Dynamics of Information Support for National and Military Security of Turkey at the Present Stage
( Pp. 49-54)

More about authors
Samsonov Egor V. postgraduate student, .
North Ossetian State University named after K.L. Khetagurov
Vladikavkaz, Republic of North Ossetia-Alania, Russian Federation Koybaev Boris G. Dr. Sci. (Polit.), Professor; North Ossetian State University named after K.L. Khetagurov; Vladikavkaz, Republic of North Ossetia-Alania, Russian Federation
Abstract:
The article examines the dynamics of information support for Turkey’s national and military security at the present stage in the context of the development of modern international relations and geopolitical transformations, which is characterized by increasing tension and instability. The importance of information flow management capabilities in accordance with the goals of Turkey’s foreign policy, national and military security is determined. The purpose of the study is to analyze the information security and cybersecurity system established in the Republic of Turkey and identify the main directions of its development. It is shown that an effective information security and cybersecurity system has been formed in modern Turkey, which makes it possible to effectively counter external and internal threats at the state, regional and global levels.
How to Cite:
Samsonov E.V., Koybaev B.G. Dynamics of Information Support for National and Military Security of Turkey at the Present Stage. Sociopolitical Sciences. 2025. Vol. 15. No. 2. Pр. 49–54. (In Rus.). DOI: 10.33693/2223-0092-2025-15-2-49-54. EDN: NIQMMO
Reference list:
Belokonev S.Yu., Hokonov A.A. The ontological status of social networks in modern public policy. Power. 2021. Vol. 29. No. 2. Pp. 22–29. (In Rus.). DOI: 10.31171/vlast.v29i2.7991.
Kovalev A.A. Information policy in the field of military security in the context of protection of national mentality. Economic and Socio-humanitarian Research. 2022. No. 4 (36). Pp. 127–132. (In Rus.). DOI: 10.24151/2409-1073-2022-4-127-132.
Kovalev O.G., Turpidarov A.A. Organizational and legal features of building a cybersecurity system in foreign countries (on the example of the model of the Turkish Republic). Stolypin Bulletin. 2021. No. 2. P. 23. (In Rus.). EDN: BPUWCP.
Kudayarov K.A. Evolution of the military-industrial complex of Turkey. Bulletin of the Russian State University of Economics. 2023. No. 2. Pp. 98–110. (In Rus.). DOI: 10.28995/2686-7648-2023-2-98-110.
Rastorguev S.V. Country positioning by rating method: Scientific analysis or manipulation technology? Bulletin of the Financial University. Humanities. 2017. Vol. 7. No. 1 (25). Pp. 13–17. (In Rus.). EDN: XUZQCX.
Demir Z. Comparison of Turkish defense industry companies and defense 100 companies with trend analysis: Sample application. Journal of Management and Economics Research. 2022. Vol. 20. Pp. 168–195. (In Turk.)
Diaz Ruiz C., ve Nilsson T. Disinformation and echo chambers: How disinformation circulates on social media through İdentity-Driven controversies. Journal of Public Policy & Marketing. 2023. No. 42 (1). Pp. 18–35. DOI: 10.1177/07439156221103852.
Şule Toktaş, Orhan Çifçi, Merve Reyhan Baygeldi et al. New security threats in the first half of the century. Police Academy Publications. 2023. Vol. 167. No. 77. Pp. 49–50. (In Turk.)
Keywords:
Turkey, national security, military security, information security, foreign policy, cybersecurity.


Related Articles

Computer Science Pages: 11-16 DOI: 10.33693/2313-223X-2025-12-1-11-16 Issue №188734
Implementation of Secure Traffic Light Management Using a Neuromorphic Computing Base Based on Fuzzy Graphs
information security neuromorphic computing neuromorphic controller intelligent controller fuzzy graphs
Show more
THEORETICAL AND HISTORICAL LEGAL SCIENCES Pages: 11-17 Issue №169107
Mechanisms for Ensuring National Security in Russia and Foreign Countries at the Present Stage: Historical and Legal Research
mechanisms provision national security history modern stage
Show more
History and Theory of Politics Pages: 15-23 DOI: 10.33693/2223-0092-2024-14-5-15-23 Issue №152162
Some United States of America Approaches to Cyber Deterrence
cybernetic space information space security of cybernetic space cybersecurity cyberattack
Show more
Political Identity of Russia in the Modern World Pages: 15-21 DOI: 10.33693/2223-0092-2022-12-4-15-21 Issue №21553
From Incredible to a New Norm: Delusions and Realities in World Politics
foreign policy political history European security trends in contemporary international relations New Bipolarity
Show more
Multiscale Modeling for Information Control and Processing Pages: 11-20 DOI: 10.33693/2313-223X-2022-9-1-11-20 Issue №20643
A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
virus software Information system Information Security security threat modeling information security risk assessment
Show more
5.1.1. THEORY AND HISTORY LAW Pages: 16-19 Issue №20468
Ensuring the National Security of the Russian Federation: Theoretical and Legal Aspect
national security ensuring national security state law society
Show more
NATIONAL SECURITY OF RUSSIA Pages: 15-20 DOI: 10.33693/2223-0092-2020-10-1-15-20 Issue №16619
The aspects of the innovation of the military-industrial complex and its significance for the national security of Russia
national security innovative development of innovation military-industrial complex
Show more
II INTERNATIONAL SCIENTIFIC CONFERENCE “TAMBOV LEGAL READINGS NAMED AFTER F.N. PLEVAKO "(24-27 MAY 2018) Pages: 14-16 Issue №12435
Review of International scientific conference «F. N. Plevako Tambov Legal Readings» (to the 175th anniversary F. N. Plevako)
FN Plevako advocacy history and theory of state and law state-building the policy of combating crime
Show more
1. PHILOSOPHY AND VALUES OF MODERN SOCIETY Pages: 6-15 Issue №3724
THREATS AND CHALLENGES TO MODERN RUSSIA THROUGH THE PRISM OF PROPHECY OF «CLAB OF ROME»
geopolitics globalization "Golden billion" corruption international relations
Show more
Cybersecurity Pages: 17-25 DOI: 10.33693/2313-223X-2025-12-1-17-25 Issue №188734
Models and Algorithms for Protecting Intrusion Detection Systems from Attacks on Machine Learning Components
cybersecurity intrusion detection systems machine learning components adversarial attacks defence techniques
Show more