Author
Abstract
The article outlines the role of digital sovereignty in national security of the state. The relevance of its formation and maintenance is due to the intensive speed of global digital transformation. Studying the structure and content of digital sovereignty is an extremely important task in conditions of instability in the macroeconomic environment. The constant increase in the volume of information and generated data and the necessity of its protection creates new difficulties and threats in matters of information security. The work identifies the main components of digital sovereignty, the key ones are the data sovereignty and technological sovereignty. The concept and features of “technological sovereignty†, modern approaches to its development are analyzed, and the need for their practical implementation is substantiated .both at the state level and at the level of business processes participants. The main objective is to provide an integrated approach to the issue in compliance with basic principles, among which regulatedness, clarity, openness, simplicity and compatibility come to the fore. Research shows that the level of technological independence in Russia is gradually increasing. It is a consequence of active support from the government which was intensified due to the current political situation and sanctions pressure on Russian business; an increase in the index of output of goods and services for basic types is the best confirmation that those measures are effective.
Suggested Citation
N. M. Gasanova, 2025.
"Ensuring the technological sovereignty of the state in the context of digital transformation,"
RSUH/RGGU BULLETIN. Series Economics. Management. Law, Russian State University for the Humanities (RSUH), issue 1.
Handle:
RePEc:aca:journl:y:2025:id:627
DOI: 10.28995/2073-6304-2025-1-69-81
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aca:journl:y:2025:id:627. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Ð ÐµÐ´Ð°ÐºÑ†Ð¸Ñ (email available below). General contact details of provider: .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.