyalar va kelajakdagi yoʻnalishlari oʻrganiladi. Shuningdek, sunʼiy intellekt (AI) va mashinaviy oʻrganish (ML) texnologiyalarining roli, xalqaro siyosatlarning taʼsiri hamda inson omilining ahamiyati tahlil qilinadi.

Manbalar

1. Akyesilmen N. Türkiye in the global cybersecurity arena: strategies in theory and practice. Insight Turkey/Summer 2022: Embracing Emerging Technologies, 2022. P - 109. DOI: https://doi.org/10.25253/99.2022243.8

2. Alrubaiq A., & Alharbi T. Developing a cybersecurity framework for e-government project in the Kingdom of Saudi Arabia. Journal of Cybersecurity and Privacy, 2021. 1(2), P - 302-318. DOI: https://doi.org/10.3390/JCP1020017

3. Antunes M., Maximiano, M., Gomes R., & Pinto D. Information security and

cybersecurity management: a case study with SMEs in Portugal. Journal of Cybersecurity and Privacy, 2021. 1(2), P - 219-238. DOI: https://doi.org/10.3390/JCP1020012

4. Bobric G.-D. Study regarding the cyber threats to the national security. Scientific BulletinNicolae Balcescu Land Forces Academy, 2020. 25(1), P - 18-25. DOI: https://doi.org/10.2478/bsaft-2020-0003

5. Cheng E. C. K., & Wang T. Institutional strategies for cybersecurity in higher education institutions. Information,2022. 13(4), P-192. DOI: https://doi.org/10.3390/info13040192

6. George H., & Arnett A. Implementing Cybersecurity Best Practices for Electrical Infrastructure in a Refinery: A Case Study. IEEE Industry Applications Magazine, 2021. 27(4), P - 18-24. DOI: https://doi.org/10.1109/MIAS.2021.3063095

7. Malik A. A., & Tosh D. K. Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. In 2020 29th International Conference on Computer Communications and Networks (ICCCN), 2020. P - 1-6. IEEE. DOI:

https://doi.org/10.1109/ICCCN49398.2020.9209654

8. Nobles C. (2018). The cyber talent gap and cybersecurity professionalizing. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 2(1), P - 42-51. DOI: https://doi.org/10.4018/IJHIOT.2018010104

9. Nugraha A.C., Hidayanto A.N., Indriany H.S., Kurniati H., & Firdaus B.M.A.

Cybersecurity project implementation for resources protection: a case study of the National Narcotics Board. In IOP Conference Series: Earth and Environmental Science, 2022 (Vol. 969, No. 1, p. 012061). IOP Publishing. DOI: https://doi.org/10.1088/1755-1315/969/1/012061

10. Sharma, R.C., & Zamfiroiu, A. Cybersecurity Threats and Vulnerabilities in the Metaverse. In 2023 International Conference on Intelligent Metaverse Technologies & Applications(iMETA), 2023 P - 1-7. DOI: https://doi.org/10.1109/iMETA59369.2023.10294950

11. Shim S. The development of digital technologies and cyber security threats. State and Politics, 2023. 29(1), P - 197-238. DOI: https://doi.org/10.56022/ceas.2023.29.1.197

12. Sia N. C., Hosseinian-Far A., & Toe T. T. Reasons Behind Poor Cybersecurity Readiness of Singapore’s Small Organizations: Reveal by Case Studies. In Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 P - 269-283. Cham: Springer International Publishing. DOI: https://doi.org/10.1007/978-3-030-68534-8_17

13. Tanriverdiyev, E. The state of the cyber environment and national cybersecurity strategy in developed countries. Studia Bezpieczeństwa Narodowego, 2022. - 23(1), P - 19-26. DOI: https://doi.org/10.37055/sbn/149510

14. Varma, P., Nijjer, S., Kaur, B., & Sharma, S. Blockchain for transformation in digital marketing. In Handbook of Research on the Platform Economy and the Evolution of ECommerce, 2022. P - 274-298. IGI Global. DOI: https://doi.org/10.4018/978-1-7998-7545-1.ch012

##submission.downloads##

Topilgan

2025-02-27

Nashr qilingan

2025-02-27

Qanday ko'rsatish

Mirzaraximov, B., & Shokirov, B. (2025). ZAMONAVIY TASHKILOTLARDA KIBERXAVFSIZLIK STRATEGIYALARINING SHAKLLANISHI VA SAMARADORLIGI: MAʼLUMOTLARNI HIMOYA QILISH CHORALARINING RIVOJLANISHI VA NATIJADORLIGI TAHLILI. Ижтимоий-гуманитар фанларнинг долзарб муаммолари Актуальные проблемы социально-гуманитарных наук Actual Problems of Humanities and Social Sciences., 5(S/1), 385–392. https://doi.org/10.47390/SPR1342V5SI1Y2025N60