Militarization Development in Cybersecurity and Shift in Poland’s Security Strategy After Russia-Ukraine War
Keywords:
Military Modernization, Cyber Security, Cyber Space, Security Shift, Security StrategyAbstract
The article focuses on how Russian-Ukraine War change concept of security in Europe. the study also elaborates the larger framework of national security, how war on Ukraine security concern of Europe and especially for Poland which share a boarder with Ukraine and military and cyber security development in reaction to counter Russia.the effects of this War on the dynamics of European security cannot be undermined. This research offers a thorough analysis Poland’s policy and strategy shift in security, with a Lens of balance of power theory to maintain balance of power, which this battle has altered in the region. It explores emphasis of how nations, such as Poland prioritized defense measures and fostered regional cooperation in response to tackle security concerns and a powerful enemy. It also takes into account that, beside alliance with NATO, which was as external balance of power measure and remains trustful, Poland shifts its strategy to internal balance of power approach by build its own military capabilities in conventional, cyber security and cyberspace.
Downloads
References
Bogusz, D. (2024). Polish Air Force.
Burant, S. R. (1993). International relations in a regional context: Poland and its eastern Neighbours—Lithuania, Belarus, Ukraine. Europe-Asia Studies, 45(3), 395-418.
Dorn, F. P. (2024). European Defence Spending in 2024 and Beyond: How to Provide Security in an Econo-mically Challenging Environment. Institute-Leibniz Institute for Economic Research at the University of Munich.
Dorobisz, J. (2024). Analysis of trends and risks in the field of network security based on statistical data. GIS Odyssey Journal, 147-163.
Gill, B. L. (2024). Geopolitics, Military Modernisation and the Future of the Indo-Pacific. Taylor & Francis.
Grobelny, Z. K. (2023). Defense and deterrence as the foundation of the a2/ad system in smart city air defense. Safety & Defense, 14-23.
Humayun, M. N. (2020). Cyber security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering, 3171-3189.
Jang, W. J. (2023). The Rise of Korea's Defense Industry in the New Global Security Paradigm. Korea Institute for Industrial Economics and Trade, 23-37.
Kamiński, M. A. (2023). Poland’s Threat Assessment. Prism, 0(2), 130-147.
Karpiuk, M. M. (2023). The role of the Cybersecurity Strategy of the Republic of Poland in ensuring cybersecurity. . Polish Political Science Yearbook, 155-163.
Kivimäki, T. (. (2012). Southeast Asia and conflict prevention. The Pacific Review, 25(4), 403-427.
Kolisnichenko, P. (2025). Poland’s Digital Leap: Progress, Challenges and Opportunities. Digital Transformation and IT Implementation. Driving Sustainable Development Across Nations, 153-182.
Lin, H. (2022). Russian cyber operations in the invasion of Ukraine. The Cyber Defense Review, 31-46.
Liu, X. (2016). Anarchy in the East: Eurocentrism, China-centred geopolitics and uneven and combined development. International Politics, 53, 574-595.
Lubiejewski, S. (2023). Conclusions from the use of aviation in the first half of the first year of the Ukrainian-Russian war. Security and Defence Quarterly, 42(2), 68-10.
Mix, D. E. (2023). Poland: Background and Us Relations. Current Politics & Economics of Europe, 34.
Mukarzel, R. (2023). The Russo-Ukrainian war and its transformative impact on European security dynamics: shifting power, emerging challenges, and future implications. Doctoral dissertation, Notre Dame University-Louaize).
Muzyka, K. (2020). Russian Forces in the Western Military District. Center for Naval Analyses (CNA).
Siemieniak, M. (2024). Analysis of the use in Polish industry of modern technology resources as tools for building smart structures. Zeszyty Naukowe Politechniki Poznańskiej.
Śledź, P. (2024). The restructuring process of the Polish defence industry in the twenty-first century: doing more of the same while expecting different results. Defense & Security Analysis, 1-20.
Żurawski, S. C. (2025). Effectiveness of information security incident management systems: identifying practices, challenges and development perspectives.
Downloads
Published
Data Availability Statement
The data that support the findings of this study are available from the corresponding author upon reasonable request.
License
Copyright (c) 2025 Mussa Iqbal, Rami Bashir, Umme- e- Rubab (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.



