Institutional, technological, and financial drivers of national cyber resilience under armed conflict and post-conflict recovery
-
DOIhttp://dx.doi.org/10.21511/ppm.23(4).2025.45
-
Article InfoVolume 23 2025, Issue #4, pp. 665-683
- 30 Views
-
2 Downloads
This work is licensed under a
Creative Commons Attribution 4.0 International License
Type of the article: Research Article
Abstract
Military and economic turbulence transform the relationships between factors shaping national cyber resilience. This study aims to analyze the impact of technological, institutional, and financial determinants on cyber resilience under armed conflict and post-conflict recovery. The empirical analysis covers neighboring European non-EU countries within the European security space that are exposed to armed conflict or post-conflict instability (Ukraine, Moldova, Georgia, Armenia, Azerbaijan, and Serbia) from 2010 to 2024, using panel data from the World Bank, IMF, and ENISA. Cyber resilience is measured by the Global Cybersecurity Index. Institutional, technological, and financial factors are proxied by standard governance, digitalization, and the financial sector and estimated using a fixed-effects model with Driscoll-Kraay robust standard errors. The results reveal pronounced regime-dependent effects. Institutional capacity plays a decisive role during armed conflict: government effectiveness shows a strong positive association with cyber resilience (β ≈ 1.04) but becomes statistically insignificant in post-conflict and stable environments. Technological factors exhibit context-sensitive effects: digital government development is positively associated with cyber resilience during armed conflict (β ≈ 0.95) and relative stability (β ≈ 1.78), while its impact weakens in post-conflict recovery. Macroeconomic conditions exert systematic influences across regimes: higher unemployment reduces cyber resilience (β ≈ −0.027), whereas inflation shows a positive association (β ≈ 0.008). Financial indicators display mixed and predominantly negative effects under relative stability. Accordingly, cybersecurity policy should be explicitly regime-sensitive: institutional and digital interventions should dominate during armed conflict, while governance and risk-management mechanisms should prevail in post-conflict and stable environments.
Acknowledgment
The authors acknowledge with gratitude the financial support provided by the Ministry of Education and Science of Ukraine for the research project “Modeling mechanisms for countering organized and transnational cybercrime in wartime and post-war times” (state registration number 0124U000550).
- Keywords
-
JEL Classification (Paper profile tab)G28, С33, О33, G21
-
References35
-
Tables7
-
Figures2
-
- Figure 1. Predicted values of the Global Cyber Resilience Index across three security regimes (relative stability, armed conflict, and post-armed conflict recovery), estimated from a full fixed-effects model capturing within-country transitions over time
- Figure 2. Average marginal effect of government effectiveness (GEF) on cyber resilience across relative stability, armed conflict, and post-conflict recovery security regimes
-
- Table 1. Security regime attribution across selected countries and periods (2010–2024)
- Table 2. Descriptive statistics of cyber resilience determinants by security regime
- Table 3. Significance of cyber resilience determinants across model specifications and security regimes (dependent variable – Global Cybersecurity Index)
- Table 4. Fixed-effects regressions of cyber resilience: overall sample and security regimes
- Table 5. Summary of correlation structure and variable selection
- Table 6. Results of diagnostic tests to substantiate the fixed effects model
- Table 7. Robustness check: fixed-effects model with digital and cybersecurity determinants (overall sample and security regime)
-
- Adams, J. N. (Ed.). (2016). Letter of Claudia Severa from Vindolanda (Tab. Vindol. 291), of the Early Second Century. In An Anthology of Informal Latin, 200 BC–AD 900: Fifty Texts with Translations and Linguistic Commentary. Cambridge: Cambridge University Press, 256-264.
- Agrafiotis, I., Nurse, J. R. C., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1), tyy006.
- Aldasoro, I., Gambacorta, L., Giudici, P., & Whyte, K. (2020). The drivers of cyber risk (BIS Working Papers No. 865).
- Arroyabe, M. F., Arranz, C. F.A., De Arroyabe, I. F., & De Arroyabe, J. C. F. (2024). Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives. Computers & Security, 141, 103826.
- Atkins, S., & Chappell, L. (2021). An Improvised Patchwork: Success and Failure in Cybersecurity Policy for Critical Infrastructure. Public Administration Review, 81(5), 847-861.
- Bampinas, G., & Panagiotidis, T. (2024). How would the war and the pandemic affect the stock and cryptocurrency cross-market linkages? Research in International Business and Finance, 70, 102272.
- Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & Díaz-Castaño, N. (2021). Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. European Societies, 23(S1), S47-S59.
- Carlo, A., & Obergfaell, K. (2024). Cyber attacks on critical infrastructures and satellite communications. International Journal of Critical Infrastructure Protection, 46, 100701.
- Carr, M. (2016). Public-private partnerships in national cyber-security strategies. International Affairs, 92(1), 43-62.
- CERT-UA. (2025). Cyber incidents overview.
- Cook, S., Giommoni, L., Trajtenberg Pareja, N., Levi, M., & Williams, M. L. (2023). Fear of Economic Cybercrime Across Europe: A Multilevel Application of Routine Activity Theory. The British Journal of Criminology, 63(2), 384-406.
- Dodel, M., & Mesch, G. (2019). An Integrated Model for Assessing Cyber-safety Behaviors: How Cognitive, Socioeconomic and Digital Determinants Affect Diverse Safety Practices. Computers & Security, 86, 75-91.
- European Commission. (2022). Digital Public Administration factsheet 2022.
- European Parliament. (2022). Russia’s War on Ukraine: Timeline of Cyber-Attacks.
- European Union Agency for Cybersecurity (ENISA). (2023). ENISA Threat Landscape 2023.
- Frandell, F., & Feeney, M. (2022). Cybersecurity Threats in Local Government: A Sociotechnical Perspective. The American Review of Public Administration, 52(8), 558-572.
- Fyshchuk, I., Mette Strange N., & Jeppe Agger N. (2025). Managing Cyberattacks in Wartime: The Case of Ukraine. Public Administration Review, 85(3), 619-627.
- Guitton, M. J., & Frechette, J. (2023). Facing cyberthreats in a crisis and post-crisis era: Rethinking security services response strategy. Computers in Human Behavior Reports, 10, 100282.
- Hui, K. L., Seung, H. K., & Qui-Hong, W. (2017). Cybercrime Deterrence and International Legislation: Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), 497-524.
- Lynch, III, T. F. (2024). Cyberspace: Great Power competition in a fragmenting domain. Orbis, 68(4), 607-623.
- Mamediieva, G., & Moynihan, D. (2023). Digital Resilience in Wartime: The Case of Ukraine. Public Administration Review, 83(6), 1512-1516.
- Miadzvetskaya, Y. (2024). EU sanctions in response to cyber-attacks as crime-based emergency measures. Computer Law & Security Review, 54, 106010.
- Moore, T. (2010). The economics of cybersecurity: Principles and policy options. International Journal of Critical Infrastructure Protection, 3(3), 103-117.
- Nobles, C. (2024). The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review. Procedia Computer Science, 239, 547-555.
- Norris, D. F., Mateczun, L., Hatcher, W., Meares, W., & Heslen, J. (2023). Local Government Cyber Insecurity: Causes and Recommendations for Improvement. Public Administration Review, 84(4), 651-59.
- Rogoff, K. (2022). The Long-Lasting Economic Shock of War. International Monetary Fund.
- Sanders, P., Bronk, C., & Bazilian, M. D. (2022). Critical energy infrastructure and the evolution of cybersecurity. The Electricity Journal, 35(10), 107224.
- Smith, B. (2022). Defending Ukraine: Early lessons from the cyber war. Microsoft Digital Threat Analysis Center.
- Song, U., Hur, G., Lee, S., & Park, J. (2024). Unraveling the dynamics of the cyber threat landscape: Major shifts examined through the recent societal events. Sustainable Cities and Society, 103, 105265.
- Streltsov, L. (2017). The System of Cybersecurity in Ukraine: Principles, Actors, Challenges, Accomplishments. European Journal for Security Research, 2(2), 147-184.
- Tiutiunyk, I. (2025). Cyber Resilience Determinants in Wartime and Post-Conflict Conditions: Evidence from a Six-Country Panel Dataset [Data set]. Zenodo.
- Ubowska, A., & Królikowski, T. (2022). Building a cybersecurity culture of public administration system in Poland. Procedia Computer Science, 207, 1242-1250.
- United Nations. (2025). Global Programme on Cybercrime.
- Virtanen, S. M. (2017). Fear of Cybercrime in Europe: Examining the Effects of Victimization and Vulnerabilities. Psychiatry, Psychology and Law, 24, 323-38.
- Yilma, K. M. (2014). Developments in cybercrime law and practice in Ethiopia. Computer Law & Security Review, 30(6), 720-735.


