{"id":48285,"date":"2025-11-26T17:53:15","date_gmt":"2025-11-26T17:53:15","guid":{"rendered":"https:\/\/www.globacademy.org\/?page_id=48285"},"modified":"2025-12-30T00:55:44","modified_gmt":"2025-12-30T00:55:44","slug":"cybersecurity-and-emerging-disruptive-technologies-research-hub","status":"publish","type":"page","link":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/","title":{"rendered":"Digital Security and Disruptive Technologies Research Group (DST\u00b2)"},"content":{"rendered":"\n<p><em>Digital Security and Disruptive Technologies Research Group (DST\u00b2) <\/em>is an interdisciplinary research group dedicated to examining how digital threats and emerging&amp;disruptive technologies (EDTs) shape international security, global power relations, and governance frameworks.<\/p>\n\n\n\n<p><em>(DST\u00b2) <\/em>focuses on a broad range of EDTs-including artificial intelligence (AI), autonomous and networked systems, and novel digital capabilities-and examines how these technologies transform the nature of conflict, competition, and cooperation in global politics. In this context, technology is understood as a dual-force: simultaneously enhancing security capacities while generating new risks and disruptions-a duality reflected in the squared notation (T\u00b2) that underpins the research groups\u2019 analytical perspective.<\/p>\n\n\n\n<p>Positioned at the intersection of International Relations, Security Studies, Cybersecurity, and Science &amp; Technology Studies, <em>(DST\u00b2) <\/em>investigates how rapid technological changes affect state behaviour, strategic interaction, and the regulation of digital and physical domains. Its research agenda addresses themes such as cyber and hybrid operations, digital resilience, algorithmic governance, institutional adaptation to automation, and the broader geopolitical implications of technology-driven rivalry.<\/p>\n\n\n\n<p>Methodologically, the <em>(DST\u00b2) <\/em>integrates qualitative and quantitative research, computational social science, discourse and network analysis, and strategic foresight. It aims to combine theoretical depth with policy relevance by producing research that links technological innovation to questions of security, power, sovereignty, and global governance. Beyond academic inquiry, the Hub prioritises policy-oriented outputs and capacity-building activities to support responsible, evidence-based governance of cybersecurity and EDTs at national, regional, and global levels.<\/p>\n\n\n\n<p><strong>Research Agenda of DST\u00b2<\/strong><\/p>\n\n\n\n<p><strong><em>Emerging &amp; Disruptive Technologies and Geopolitical Rivalry: <\/em><\/strong>Examining how EDTs and evolving cyber-threats intensify interstate rivalry, reshape patterns of conflict and cooperation, and redefine defence, deterrence, and strategic behaviour. This agenda analyses how AI-enabled operations, advanced cyber capabilities, and other EDTs shift the balance of power and create new geopolitical asymmetries in a rapidly changing technological environment.<\/p>\n\n\n\n<p><strong><em>Cybersecurity and AI-Driven Threats: <\/em><\/strong>Analysing how EDTs transform the cyber threat landscape, accelerate offensive and defensive capabilities, deepen digital interdependence, and challenge state security. This includes studying cyber operations, hybrid and grey-zone activities, disinformation ecosystems, critical infrastructure vulnerabilities, and the governance of cyberspace.<\/p>\n\n\n\n<p><strong><em>Cyber-Attacks, Emerging &amp; Disruptive Technologies in Global Governance: <\/em><\/strong>Exploring how cyber-attacks, AI, quantum technologies, autonomous systems, and other EDTs disrupt existing institutions, norms, and regulatory frameworks. Particular attention is given to accountability, ethical use, transparency, norm-setting, and the challenges of governing dual-use and rapidly evolving technologies.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Group Members<\/h4>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/www.globacademy.org\/en\/atakan-yilmaz\/\"><img decoding=\"async\" width=\"964\" height=\"1024\" src=\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png\" alt=\"\" class=\"wp-image-48367\" style=\"width:216px;height:auto\" srcset=\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png 964w, https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz-282x300.png 282w, https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz-768x816.png 768w\" sizes=\"(max-width: 964px) 100vw, 964px\" \/><\/a><figcaption class=\"wp-element-caption\">Dr. Atakan Y\u0131lmaz<br><em>Coordinator<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.globacademy.org\/en\/cem-savas\/\"><img decoding=\"async\" width=\"682\" height=\"1024\" src=\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Cem-Savas-682x1024.jpeg\" alt=\"\" class=\"wp-image-48369\" style=\"width:152px;height:auto\" srcset=\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Cem-Savas-682x1024.jpeg 682w, https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Cem-Savas-200x300.jpeg 200w, https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Cem-Savas-768x1152.jpeg 768w, https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Cem-Savas.jpeg 853w\" sizes=\"(max-width: 682px) 100vw, 682px\" \/><\/a><figcaption class=\"wp-element-caption\">Asst. Prof. Cem Sava\u015f<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.globacademy.org\/en\/ethem-ilbiz\/\"><img decoding=\"async\" width=\"875\" height=\"1024\" src=\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Ethem-Ilbiz-875x1024.jpeg\" alt=\"\" class=\"wp-image-48371\" style=\"width:197px;height:auto\" srcset=\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Ethem-Ilbiz-875x1024.jpeg 875w, https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Ethem-Ilbiz-256x300.jpeg 256w, https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Ethem-Ilbiz-768x899.jpeg 768w, https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Ethem-Ilbiz-1312x1536.jpeg 1312w, https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Ethem-Ilbiz.jpeg 1367w\" sizes=\"(max-width: 875px) 100vw, 875px\" \/><\/a><figcaption class=\"wp-element-caption\">Dr. Ethem \u0130lbiz<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.globacademy.org\/en\/v-mert-nacar\/\"><img decoding=\"async\" width=\"204\" height=\"270\" src=\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/M.Vahap-.png\" alt=\"\" class=\"wp-image-48373\"\/><\/a><figcaption class=\"wp-element-caption\">V. Mert Nacar<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Security and Disruptive Technologies Research Group (DST\u00b2) is an interdisciplinary research group dedicated to examining how digital threats and emerging&amp;disruptive technologies (EDTs) shape international security, global power relations, and governance frameworks. (DST\u00b2) focuses on a broad range of EDTs-including artificial intelligence (AI), autonomous and networked systems, and novel digital capabilities-and examines how these technologies [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-48285","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Security and Disruptive Technologies Research Group (DST\u00b2) - Global Academy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Security and Disruptive Technologies Research Group (DST\u00b2) - Global Academy\" \/>\n<meta property=\"og:description\" content=\"Digital Security and Disruptive Technologies Research Group (DST\u00b2) is an interdisciplinary research group dedicated to examining how digital threats and emerging&amp;disruptive technologies (EDTs) shape international security, global power relations, and governance frameworks. (DST\u00b2) focuses on a broad range of EDTs-including artificial intelligence (AI), autonomous and networked systems, and novel digital capabilities-and examines how these technologies [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/\" \/>\n<meta property=\"og:site_name\" content=\"Global Academy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-30T00:55:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png\" \/>\n\t<meta property=\"og:image:width\" content=\"964\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/\",\"url\":\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/\",\"name\":\"Digital Security and Disruptive Technologies Research Group (DST\u00b2) - Global Academy\",\"isPartOf\":{\"@id\":\"https:\/\/www.globacademy.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png\",\"datePublished\":\"2025-11-26T17:53:15+00:00\",\"dateModified\":\"2025-12-30T00:55:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#primaryimage\",\"url\":\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png\",\"contentUrl\":\"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/www.globacademy.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Security and Disruptive Technologies Research Group (DST\u00b2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.globacademy.org\/#website\",\"url\":\"https:\/\/www.globacademy.org\/\",\"name\":\"Global Academy\",\"description\":\"Global Academy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.globacademy.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Security and Disruptive Technologies Research Group (DST\u00b2) - Global Academy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/","og_locale":"en_US","og_type":"article","og_title":"Digital Security and Disruptive Technologies Research Group (DST\u00b2) - Global Academy","og_description":"Digital Security and Disruptive Technologies Research Group (DST\u00b2) is an interdisciplinary research group dedicated to examining how digital threats and emerging&amp;disruptive technologies (EDTs) shape international security, global power relations, and governance frameworks. (DST\u00b2) focuses on a broad range of EDTs-including artificial intelligence (AI), autonomous and networked systems, and novel digital capabilities-and examines how these technologies [&hellip;]","og_url":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/","og_site_name":"Global Academy","article_modified_time":"2025-12-30T00:55:44+00:00","og_image":[{"width":964,"height":1024,"url":"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/","url":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/","name":"Digital Security and Disruptive Technologies Research Group (DST\u00b2) - Global Academy","isPartOf":{"@id":"https:\/\/www.globacademy.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#primaryimage"},"image":{"@id":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png","datePublished":"2025-11-26T17:53:15+00:00","dateModified":"2025-12-30T00:55:44+00:00","breadcrumb":{"@id":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#primaryimage","url":"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png","contentUrl":"https:\/\/www.globacademy.org\/wp-content\/uploads\/2025\/12\/Atakan-Yilmaz.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.globacademy.org\/en\/cybersecurity-and-emerging-disruptive-technologies-research-hub\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/www.globacademy.org\/en\/"},{"@type":"ListItem","position":2,"name":"Digital Security and Disruptive Technologies Research Group (DST\u00b2)"}]},{"@type":"WebSite","@id":"https:\/\/www.globacademy.org\/#website","url":"https:\/\/www.globacademy.org\/","name":"Global Academy","description":"Global Academy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.globacademy.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.globacademy.org\/en\/wp-json\/wp\/v2\/pages\/48285"}],"collection":[{"href":"https:\/\/www.globacademy.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.globacademy.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.globacademy.org\/en\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.globacademy.org\/en\/wp-json\/wp\/v2\/comments?post=48285"}],"version-history":[{"count":3,"href":"https:\/\/www.globacademy.org\/en\/wp-json\/wp\/v2\/pages\/48285\/revisions"}],"predecessor-version":[{"id":48396,"href":"https:\/\/www.globacademy.org\/en\/wp-json\/wp\/v2\/pages\/48285\/revisions\/48396"}],"wp:attachment":[{"href":"https:\/\/www.globacademy.org\/en\/wp-json\/wp\/v2\/media?parent=48285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}