TY - JOUR T1 - DİJİTAL ÇAĞDA DEVLETİN ROLÜ VE SINIRLARI: MODERN TEKNOLOJİLERLE YENİDEN TANIMLANAN GÜVENLİK VE YÖNETİŞİM UNSURLARI ÜZERİNDEN BİR İNCELEME TT - THE ROLE AND LIMITS OF THE STATE IN THE DIGITAL AGE: AN ANALYSIS OF SECURITY AND GOVERNANCE ELEMENTS REDEFINED BY MODERN TECHNOLOGIES AU - Arslan, Alp Cenk PY - 2025 DA - October Y2 - 2025 DO - 10.18092/ulikidince.1587738 JF - Uluslararası İktisadi ve İdari İncelemeler Dergisi JO - IJEAS PB - Kenan ÇELİK WT - DergiPark SN - 1307-9832 SP - 51 EP - 74 IS - 49 LA - tr AB - Dijital dünyada yapay zekâ (YZ), büyük veri analitiği ve siber güvenlik, devletin geleneksel işlevlerini ve güvenlik kapasitesini yeniden şekillendirmektedir. Bu makale, bu teknolojilerin gözetim, tehdit tespiti ve risk yönetimi gibi alanlardaki potansiyelini ve bu süreçte ortaya çıkan etik, mahremiyet ve veri güvenliği sorunlarını ele almaktadır. Modern teknolojiler, devletlere daha etkin güvenlik önlemleri ve yenilikçi kamu hizmetleri sağlama imkânı sunarken, bireysel hakların ihlali, veri manipülasyonu ve önyargılı algoritmalar gibi sınamalara yol açmaktadır. Çalışma, bu dönüşümün devletin egemenliği, bireysel mahremiyet ve etik yönetişim üzerindeki etkilerini tartışarak, dijital çağın karmaşıklıkları karşısında devletin rolünün yeniden tanımlanması gerektiğini vurgulamaktadır. KW - Yapay Zeka ve Devlet KW - Güvenlik Yönetimi KW - Güvenlik Stratejileri KW - Kamu Güvenliği KW - Dijital Devlet KW - Yönetişim N2 - In the digital world, artificial intelligence (AI), big data analytics, and cybersecurity are reshaping the traditional functions and security capacities of the state. This article examines the potential of these technologies in areas such as surveillance, threat detection, and risk management, while addressing the ethical, privacy, and data security challenges they bring. Modern technologies offer states the opportunity to implement more effective security measures and deliver innovative public services. However, they also raise concerns about violations of individual rights, data manipulation, and biased algorithms. Furthermore, while digitization accelerates decision-making processes, it creates challenges for governance principles such as transparency and accountability. This study explores the impact of this transformation on state sovereignty, individual privacy, and ethical governance, emphasizing the need to redefine the state’s role in light of the complexities brought about by the digital age. CR - Aas, K. F. (2013). ‘Getting Ahead of the Game’: Border Technologies and the Changing Space of Governance. Global Surveillance and Policing, 194-214, Willan. CR - Ahmadisheykhsarmast, S., & Sonmez, R. (2020). A Smart Contract System for Security of Payment of Construction Contracts. Automation in Construction, 120, 103401. https://doi.org/10. 1016/j.autcon.2020.103401 CR - Ahad, M., Paiva, S., Tripathi, G., & Feroz, N. (2020). Enabling Technologies and Sustainable Smart Cities. Sustainable Cities and Society. https://doi.org/10.1016/j.scs.2020.102301 CR - Ağırdil, O. (2025a). Almanya’nın Kamu Güvenliği Politikaları: Strateji Belgeleri Üzerinden Bir İnceleme. Liberal Düşünce Dergisi, (118), 199-230. https://doi.org/10.36484/liberal.1683028 CR - Ağırdil, O. (2025b). Fransa’nın Kamu Güvenliği Politikaları: Strateji Belgeleri Üzerinden Bir İnceleme. İletişim Ve Diplomasi, (14), 23-44. https://doi.org/10.54722/iletisimvediplomasi.1667005 CR - Aleem, A., Wakefield, A., & Button, M. (2013). Addressing the Weakest Link: Implementing Converged Security. Security Journal, 26, 236-248. https://doi.org/10.1057/sj.2013.14 CR - Al-Hawawreh, M., Moustafa, N., Garg, S., & Hossain, M. (2021). Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks. IEEE Transactions on Network Science and Engineering, 8, 2968-2981. https://doi.org/10.1109/tnse.2020.3032415 CR - Anderson, R., & Moore, T. (2006). The Economics of Information Security. Science, 314(5799), 610-613. CR - Andrejevic, M., & Gates, K. (2014). Big Data Surveillance: Introduction. Surveillance & Society, 12(2), 185-196. CR - Balkin, J. (2003). Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society. https://doi.org/10.2139/ssrn.470842 CR - Beck, R., Müller-Bloch, C., & King, J. (2018). Governance in the Blockchain Economy: A Framework and Research Agenda. Journal of the Association for Information Systems, 19, 1. https://doi.org/10.17705/1jais.00518 CR - Bernabe, J., Cánovas, J., Hernández-Ramos, J., Moreno, R., & Skarmeta, A. (2019). Privacy-Preserving Solutions for Blockchain: Review and Challenges. IEEE Access, 7, 164908-164940. https://doi.org/10.1109/access.2019.2950872 CR - Brayne, S., & Christin, A. (2020). Technologies of Crime Prediction: The Reception of Algorithms in Policing and Criminal Courts. Social Problems. https://doi.org/10.1093/socpro/spaa004 CR - Brilingaitė, A., Bukauskas, L., & Juozapavičius, A. (2020). A Framework for Competence Development and Assessment in Hybrid Cybersecurity Exercises. Computers & Security, 88, 101607. https://doi.org/10.1016/j.cose.2019.101607 CR - Broeders, D., & Dijstelbloem, H. (2015). The Datafication of Mobility and Migration Management: The Mediating State and Its Consequences. In Digitizing Identities, 242-260, Routledge. CR - Burton, J., & Soare, S. (2019). Understanding the Strategic Implications of the Weaponization of Artificial Intelligence. 2019 11th International Conference on Cyber Conflict (CyCon), 1-17. IEEE. https://doi.org/10.23919/cycon.2019.8756866 CR - Busygina, I., Filippov, M., & Taukebaeva, E. (2018). To Decentralize or to Continue on the Centralization Track: The Cases of Authoritarian Regimes in Russia and Kazakhstan. Journal of Eurasian Studies, 9, 61-71. https://doi.org/10.1016/j.euras.2017.12.008 CR - Chachko, E. (2021). National Security by Platform. Stan. Tech. L. Rev., 25, 55. CR - Chaar-López, I. (2019). Sensing Intruders: Race and the Automation of Border Control. American Quarterly, 71, 495 - 518. CR - Chowdhury, N., & Gkioulos, V. (2021). Cyber Security Training for Critical Infrastructure Protection: A Literature Review. Computer Science Review, 40, 100361. https://doi.org/10.1016/j.cosrev. 2021.100361 CR - Cong, L., & He, Z. (2018). Blockchain Disruption and Smart Contracts. Kauffman: Entrepreneurship Scholars Initiatives (Topic). https://doi.org/10.2139/ssrn.2985764 CR - Crampton, J. W. (2019). Platform Biometrics. Surveillance & Society, 17(1/2), 54-62. CR - Dunn Cavelty, M. (2012). The Militarisation of Cyberspace: Why Less May Be Better. In 4th International Conference on Cyber Conflict (CYCON 2012), 141-153. IEEE. https://ccdcoe. org/uploads/2012/01/2_6_Dunn-Cavelty_TheMilitarisationOfCyberspace.pdf CR - Çatlı, M. (2021). Dijital Devlet Teorisi. Ankara: Adalet Yayınevi. CR - Dyson, E. (2008). Reflections on Privacy 2.0. Scientific American, 299(3), 50-55. https://doi.org /10.1038/scientificamerican0908-50 CR - EU GDPR. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council. Regulation (EU), 679(2016), 10-13. CR - European Commission, Directorate‑General for Education, Youth, Sport and Culture. (2025). About the Digital Education Action Plan. European Education Area. https://education.ec.europa.eu /focus-topics/digital-education/plan CR - Farnaghi, M., & Mansourian, A. (2020). Blockchain, an Enabling Technology for Transparent and Accountable Decentralized Public Participatory GIS. Cities, 105, 102850. https://doi.org/ 10.1016/j.cities.2020.102850 CR - Gelb, A., & Clark, J. (2013). Identification for Development: The Biometrics Revolution. Center for Global Development Working Paper, 315. https://doi.org/10.2139/ssrn.2226594 CR - Giancaspro, M. (2017). Is a ‘Smart Contract’ Really a Smart Idea? Insights from a Legal Perspective. Computer Law & Security Review, 33, 825-835. https://doi.org/10.1016/j.clsr.2017.05.007 CR - Goldenfein, J., & Leiter, A. (2018). Legal Engineering on the Blockchain: ‘Smart Contracts’ as Legal Conduct. Law and Critique, 29, 141-149. https://doi.org/10.1007/s10978-018-9224-0 CR - Gordon, L. A., & Loeb, M. P. (2002). The Economics of Information Security Investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438-457. CR - Grabosky, P. (2007). The Internet, Technology, and Organized Crime. Asian Journal of Criminology, 2(2), 145-161. https://doi.org/10.1007/s11417-007-9034-z CR - Grimmelikhuijsen, S. (2012). Linking Transparency, Knowledge and Citizen Trust in Government: An Experiment. International Review of Administrative Sciences, 78, 50-73. https://doi.org /10.1177/0020852311429667 CR - Guo, J., & Zhang, H. (2024). Digital age: The Path Choice of Government-Citizen Value Co-Creation. Heliyon, 10(15). CR - Hanna, N. (2018). A Role for the State in the Digital Age. Journal of Innovation and Entrepreneurship 7(5). https://doi.org/10.1186/s13731-018-0086-3 CR - Heinl, C. (2014). Regional Cybersecurity: Moving Toward a Resilient ASEAN Cybersecurity Regime. Asia Policy, 18, 131-159. https://doi.org/10.1353/asp.2014.0026 CR - Hilbert, M. (2020). Digital Technology and Social Change: The Digital Transformation of Society from a Historical Perspective. Dialogues in Clinical Neuroscience, 22(2), 189-194. CR - Hoofnagle, C. J., Van Der Sloot, B., & Borgesius, F. Z. (2019). The European Union General Data Protection Regulation: What It Is and What It Means. Information & Communications Technology Law, 28(1), 65-98. CR - ISO/IEC. (2022). ISO/IEC 27001: Information Security Management Systems. International Organization for Standardization. https://www.iso.org/standard/54534.html Jain, A. K., Ross, A., & Prabhakar, S. (2004). An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4-20. https://doi.org /10.1109/tcsvt.2003.818349 CR - Joshi, J., Ghafoor, A., Aref, W., & Spafford, E. (2002). Security and Privacy Challenges of a Digital Government. Proceedings of the National Conference on Digital Government, 121-136. https://doi.org/10.1007/0-306-47374-7_7 CR - Ke, T., & Sudhir, K. (2022). Privacy Rights and Data Security: GDPR and Personal Data Markets. Management Science. https://doi.org/10.1287/mnsc.2022.4614 CR - Khalil, K., Abdel-Aziz, M., Nazmy, T., & Salem, A. (2008). The Role of Artificial Intelligence Technologies in Crisis Response. ArXiv, abs/0806.1280 CR - Kostyuk, N., & Wayne, C. (2020). The Microfoundations of State Cybersecurity: Cyber Risk Perceptions and the Mass Public. Journal of Global Security Studies. https://doi.org /10.1093/jogss/ogz077 CR - KVKK. (2016). 6698 Sayılı Kişisel Verilerin Korunması Kanunu. Resmî Gazete, 29677. https://www.resmigazete.gov.tr/eskiler/2016/04/20160407-9.htm CR - Laufs, J., Borrion, H., & Bradford, B. (2020). Security and the Smart City: A Systematic Review. Sustainable Cities and Society, 55, 102023. https://doi.org/10.1016/j.scs.2020.102023 CR - Lyon, D. (1992). The New Surveillance: Electronic Technologies and The Maximum-Security Society. Crime, Law and Social Change, 18, 159-175. https://doi.org/10.1007/bf00230629 CR - Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, Consequences, Critique. Big Data & Society, 1(2), 1-13. https://doi.org/10.1177/2053951714541861 CR - McAuliffe, M., Blower, J., & Beduschi, A. (2021). Digitalization and Artificial Intelligence in Migration and Mobility: Transnational Implications of the COVID-19 Pandemic. Societies, 11(4), 135. CR - Murthy, S., Bhat, K., Das, S., & Kumar, N. (2021). Individually Vulnerable, Collectively Safe. Proceedings of the ACM on Human-Computer Interaction, 5, 1-24. https://doi.org/10.1145 /3449212 CR - Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/ bitcoin.pdf CR - National Telecommunications and Information Administration. (n.d.). Broadband Equity, Access, and Deployment (BEAD) Program, U.S. Department of Commerce. https://broadbandusa. ntia.gov/funding-programs/broadband-equity-access-and-deployment-bead-program CR - Nguyen Duc, A., & Chirumamilla, A. (2019). Identifying security risks of digital transformation-an engineering perspective. In Digital Transformation for a Sustainable Society in the 21st Century: 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, Trondheim, Norway, September 18–20, 2019, Proceedings 18, 677-688. Springer International Publishing. CR - OECD. (2013). The OECD Privacy Framework. OECD Publishing. https://www.oecd.org/sti/ ieconomy/oecd_privacy_framework.pdf CR - OECD. (2015). Digital Security Risk Management for Economic and Social Prosperity: OECD Recommendation and Companion Document. OECD. CR - Owen, S. (2017). Monitoring social media and protest movements: Ensuring Political Order through Surveillance and Surveillance Discourse. Social Identities, 23(6), 688-700. CR - Pereira, J., Tavalaei, M. M., & Ozalp, H. (2019). Blockchain-based Platforms: Decentralized Infrastructures and Its Boundary Conditions. Technological Forecasting and Social Change, 146, 94-102. CR - Rhodes, R. A. W. (1996). The New Governance: Governing without Government. Political Studies, 44(4), 652-667. https://doi.org/10.1111/j.1467-9248.1996.tb01747.x CR - Sarker, I. (2021). CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks. ArXiv, abs/2104.08080. https://doi.org/10.1016 /j.iot.2021.100393 CR - Schuetz, S., & Venkatesh, V. (2020). Blockchain, Adoption, and Financial Inclusion in India: Research Opportunities. International Journal of Information Management, 52, 101936. https://doi.org/10.1016/j.ijinfomgt.2019.04.009 CR - SIFMA. (2023). Addressing Regulatory Gaps in the Digital Asset Ecosystem. https://www.sifma.org/resources/news/addressing-regulatory-gaps-in-the-digital-asset-ecosystem/ CR - Singh, R., Majumdar, P., Mittal, S., & Vatsa, M. (2021). Anatomizing Bias in Facial Analysis. Proceedings of the AAAI Conference on Artificial Intelligence, 36, 12351-12358. https://doi.org/10.1609/aaai.v36i11.21500 CR - Starr, A., Fernandez, L., Amster, R., Wood, L., & Caro, M. (2008). The Impacts of State Surveillance on Political Assembly and Association: A Socio-Legal Analysis. Qualitative Sociology, 31, 251-270. https://doi.org/10.1007/s11133-008-9107-z CR - Sung, C., & Park, J. (2021). Understanding of Blockchain-Based Identity Management System Adoption in the Public Sector. Journal of Enterprise Information Management, 34, 1481-1505. https://doi.org/10.1108/jeim-12-2020-0532 CR - Taddeo, M. (2013). Cyber Security and Individual Rights, Striking the Right Balance. Philosophy & Technology, 26, 353-356. https://doi.org/10.1007/s13347-013-0140-9 CR - Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting Artificial Intelligence in Cybersecurity is a Double-Edged Sword. Nature Machine Intelligence, 1-4. https://doi.org/10.1038/s42256-019-0109-1 CR - Tao, H., Bhuiyan, M., Rahman, M., Wang, G., Wang, T., Ahmed, M., & Li, J. (2019). Economic Perspective Analysis of Protecting Big Data Security and Privacy. Future Generation Computer Systems, 98, 660-671. https://doi.org/10.1016/j.future.2019.03.042 CR - Timmers, P. (2024). Sovereignty in the digital age. Introduction to Digital Humanism, 571-592. CR - Vladucu, M., Dong, Z., Medina, J., & Rojas-Cessa, R. (2023). E-Voting Meets Blockchain: A Survey. IEEE Access, 11, 23293-23308. https://doi.org/10.1109/access.2023.3253682 CR - Weber, M. (2009). The Theory of Social and Economic Organization. Simon and Schuster. CR - Weber, R. (2015). The digital future - A challenge for privacy? Computer Law & Security Review, 31, 234-242. https://doi.org/10.1016/j.clsr.2015.01.003 CR - Weingärtner, T., Batista, D., Köchli, S., & Voutat, G. (2021). Prototyping a Smart Contract Based Public Procurement to Fight Corruption. Computers, 10, 85. https://doi.org/10.3390 /computers10070085 CR - Wiranata, A. J. (2024). Utilization of Artificial Intelligence in Monitoring and Mitigating National Security Threats. Security Intelligence Terrorism Journal, 1(2), 122–127. CR - World Bank. (n.d.). Digital Transformation Overview. https://www.worldbank.org/en/topic/digital /overview CR - World Economic Forum. (2024). How Countries are Navigating Uncertainty of Digital Asset Regulation. https://www.weforum.org/stories/2024/10/different-countries-navigating-unce rtainty-digital-asset-regulation-election-year/ CR - Zeadally, S., Adi, E., Baig, Z., & Khan, I. (2020). Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access, 8, 23817-23837. https://doi.org/10.1109/access .2020.2968045 CR - Zhang, R., Xue, R., & Liu, L. (2019). Security and Privacy on Blockchain. ACM Computing Surveys (CSUR), 52, 1-34. https://doi.org/10.1145/3316481 UR - https://doi.org/10.18092/ulikidince.1587738 L1 - https://dergipark.org.tr/en/download/article-file/4377321 ER -