Research Article
BibTex RIS Cite

DİJİTAL ÇAĞDA DEVLETİN ROLÜ VE SINIRLARI: MODERN TEKNOLOJİLERLE YENİDEN TANIMLANAN GÜVENLİK VE YÖNETİŞİM UNSURLARI ÜZERİNDEN BİR İNCELEME

Year 2025, Issue: 49, 51 - 74, 29.10.2025
https://doi.org/10.18092/ulikidince.1587738

Abstract

Dijital dünyada yapay zekâ (YZ), büyük veri analitiği ve siber güvenlik, devletin geleneksel işlevlerini ve güvenlik kapasitesini yeniden şekillendirmektedir. Bu makale, bu teknolojilerin gözetim, tehdit tespiti ve risk yönetimi gibi alanlardaki potansiyelini ve bu süreçte ortaya çıkan etik, mahremiyet ve veri güvenliği sorunlarını ele almaktadır. Modern teknolojiler, devletlere daha etkin güvenlik önlemleri ve yenilikçi kamu hizmetleri sağlama imkânı sunarken, bireysel hakların ihlali, veri manipülasyonu ve önyargılı algoritmalar gibi sınamalara yol açmaktadır. Çalışma, bu dönüşümün devletin egemenliği, bireysel mahremiyet ve etik yönetişim üzerindeki etkilerini tartışarak, dijital çağın karmaşıklıkları karşısında devletin rolünün yeniden tanımlanması gerektiğini vurgulamaktadır.

References

  • Aas, K. F. (2013). ‘Getting Ahead of the Game’: Border Technologies and the Changing Space of Governance. Global Surveillance and Policing, 194-214, Willan.
  • Ahmadisheykhsarmast, S., & Sonmez, R. (2020). A Smart Contract System for Security of Payment of Construction Contracts. Automation in Construction, 120, 103401. https://doi.org/10. 1016/j.autcon.2020.103401
  • Ahad, M., Paiva, S., Tripathi, G., & Feroz, N. (2020). Enabling Technologies and Sustainable Smart Cities. Sustainable Cities and Society. https://doi.org/10.1016/j.scs.2020.102301
  • Ağırdil, O. (2025a). Almanya’nın Kamu Güvenliği Politikaları: Strateji Belgeleri Üzerinden Bir İnceleme. Liberal Düşünce Dergisi, (118), 199-230. https://doi.org/10.36484/liberal.1683028
  • Ağırdil, O. (2025b). Fransa’nın Kamu Güvenliği Politikaları: Strateji Belgeleri Üzerinden Bir İnceleme. İletişim Ve Diplomasi, (14), 23-44. https://doi.org/10.54722/iletisimvediplomasi.1667005
  • Aleem, A., Wakefield, A., & Button, M. (2013). Addressing the Weakest Link: Implementing Converged Security. Security Journal, 26, 236-248. https://doi.org/10.1057/sj.2013.14
  • Al-Hawawreh, M., Moustafa, N., Garg, S., & Hossain, M. (2021). Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks. IEEE Transactions on Network Science and Engineering, 8, 2968-2981. https://doi.org/10.1109/tnse.2020.3032415
  • Anderson, R., & Moore, T. (2006). The Economics of Information Security. Science, 314(5799), 610-613.
  • Andrejevic, M., & Gates, K. (2014). Big Data Surveillance: Introduction. Surveillance & Society, 12(2), 185-196.
  • Balkin, J. (2003). Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society. https://doi.org/10.2139/ssrn.470842
  • Beck, R., Müller-Bloch, C., & King, J. (2018). Governance in the Blockchain Economy: A Framework and Research Agenda. Journal of the Association for Information Systems, 19, 1. https://doi.org/10.17705/1jais.00518
  • Bernabe, J., Cánovas, J., Hernández-Ramos, J., Moreno, R., & Skarmeta, A. (2019). Privacy-Preserving Solutions for Blockchain: Review and Challenges. IEEE Access, 7, 164908-164940. https://doi.org/10.1109/access.2019.2950872
  • Brayne, S., & Christin, A. (2020). Technologies of Crime Prediction: The Reception of Algorithms in Policing and Criminal Courts. Social Problems. https://doi.org/10.1093/socpro/spaa004
  • Brilingaitė, A., Bukauskas, L., & Juozapavičius, A. (2020). A Framework for Competence Development and Assessment in Hybrid Cybersecurity Exercises. Computers & Security, 88, 101607. https://doi.org/10.1016/j.cose.2019.101607
  • Broeders, D., & Dijstelbloem, H. (2015). The Datafication of Mobility and Migration Management: The Mediating State and Its Consequences. In Digitizing Identities, 242-260, Routledge.
  • Burton, J., & Soare, S. (2019). Understanding the Strategic Implications of the Weaponization of Artificial Intelligence. 2019 11th International Conference on Cyber Conflict (CyCon), 1-17. IEEE. https://doi.org/10.23919/cycon.2019.8756866
  • Busygina, I., Filippov, M., & Taukebaeva, E. (2018). To Decentralize or to Continue on the Centralization Track: The Cases of Authoritarian Regimes in Russia and Kazakhstan. Journal of Eurasian Studies, 9, 61-71. https://doi.org/10.1016/j.euras.2017.12.008
  • Chachko, E. (2021). National Security by Platform. Stan. Tech. L. Rev., 25, 55.
  • Chaar-López, I. (2019). Sensing Intruders: Race and the Automation of Border Control. American Quarterly, 71, 495 - 518.
  • Chowdhury, N., & Gkioulos, V. (2021). Cyber Security Training for Critical Infrastructure Protection: A Literature Review. Computer Science Review, 40, 100361. https://doi.org/10.1016/j.cosrev. 2021.100361
  • Cong, L., & He, Z. (2018). Blockchain Disruption and Smart Contracts. Kauffman: Entrepreneurship Scholars Initiatives (Topic). https://doi.org/10.2139/ssrn.2985764
  • Crampton, J. W. (2019). Platform Biometrics. Surveillance & Society, 17(1/2), 54-62.
  • Dunn Cavelty, M. (2012). The Militarisation of Cyberspace: Why Less May Be Better. In 4th International Conference on Cyber Conflict (CYCON 2012), 141-153. IEEE. https://ccdcoe. org/uploads/2012/01/2_6_Dunn-Cavelty_TheMilitarisationOfCyberspace.pdf
  • Çatlı, M. (2021). Dijital Devlet Teorisi. Ankara: Adalet Yayınevi.
  • Dyson, E. (2008). Reflections on Privacy 2.0. Scientific American, 299(3), 50-55. https://doi.org /10.1038/scientificamerican0908-50
  • EU GDPR. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council. Regulation (EU), 679(2016), 10-13.
  • European Commission, Directorate‑General for Education, Youth, Sport and Culture. (2025). About the Digital Education Action Plan. European Education Area. https://education.ec.europa.eu /focus-topics/digital-education/plan
  • Farnaghi, M., & Mansourian, A. (2020). Blockchain, an Enabling Technology for Transparent and Accountable Decentralized Public Participatory GIS. Cities, 105, 102850. https://doi.org/ 10.1016/j.cities.2020.102850
  • Gelb, A., & Clark, J. (2013). Identification for Development: The Biometrics Revolution. Center for Global Development Working Paper, 315. https://doi.org/10.2139/ssrn.2226594
  • Giancaspro, M. (2017). Is a ‘Smart Contract’ Really a Smart Idea? Insights from a Legal Perspective. Computer Law & Security Review, 33, 825-835. https://doi.org/10.1016/j.clsr.2017.05.007
  • Goldenfein, J., & Leiter, A. (2018). Legal Engineering on the Blockchain: ‘Smart Contracts’ as Legal Conduct. Law and Critique, 29, 141-149. https://doi.org/10.1007/s10978-018-9224-0
  • Gordon, L. A., & Loeb, M. P. (2002). The Economics of Information Security Investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438-457.
  • Grabosky, P. (2007). The Internet, Technology, and Organized Crime. Asian Journal of Criminology, 2(2), 145-161. https://doi.org/10.1007/s11417-007-9034-z
  • Grimmelikhuijsen, S. (2012). Linking Transparency, Knowledge and Citizen Trust in Government: An Experiment. International Review of Administrative Sciences, 78, 50-73. https://doi.org /10.1177/0020852311429667
  • Guo, J., & Zhang, H. (2024). Digital age: The Path Choice of Government-Citizen Value Co-Creation. Heliyon, 10(15).
  • Hanna, N. (2018). A Role for the State in the Digital Age. Journal of Innovation and Entrepreneurship 7(5). https://doi.org/10.1186/s13731-018-0086-3
  • Heinl, C. (2014). Regional Cybersecurity: Moving Toward a Resilient ASEAN Cybersecurity Regime. Asia Policy, 18, 131-159. https://doi.org/10.1353/asp.2014.0026
  • Hilbert, M. (2020). Digital Technology and Social Change: The Digital Transformation of Society from a Historical Perspective. Dialogues in Clinical Neuroscience, 22(2), 189-194.
  • Hoofnagle, C. J., Van Der Sloot, B., & Borgesius, F. Z. (2019). The European Union General Data Protection Regulation: What It Is and What It Means. Information & Communications Technology Law, 28(1), 65-98.
  • ISO/IEC. (2022). ISO/IEC 27001: Information Security Management Systems. International Organization for Standardization. https://www.iso.org/standard/54534.html Jain, A. K., Ross, A., & Prabhakar, S. (2004). An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4-20. https://doi.org /10.1109/tcsvt.2003.818349
  • Joshi, J., Ghafoor, A., Aref, W., & Spafford, E. (2002). Security and Privacy Challenges of a Digital Government. Proceedings of the National Conference on Digital Government, 121-136. https://doi.org/10.1007/0-306-47374-7_7
  • Ke, T., & Sudhir, K. (2022). Privacy Rights and Data Security: GDPR and Personal Data Markets. Management Science. https://doi.org/10.1287/mnsc.2022.4614
  • Khalil, K., Abdel-Aziz, M., Nazmy, T., & Salem, A. (2008). The Role of Artificial Intelligence Technologies in Crisis Response. ArXiv, abs/0806.1280
  • Kostyuk, N., & Wayne, C. (2020). The Microfoundations of State Cybersecurity: Cyber Risk Perceptions and the Mass Public. Journal of Global Security Studies. https://doi.org /10.1093/jogss/ogz077
  • KVKK. (2016). 6698 Sayılı Kişisel Verilerin Korunması Kanunu. Resmî Gazete, 29677. https://www.resmigazete.gov.tr/eskiler/2016/04/20160407-9.htm
  • Laufs, J., Borrion, H., & Bradford, B. (2020). Security and the Smart City: A Systematic Review. Sustainable Cities and Society, 55, 102023. https://doi.org/10.1016/j.scs.2020.102023
  • Lyon, D. (1992). The New Surveillance: Electronic Technologies and The Maximum-Security Society. Crime, Law and Social Change, 18, 159-175. https://doi.org/10.1007/bf00230629
  • Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, Consequences, Critique. Big Data & Society, 1(2), 1-13. https://doi.org/10.1177/2053951714541861
  • McAuliffe, M., Blower, J., & Beduschi, A. (2021). Digitalization and Artificial Intelligence in Migration and Mobility: Transnational Implications of the COVID-19 Pandemic. Societies, 11(4), 135.
  • Murthy, S., Bhat, K., Das, S., & Kumar, N. (2021). Individually Vulnerable, Collectively Safe. Proceedings of the ACM on Human-Computer Interaction, 5, 1-24. https://doi.org/10.1145 /3449212
  • Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/ bitcoin.pdf
  • National Telecommunications and Information Administration. (n.d.). Broadband Equity, Access, and Deployment (BEAD) Program, U.S. Department of Commerce. https://broadbandusa. ntia.gov/funding-programs/broadband-equity-access-and-deployment-bead-program
  • Nguyen Duc, A., & Chirumamilla, A. (2019). Identifying security risks of digital transformation-an engineering perspective. In Digital Transformation for a Sustainable Society in the 21st Century: 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, Trondheim, Norway, September 18–20, 2019, Proceedings 18, 677-688. Springer International Publishing.
  • OECD. (2013). The OECD Privacy Framework. OECD Publishing. https://www.oecd.org/sti/ ieconomy/oecd_privacy_framework.pdf
  • OECD. (2015). Digital Security Risk Management for Economic and Social Prosperity: OECD Recommendation and Companion Document. OECD.
  • Owen, S. (2017). Monitoring social media and protest movements: Ensuring Political Order through Surveillance and Surveillance Discourse. Social Identities, 23(6), 688-700.
  • Pereira, J., Tavalaei, M. M., & Ozalp, H. (2019). Blockchain-based Platforms: Decentralized Infrastructures and Its Boundary Conditions. Technological Forecasting and Social Change, 146, 94-102.
  • Rhodes, R. A. W. (1996). The New Governance: Governing without Government. Political Studies, 44(4), 652-667. https://doi.org/10.1111/j.1467-9248.1996.tb01747.x
  • Sarker, I. (2021). CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks. ArXiv, abs/2104.08080. https://doi.org/10.1016 /j.iot.2021.100393
  • Schuetz, S., & Venkatesh, V. (2020). Blockchain, Adoption, and Financial Inclusion in India: Research Opportunities. International Journal of Information Management, 52, 101936. https://doi.org/10.1016/j.ijinfomgt.2019.04.009
  • SIFMA. (2023). Addressing Regulatory Gaps in the Digital Asset Ecosystem. https://www.sifma.org/resources/news/addressing-regulatory-gaps-in-the-digital-asset-ecosystem/
  • Singh, R., Majumdar, P., Mittal, S., & Vatsa, M. (2021). Anatomizing Bias in Facial Analysis. Proceedings of the AAAI Conference on Artificial Intelligence, 36, 12351-12358. https://doi.org/10.1609/aaai.v36i11.21500
  • Starr, A., Fernandez, L., Amster, R., Wood, L., & Caro, M. (2008). The Impacts of State Surveillance on Political Assembly and Association: A Socio-Legal Analysis. Qualitative Sociology, 31, 251-270. https://doi.org/10.1007/s11133-008-9107-z
  • Sung, C., & Park, J. (2021). Understanding of Blockchain-Based Identity Management System Adoption in the Public Sector. Journal of Enterprise Information Management, 34, 1481-1505. https://doi.org/10.1108/jeim-12-2020-0532
  • Taddeo, M. (2013). Cyber Security and Individual Rights, Striking the Right Balance. Philosophy & Technology, 26, 353-356. https://doi.org/10.1007/s13347-013-0140-9
  • Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting Artificial Intelligence in Cybersecurity is a Double-Edged Sword. Nature Machine Intelligence, 1-4. https://doi.org/10.1038/s42256-019-0109-1
  • Tao, H., Bhuiyan, M., Rahman, M., Wang, G., Wang, T., Ahmed, M., & Li, J. (2019). Economic Perspective Analysis of Protecting Big Data Security and Privacy. Future Generation Computer Systems, 98, 660-671. https://doi.org/10.1016/j.future.2019.03.042
  • Timmers, P. (2024). Sovereignty in the digital age. Introduction to Digital Humanism, 571-592.
  • Vladucu, M., Dong, Z., Medina, J., & Rojas-Cessa, R. (2023). E-Voting Meets Blockchain: A Survey. IEEE Access, 11, 23293-23308. https://doi.org/10.1109/access.2023.3253682
  • Weber, M. (2009). The Theory of Social and Economic Organization. Simon and Schuster.
  • Weber, R. (2015). The digital future - A challenge for privacy? Computer Law & Security Review, 31, 234-242. https://doi.org/10.1016/j.clsr.2015.01.003
  • Weingärtner, T., Batista, D., Köchli, S., & Voutat, G. (2021). Prototyping a Smart Contract Based Public Procurement to Fight Corruption. Computers, 10, 85. https://doi.org/10.3390 /computers10070085
  • Wiranata, A. J. (2024). Utilization of Artificial Intelligence in Monitoring and Mitigating National Security Threats. Security Intelligence Terrorism Journal, 1(2), 122–127.
  • World Bank. (n.d.). Digital Transformation Overview. https://www.worldbank.org/en/topic/digital /overview
  • World Economic Forum. (2024). How Countries are Navigating Uncertainty of Digital Asset Regulation. https://www.weforum.org/stories/2024/10/different-countries-navigating-unce rtainty-digital-asset-regulation-election-year/
  • Zeadally, S., Adi, E., Baig, Z., & Khan, I. (2020). Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access, 8, 23817-23837. https://doi.org/10.1109/access .2020.2968045
  • Zhang, R., Xue, R., & Liu, L. (2019). Security and Privacy on Blockchain. ACM Computing Surveys (CSUR), 52, 1-34. https://doi.org/10.1145/3316481

THE ROLE AND LIMITS OF THE STATE IN THE DIGITAL AGE: AN ANALYSIS OF SECURITY AND GOVERNANCE ELEMENTS REDEFINED BY MODERN TECHNOLOGIES

Year 2025, Issue: 49, 51 - 74, 29.10.2025
https://doi.org/10.18092/ulikidince.1587738

Abstract

In the digital world, artificial intelligence (AI), big data analytics, and cybersecurity are reshaping the traditional functions and security capacities of the state. This article examines the potential of these technologies in areas such as surveillance, threat detection, and risk management, while addressing the ethical, privacy, and data security challenges they bring. Modern technologies offer states the opportunity to implement more effective security measures and deliver innovative public services. However, they also raise concerns about violations of individual rights, data manipulation, and biased algorithms. Furthermore, while digitization accelerates decision-making processes, it creates challenges for governance principles such as transparency and accountability. This study explores the impact of this transformation on state sovereignty, individual privacy, and ethical governance, emphasizing the need to redefine the state’s role in light of the complexities brought about by the digital age.

References

  • Aas, K. F. (2013). ‘Getting Ahead of the Game’: Border Technologies and the Changing Space of Governance. Global Surveillance and Policing, 194-214, Willan.
  • Ahmadisheykhsarmast, S., & Sonmez, R. (2020). A Smart Contract System for Security of Payment of Construction Contracts. Automation in Construction, 120, 103401. https://doi.org/10. 1016/j.autcon.2020.103401
  • Ahad, M., Paiva, S., Tripathi, G., & Feroz, N. (2020). Enabling Technologies and Sustainable Smart Cities. Sustainable Cities and Society. https://doi.org/10.1016/j.scs.2020.102301
  • Ağırdil, O. (2025a). Almanya’nın Kamu Güvenliği Politikaları: Strateji Belgeleri Üzerinden Bir İnceleme. Liberal Düşünce Dergisi, (118), 199-230. https://doi.org/10.36484/liberal.1683028
  • Ağırdil, O. (2025b). Fransa’nın Kamu Güvenliği Politikaları: Strateji Belgeleri Üzerinden Bir İnceleme. İletişim Ve Diplomasi, (14), 23-44. https://doi.org/10.54722/iletisimvediplomasi.1667005
  • Aleem, A., Wakefield, A., & Button, M. (2013). Addressing the Weakest Link: Implementing Converged Security. Security Journal, 26, 236-248. https://doi.org/10.1057/sj.2013.14
  • Al-Hawawreh, M., Moustafa, N., Garg, S., & Hossain, M. (2021). Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks. IEEE Transactions on Network Science and Engineering, 8, 2968-2981. https://doi.org/10.1109/tnse.2020.3032415
  • Anderson, R., & Moore, T. (2006). The Economics of Information Security. Science, 314(5799), 610-613.
  • Andrejevic, M., & Gates, K. (2014). Big Data Surveillance: Introduction. Surveillance & Society, 12(2), 185-196.
  • Balkin, J. (2003). Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society. https://doi.org/10.2139/ssrn.470842
  • Beck, R., Müller-Bloch, C., & King, J. (2018). Governance in the Blockchain Economy: A Framework and Research Agenda. Journal of the Association for Information Systems, 19, 1. https://doi.org/10.17705/1jais.00518
  • Bernabe, J., Cánovas, J., Hernández-Ramos, J., Moreno, R., & Skarmeta, A. (2019). Privacy-Preserving Solutions for Blockchain: Review and Challenges. IEEE Access, 7, 164908-164940. https://doi.org/10.1109/access.2019.2950872
  • Brayne, S., & Christin, A. (2020). Technologies of Crime Prediction: The Reception of Algorithms in Policing and Criminal Courts. Social Problems. https://doi.org/10.1093/socpro/spaa004
  • Brilingaitė, A., Bukauskas, L., & Juozapavičius, A. (2020). A Framework for Competence Development and Assessment in Hybrid Cybersecurity Exercises. Computers & Security, 88, 101607. https://doi.org/10.1016/j.cose.2019.101607
  • Broeders, D., & Dijstelbloem, H. (2015). The Datafication of Mobility and Migration Management: The Mediating State and Its Consequences. In Digitizing Identities, 242-260, Routledge.
  • Burton, J., & Soare, S. (2019). Understanding the Strategic Implications of the Weaponization of Artificial Intelligence. 2019 11th International Conference on Cyber Conflict (CyCon), 1-17. IEEE. https://doi.org/10.23919/cycon.2019.8756866
  • Busygina, I., Filippov, M., & Taukebaeva, E. (2018). To Decentralize or to Continue on the Centralization Track: The Cases of Authoritarian Regimes in Russia and Kazakhstan. Journal of Eurasian Studies, 9, 61-71. https://doi.org/10.1016/j.euras.2017.12.008
  • Chachko, E. (2021). National Security by Platform. Stan. Tech. L. Rev., 25, 55.
  • Chaar-López, I. (2019). Sensing Intruders: Race and the Automation of Border Control. American Quarterly, 71, 495 - 518.
  • Chowdhury, N., & Gkioulos, V. (2021). Cyber Security Training for Critical Infrastructure Protection: A Literature Review. Computer Science Review, 40, 100361. https://doi.org/10.1016/j.cosrev. 2021.100361
  • Cong, L., & He, Z. (2018). Blockchain Disruption and Smart Contracts. Kauffman: Entrepreneurship Scholars Initiatives (Topic). https://doi.org/10.2139/ssrn.2985764
  • Crampton, J. W. (2019). Platform Biometrics. Surveillance & Society, 17(1/2), 54-62.
  • Dunn Cavelty, M. (2012). The Militarisation of Cyberspace: Why Less May Be Better. In 4th International Conference on Cyber Conflict (CYCON 2012), 141-153. IEEE. https://ccdcoe. org/uploads/2012/01/2_6_Dunn-Cavelty_TheMilitarisationOfCyberspace.pdf
  • Çatlı, M. (2021). Dijital Devlet Teorisi. Ankara: Adalet Yayınevi.
  • Dyson, E. (2008). Reflections on Privacy 2.0. Scientific American, 299(3), 50-55. https://doi.org /10.1038/scientificamerican0908-50
  • EU GDPR. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council. Regulation (EU), 679(2016), 10-13.
  • European Commission, Directorate‑General for Education, Youth, Sport and Culture. (2025). About the Digital Education Action Plan. European Education Area. https://education.ec.europa.eu /focus-topics/digital-education/plan
  • Farnaghi, M., & Mansourian, A. (2020). Blockchain, an Enabling Technology for Transparent and Accountable Decentralized Public Participatory GIS. Cities, 105, 102850. https://doi.org/ 10.1016/j.cities.2020.102850
  • Gelb, A., & Clark, J. (2013). Identification for Development: The Biometrics Revolution. Center for Global Development Working Paper, 315. https://doi.org/10.2139/ssrn.2226594
  • Giancaspro, M. (2017). Is a ‘Smart Contract’ Really a Smart Idea? Insights from a Legal Perspective. Computer Law & Security Review, 33, 825-835. https://doi.org/10.1016/j.clsr.2017.05.007
  • Goldenfein, J., & Leiter, A. (2018). Legal Engineering on the Blockchain: ‘Smart Contracts’ as Legal Conduct. Law and Critique, 29, 141-149. https://doi.org/10.1007/s10978-018-9224-0
  • Gordon, L. A., & Loeb, M. P. (2002). The Economics of Information Security Investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438-457.
  • Grabosky, P. (2007). The Internet, Technology, and Organized Crime. Asian Journal of Criminology, 2(2), 145-161. https://doi.org/10.1007/s11417-007-9034-z
  • Grimmelikhuijsen, S. (2012). Linking Transparency, Knowledge and Citizen Trust in Government: An Experiment. International Review of Administrative Sciences, 78, 50-73. https://doi.org /10.1177/0020852311429667
  • Guo, J., & Zhang, H. (2024). Digital age: The Path Choice of Government-Citizen Value Co-Creation. Heliyon, 10(15).
  • Hanna, N. (2018). A Role for the State in the Digital Age. Journal of Innovation and Entrepreneurship 7(5). https://doi.org/10.1186/s13731-018-0086-3
  • Heinl, C. (2014). Regional Cybersecurity: Moving Toward a Resilient ASEAN Cybersecurity Regime. Asia Policy, 18, 131-159. https://doi.org/10.1353/asp.2014.0026
  • Hilbert, M. (2020). Digital Technology and Social Change: The Digital Transformation of Society from a Historical Perspective. Dialogues in Clinical Neuroscience, 22(2), 189-194.
  • Hoofnagle, C. J., Van Der Sloot, B., & Borgesius, F. Z. (2019). The European Union General Data Protection Regulation: What It Is and What It Means. Information & Communications Technology Law, 28(1), 65-98.
  • ISO/IEC. (2022). ISO/IEC 27001: Information Security Management Systems. International Organization for Standardization. https://www.iso.org/standard/54534.html Jain, A. K., Ross, A., & Prabhakar, S. (2004). An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4-20. https://doi.org /10.1109/tcsvt.2003.818349
  • Joshi, J., Ghafoor, A., Aref, W., & Spafford, E. (2002). Security and Privacy Challenges of a Digital Government. Proceedings of the National Conference on Digital Government, 121-136. https://doi.org/10.1007/0-306-47374-7_7
  • Ke, T., & Sudhir, K. (2022). Privacy Rights and Data Security: GDPR and Personal Data Markets. Management Science. https://doi.org/10.1287/mnsc.2022.4614
  • Khalil, K., Abdel-Aziz, M., Nazmy, T., & Salem, A. (2008). The Role of Artificial Intelligence Technologies in Crisis Response. ArXiv, abs/0806.1280
  • Kostyuk, N., & Wayne, C. (2020). The Microfoundations of State Cybersecurity: Cyber Risk Perceptions and the Mass Public. Journal of Global Security Studies. https://doi.org /10.1093/jogss/ogz077
  • KVKK. (2016). 6698 Sayılı Kişisel Verilerin Korunması Kanunu. Resmî Gazete, 29677. https://www.resmigazete.gov.tr/eskiler/2016/04/20160407-9.htm
  • Laufs, J., Borrion, H., & Bradford, B. (2020). Security and the Smart City: A Systematic Review. Sustainable Cities and Society, 55, 102023. https://doi.org/10.1016/j.scs.2020.102023
  • Lyon, D. (1992). The New Surveillance: Electronic Technologies and The Maximum-Security Society. Crime, Law and Social Change, 18, 159-175. https://doi.org/10.1007/bf00230629
  • Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, Consequences, Critique. Big Data & Society, 1(2), 1-13. https://doi.org/10.1177/2053951714541861
  • McAuliffe, M., Blower, J., & Beduschi, A. (2021). Digitalization and Artificial Intelligence in Migration and Mobility: Transnational Implications of the COVID-19 Pandemic. Societies, 11(4), 135.
  • Murthy, S., Bhat, K., Das, S., & Kumar, N. (2021). Individually Vulnerable, Collectively Safe. Proceedings of the ACM on Human-Computer Interaction, 5, 1-24. https://doi.org/10.1145 /3449212
  • Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/ bitcoin.pdf
  • National Telecommunications and Information Administration. (n.d.). Broadband Equity, Access, and Deployment (BEAD) Program, U.S. Department of Commerce. https://broadbandusa. ntia.gov/funding-programs/broadband-equity-access-and-deployment-bead-program
  • Nguyen Duc, A., & Chirumamilla, A. (2019). Identifying security risks of digital transformation-an engineering perspective. In Digital Transformation for a Sustainable Society in the 21st Century: 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, Trondheim, Norway, September 18–20, 2019, Proceedings 18, 677-688. Springer International Publishing.
  • OECD. (2013). The OECD Privacy Framework. OECD Publishing. https://www.oecd.org/sti/ ieconomy/oecd_privacy_framework.pdf
  • OECD. (2015). Digital Security Risk Management for Economic and Social Prosperity: OECD Recommendation and Companion Document. OECD.
  • Owen, S. (2017). Monitoring social media and protest movements: Ensuring Political Order through Surveillance and Surveillance Discourse. Social Identities, 23(6), 688-700.
  • Pereira, J., Tavalaei, M. M., & Ozalp, H. (2019). Blockchain-based Platforms: Decentralized Infrastructures and Its Boundary Conditions. Technological Forecasting and Social Change, 146, 94-102.
  • Rhodes, R. A. W. (1996). The New Governance: Governing without Government. Political Studies, 44(4), 652-667. https://doi.org/10.1111/j.1467-9248.1996.tb01747.x
  • Sarker, I. (2021). CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks. ArXiv, abs/2104.08080. https://doi.org/10.1016 /j.iot.2021.100393
  • Schuetz, S., & Venkatesh, V. (2020). Blockchain, Adoption, and Financial Inclusion in India: Research Opportunities. International Journal of Information Management, 52, 101936. https://doi.org/10.1016/j.ijinfomgt.2019.04.009
  • SIFMA. (2023). Addressing Regulatory Gaps in the Digital Asset Ecosystem. https://www.sifma.org/resources/news/addressing-regulatory-gaps-in-the-digital-asset-ecosystem/
  • Singh, R., Majumdar, P., Mittal, S., & Vatsa, M. (2021). Anatomizing Bias in Facial Analysis. Proceedings of the AAAI Conference on Artificial Intelligence, 36, 12351-12358. https://doi.org/10.1609/aaai.v36i11.21500
  • Starr, A., Fernandez, L., Amster, R., Wood, L., & Caro, M. (2008). The Impacts of State Surveillance on Political Assembly and Association: A Socio-Legal Analysis. Qualitative Sociology, 31, 251-270. https://doi.org/10.1007/s11133-008-9107-z
  • Sung, C., & Park, J. (2021). Understanding of Blockchain-Based Identity Management System Adoption in the Public Sector. Journal of Enterprise Information Management, 34, 1481-1505. https://doi.org/10.1108/jeim-12-2020-0532
  • Taddeo, M. (2013). Cyber Security and Individual Rights, Striking the Right Balance. Philosophy & Technology, 26, 353-356. https://doi.org/10.1007/s13347-013-0140-9
  • Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting Artificial Intelligence in Cybersecurity is a Double-Edged Sword. Nature Machine Intelligence, 1-4. https://doi.org/10.1038/s42256-019-0109-1
  • Tao, H., Bhuiyan, M., Rahman, M., Wang, G., Wang, T., Ahmed, M., & Li, J. (2019). Economic Perspective Analysis of Protecting Big Data Security and Privacy. Future Generation Computer Systems, 98, 660-671. https://doi.org/10.1016/j.future.2019.03.042
  • Timmers, P. (2024). Sovereignty in the digital age. Introduction to Digital Humanism, 571-592.
  • Vladucu, M., Dong, Z., Medina, J., & Rojas-Cessa, R. (2023). E-Voting Meets Blockchain: A Survey. IEEE Access, 11, 23293-23308. https://doi.org/10.1109/access.2023.3253682
  • Weber, M. (2009). The Theory of Social and Economic Organization. Simon and Schuster.
  • Weber, R. (2015). The digital future - A challenge for privacy? Computer Law & Security Review, 31, 234-242. https://doi.org/10.1016/j.clsr.2015.01.003
  • Weingärtner, T., Batista, D., Köchli, S., & Voutat, G. (2021). Prototyping a Smart Contract Based Public Procurement to Fight Corruption. Computers, 10, 85. https://doi.org/10.3390 /computers10070085
  • Wiranata, A. J. (2024). Utilization of Artificial Intelligence in Monitoring and Mitigating National Security Threats. Security Intelligence Terrorism Journal, 1(2), 122–127.
  • World Bank. (n.d.). Digital Transformation Overview. https://www.worldbank.org/en/topic/digital /overview
  • World Economic Forum. (2024). How Countries are Navigating Uncertainty of Digital Asset Regulation. https://www.weforum.org/stories/2024/10/different-countries-navigating-unce rtainty-digital-asset-regulation-election-year/
  • Zeadally, S., Adi, E., Baig, Z., & Khan, I. (2020). Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access, 8, 23817-23837. https://doi.org/10.1109/access .2020.2968045
  • Zhang, R., Xue, R., & Liu, L. (2019). Security and Privacy on Blockchain. ACM Computing Surveys (CSUR), 52, 1-34. https://doi.org/10.1145/3316481
There are 77 citations in total.

Details

Primary Language Turkish
Subjects Political Science (Other)
Journal Section Articles
Authors

Alp Cenk Arslan 0000-0002-5526-2089

Early Pub Date October 24, 2025
Publication Date October 29, 2025
Submission Date November 19, 2024
Acceptance Date August 19, 2025
Published in Issue Year 2025 Issue: 49

Cite

APA Arslan, A. C. (2025). DİJİTAL ÇAĞDA DEVLETİN ROLÜ VE SINIRLARI: MODERN TEKNOLOJİLERLE YENİDEN TANIMLANAN GÜVENLİK VE YÖNETİŞİM UNSURLARI ÜZERİNDEN BİR İNCELEME. Uluslararası İktisadi Ve İdari İncelemeler Dergisi(49), 51-74. https://doi.org/10.18092/ulikidince.1587738

______________________________________________________

Address: Karadeniz Technical University Department of Economics Room Number 213  

61080 Trabzon / Turkey

e-mail : uiiidergisi@gmail.com