{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:17:03Z","timestamp":1775560623611,"version":"3.50.1"},"reference-count":70,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Anglia Ruskin University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>As the digital environment progresses, the complexities of cyber threats also advance, encompassing both hostile cyberattacks and sophisticated cyber espionage. In the face of these difficulties, cooperative endeavours between state and non-state actors have attracted considerable interest as crucial elements in improving global cyber resilience. This study examines cybersecurity governance\u2019s evolving dynamics, specifically exploring non-state actors\u2019 roles and their effects on global security. This highlights the increasing dangers presented by supply chain attacks, advanced persistent threats, ransomware, and vulnerabilities on the Internet of Things. Furthermore, it explores how non-state actors, such as terrorist organisations and armed groups, increasingly utilise cyberspace for strategic objectives. This issue can pose a challenge to conventional state-focused approaches to security management. Moreover, the research examines the crucial influence of informal governance processes on forming international cybersecurity regulations. The study emphasises the need for increased cooperation between governmental and non-governmental entities to create robust and flexible cybersecurity measures. This statement urges policymakers, security experts, and researchers to thoroughly examine the complex relationship between geopolitics, informal governance systems, and growing cyber threats to strengthen global digital resilience.<\/jats:p>","DOI":"10.3390\/info15110682","type":"journal-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T11:53:43Z","timestamp":1730462023000},"page":"682","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era"],"prefix":"10.3390","volume":"15","author":[{"given":"Aisha","family":"Adeyeri","sequence":"first","affiliation":[{"name":"School of Computing and Information Sciences, Anglia Ruskin University, Cambridge CB1 1PT, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9315-4428","authenticated-orcid":false,"given":"Hossein","family":"Abroshan","sequence":"additional","affiliation":[{"name":"School of Computing and Information Sciences, Anglia Ruskin University, Cambridge CB1 1PT, UK"}]}],"member":"1968","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Johnstone, I., Sukumar, A., and Trachtman, J. (2023). The way ahead for multistakeholder cyber diplomacy. Building an International Cybersecurity Regime, Edward Elgar Publishing.","DOI":"10.4337\/9781035301546"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/13523260.2023.2296739","article-title":"The pervasive informality of the international cybersecurity regime: Geopolitics, non-state actors and diplomacy","volume":"45","author":"Sukumar","year":"2024","journal-title":"Contemp. Secur. Policy"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Liu, J. (2023). Rethinking Chinese multistakeholder governance of cybersecurity. Building an International Cybersecurity Regime, Edward Elgar Publishing.","DOI":"10.4337\/9781035301546.00015"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"77","DOI":"10.54851\/v5i1y202307","article-title":"Comparative Analysis on Cyber Diplomacy in EU and US","volume":"5","author":"Rotuna","year":"2023","journal-title":"Rom. Cyber Secur. J."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Sukumar, A. (2023). The geopolitics of multistakeholder cyber diplomacy: A comparative analysis. Building an International Cybersecurity Regime, Edward Elgar Publishing.","DOI":"10.4337\/9781035301546.00008"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"100556","DOI":"10.1016\/j.ijcip.2022.100556","article-title":"Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review","volume":"39","author":"Ampratwum","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Whyte, C., and Mazanec, B. (2023). Understanding Cyber-Warfare: Politics, Policy and Strategy, Routledge.","DOI":"10.4324\/9781003246398"},{"key":"ref_8","first-page":"100","article-title":"Theme development in qualitative content analysis and thematic analysis","volume":"6","author":"Vaismoradi","year":"2016","journal-title":"J. Nurs. Educ. Pr."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"107","DOI":"10.9734\/jerr\/2024\/v26i21075","article-title":"Emerging Threats in Cyberspace: Implications for National Security Policy and Healthcare Sector","volume":"26","author":"Ness","year":"2024","journal-title":"J. Eng. Res. Rep."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1515\/jms-2016-0184","article-title":"Non-state actors in cyberspace operations","volume":"4","author":"Sigholm","year":"2013","journal-title":"J. Mil. Stud."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Work, J. (2019, January 3\u20134). In wolf\u2019s clothing: Complications of threat emulation in contemporary cyber intelligence practice. Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, UK.","DOI":"10.1109\/CyberSecPODS.2019.8885269"},{"key":"ref_12","first-page":"1","article-title":"Emerging threats in cybersecurity: A review article","volume":"1","author":"Kumar","year":"2023","journal-title":"Int. J. Appl. Nat. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"57","DOI":"10.58496\/MJCS\/2023\/010","article-title":"Exploring the top five evolving threats in cybersecurity: An in-depth overview","volume":"2023","author":"Mijwil","year":"2023","journal-title":"Mesopotamian J. Cybersecur."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"\u00d6zsungur, F. (2023). Cyberwarfare: War Activities in Cyberspace. Handbook of Research on War Policies, Strategies, and Cyber Wars, IGI Global.","DOI":"10.4018\/978-1-6684-6741-1"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1017\/eis.2021.20","article-title":"The better angels of our digital nature? Offensive cyber capabilities and state violence","volume":"8","author":"Egloff","year":"2023","journal-title":"Eur. J. Int. Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"16","DOI":"10.31703\/glsr.2023(VIII-II).03","article-title":"Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter","volume":"VIII","author":"Usman","year":"2023","journal-title":"Glob. Leg. Stud. Rev."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5539\/ijbm.v13n6p1","article-title":"Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks","volume":"12","author":"Thomas","year":"2018","journal-title":"Int. J. Bus. Manag."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Alqudhaibi, A., Albarrak, M., Aloseel, A., Jagtap, S., and Salonitis, K. (2023). Predicting cybersecurity threats in critical infrastructure for industry 4.0: A proactive approach based on attacker motivations. Sensors, 23.","DOI":"10.3390\/s23094539"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"121118","DOI":"10.1109\/ACCESS.2023.3328351","article-title":"A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms","volume":"11","author":"Ferdous","year":"2023","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Aslan, \u00d6., Aktu\u011f, S.S., Ozkan-Okay, M., Yilmaz, A.A., and Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12.","DOI":"10.3390\/electronics12061333"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M.A., Amir, A., Vuda, K.V., and Sarwat, A.I. (2023). Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure. Sensors, 23.","DOI":"10.3390\/s23084060"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1080\/00313831.2022.2114543","article-title":"Depoliticising political violence: State-centric and individualised discourses in the Norwegian counterterrorism policy field","volume":"67","author":"Mattsson","year":"2023","journal-title":"Scand. J. Educ. Res."},{"key":"ref_23","unstructured":"Hendrik, W.O. (2023). 9 Soft power and cyber security: The evolution of US cyber diplomacy. Soft Power and the Future of US Foreign Policy, Manchester University Press."},{"key":"ref_24","first-page":"157","article-title":"Assembling Publics: Microsoft, Cybersecurity, and Public-Private Relations","volume":"11","author":"Liebetrau","year":"2023","journal-title":"Politics Gov."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1080\/10357718.2023.2279084","article-title":"Spies and scholars in the cyber age: Researching intelligence in Australian policy and regional security","volume":"78","author":"Schaefer","year":"2024","journal-title":"Aust. J. Int. Aff."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1080\/19448953.2023.2233364","article-title":"The Role of Non-State Actors in Modern Warfare: The Case of Syria and Nagorno-Karabakh","volume":"26","author":"Petrosyan","year":"2024","journal-title":"J. Balk. Near East. Stud."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"286","DOI":"10.25234\/eclic\/28268","article-title":"Individual Criminal Responsibility of Non-State Actors Operating in Cyberspace for War Crimes Under the ICC Statute","volume":"7","author":"Gabrielli","year":"2023","journal-title":"EU Comp. Law Issues Chall. Ser. (ECLIC)"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1080\/19393555.2023.2201482","article-title":"The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process","volume":"33","author":"Madnick","year":"2024","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"269","DOI":"10.36713\/epra14915","article-title":"A Brief Study of International Law in the Age of Cybersecurity","volume":"9","author":"Shukla","year":"2023","journal-title":"EPRA Int. J. Multidiscip. Res. (IJMR)"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1177\/13540661221117051","article-title":"Subversion, cyber operations, and reverse structural power in world politics","volume":"29","author":"Maschmeyer","year":"2023","journal-title":"Eur. J. Int. Relat."},{"key":"ref_31","first-page":"101","article-title":"Cyber Security and International Conflicts: An Analysis of State-Sponsored Cyber Attacks","volume":"8","author":"Azubuike","year":"2023","journal-title":"Nnamdi Azikiwe J. Political Sci."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"169","DOI":"10.34306\/itsdi.v4i2.587","article-title":"Analysis of cyber diplomacy and its challenges for the digital era community","volume":"4","author":"Maulana","year":"2023","journal-title":"IAIC Trans. Sustain. Digit. Innov. (ITSDI)"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Kosenkov, A. (2016). Cyber conflicts as a new global threat. Future Internet, 8.","DOI":"10.3390\/fi8030045"},{"key":"ref_34","first-page":"14","article-title":"The legitimacy of international law: Challenges and the emerging issues","volume":"4","author":"Abdullahi","year":"2023","journal-title":"J. Glob. Soc. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Utkirovich, R.U. (2023). Navigating the Cyber Legal Landscape: Protecting Legal Entities through Comprehensive Cyber-security Strategies. Uzb. J. Law Digit. Policy, 1.","DOI":"10.59022\/ujldp.56"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Burrell, D.N. (2023). A Critical Analytical View of Control Theory and the Geopolitical and Economic Drivers Affecting Cyber Security Warfare. Applied Research Approaches to Technology, Healthcare, and Business, IGI Global.","DOI":"10.4018\/979-8-3693-1630-6"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"103705","DOI":"10.1016\/j.cose.2024.103705","article-title":"Anomaly detection for space information networks: A survey of challenges, techniques, and future directions","volume":"139","author":"Diro","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Painter, C. (2023). US multistakeholder engagement in cyber stability issues. Building an International Cybersecurity Regime, Edward Elgar Publishing.","DOI":"10.4337\/9781035301546.00013"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1002\/eet.2074","article-title":"Granting legitimacy from non-state actor deliberation: An example of women\u2019s groups at the United Nations Framework Convention on Climate Change","volume":"34","author":"Zhao","year":"2023","journal-title":"Environ. Policy Gov."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1080\/13501763.2023.2173274","article-title":"Regulatory cybersecurity governance in the making: The formation of ENISA and its struggle for epistemic authority","volume":"30","author":"Smeets","year":"2023","journal-title":"J. Eur. Public Policy"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1353","DOI":"10.1080\/13501763.2023.2172063","article-title":"Supranational security states for national security problems: Governing by rules & capacities in tech-driven security spaces","volume":"30","year":"2023","journal-title":"J. Eur. Public Policy"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Radanliev, P. (2024). Cyber diplomacy: Defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing. J. Cyber Secur. Technol., 1\u201351.","DOI":"10.1080\/23742917.2024.2312671"},{"key":"ref_43","unstructured":"Sullivan, J., and Nurse, J.R. (2021). Cyber Security Incentives and the Role of Cyber Insurance, Royal United Services Institute for Defence and Security Studies (RUSI). RUSI Emerging Insights Paper; Technical report."},{"key":"ref_44","first-page":"1115","article-title":"Before the Breach: The Role of Cyber Insurance Incentivizing Data Security","volume":"86","author":"Heath","year":"2018","journal-title":"Georg. Wash. Law Rev."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/13523260.2023.2279033","article-title":"The role of insurers in shaping international cyber-security norms about cyber-war","volume":"45","author":"Wolff","year":"2024","journal-title":"Contemp. Secur. Policy"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Arslan, A.S. (APSA Prepr., 2024). Neorealist Analysis of Security Dilemma in Cyberspace; A Quantitative Study, APSA Prepr., preprint.","DOI":"10.33774\/apsa-2023-wvw2z-v10"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Iacono, M., and Mastroianni, M. (2024). Evaluation of the Effectiveness of National Promotion Strategies for the Improvement of Privacy and Security. Computers, 13.","DOI":"10.3390\/computers13040087"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Maleh, Y., Alazab, M., and Romdhani, I. (2023). AI and Blockchain for Cybersecurity in Cyber-Physical Systems: Challenges and Future Research Agenda. Blockchain for Cybersecurity in Cyber-Physical Systems, Springer International Publishing.","DOI":"10.1007\/978-3-031-25506-9"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Tyagi, A.K. (2024). Blockchain and Artificial Intelligence for Cyber Security in the Era of Internet of Things and Industrial Internet of Things Applications. AI and Blockchain Applications in Industrial Robotics, IGI Global.","DOI":"10.4018\/979-8-3693-0659-8.ch007"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"e318","DOI":"10.1002\/spy2.318","article-title":"A comprehensive study on cybersecurity challenges and opportunities in the IoT world","volume":"6","author":"Lone","year":"2023","journal-title":"Secur. Priv."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Kaur, I., Gupta, V., Verma, V., and Kaur, S. (2023). Securing healthcare records using blockchain: Applications and challenges. AI and Blockchain in Healthcare, Springer.","DOI":"10.1007\/978-981-99-0377-1_4"},{"key":"ref_52","first-page":"1","article-title":"Privacy-Preserving Techniques in AI-Powered Cyber Security: Challenges and Opportunities","volume":"5","author":"Vegesna","year":"2023","journal-title":"Int. J. Mach. Learn. Sustain. Dev."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Rees, J., and Rees, C.J. (2023). Cyber-Security and the Changing Landscape of Critical National Infrastructure: State and Non-state Cyber-Attacks on Organisations, Systems and Services. Applications for Artificial Intelligence and Digital Forensics in National Security, Springer.","DOI":"10.1007\/978-3-031-40118-3_5"},{"key":"ref_54","unstructured":"Vegesna, V.V. (2023). Enhancing cyber resilience by integrating AI-Driven threat detection and mitigation strategies. Trans. Latest Trends Artif. Intell., 4, Available online: https:\/\/ijsdcs.com\/index.php\/TLAI\/article\/view\/396\/140."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Saeed, S., Altamimi, S.A., Alkayyal, N.A., Alshehri, E., and Alabbad, D.A. (2023). Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors, 23.","DOI":"10.3390\/s23156666"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Safitra, M.F., Lubis, M., and Fakhrurroja, H. (2023). Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability, 15.","DOI":"10.3390\/su151813369"},{"key":"ref_57","first-page":"101781","article-title":"Cyber resilience in industrial networks: A state of the art, challenges, and future directions","volume":"35","author":"Alrumaih","year":"2023","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"327","DOI":"10.3390\/jcp3030017","article-title":"A dynamic and adaptive cybersecurity governance framework","volume":"3","author":"Melaku","year":"2023","journal-title":"J. Cybersecur. Priv."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1177\/00223433231217687","article-title":"How the process of discovering cyberattacks biases our understanding of cybersecurity","volume":"61","author":"Oppenheimer","year":"2024","journal-title":"J. Peace Res."},{"key":"ref_60","first-page":"42","article-title":"Machine Learning Algorithms for Cybersecurity: Detecting and Preventing Threats","volume":"15","author":"Shah","year":"2021","journal-title":"Rev. Esp. Doc. Cient."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Trachtman, J. (2023). Developing multistakeholder structures for cybersecurity norms: Learning from experience. Building an International Cybersecurity Regime, Edward Elgar Publishing.","DOI":"10.4337\/9781035301546.00010"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"101804","DOI":"10.1016\/j.inffus.2023.101804","article-title":"Artificial intelligence for cybersecurity: Literature review and future research directions","volume":"97","author":"Kaur","year":"2023","journal-title":"Inf. Fusion"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1080\/13523260.2023.2269809","article-title":"Authoritarian multilateralism in the global cyber regime complex: The double transformation of an international diplomatic practice","volume":"45","author":"Raymond","year":"2024","journal-title":"Contemp. Secur. Policy"},{"key":"ref_64","unstructured":"Traitware (2024, October 14). Should Governments Require Stronger Security?. 2024., Available online: https:\/\/traitware.com\/should-governments-step-in-to-require-stronger-cybersecurity-for-companies\/."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Nanni, R. (2024). Digital sovereignty and Internet standards: Normative implications of public-private relations among Chinese stakeholders in the Internet Engineering Task Force. The Geopolitics of Chinese Internets, Routledge.","DOI":"10.4324\/9781032690162-2"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Anagnostakis, D. (2022). The External Face of the EU\u2019s Cybersecurity Policies: Promoting Good Cybersecurity Governance Abroad?. EU Good Governance Promotion in the Age of Democratic Decline, Springer.","DOI":"10.1007\/978-3-031-05781-6_11"},{"key":"ref_67","first-page":"389","article-title":"The offline defense of the Internet: An examination of the electronic frontier foundation","volume":"15","author":"Nhan","year":"2011","journal-title":"SMU Sci. Technol. Law Rev."},{"key":"ref_68","unstructured":"Hewling, M. (2018). Cyber Intelligence: A Framework for the Sharing of Data, Academic Conferences International Limited."},{"key":"ref_69","unstructured":"Yatagan, C. (2022). Interaction Between the U.S. Intelligence Community and the Private Sector in Sharing Cyber Threat Intelligence, American University."},{"key":"ref_70","first-page":"627","article-title":"Cybersecurity Private-Public Partnerships: A Bridge to Advance Global Cybersecurity","volume":"56","author":"Haklai","year":"2023","journal-title":"Tex. Tech. Law Rev."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/11\/682\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:26:18Z","timestamp":1760113578000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/11\/682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,1]]},"references-count":70,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["info15110682"],"URL":"https:\/\/doi.org\/10.3390\/info15110682","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,1]]}}}