<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cybersecurity as a catalyst for digital transformation and economic development: A fuzzy system dynamics approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nataliia Kasianova</string-name>
          <email>nataliia.kasianova@npp.nau.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Berik Akhmetov</string-name>
          <email>berik.akhmetov@yu.edu.kz</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Koverha</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Vovna</string-name>
          <email>oleksandr.vovna@knu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anna Maryna</string-name>
          <email>annamarina197@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yaroslav Krutohorskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>International Educators and Scholars Foundation</institution>
          ,
          <addr-line>Zvirenetska Str., 63, Kyiv, 01014</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>SHEI "Donbas State Pedagogical University"</institution>
          ,
          <addr-line>Naukova Str., 13, Dnipro, 49107</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska Str., 60, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>Microdistrict, 32, Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article substantiates the strategic role of cybersecurity as a key driver of digital transformation and economic growth. The novelty of the study lies in the development of a comprehensive model based on Fuzzy System Dynamics (FSD), which for the first time integrates the Cybersecurity Index and the Digital Economy and Society Index through four integral dimensions: technological infrastructure, economic resilience, human capital, and institutional environment. The proposed model enables the simulation of complex, nonlinear interrelations among these parameters, taking into account the uncertainty of both qualitative and quantitative data. A causal diagram has been created to illustrate the impact of cybersecurity on digital development through feedback loops. Empirical modeling based on data from more than 80 countries has made it possible to form a matrix positioning them according to integral indicators. The results obtained expand the understanding of the role of digital security in economic policy and can be used for strategic planning and the formulation of national digital strategies.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cybersecurity</kwd>
        <kwd>digital transformation</kwd>
        <kwd>economic development</kwd>
        <kwd>modeling</kwd>
        <kwd>fuzzy system dynamics</kwd>
        <kwd>causal diagram</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The modern global economy is undergoing an unprecedented transformation driven by the rapid
development of information and communication technologies (ICT) and the widespread
implementation of digital innovations. The data-driven digital economy, based on network interactions and
automated processes, opens up broad opportunities for enhancing productivity, creating new markets,
and optimizing economic activity. However, this innovative paradigm generates complex digital risks,
among which cyber threats are paramount. Economic losses from cybercrime, amounting to trillions of
dollars annually, underscore the need to reconsider cybersecurity as a strategic economic asset that
plays a central role in digital transformation and economic development. According to estimates by
Cybersecurity Ventures, global losses from cybercrime exceeded $8 trillion in 2023, and are projected to
grow to $10.5 trillion by 2025, surpassing the GDP of most countries worldwide [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. According to the
Global Risks Report 2023 prepared by the World Economic Forum, cyber threats have entered the top
ifve most critical global challenges of our time [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        The issue of digital security becomes particularly acute in the context of hybrid threats and
cyberattacks targeting critical infrastructure. For instance, the large-scale attack on the Colonial Pipeline in the
United States in 2021 resulted not only in disruption of energy supply but also caused direct economic
damages estimated at over $200 million, including ransom payments, logistical losses, and a decline in
public trust [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        In Germany in 2020, an attack on the university hospital in Düsseldorf led to the shutdown of
IT systems and ultimately the death of a patient – highlighting not only the economic, but also the
humanitarian consequences of cyber incidents [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In the United Kingdom, the WannaCry ransomware
attack on the National Health Service (NHS) in 2017 cost the budget over £92 million after 19,000
appointments were cancelled [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        In Ukraine, the cybersecurity situation is no less critical due to the ongoing cyber warfare since
2022, which afects the public, military, and private sectors. According to expert estimates, in 2023, the
vulnerability detection and response system processed about 18 billion information security events
detected through monitoring tools and telemetry data analysis. Of these, 133 million were suspicious
events, 148,000 were critical events indicative of potential cyber incidents, and 1,105 confirmed cyber
incidents were recorded – 62.5% more compared to 2022 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Cyberattacks have become a tool for
destabilizing the macroeconomic situation, afecting the banking system, energy infrastructure, and
information space.
      </p>
      <p>The growth in the number, complexity, and international nature of cyberattacks, as well as the scale
of their economic and social consequences, necessitate a deeper understanding of cybersecurity as
a component of economic policy. Cybersecurity has become an integral part of national economic
development. As digitalization advances, protecting information systems, data, and critical infrastructure
acquires strategic importance for the modernization of economies and their integration into global
digital markets. In this context, cybersecurity becomes a key precondition for investment attractiveness,
innovation activity, and the economic resilience of a country in the face of global competition.</p>
      <p>The complexity of interconnections between cybersecurity, digital transformation, and economic
development, as well as the high level of uncertainty in assessing these processes, requires the application
of innovative methodologies such as fuzzy system dynamics.</p>
      <p>
        Fuzzy system dynamics, integrating the principles of system dynamics and fuzzy logic, enables
the modeling of interrelations between system elements, taking into account qualitative data and
uncertainty [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7, 8, 9</xref>
        ]. This approach makes it possible to analyze the impact of cybersecurity on the
digital development of the national economy and propose an adaptive tool for shaping the state’s digital
policy.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Related work</title>
      <p>Cybersecurity as a scientific category is increasingly viewed not in isolation within the protection of
information systems but as an integral component of the digital economy. Its significance is manifested
not only in safeguarding critical resources but also in influencing macroeconomic processes, particularly
investment attractiveness, labor market stability, the development of innovation infrastructure, and the
formation of institutional trust.</p>
      <p>
        The studies of Li Shuzhun and M. Hadjieleftheriou deepen the understanding of cybersecurity by
focusing on its regulatory and policy aspects. The authors emphasize that a comprehensive regulatory
framework and strategic policy are key to building trust in digital markets, directly contributing to the
competitiveness of the digital economy [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Significant contributions to the study of the economic aspects of cybersecurity have been made by R.
Anderson, who argues that efective protection mechanisms are not only a technical issue but also an
economic one, as low levels of cybersecurity lead to substantial economic losses and reduced economic
activity. This underscores the need to integrate cybersecurity into economic strategies [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        An innovative approach is represented by the cybersecurity investment model proposed by L. Gordon
and M. Loeb [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The Gordon-Loeb model provides analytical tools for the optimal allocation of
resources, maximizing the benefits of cybersecurity investments while minimizing costs. This is crucial
for managerial decision-making in digital security, allowing the assessment of risk-cost trade-ofs/
      </p>
      <p>
        In Ukraine, the issue of cybersecurity in the context of economic development is gaining increasing
attention. In particular, Tkachuk L. and Movchanyuk M. substantiates the need for the formation of
a national digital security strategy as a component of national security and economic growth. She
emphasizes that without systematic management of digital risks, sustainable development during the
country’s digital transformation is impossible [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        Yu. Kindzerskyi’s research focuses on the economic consequences of cyber threats, highlighting their
negative impact on investment and the development of digital infrastructure. He identifies institutional
issues that slow down the mitigation of cyber risks and pose a threat to economic development [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        One of the key ideas proposed by [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] is the distinction between digital security at the macro and micro
levels, where the macro level refers to the security of the state’s overall information-digital environment,
and the micro level relates to the ability of enterprises to secure their own digital information . This
approach enables the alignment of national cybersecurity policy with the practical needs of businesses,
which is highly relevant in the context of hybrid threats and wartime.
      </p>
      <p>
        Recent studies increasingly focus on the quantitative assessment of the impact of cybersecurity on
digital development. For example, Y. Bilan et al. explored the impact of information and communications
technology (ICT) on economic growth, showing that countries with high levels of cybersecurity
(according to the National Cyber Security Index, NCSI) demonstrate higher digitalization and productivity
indicators [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. However, the authors note the lack of models linking cybersecurity with macroeconomic
strategies.
      </p>
      <p>
        The application of system dynamics allowed O. Rehman and V. Ali (2021) to model supply chain
resilience to cyber threats, highlighting the capacity of this method to predict long-term economic
consequences [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. However, the proposed model does not account for the uncertainty inherent in
cyber risks, limiting its practical applicability.
      </p>
      <p>
        Despite significant progress, major gaps remain in the scientific literature. First, there is a lack of
comprehensive metrics to assess cybersecurity in the context of a country’s digital and economic
development. For example, the NCSI developed by the e-Governance Academy [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] evaluates cybersecurity
through 46 indicators but does not link it to economic indicators such as ICT investment or the Human
Development Index. Second, regulatory mechanisms often lag behind the dynamics of digital threats,
necessitating new approaches to cybersecurity management. Third, the shortage of cybersecurity
specialists creates a bottleneck for implementing technologically complex projects. Finally, the absence
of models integrating cybersecurity with the key dimensions of a country’s digital development
(technological infrastructure, economic resilience, human capital, institutional environment) limits forecasting
and policy development opportunities.
      </p>
      <p>This article aims to substantiate the fundamental relationship between cybersecurity and national
economic development by developing a comprehensive model based on fuzzy system dynamics that
integrates the cybersecurity indicator (National Cyber Security Index, NCSI) with an integral assessment
of the country’s digital development. The assessment covers key components of digital development:
human capital (reflecting intellectual and educational potential), technological infrastructure (the
foundation of digitalization), economic resilience (a prerequisite for financial and economic stability), and
institutional factors (ensuring efective development management). The application of fuzzy system
dynamics enables the modeling of complex interconnections while accounting for the uncertainty of
qualitative and quantitative data, allowing forecasts of the impact of cybersecurity on digital
transformation and economic growth. It provides recommendations for strategic digital development policy
planning. Thus, the study is aimed at creating an analytical tool for assessing the contribution of
cybersecurity to building a resilient economy and integrating the country into global digital markets.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Data and methodology</title>
      <p>The methodological relationship between digital security and national economic development must
be analyzed within a systemic context. In this framework, digital security emerges as a system of
interconnected institutional, technological, legal, and social factors that ensure the continuity and
security of digital interactions across all spheres of public life. Accordingly, any disruption of digital
stability – whether caused by a cyberattack or the absence of regulatory oversight – can have systemic
economic consequences. In particular, such disruptions may generate cascading efects that undermine
macroeconomic stability by eroding trust in digital systems, reducing investment activity, and disrupting
the functioning of critical infrastructure.</p>
      <p>
        From the standpoint of institutional economics, digital security ensures the transparency and
consistency of the "rules of the game" in the digital environment. It creates the preconditions for the
efective enforcement of contracts, reduces transaction costs, and strengthens trust among investors
and consumers of digital services. In this sense, digital security functions as an intangible institution
that guarantees economic equilibrium under conditions of digital transformation. For instance, efective
cybersecurity regulation helps to reduce information asymmetry between economic agents, which,
according to the theory of institutional economics, enhances the eficiency of market interactions [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>Moreover, a secure digital environment is essential for the development of digital infrastructure,
including the Internet of Things, cloud services, mobile banking, and e-government. Any technical
progress without an adequate security system increases risks, hampers the scaling of digital solutions,
lowers the eficiency of public investments, and slows innovative growth. In particular, insuficient
levels of cybersecurity can create barriers to the adoption of advanced technologies such as artificial
intelligence or blockchain, which require high levels of data protection.</p>
      <p>
        In the socio-economic dimension, digital security is closely linked to digital inclusion – the
population’s ability to fully access and utilize digital services regardless of age, income, or place of residence.
Inadequate security in educational or medical digital services restricts citizens’ participation in the
digital economy, deepens inequality, and impedes human capital development. This link is confirmed by
empirical data: countries with high levels of cybersecurity (as measured by NCSI) demonstrate higher
levels of digital inclusion, correlating with the Human Development Index (HDI) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        At the macroeconomic level, digital security directly afects the economic security of the state.
Strategically, it ensures the continuity of operations of critical infrastructure, including energy, transport,
communications, and the banking sector. Its efective functioning is a prerequisite for the stability
of public governance, capital markets, and fiscal policy implementation. For example, cyberattacks
on critical infrastructure, as in the case of Colonial Pipeline [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] demonstrate how breaches of digital
security can cause direct economic damage and destabilize markets.
      </p>
      <p>Thus, digital security is an integral element of the national economic system, with a complex
interdisciplinary nature and a multi-level hierarchy of influence – from the technological level to the
level of strategic planning. Its methodological analysis requires the integration of principles from
institutional, neoclassical, and digital economics, as well as national security theory. To model these
complex relationships, it is advisable to apply fuzzy system dynamics (FSD), which accommodates data
uncertainty and nonlinear interactions among technological infrastructure (TI), economic resilience (ES),
human potential (HP), and the institutional environment (IE). This approach facilitates the creation of
adaptive models that reflect causal relationships between cybersecurity (NCSI) and digital development
(DESI), contributing to the design of strategies for enhancing economic competitiveness. Such an
approach enables a comprehensive assessment of the role of digital security as an indicator of a
state’s economic maturity and as a guarantor of its competitiveness in the context of global digital
transformation.</p>
      <p>
        From an economic perspective, the chain "digital security → digital development → national economic
development" follows the fundamental logic that security is a necessary precondition for the sustainable
and efective deployment of digital technologies, which in turn become the main driver of economic
growth. This chain reflects a causal relationship where digital security serves as a catalyst, ensuring the
stability and trust necessary for scaling digital innovations [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        First, digital security minimizes the risks of losses and disruptions associated with cyber incidents,
which can cause significant direct and indirect economic damages—from the loss of consumer trust to the
need for large financial expenditures to restore systems. Reliable security systems reduce uncertainty in
the digital environment, stimulating trust from investors, users, and businesses. For example, according
to [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], optimal cybersecurity investments can reduce economic losses from cyberattacks by up to
80%, confirming its role as an economic asset. Furthermore, a high level of cybersecurity helps lower
insurance premiums for businesses and increases their readiness for digital transformation.
      </p>
      <p>
        Second, digital development is a consequence of investments in digital technologies, infrastructure,
human capital, and innovation. This development directly depends on efective digital security:
businesses and public institutions are more likely to adopt new digital solutions, expand e-services, and
create innovative products when confident in the protection of information assets. This generates a
multiplier efect for the economy, increasing productivity and competitiveness. In particular, countries
with a high level of cybersecurity (according to NCSI) demonstrate higher ICT investment and
innovation activity, which correlates with the Digital Economy and Society Index (DESI) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. This efect is
especially pronounced in data-dependent sectors such as fintech and e-commerce.
      </p>
      <p>
        Third, digital development transforms the national economy by expanding access to global markets,
creating new areas of activity, increasing resource management eficiency, and stimulating innovation.
As a result, the country achieves sustainable economic growth, GDP growth, and improved social welfare.
Digital development also promotes integration into global value chains, which, according to OECD
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], can increase national GDP by 1–2% provided an adequate level of digital security. For example,
countries with advanced digital infrastructure and high NCSI levels, such as Singapore and Denmark,
demonstrate higher economic growth rates compared to countries with low levels of cybersecurity.
      </p>
      <p>Thus, digital security creates the conditions for uninterrupted and reliable digital development, which
in turn forms the basis for modernization and national economic growth. This relationship forms
a reinforcing loop, where improvements in cybersecurity stimulate digital development, and digital
development, in turn, generates demand for enhanced security systems.</p>
      <p>
        However, despite the obvious importance of this aspect, a unified approach to quantitatively
measuring digital security and digital development as components of a state’s economic resilience is still absent
in both scientific and applied fields. Most existing approaches focus either on purely technological
indicators or on formal legal criteria, which does not fully capture the complex interrelations between
digital security and national economic development. For example, the Global Cybersecurity Index (GCI)
focuses on technical and legal aspects but ignores socio-economic factors such as human capital or
institutional trust. Similarly, DESI covers digital development but does not integrate cybersecurity as a
key factor. To overcome these gaps, it is proposed to use fuzzy system dynamics (FSD), which allows the
modeling of nonlinear interconnections between technological infrastructure (TI), economic resilience
(ES), human potential (HP), and the institutional environment (IE), while accounting for uncertainty
and qualitative data [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Assessing a country’s digital development is a key component in analyzing modern economic
transformation and integration into the global digital space. Several methodological approaches exist for
measuring this phenomenon, each with its advantages and limitations that determine its applicability
in various contexts. Moreover, digital development, as a complex phenomenon, encompasses not
only technological aspects but also socio-economic, institutional, and security factors, requiring an
integrative assessment approach [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>
        First, the index-based approach relies on the formation of composite digital development indices that
aggregate various indicators – from Internet accessibility and digital infrastructure to levels of digital
literacy and the use of digital technologies in business. One of the best-known is the Digital Economy
and Society Index (DESI) developed by the European Commission [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. The advantage of this approach
is its comprehensiveness and the ability to compare across countries, as well as the dynamic nature
of the index, which is updated annually. However, the index approach is often criticized for excessive
universality, which may not reflect the specifics of national economies, and for requiring a large volume
of data that may not always be available or of suficient quality [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. Furthermore, DESI does not fully
integrate cybersecurity indicators, such as the National Cyber Security Index (NCSI), limiting its ability
to assess the security dimension of digital development.
      </p>
      <p>
        Second, a systems approach views digital development through the lens of interactions among
infrastructure, the regulatory environment, human capital, and innovation culture. R. Atkinson and A.
McKay [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] emphasize the importance of comprehensive analysis of systemic factors shaping a country’s
digital ecosystem. This approach enables a deeper understanding of the relationships and factors that
promote or hinder digital transformation. At the same time, its disadvantages include the complexity of
modeling and quantitatively assessing all systemic components simultaneously. The systems approach
also complicates the accounting of nonlinear efects, such as cascading failures from cyberattacks, which
requires dynamic modeling. In an increasingly turbulent economic environment characterized by digital
transformation and environmental challenges, the concept of balanced national economic development
is acquiring new strategic significance. The focus is shifting from linear planning to an integrated,
multifactor assessment of economic resilience and adaptability under dynamic conditions. At the same
time, classical strategic analysis tools are unable to adequately account for the fuzziness, contradictions,
ambiguity, and nonlinearity of interrelations between economic, social, environmental, and innovation
determinants of digital development. For example, traditional models, such as regression analysis, do
not account for qualitative variables, such as trust in digital systems or subjective perceptions of cyber
threats. This necessitates intelligent models based on processing linguistic variables, weakly structured
data, feedback dynamics, and development scenarios.
      </p>
      <p>
        Fuzzy logic makes it possible to formalize complex managerial assessments based on expert judgments,
while system dynamics helps identify delayed efects of strategic decisions and feedback loops in
governance. The combination of these approaches creates the foundation for building an integral model
of balanced digital development, relevant to contemporary challenges. This combination, known as
fuzzy system dynamics (FSD), enables the modeling of complex interconnections between cybersecurity
(NCSI) and digital development (DESI), accounting for data uncertainty and nonlinear efects [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        System Dynamics as a Tool for Strategic Modeling was initiated by J. Forrester [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and later adapted
to the management of large-scale economic systems in the works of K. Richardson [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] and J. Sterman
[
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. These studies emphasize the significance of nonlinear interdependencies between subsystems,
time delays, amplification (or attenuation) efects, and similar dynamics. Particularly promising is the
policy design through feedback loops approach, which facilitates the evaluation of long-term efects of
strategic decisions (e.g., the implementation of a cybersecurity enhancement policy may have a delayed
efect on ICT investment growth through increased business trust).
      </p>
      <p>
        On the other hand, fuzzy logic methods are increasingly employed to formalize complex managerial
assessments, especially under conditions of information scarcity or vague definitions of strategic
parameters. These approaches are based on the ideas of L. Zadeh [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and are applied in the assessment
of innovation activity, environmental load, financial sustainability, among other areas [
        <xref ref-type="bibr" rid="ref28 ref29">28, 29</xref>
        ]. Fuzzy
logic allows for the processing of qualitative assessments such as "high/medium/low protection level",
which is especially critical for countries with limited data availability.
      </p>
      <p>The integration of fuzzy logic and system dynamics remains at the conceptual development stage;
however, selected studies have demonstrated the efectiveness of this combined approach in modeling
strategic interactions among digital development factors. The fuzzy system dynamics (FSD) approach
integrates:</p>
      <p>1) system dynamics – to represent dynamic interrelationships through stocks, flows, and feedback
loops (reinforcing and balancing);</p>
      <p>2) fuzzy logic – to handle uncertainty in qualitative or imprecise data (e.g., "high / medium / low level
of cybersecurity") via membership functions and Fuzzy Inference Systems (FIS) [Zadeh, 1965]. FSD
enables the construction of causal loop diagrams that illustrate interconnections among technological
infrastructure (TI), economic sustainability (ES), human potential (HP), and institutional environment
(IE).</p>
      <p>In the process of formalizing a methodology for assessing digital development, particular importance
is placed on the selection of indicators that can serve as generalized (integral) metrics for specific
assessment dimensions. Given the multidimensional nature of digital security, the substantiated choice of such
indicators ensures a balance between analytical depth and practical model applicability. This selection
is based on criteria of international standardization, data availability, and relevance to cybersecurity
and digital development.</p>
      <p>
        The first key group of indicators characterizes the state of digital transformation’s technological
infrastructure, as the technical foundation is critical for all digital processes, including those related to
security. Within this group, the level of broadband Internet access is proposed as a core indicator. It
captures both physical accessibility to digital resources and the population’s potential to participate in
the digital environment. Broadband connectivity underpins not only the digital economy but also the
efective operation of defensive infrastructures that must respond to threats in real time. Furthermore,
this indicator is internationally standardized and widely available in open databases from ITU and
the World Bank. For instance, countries with high broadband coverage (over 80% of households)
demonstrate higher NCSI scores, indicating their capacity to maintain digital security [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>
        The second dimension involves the economic capacity of the state to ensure digital security. Here, the
key indicator is gross national income per capita (GNI per capita). This metric reflects not only overall
welfare levels but also the availability of resources for investing in complex digital protection systems,
human capital development, and infrastructure modernization. Countries with high GNI exhibit greater
expenditure capacity for digital security in both the public and corporate sectors. Globally, GNI is often
used as a proxy indicator of investment potential in innovation-driven sectors, including cybersecurity.
Notably, the correlation between GNI per capita and cybersecurity spending reaches 0.75 among OECD
countries, highlighting the economic dimension of digital security [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        Equally important is human potential, which shapes the quality of users’ digital behavior, threat
awareness, and, consequently, the overall vulnerability of a country to cyberattacks and lapses in
information hygiene. In this context, the Human Development Index (HDI) – which includes life
expectancy, education level, and income – is the most comprehensive representation. It consolidates
key social aspects that determine not only digital literacy but also the overall societal capacity to adapt
to digital challenges. HDI also correlates with digital inclusion indicators (r = 0.65), confirming its role
in reducing cyber risk through education [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ].
      </p>
      <p>
        The fourth component is the institutional environment, which influences the efectiveness of digital
security policy implementation, transparency of processes, and responsiveness to cyber threats within
public governance. The most informative indicator in this case is the Worldwide Governance Indicators
(WGI), developed by Transparency International. Among them, the indicator of government
efectiveness was selected. It reflects perceptions of the quality of public services, the civil service’s quality
and its independence from political pressure, the quality of policy formulation and implementation,
and confidence in the government’s commitment to these policies. Government efectiveness strongly
correlates (r = 0.82) with NCSI, underscoring its key role in building institutional trust in cybersecurity
[
        <xref ref-type="bibr" rid="ref31">31</xref>
        ].
      </p>
      <p>Thus, for each of the four domains – technological, economic, social, and institutional – a
representative integral indicator has been substantiated, capable of meaningfully reflecting the essence of the
corresponding component of digital security. The subsequent combination of these variables within
a fuzzy logic model enables the construction of an adaptive index of digital development relevant
to the conditions of a specific country or region. These indicators form the basis for developing an
adaptive digital development index via a Fuzzy Inference System (FIS), which integrates NCSI and DESI
within the FSD model. Further formalization of the model involves building a causal loop diagram to
depict feedback between these variables and performing scenario analysis to evaluate the impact of
cybersecurity policy on economic development.</p>
      <p>
        Based on a comparative analysis of the literature, recommendations from international organizations
(ITU, World Bank, UNDP, OECD), and the logic of structural modeling of digital environments, a
generalized indicator system was developed, consisting of logical blocks presented in Table 1. This
system reflects a multidimensional approach to assessing digital development by integrating quantitative
and qualitative aspects, aligned with the contemporary challenges of global digital transformation [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ].
      </p>
      <p>ICT trade balance</p>
      <p>ICTB</p>
      <p>Direct use
Direct use</p>
      <p>Composite index
Average speed of fixed
broadband (5GB
minimum plan)
Relative cost of 5GB
ifxed broadband
package as % of GNI per
capita
Level of digital
economy development
Economic Stability (ES)</p>
      <p>Excessive debt reduces
investment potential
Macroeconomic
instability
Limits domestic digital
market and inclusion
Financial flexibility for
digital challenges
Country’s capacity to
invest in digitalization</p>
      <p>Essential for the development of
egovernment, online services, and digital
commerce.</p>
      <p>A basic level of digital access enabling
online learning, e-commerce, and digital
services. 10 Mbit/s is the minimum quality
threshold.</p>
      <p>Reflects afordability of basic internet
access. &lt;2% GNI p.c. is considered afordable
by ITU; &gt;5% is a significant barrier.</p>
      <p>Indicates the country’s capacity to
produce and export ICT products. A higher
balance reflects technological maturity.</p>
      <p>An aggregated measure of a country’s
technological potential.</p>
      <p>Higher debt limits strategic investments
in security, infrastructure, and digital
projects.</p>
      <p>High inflation devalues resources, limits
planning, and hinders digital project
financing.</p>
      <p>Reflects low employment and
productivity, limiting tax revenue and demand for
digital services.</p>
      <p>High reserves act as a bufer during crises,
including cyber threats. Indicator of
macroeconomic resilience.</p>
      <p>Key indicator of prosperity. Higher GNI
reflects greater ability to invest in
infrastructure and digital security.</p>
      <p>Reflects the quality and accessibility of
education, impacting digital competencies.</p>
      <p>Represents health, welfare, and social
stability—factors influencing digital
adoption.</p>
      <p>Higher MPI indicates limited access to
basic resources, restricting digital inclusion
and increasing cyber risks.</p>
      <p>Shows national commitment to education,
including development of digital skills.</p>
      <p>Strongly correlates with digital literacy,
responsibility, and institutional capacity.</p>
      <p>High CPI suggests transparent
processes—vital for trust in digital services
and data protection.</p>
      <p>Reflects public trust, well-being, and
willingness to use e-services.</p>
      <p>High EPI suggests mature institutions,
often correlating with digital maturity.</p>
      <p>Higher values reflect inequality, reducing
digital inclusiveness and increasing social
risks.</p>
      <p>The application of this particular system of indicators, in combination with fuzzy logic methods (FIS
modeling), facilitates the construction of an adaptive, multidimensional framework for assessing digital
security and development. This framework captures both quantitative and qualitative aspects of the
functioning of the digital environment at the national level. At its core, the model is structured around
two key variables – the Digital Economy and Society Index (DESI) and the National Cyber Security
Index (NCSI). These variables function as stocks, synthesizing the contributions of four principal
dimensions: technological infrastructure (TI), encompassing metrics such as broadband access, the
development of e-government, ICT investment, and related indicators; economic sustainability (ES),
reflecting macroeconomic variables including public debt, investment in cybersecurity, and economic
losses stemming from cyber threats; human potential (HP), capturing indicators of education, well-being,
poverty levels, and workforce development in the field of cybersecurity; institutional environment (IE),
which comprises corruption levels, government efectiveness, legislative frameworks for cybersecurity,
and indices of trust and happiness. As detailed in Table 1, these dimensions constitute a comprehensive
system of indicators that reflect both direct and mediated influences on cybersecurity and digital
development, thereby ensuring their relevance across countries with diverse economic and social
contexts.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental results</title>
      <p>
        A causal diagram enables the modeling of interrelationships between cybersecurity— quantified via
the National Cyber Security Index (NCSI) – and a country’s digital development, structured according
to the four dimensions outlined in Table 1. This diagram, partially presented in graphviz.pdf, reveals
nonlinear interactions among TI, ES, HP, and IE. These relationships are empirically validated by
observed correlations between NCSI and DESI (r = 0.68 for 93 countries, 2023) [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>
        The causal scheme (Figure 1) illustrates both reinforcing and balancing feedback loops among these
dimensions. Specifically, an increase in cybersecurity capacity (NCSI) contributes to the advancement of
the digital economy (DESI) through enhancements in technological infrastructure, growth in investment,
human capital development, and the reduction of corruption. Conversely, higher levels of digital
development increase investment attractiveness, stimulate economic growth, and create favorable
conditions for the further strengthening of cybersecurity. For instance, countries with high NCSI scores,
such as Estonia, demonstrate more rapid DESI growth, driven by the synergistic interplay between
cybersecurity and e-governance [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        The proposed causal diagram represents the dynamic interdependence between cybersecurity –
measured by the National Cyber Security Index (NCSI) – and digital development, evaluated through
the Digital Economy and Society Index (DESI). The diagram integrates the fuzzy system dynamics (FSD)
approach, which combines classical system dynamics – characterized by stocks, flows, and feedback
loops – with fuzzy logic, thus enabling efective analysis under uncertainty and when working with
qualitative data [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. This hybrid approach ofers deeper insights into the manner in which each of the
four dimensions afects DESI and NCSI, and how these indices interact, forming a complex system of
interdependencies.
      </p>
      <p>System dynamics models the flows of investment into technology, education, and cybersecurity,
as well as feedback mechanisms, which can be either reinforcing (positive) or balancing (negative).
For example, an increase in NCSI may stimulate digital development, which in turn fosters economic
growth and encourages further investment in cybersecurity. Simultaneously, cyber threats or economic
constraints can act as limiting factors within this process.</p>
      <p>Fuzzy logic allows the incorporation of linguistic variables such as "low", "medium", and "high" levels
of specific indicators through a system of fuzzy inference rules (FIS). This feature is especially critical
when working with incomplete or subjective data – such as corruption indices or education levels.</p>
      <p>To synthesize the multifactorial characteristics within each of the four domains, FIS modeling is
applied using the Matlab programming environment (Figure 2). For each block (TI, ES, HP, IE), a separate
FIS is specified, receiving a set of input indicators. Membership functions describe the degree to which
each input indicator is classified as "low", "medium", or "high". FIS rules define the logical integration
and conditional relationships between input variables and the resulting aggregate indicator for each
dimension. For instance, within the TI block, a FIS rule might state: "If BRA is high and IDI is high,
then TI is high", reflecting the synergy between broadband access and ICT development.</p>
      <p>The composite Digital Economy and Society Index (DESI) is formulated as a function of four integral
FIS-derived indicators, each representing a key national component: technological, economic, human,
and institutional. These aggregated indicators capture the overall condition of a country within each
dimension. The interrelation with the National Cyber Security Index (NCSI) is twofold: beyond its direct
influence on these four components, the integral indicators also interact with NCSI through DESI via
feedback loops, either reinforcing or ofsetting the impact of cybersecurity on digital development. For
instance, a low level of institutional environment (IE) – reflected in a high Corruption Perceptions Index
(CPI) – may introduce a balancing feedback loop, thereby constraining the efect of a high NCSI score on
DESI due to corruption-related barriers. The application of fuzzy logic enables the qualitative assessment
of indicator states using the categories "low/medium/high". This capability is particularly critical in
contexts where precise data are unavailable, or where multi-component socio-economic processes must
be evaluated under uncertainty. The results of the fuzzy modeling of the digital development index
across countries are presented in Table 2.</p>
      <p>In parallel, the level of cybersecurity is assessed using the National Cyber Security Index (NCSI),
which is based on 46 indicators covering legislative, organizational, educational, and technical aspects
of cyber protection. The obtained DESI and NCSI values for various countries are used to construct
a positioning matrix, where the horizontal axis represents the level of digital development and the
vertical axis represents the cybersecurity index (Figure 3). The matrix is divided into nine quadrants,
allowing for a classification of countries based on their degree of digital maturity and cybersecurity.
This segmentation enables a more nuanced classification, which is critical for diferentiated strategic
management.</p>
      <p>1. Low DESI / Low NCSI: Countries with limited digital development and low cybersecurity levels,
such as Mauritania, Mozambique, and Guatemala. These nations exhibit weak infrastructure, low
investment in digital technologies, and insuficient legal frameworks for cyber protection. Strategic
challenges: Development of basic digital infrastructure, legislative formation, and improving cyber
literacy.</p>
      <p>2. Low DESI / Medium NCSI: Countries with low digital integration but moderate cybersecurity
levels (Nigeria, Botswana, Montenegro), possibly due to targeted cybersecurity initiatives. Strategic
challenges: Accelerating digital transformation while maintaining and enhancing cybersecurity.</p>
      <p>3. Low DESI / High NCSI: Countries with limited digital development but high cybersecurity levels
(e.g., Czech Republic, Turkey, Serbia), indicating a prioritization of security even amid limited resources.
Strategic challenges: Leveraging cybersecurity strengths to accelerate digital transformation.</p>
      <p>4. Medium DESI / Low NCSI: Countries with moderate digital development but insuficient
cybersecurity (Mexico, Zimbabwe, Bosnia and Herzegovina). Strategic challenges: Strengthening cybersecurity
to ensure the stability of digital services.</p>
      <p>5. Medium DESI / Medium NCSI: Countries with moderate levels of both digital integration and
cybersecurity (Chile, Argentina, Oman). Strategic challenges: Balancing digital infrastructure development
with improved cyber resilience.</p>
      <p>6. Medium DESI / High NCSI: Countries with strong cybersecurity and medium levels of digital
development (Estonia, Croatia, Ukraine). Strategic challenges: Using cybersecurity as a competitive
advantage to stimulate the digital economy.</p>
      <p>7. High DESI / Low NCSI: Countries with high digital integration but inadequate cybersecurity (none
identified). Strategic challenges: Immediate enhancement of cybersecurity to prevent major cyber
incidents.</p>
      <p>8. High DESI / Medium NCSI: Countries with an advanced digital economy but moderate cybersecurity
levels (China). Strategic challenges: Increasing cyber resilience to maintain user and investor trust.</p>
      <p>9. High DESI / High NCSI: Countries with high levels of both digital development and cybersecurity,
representing leaders in digital transformation (USA, Singapore, Poland).</p>
      <p>Strategic challenges: Sustaining leadership through innovation, continuous cybersecurity
improvement, and human capital development.</p>
      <p>Thus, the causal diagram and the country positioning matrix based on the Digital Economy and
Society Index (DESI) and the National Cyber Security Index (NCSI) constitute two complementary
components of an integrated study of digital development and cybersecurity.</p>
      <p>The causal diagram models the deep cause-efect relationships among the key components of digital
transformation – technological infrastructure, economic resilience, human capital, and institutional
environment – and their influence on the integral indices DESI and NCSI. It reflects dynamic processes,
including investment flows, reinforcing and balancing feedback loops, and accounts for data uncertainty
using fuzzy logic. This systems-based approach allows for a better understanding of how interactions
among these factors shape a country’s level of digital development and cybersecurity, as well as their
mutual impact. The positioning matrix, in turn, is a practical tool based on modeling results and
empirical data that enables the classification of countries by digital maturity (DESI) and cybersecurity
(NCSI) into nine quadrants (low, medium, high for each dimension). It visualizes countries’ current
states, identifies their strengths and weaknesses, and helps prioritize strategic development areas.</p>
      <p>Therefore, the causal diagram provides the theoretical and methodological foundation by explaining
the mechanisms of index formation and interaction, while the positioning matrix transforms this
knowledge into a practical format for analysis, comparison, and decision-making. Together, they form
an integrated system that combines deep systems analysis with applied analytics, supporting efective
digital transformation planning and cybersecurity enhancement at both national and international
levels.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>This study proposes an innovative approach to assessing the impact of cybersecurity and digital
development in countries using a Fuzzy System Dynamics (FSD) model. The core of the approach lies
in integrating fuzzy logic with system dynamics to model the nonlinear interdependencies between
cybersecurity and digital development across four dimensions: technological infrastructure, economic
resilience, human capital, and institutional environment. The novelty of the approach lies in:
1. Using Fuzzy Inference Systems (FIS) to manage data uncertainty, allowing the model to adapt to
countries with incomplete statistical data.</p>
      <p>2. Creating a causal diagram that models reinforcing and balancing feedback loops.
3. Unlike traditional index-based or regression-based methods, FSD accounts for nonlinearity,
dynamics, and qualitative variables, enabling a deeper understanding of complex interrelations.</p>
      <p>Another fundamentally new aspect is the combination of quantitative data normalization with fuzzy
set theory, which avoids rigid threshold-based decisions and better reflects the real functioning of
digital systems. Traditional methods often ignore the non-linear nature of digital development, which
depends on the dynamic interaction of factors that cannot always be precisely measured. Therefore,
the model is built as a Fuzzy Inference System (FIS) to formalize the causal relationships between input
variables (e.g., institutional trust, digital accessibility, macroeconomic stability) and the resulting level
of digital security. Moreover, the proposed system is open to extension and adaptation, as each group
of indicators can be detailed or replaced depending on the specific country, its strategic priorities, or
available statistical sources. The model can also be integrated with existing digital indices such as the
Global Cybersecurity Index, Network Readiness Index, or Digital Economy and Society Index (DESI) —
serving not as an alternative, but as an analytical supplement focused on deeper internal evaluation.</p>
      <p>Key contributions of scientific novelty:
1. Systemic structuring of digital development across functional dimensions, covering both
technological and socio-institutional aspects.</p>
      <p>2. Use of internationally recognized composite indicators as a representative foundation.
3. Application of fuzzy logic methods to model complex inter-factor relationships under uncertainty.
4. Adaptability of the model to various strategic analysis scenarios and digital transformation policy
monitoring.</p>
      <p>The proposed model can serve as a basis for developing national digital capacity rankings, as a tool
for rapid diagnostics of the digital environment, and for evaluating the efectiveness of public policies in
the field of cybersecurity and digital development. This approach demonstrates strong potential as a tool
for shaping efective digital policy. The FSD model provides a comprehensive view of the interrelations
between cybersecurity and digital development, contributing to enhancing the competitiveness of
countries in the global digital landscape.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Morgan</surname>
          </string-name>
          , Cybercrime to cost
          <source>the world $10.5 trillion annually by</source>
          <year>2025</year>
          ,
          <year>2021</year>
          . URL: https:// cybersecurityventures.com/cybercrime-damages-6
          <string-name>
            <surname>-</surname>
          </string-name>
          trillion-by-
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>World</given-names>
            <surname>Economic</surname>
          </string-name>
          <string-name>
            <surname>Forum</surname>
          </string-name>
          ,
          <source>Global Risks Report</source>
          <year>2023</year>
          ,
          <year>2023</year>
          . URL: https://www.weforum.org/reports/ global-risks
          <source>-report-2023.</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3] The New York Times,
          <article-title>Cyberattack Forces a Shutdown of a Top U</article-title>
          .S. Pipeline,
          <year>2021</year>
          . URL: https: //www.nytimes.com/
          <year>2021</year>
          /05/08/us/politics/cyberattack-colonial-pipeline.html.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>DW</given-names>
            <surname>News</surname>
          </string-name>
          ,
          <article-title>Police probe lethal cyberattack on hospital</article-title>
          ,
          <year>2020</year>
          . URL: https://www.dw.com/en/ german-police
          <article-title>-probe-negligent-homicide-in-hospital-cyberattack/a-54970859.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>National</given-names>
            <surname>Health</surname>
          </string-name>
          <string-name>
            <surname>Executive</surname>
          </string-name>
          ,
          <source>WannaCry cyber-attack cost the NHS £92m after 19</source>
          ,000 appointments were cancelled,
          <year>2018</year>
          . URL: https://surl.lu/rrjkqw.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] State Service for Special Communications and Information Protection of Ukraine, Report of the Cyber Incident Response Center of the State Cyber Security Center</article-title>
          ,
          <year>2023</year>
          . URL: https://surl.li/ yglmbx.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Zadeh</surname>
          </string-name>
          , Fuzzy sets,
          <source>Information and Control</source>
          <volume>8</volume>
          (
          <year>1965</year>
          )
          <fpage>338</fpage>
          -
          <lpage>353</lpage>
          . doi:
          <volume>10</volume>
          .1016/ S0019-
          <volume>9958</volume>
          (
          <issue>65</issue>
          )
          <fpage>90241</fpage>
          -
          <lpage>X</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Forrester</surname>
          </string-name>
          , Industrial Dynamics, Pegasus Communications, Waltham, MA,
          <year>1961</year>
          . URL: https: //surl.lu/bbgxxt.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Averyanova</surname>
          </string-name>
          , et al.,
          <article-title>UAS cyber security hazards analysis and approach to qualitative assessment</article-title>
          , in: S. Shukla,
          <string-name>
            <given-names>A.</given-names>
            <surname>Unal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. V.</given-names>
            <surname>Kureethara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mishra</surname>
          </string-name>
          , D. Han (Eds.),
          <source>Data Science and Security</source>
          , volume
          <volume>290</volume>
          <source>of Lecture Notes in Networks and Systems</source>
          , Springer, Singapore,
          <year>2021</year>
          , pp.
          <fpage>258</fpage>
          -
          <lpage>265</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-16-4486-3_
          <fpage>28</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>F.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hadjieleftheriou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Kollios</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Reyzin</surname>
          </string-name>
          ,
          <article-title>Dynamic authenticated index structures for outsourced databases</article-title>
          ,
          <source>IEEE Transactions on Information Forensics and Security</source>
          <volume>13</volume>
          (
          <year>2017</year>
          )
          <fpage>70</fpage>
          -
          <lpage>84</lpage>
          . URL: https://www.cs.bu.edu/~reyzin/papers/auth-db.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Anderson</surname>
          </string-name>
          , Security Engineering:
          <article-title>A Guide to Building Dependable Distributed Systems</article-title>
          , Wiley,
          <year>2008</year>
          . URL: https://www.cl.cam.ac.uk/~rja14/book.html.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Gordon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Loeb</surname>
          </string-name>
          ,
          <article-title>The economics of information security investment</article-title>
          ,
          <source>ACM Transactions on Information and System Security</source>
          <volume>5</volume>
          (
          <year>2002</year>
          )
          <fpage>438</fpage>
          -
          <lpage>457</lpage>
          . doi:
          <volume>10</volume>
          .1145/581271.581274.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          , M. T. Movchanyuk,
          <article-title>Information security as a component of the national security of ukraine, in: Abstracts of the reports of the All-Ukrainian scientific and practical Internet conference of students, postgraduates and young scientists “Youth in science: research, problems, prospects” (MN-</article-title>
          <year>2021</year>
          ), Vinnytsia,
          <year>2021</year>
          . URL: https://surli.cc/bbvjye.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Kindzerskyi</surname>
          </string-name>
          ,
          <article-title>Cybersecurity and the formation of the digital economy: problems of interconnection, Economics Bulletin 3 (</article-title>
          <year>2020</year>
          )
          <fpage>18</fpage>
          -
          <lpage>26</lpage>
          . URL: https://doi.org/10.33271/ebdut/71.018. doi:
          <volume>10</volume>
          .33271/ebdut/71.018.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>N.</given-names>
            <surname>Kasianova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bilichenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Severynenko</surname>
          </string-name>
          ,
          <article-title>Modeling digital security of an enterprise</article-title>
          ,
          <source>Modern Economics</source>
          <volume>39</volume>
          (
          <year>2023</year>
          )
          <fpage>54</fpage>
          -
          <lpage>61</lpage>
          . doi:
          <volume>10</volume>
          .31521/modecon.
          <source>V39</source>
          (
          <year>2023</year>
          )
          <article-title>-08.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bilan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Oliinyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Mishchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Skare</surname>
          </string-name>
          ,
          <article-title>Impact of information and communications technology on the development and use of knowledge</article-title>
          ,
          <source>Technological Forecasting and Social Change</source>
          <volume>191</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1016/j.techfore.
          <year>2023</year>
          .
          <volume>122519</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>O.</given-names>
            <surname>Rehman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ali</surname>
          </string-name>
          ,
          <article-title>Enhancing healthcare supply chain resilience: decision-making in a fuzzy environment</article-title>
          ,
          <source>The International Journal of Logistics Management</source>
          <volume>33</volume>
          (
          <year>2022</year>
          )
          <fpage>520</fpage>
          -
          <lpage>546</lpage>
          . doi:
          <volume>10</volume>
          .1108/ IJLM-01-2021-0004.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>National</given-names>
            <surname>Cyber Security Index</surname>
          </string-name>
          ,
          <source>National Cyber Security Index Methodology</source>
          ,
          <year>2025</year>
          . URL: https: //ncsi.ega.ee/methodology/.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>D. C.</surname>
          </string-name>
          <article-title>North, Institutions, institutional change and economic performance</article-title>
          , Cambridge University Press,
          <year>1990</year>
          . URL: https://doi.org/10.1017/CBO9780511808678.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <source>[20] OECD, Digital Economy Outlook</source>
          <year>2020</year>
          ,
          <year>2020</year>
          . URL: https://doi.org/10.1787/bb167041-en.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D. P.</given-names>
            <surname>Möller</surname>
          </string-name>
          , Guide To Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices, Springer,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>European</surname>
            <given-names>Commission</given-names>
          </string-name>
          ,
          <source>Digital Economy and Society Index (DESI)</source>
          ,
          <year>2020</year>
          . URL: https:// digital-strategy.ec.europa.eu/en/policies/desi.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>ITU</surname>
          </string-name>
          ,
          <source>Measuring digital development: Facts and Figures</source>
          <year>2024</year>
          ,
          <year>2024</year>
          . URL: https://www.itu.int/hub/ publication/D-IND-ICT_MDD-2024-4/.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>R. D.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. S. McKay</surname>
          </string-name>
          ,
          <source>Digital Prosperity: Understanding the Economic Benefits of the Information Technology Revolution</source>
          ,
          <year>2007</year>
          . URL: http://dx.doi.org/10.2139/ssrn.1004516.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>B.</given-names>
            <surname>Kosko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Toms</surname>
          </string-name>
          ,
          <article-title>Fuzzy thinking: The new science of fuzzy logic</article-title>
          , Flamingo, London,
          <year>1994</year>
          . URL: https://reasonpapers.com/pdf/19/rp_19_
          <fpage>20</fpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>G. P.</given-names>
            <surname>Richardson</surname>
          </string-name>
          ,
          <source>Feedback Thought in Social Science and Systems Theory</source>
          , University of Pennsylvania Press,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Sterman</surname>
          </string-name>
          ,
          <article-title>Business dynamics: Systems thinking and modeling for a complex world, Irwin/McGraw-</article-title>
          <string-name>
            <surname>Hill</surname>
          </string-name>
          ,
          <year>2000</year>
          . URL: https://surl.li/wqtqhw.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <article-title>Fuzzy set theory -</article-title>
          and
          <source>its applications</source>
          , 4th ed., Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2010</year>
          . URL: https://doi.org/10.1007/
          <fpage>978</fpage>
          -94-007-0849-0.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>C.</given-names>
            <surname>Kahraman</surname>
          </string-name>
          ,
          <article-title>Fuzzy multi-criteria decision making</article-title>
          , Springer,
          <year>2008</year>
          . URL: https://surli.cc/jaguxd.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <source>[30] UNDP, Human Development Report</source>
          <year>2021</year>
          /
          <year>2022</year>
          ,
          <year>2021</year>
          . URL: https://hdr.undp.org/en/content/ human-development
          <source>-report-2021-22.</source>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>World</surname>
            <given-names>Bank</given-names>
          </string-name>
          ,
          <source>Worldwide Governance Indicators</source>
          <year>2023</year>
          ,
          <year>2023</year>
          . URL: https://info.worldbank.org/ governance/wgi/.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>S.</given-names>
            <surname>Saeed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Altamim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Alkayyal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Alshehri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Alabbad</surname>
          </string-name>
          ,
          <article-title>Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations</article-title>
          ,
          <source>Sensors</source>
          <volume>23</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/s23156666.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>