Please use this identifier to cite or link to this item:
http://rps.chtei-knteu.cv.ua:8585/jspui/handle/123456789/2836| Title: | The Role of Artificial Intelligence Technologies in Rebuilding the Post-war Economy and Ensuring Cyber Security: An Example from Ukraine |
| Authors: | Вдовічена, Ольга Геннадіївна / Vdovichena, Olha Кримська, Анна Олександрівна / Krymska, Anna Королюк, Юрій Григорович / Koroliuk, Yurii Шимко Алла Василівна / Shymko, Alla Вдовічен, Анатолій Анатолійович / Vdovichen, Anatolii |
| Keywords: | economic recovery cyber security post-conflict regulation digital transformation Scopus |
| Issue Date: | Feb-2025 |
| Publisher: | THE ROLE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES IN REBUILDING THE POST-WAR ECONOMY AND ENSURING CYBER SECURITY: AN EXAMPLE FROM UKRAINE / O. Vdovichena, A . Krymska, Y. Koroliuk, A. Shymko, A. Vdovichen // Salud, Ciencia y Tecnología – Serie de Conferencias [Internet]. – 2025. – № 4. – 642. – DOI: 10.56294/sctconf2025642. |
| Abstract: | This paper explores the dual role of artificial intelligence (AI) technologies in Ukraine’s post-war economic recovery and cybersecurity using Agent-Based Modeling (ABM). The simulation reveals that sectors like manufacturing and banking rapidly adopt AI due to clear productivity and security benefits, leading to positive spillover effects across the broader economy. However, slower adoption in sectors such as agriculture and retail highlights the need for government intervention, such as subsidies and tax incentives, to ensure a balanced recovery. In cybersecurity, AI-enhanced defence mechanisms significantly improve threat detection and response, though they also introduce new vulnerabilities, requiring continuous system updates to stay ahead of evolving threats. The findings emphasise the importance of strategic AI adoption and adaptive cybersecurity policies in Ukraine’s post-war context, with implications for future economic stability and national security. The study also identifies critical areas for future research, including data validation and further exploration of AI vulnerabilities. |
| URI: | http://rps.chtei-knteu.cv.ua:8585/jspui/handle/123456789/2836 |
| Appears in Collections: | 2025 |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| SCTCONF_2025_642.pdf | основний текст | 472.71 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.