<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.4 20241031//EN" "https://jats.nlm.nih.gov/archiving/1.4/JATS-archive-oasis-article1-4-mathml3.dtd">
<article xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" xml:lang="ru"><front><journal-meta><issn publication-format="print">2411-1406</issn><issn publication-format="electronic">2411-1406</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.17059/ekon.reg.2025-4-5</article-id><title-group xml:lang="en"><article-title>Changing Government Approaches to Technological Development:  Results of a Cross-Country Assessment of Security Strategies</article-title></title-group><title-group xml:lang="ru"><article-title>Изменение государственных подходов к технологическому развитию: результаты межстрановой оценки стратегий безопасности</article-title></title-group><contrib-group><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6807-6074</contrib-id><name-alternatives><name xml:lang="en"><surname>Mikhaylova </surname><given-names>Anna A. </given-names></name><name xml:lang="ru"><surname>Михайлова</surname><given-names>Анна Алексеева </given-names></name></name-alternatives><email>tikhonova.1989@mail.ru</email><xref ref-type="aff" rid="aff1"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">Immanuel Kant Baltic Federal University</institution></aff><aff><institution xml:lang="ru">Балтийский федеральный университет им. И. Канта</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2025-10-01" publication-format="electronic"/><volume>21</volume><issue>4</issue><fpage>977</fpage><lpage>998</lpage><history><date date-type="received" iso-8601-date="2025-04-26"/><date date-type="accepted" iso-8601-date="2025-06-30"/></history><permissions><copyright-statement xml:lang="ru">Copyright © 2025  </copyright-statement><copyright-year>2025</copyright-year><copyright-holder xml:lang="ru"> </copyright-holder><ali:free_to_read/><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><ali:license_ref>https://creativecommons.org/licenses/by/4.0/</ali:license_ref></license></permissions><self-uri content-type="html" mimetype="text/html" xlink:title="article webpage" xlink:href="https://www.economyofregions.org/ojs/index.php/er/article/view/1236">https://www.economyofregions.org/ojs/index.php/er/article/view/1236</self-uri><self-uri content-type="pdf" mimetype="application/pdf" xlink:title="article pdf" xlink:href="https://www.economyofregions.org/ojs/index.php/er/article/download/1236/497">https://www.economyofregions.org/ojs/index.php/er/article/download/1236/497</self-uri><abstract xml:lang="en"><p>Interest in critical and cross-cutting technologies is steadily growing, as many countries view them as key drivers of competitiveness and important instruments of geopolitical influence. While the concepts of technopolitics, techno-nationalism, technological sovereignty, and others have received scholarly attention, none of them provides a solid theoretical basis for a systematic comparison of various institutional approaches to technological development in the context of national security. Existing research rarely brings together institutional, economic, and geopolitical perspectives, leaving a gap in the assessment of national models of technological development. This article employs qualitative and quantitative analysis to identify how approaches to technological development have evolved in the security strategies of the United States, China, Russia, Japan, and the European Union in the post-Soviet period. The study draws on a qualitative examination of 34 official security documents. Current national strategies reflect a dual view of technologies, both as sources of threats and as resources for development, alongside a shift from a globalization-oriented model toward technological sovereignty. Technological development has broadened the spectrum of security concerns, with information and cybersecurity becoming particularly prominent. The study identifies the specific technologies prioritized by the United States, China, Russia, Japan, and the EU in their security strategies, together with a noticeable movement toward civil–military convergence. Shared goals across the examined countries and the EU include stimulating science and innovation, reducing reliance on foreign technologies, and developing high-tech industries. A comparison with data on integration into global supply chains, high-tech trade, and national R&amp;D spending shows varying degrees of progress toward achieving technological sovereignty. The USA and China demonstrate the strongest statistical progress, while Japan, the EU, and Russia continue to face structural constraints and critical dependencies that weaken their efforts in the security sphere.</p></abstract><abstract xml:lang="ru"><p>В политической повестке многих стран растет интерес к критическим и сквозным технологиям как основе конкурентоспособности и инструменту геополитического влияния. В научном плане получили развитие концепции технополитики, технонационализма, технологического суверенитета и ряд других, однако ни одна из них не предоставляет прочной теоретической основы для системного сравнения различных институциональных подходов к технологическому развитию в контексте национальной безопасности. Ощущается недостаток исследований, объединяющих анализ институциональных, экономических и геополитических факторов в отношении оценки государственных моделей технологического развития. Цель статьи — выявить с помощью методов качественного и количественного анализа, как в постсоветский период в стратегиях безопасности США, Китая, России, Японии и Европейского союза (ЕС) изменился подход к технологическому развитию. Методика исследования построена на качественном анализе текстов 34 официальных документов в области безопасности. В современных стратегиях отмечается двойственность представления технологий: как источника угроз и ресурса развития, с переходом от модели глобализации к технологическому суверенитету. Вследствие технологического развития отмечается расширение учитываемых видов безопасности с выделением информационной и кибербезопасности. В результате исследования определены конкретные технологии, на которые делают упор США, Китай, Россия, Япония и ЕС в своих стратегических документах, и характерный для них сдвиг к гражданско-военной конвергенции. Общими для изучаемых стран и ЕС являются задачи по стимулированию науки и инноваций, сокращению зависимости от иностранных технологий, развитию высокотехнологичных производств. Сопоставление с данными по интеграции в глобальные цепочки поставок, высокотехнологичной торговле, внутренним расходам на НИОКР позволило сделать вывод о прогрессе в достижении декларируемых целей, связанных с обеспечением технологического суверенитета в рассматриваемых странах. Лучшую статистическую динамику с позиции обеспечения технологического суверенитета демонстрируют США и Китай, в то время как у Японии, ЕС и России сохраняются нерешенные проблемы и критические структурные зависимости, снижающие их усилия в сфере безопасности.</p></abstract><kwd-group xml:lang="en"><kwd>technological sovereignty, technological innovation, cybersecurity, techno-nationalism, technological geopolitics, security strategy, digitalization, research and development</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>технологический суверенитет, технологические инновации, кибербезопасность, технонационализм, технологическая геополитика, стратегия безопасности, цифровизация, исследования и разработки</kwd></kwd-group></article-meta></front><body/><back><ack xml:lang="en"><p>The study is funded by the Russian Science Foundation, project No. 23-77-01101 “Geography of the cyberthreats and the problems of ensuring Russia’s national security in the digital realm”.</p></ack><ack xml:lang="ru"><p>Исследование выполнено при финансовой поддержке проекта РНФ № 23-77-01101 «География киберугроз и проблемы обеспечения национальной безопасности России в цифровой сфере».</p></ack><ref-list><ref id="ref1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Афонцев, С. А. (2024). Теоретическое измерение экономического суверенитета. Журнал Новой экономической ассоциации, (3(64)), 218–224. http://doi.org/10.31737/22212264_2024_3_218-224</mixed-citation><mixed-citation xml:lang="en">Afontsev, S. A. (2024). Theoretical dimensions of economic sovereignty. Zhurnal Novoi ekonomicheskoi assotsiatsii [Journal of the New Economic Association], (3(64)), 218–224. http://doi.org/10.31737/22212264_2024_3_218-224 (In Russ.) </mixed-citation></citation-alternatives></ref><ref id="ref2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Бекус, Н. (2022). Космическая технополитика и постколониальная современность в Казахстане. Вестник ЕНУ им. Л. Гумилева Серия: Исторические науки. Философия. Религиоведение, 141 (4), 218–238. http://doi.org/10.32523/2616–7255-2022-141-4-218-238 </mixed-citation><mixed-citation xml:lang="en">Bauer, M., &amp; Erixon, F. (2020). Europe’s quest for technology sovereignty: Opportunities and pitfalls (No. 02/2020). ECIPE Occasional Paper. https://ecipe.org/publications/europes-technology-sovereignty/ (Date of access: 10.09.2025). </mixed-citation></citation-alternatives></ref><ref id="ref3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Волошенко, К. Ю. (2024). Экономическая безопасность как фактор экономического развития российского эксклава в национальных интересах. Балтийский регион, 16 (4), 31–50. https://doi.org/10.5922/2079–8555-2024-4-2</mixed-citation><mixed-citation xml:lang="en">Bekus, N. (2022). Outer space techno-politics and postcolonial modernity in Kazakhstan. Vestnik ENU im. L. Gumileva Seriya: Istoricheskie nauki. Filosofiya. Religiovedenie [Bulletin of the L. N. Gumilyov ENU. Historical sciences. Philosophy. Religion Series], 141 (4), 218–238. http://doi.org/10.32523/2616–7255-2022-141-4-218-238 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Данилин, И. В., Селянин, Я. В. (2023). Гонка нанометров: американская политика в отношении Тайваня и Республики Корея. Мировая экономика и международные отношения, 67 (11), 80–88. https://doi.org/10.20542/0131–2227-2023-67-11-80-88</mixed-citation><mixed-citation xml:lang="en">Buzan, B., &amp; Wæver, O. (2009). Macrosecuritisation and security constellations: Reconsidering scale in securitisation theory. Review of International Studies, 35 (2), 253–276. https://doi.org/10.1017/S0260210509008511</mixed-citation></citation-alternatives></ref><ref id="ref5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Еремина, Н. В. (2025). Балтийский регион в британской стратегии безопасности после начала специальной военной операции России. Балтийский регион, 17 (1), 4–18. https://doi.org/10.5922/2079–8555-2025-1-1</mixed-citation><mixed-citation xml:lang="en">Buzan, B., &amp; Wæver, O. (2009). Macrosecuritisation and security constellations: Reconsidering scale in securitisation theory. Review of International Studies, 35 (2), 253–276. https://doi.org/10.1017/S0260210509008511</mixed-citation></citation-alternatives></ref><ref id="ref6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Капогузов, Е. А., Пахалов, А. М. (2024). Технологический суверенитет: концептуальные подходы и восприятие российскими академическими экспертами. Журнал Новой экономической ассоциации, (3(64)), 244–250. http://doi.org/10.31737/22212264_2024_3_244-250</mixed-citation><mixed-citation xml:lang="en">Chin, J. J., Skinner, K., &amp; Yoo, C. (2023). Understanding national security strategies through time. Foreign policy, 6 (4), 103–124. https://doi.org/10.26153/tsw/48842</mixed-citation></citation-alternatives></ref><ref id="ref7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Ленчук, Е. Б. (2024). Технологический суверенитет — новый вектор научно-технологической политики России. Журнал Новой экономической ассоциации, (3(64)), 232–237. http://doi.org/10.31737/22212264_2024_3_232-237 </mixed-citation><mixed-citation xml:lang="en">Crampton, J. W. (2015). Collect it all: national security, Big Data and governance. GeoJournal, 80(4), 519–531. https://doi.org/10.1007/s10708-014-9598-y</mixed-citation></citation-alternatives></ref><ref id="ref8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Матковская, Я. С. (2022). Техно-национализм и инновационное развитие современной экономики. Друкеровский вестник, (4), 49–64. http://doi.org/10.17213/2312–6469-2022-4-49-64 </mixed-citation><mixed-citation xml:lang="en">Danilin, I. V., &amp; Selyanin, Ya. V. (2023). Race for nanometers: American policy toward Taiwan and Republic of Korea. Mirovaya ekonomika i mezhdunarodnye otnosheniya [World Economy and International Relations], 67 (11), 80–88. https://doi.org/10.20542/0131–2227-2023-67-11-80-88 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Огородников, П. И., Залозная, Г. М., Боровский, А. С. (2018). Системный анализ обеспечения стабильности эффективного функционирования инновационной и цифровой экономики на основе интеллектуализации системы комплексной безопасности. Экономика региона, 14 (4), 1221–1231. https://doi.org/10.17059/2018-4-13 </mixed-citation><mixed-citation xml:lang="en">Donnelly, S., Ríos Camacho, E., &amp; Heidebrecht, S. (2023). Digital sovereignty as control: the regulation of digital finance in the European Union. Journal of European Public Policy, 31 (8), 2226–2249. https://doi.org/10.1080/13501763.2023.2295520</mixed-citation></citation-alternatives></ref><ref id="ref10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Паксютов, Г. Д. (2022). Японская индустрия полупроводников: актуальные тенденции и стратегическое значение. Проблемы Дальнего Востока, (6), 113–124. http://doi.org/10.31857/S013128120023340-5 </mixed-citation><mixed-citation xml:lang="en">Drezner, D. W. (2024, November 22). How everything became national security and national security became everything. Foreign Affairs, 103 (5). https://www.foreignaffairs.com/united-states/how-everything-became-national-security-drezner (Date of access: 04.02.2025).</mixed-citation></citation-alternatives></ref><ref id="ref11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Потапцева, Е. В., Акбердина, В. В., Пономарева, А. О. (2024). Концепция технологического суверенитета в современной государственной политике России. AlterEconomics, 21 (4), 818–842. https://doi.org/10.31063/AlterEconomics/2024.21-4.9 </mixed-citation><mixed-citation xml:lang="en">Eremina, N. V. (2025). The Baltic region in the British security strategy after the beginning of Russia’s special military operation. Baltiiskii region [Baltic Region], 17 (1), 4–18. https://doi.org/10.5922/2079–8555-2025-1-1 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Смородинская, Н. В., Катуков, Д. Д. (2024). Курс на технологический суверенитет: новый глобальный тренд и российская специфика. Балтийский регион, 16 (3), 108–135. https://doi.org/10.5922/2079–8555-2024-3-6</mixed-citation><mixed-citation xml:lang="en">Farid, A., &amp; Sarwar, G. (2024). Artificial intelligence and national security: future warfare implications for Pakistan. Annals of Human and Social Sciences, 5 (2), 446–459. </mixed-citation></citation-alternatives></ref><ref id="ref13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Супян, В. Б. (2019). Научные исследования в США: финансирование, структура, результаты. Журнал Новой экономической ассоциации, (1(41)), 201–207. https://doi.org/10.31737/2221–2264-2019-41-1-9</mixed-citation><mixed-citation xml:lang="en">Grant, P. (1983). Technological sovereignty: forgotten factor in the ‘hi-tech’ razzamatazz. Prometheus, 1(2), 239–270. https://doi.org/10.1080/08109028308628930</mixed-citation></citation-alternatives></ref><ref id="ref14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Сучков, М. А. (2022). «Геополитика технологий»: международные отношения в эпоху Четвертой промышленной революции. Вестник Санкт-Петербургского университета. Международные отношения, 15 (2),138–157. https://doi.org/10.21638/spbu06.2022.202</mixed-citation><mixed-citation xml:lang="en">Holmesm, K. R. (2015). What Is National Security? Heritage Foundation: Index of Military Strength, 17–26. https://www.heritage.org/military-strength-essays/2015-essays/what-national-security (Date of access: 04.09.2024).</mixed-citation></citation-alternatives></ref><ref id="ref15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Шевко, Н. Р., Казанцев, С. Я. (2020). Кибербезопасность: проблемы и пути решения. Вестник экономической безопасности, (5), 185–189. </mixed-citation><mixed-citation xml:lang="en">Kapoguzov, E. A., &amp; Pakhalov, A. M. (2024). Technological sovereignty: Conceptual approaches and perceptions by the Russian academic experts. Zhurnal Novoi ekonomicheskoi assotsiatsii [Journal of the New Economic Association], (3(64)), 244–250. http://doi.org/10.31737/22212264_2024_3_244-250 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Шестопал, С. С., Мамычев, А. Ю. (2020). Суверенитет в глобальном цифровом измерении: современные тренды. Балтийский гуманитарный журнал, 9 (1(30)), 398–403. https://doi.org/10.26140/bgz3-2020–0901-0098</mixed-citation><mixed-citation xml:lang="en">Kim, Y., &amp; Rho, S. (2024). The US–China chip war, economy–security nexus, and Asia. Journal of Chinese Political Science, 29 (3), 433–460. https://doi.org/10.1007/s11366-024-09881-7</mixed-citation></citation-alternatives></ref><ref id="ref17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Bauer, M., &amp; Erixon, F. (2020). Europe’s quest for technology sovereignty: Opportunities and pitfalls (No. 02/2020). ECIPE Occasional Paper. https://ecipe.org/publications/europes-technology-sovereignty/ (дата обращения: 10.09.2025). </mixed-citation><mixed-citation xml:lang="en">King, J. (2019). Commissioner King’s remarks at the 2019. Digital Resilience Summit of the Lisbon Council. https://ec.europa.eu/commission/presscorner/detail/en/speech_19_7261 (Date of access:10.09.2024).</mixed-citation></citation-alternatives></ref><ref id="ref18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Buzan, B. (2008). The Changing Agenda of Military Security. In H. G. Brauch et al. (Eds.), Globalization and Environmental Challenges. Hexagon Series on Human and Environmental Security and Peace, Vol. 3 (pp. 553–560). Springer: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-75977-5_41</mixed-citation><mixed-citation xml:lang="en">Koh, W. T. H. (2006). Singapore’s transition to innovation-based economic growth: infrastructure, institutions and government’s role. R&amp;D Management, 36 (2), 143–160. https://doi.org/10.1111/j.1467–9310.2006.00422.x</mixed-citation></citation-alternatives></ref><ref id="ref19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Buzan, B., &amp; Wæver, O. (2009). Macrosecuritisation and security constellations: Reconsidering scale in securitisation theory. Review of International Studies, 35 (2), 253–276. https://doi.org/10.1017/S0260210509008511</mixed-citation><mixed-citation xml:lang="en">Lenchuk, E. B. (2024). Technological sovereignty — a new trend in Russian scientific and technological policy. Zhurnal Novoi ekonomicheskoi assotsiatsii [Journal of the New Economic Association], (3(64)), 232–237. http://doi.org/10.31737/22212264_2024_3_232-237 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Chin, J. J., Skinner, K., &amp; Yoo, C. (2023). Understanding national security strategies through time. Foreign policy, 6 (4), 103–124. https://doi.org/10.26153/tsw/48842</mixed-citation><mixed-citation xml:lang="en">Lynn, L. &amp; Salzman, H. (2023). Techno-nationalism or building a global science and technology commons? (but what about China?). Global Policy, 14 (5), 832–846. https://doi.org/10.1111/1758–5899.13258</mixed-citation></citation-alternatives></ref><ref id="ref21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Crampton, J. W. (2015). Collect it all: national security, Big Data and governance. GeoJournal, 80 (4), 519–531. https://doi.org/10.1007/s10708-014-9598-y</mixed-citation><mixed-citation xml:lang="en">Matkovskaya, Ya. S. (2022). Techno-nationalism and innovative development of the contemporary economy. Drukerovskij vestnik, (4), 49–64. http://doi.org/10.17213/2312–6469-2022-4-49-64 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">Donnelly, S., Ríos Camacho, E., &amp; Heidebrecht, S. (2023). Digital sovereignty as control: the regulation of digital finance in the European Union. Journal of European Public Policy, 31 (8), 2226–2249. https://doi.org/10.1080/13501763.2023.2295520</mixed-citation><mixed-citation xml:lang="en">Mochinaga, D. (2020). The expansion of China’s digital silk road and Japan’s response. Asia Policy, 15 (1), 41–60. https://doi.org/10.1353/asp.2020.0005</mixed-citation></citation-alternatives></ref><ref id="ref23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">Drezner, D. W. (2024, November 22). How everything became national security and national security became everything. Foreign Affairs, 103 (5). https://www.foreignaffairs.com/united-states/how-everything-became-national-security-drezner (дата обращения: 04.02.2025).</mixed-citation><mixed-citation xml:lang="en">Mola, L. (2023). Fostering ‘European Technological Sovereignty’Through the CSDP: Conceptual and Legal Challenges. First Reflections Around the 2022 Strategic Compass. European Papers-A Journal on Law and Integration, 8(2), 459–474. https://doi.org/10.15166/2499–8249/667 </mixed-citation></citation-alternatives></ref><ref id="ref24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">Farid, A., &amp; Sarwar, G. (2024). Artificial intelligence and national security: future warfare implications for Pakistan. Annals of Human and Social Sciences, 5 (2), 446–459. </mixed-citation><mixed-citation xml:lang="en">Murphy, K. M., &amp; Topel, R. H. (2013). Some Basic Economics of National Security. American Economic Review, 103 (3), 508–511. https://doi.org/10.1257/aer.103.3.508</mixed-citation></citation-alternatives></ref><ref id="ref25"><label>25</label><citation-alternatives><mixed-citation xml:lang="ru">Grant, P. (1983). Technological sovereignty: forgotten factor in the ‘hi-tech’ razzamatazz. Prometheus, 1 (2), 239–270. https://doi.org/10.1080/08109028308628930</mixed-citation><mixed-citation xml:lang="en">Ogorodnikov, P. I., Zaloznaya, G. M., &amp; Borovsky, A. S. (2018). The system analysis of ensuring the stability of innovative and digital economy on the basis of intellectual comprehensive security system. Ekonomika regiona [Economy of Region], 14 (4), 1221–1231. https://doi.org/10.17059/2018-4-13 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref26"><label>26</label><citation-alternatives><mixed-citation xml:lang="ru">Holmesm, K. R. (2015). What Is National Security? Heritage Foundation: Index of Military Strength, 17–26. https://www.heritage.org/military-strength-essays/2015-essays/what-national-security (дата обращения: 04.09.2024).</mixed-citation><mixed-citation xml:lang="en">Okhrimenko, I., Stepenko, V., Chernova, O., &amp; Zatsarinnaya, E. (2023). The impact of information sphere in the economic security of the country: Case of Russian realities. Journal of Innovation and Entrepreneurship, 12 (1), 67. https://doi.org/10.1186/s13731-023-00326-8</mixed-citation></citation-alternatives></ref><ref id="ref27"><label>27</label><citation-alternatives><mixed-citation xml:lang="ru">Kim, Y., &amp; Rho, S. (2024). The US–China chip war, economy–security nexus, and Asia. Journal of Chinese Political Science, 29 (3), 433–460. https://doi.org/10.1007/s11366-024-09881-7</mixed-citation><mixed-citation xml:lang="en">Paksyutov, G. D. (2022). Japan’s Semiconductor Industry: Topical Trends and Strategic Importance. Problemy dalnego vostoka [Far Eastern Studies], (6), 113–124. http://doi.org/10.31857/S013128120023340-5 (In Russ.) </mixed-citation></citation-alternatives></ref><ref id="ref28"><label>28</label><citation-alternatives><mixed-citation xml:lang="ru">King, J. (2019). Commissioner King’s remarks at the 2019. Digital Resilience Summit of the Lisbon Council. https://ec.europa.eu/commission/presscorner/detail/en/speech_19_7261 (дата обращения:10.09.2024).</mixed-citation><mixed-citation xml:lang="en">Peters, M. A. (2022). Semiconductors, geopolitics and technological rivalry: The US CHIPS &amp; Science Act, 2022. Educational Philosophy and Theory, 55 (14), 1642–1646. https://doi.org/10.1080/00131857.2022.2124914</mixed-citation></citation-alternatives></ref><ref id="ref29"><label>29</label><citation-alternatives><mixed-citation xml:lang="ru">Koh, W. T. H. (2006). Singapore’s transition to innovation-based economic growth: infrastructure, institutions and government’s role. R&amp;D Management, 36 (2), 143–160. https://doi.org/10.1111/j.1467–9310.2006.00422.x</mixed-citation><mixed-citation xml:lang="en">Potaptseva, E. V., Akberdina, V. V., &amp; Ponomareva, A. O. (2024). The Concept of Technological Sovereignty in the State Policy of Contemporary Russia. AlterEconomics, 21 (4), 818–842. https://doi.org/10.31063/AlterEconomics/2024.21-4.9 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref30"><label>30</label><citation-alternatives><mixed-citation xml:lang="ru">Lynn, L. &amp; Salzman, H. (2023). Techno-nationalism or building a global science and technology commons? (but what about China?). Global Policy, 14 (5), 832–846. https://doi.org/10.1111/1758–5899.13258</mixed-citation><mixed-citation xml:lang="en">Salminen, M., &amp; Hossain, K. (2018). Digitalisation and human security dimensions in cybersecurity: An appraisal for the European High North. Polar Record, 54 (2),108–118. https://doi.org/10.1017/S0032247418000268</mixed-citation></citation-alternatives></ref><ref id="ref31"><label>31</label><citation-alternatives><mixed-citation xml:lang="ru">Mochinaga, D. (2020). The expansion of China’s digital silk road and Japan’s response. Asia Policy, 15 (1), 41–60. https://doi.org/10.1353/asp.2020.0005</mixed-citation><mixed-citation xml:lang="en">Samuels, R. J. (2018). Japan’s technology highways. In Rich nation, strong army: national security and the technological transformation of Japan. (pp. 270–318). Cornell University Press.</mixed-citation></citation-alternatives></ref><ref id="ref32"><label>32</label><citation-alternatives><mixed-citation xml:lang="ru">Mola, L. (2023). Fostering ‘European Technological Sovereignty’Through the CSDP: Conceptual and Legal Challenges. First Reflections Around the 2022 Strategic Compass. European Papers-A Journal on Law and Integration, 8 (2), 459–474. https://doi.org/10.15166/2499–8249/667 </mixed-citation><mixed-citation xml:lang="en">Savage, S., Avila, G., Chávez, N. E., &amp; Garcia-Murillo, M. (2024). AI and national security. In M. Garcia-Murillo, I. MacInnes, A. Renda (Eds), Handbook of Artificial Intelligence at Work (pp. 276–290). Edward Elgar Publishing. https://doi.org/10.4337/9781800889972.00022 </mixed-citation></citation-alternatives></ref><ref id="ref33"><label>33</label><citation-alternatives><mixed-citation xml:lang="ru">Murphy, K. M., &amp; Topel, R. H. (2013). Some Basic Economics of National Security. American Economic Review, 103 (3), 508–511. https://doi.org/10.1257/aer.103.3.508</mixed-citation><mixed-citation xml:lang="en">Schmidt, E. (2023, February 28). Innovation Power: Why technology will define the future of geopolitics. Foreign Affairs. https://www.foreignaffairs.com/united-states/eric-schmidt-innovation-power-technology-geopolitics (Date of access: 10.09.2024).</mixed-citation></citation-alternatives></ref><ref id="ref34"><label>34</label><citation-alternatives><mixed-citation xml:lang="ru">Okhrimenko, I., Stepenko, V., Chernova, O., &amp; Zatsarinnaya, E. (2023). The impact of information sphere in the economic security of the country: Case of Russian realities. Journal of Innovation and Entrepreneurship, 12 (1), 67. https://doi.org/10.1186/s13731-023-00326-8</mixed-citation><mixed-citation xml:lang="en">Seidl, T., &amp; Schmitz, L. (2023). Moving on to not fall behind? Technological sovereignty and the ‘geo-dirigiste’ turn in EU industrial policy. Journal of European Public Policy, 31 (8), 2147–2174. https://doi.org/10.1080/13501763.2023.2248204</mixed-citation></citation-alternatives></ref><ref id="ref35"><label>35</label><citation-alternatives><mixed-citation xml:lang="ru">Peters, M. A. (2022). Semiconductors, geopolitics and technological rivalry: The US CHIPS &amp; Science Act, 2022. Educational Philosophy and Theory, 55 (14), 1642–1646. https://doi.org/10.1080/00131857.2022.2124914</mixed-citation><mixed-citation xml:lang="en">Shestopal, S. S., &amp; Mamychev, A. Yu. (2020). Sovereignty in the global digital space: Current trends. Baltiiskii gumanitarnyi zhurnal [Baltic Humanitarian Journal], 9 (1(30)), 398–403. https://doi.org/10.26140/bgz3-2020–0901-0098 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref36"><label>36</label><citation-alternatives><mixed-citation xml:lang="ru">Salminen, M., &amp; Hossain, K. (2018). Digitalisation and human security dimensions in cybersecurity: An appraisal for the European High North. Polar Record, 54 (2),108–118. https://doi.org/10.1017/S0032247418000268</mixed-citation><mixed-citation xml:lang="en">Shevko, N. R., &amp; Kazantsev, S. Ya. (2020). Cybersecurity: Problems and solutions. Vestnik ekonomicheskoi bezopasnosti [Bulletin of Economic Security], (5), 185–189. (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref37"><label>37</label><citation-alternatives><mixed-citation xml:lang="ru">Samuels, R. J. (2018). Japan’s technology highways. In Rich nation, strong army: national security and the technological transformation of Japan. (pp. 270–318). Cornell University Press.</mixed-citation><mixed-citation xml:lang="en">Smorodinskaya, N. V., &amp; Katukov, D. D. (2024). Moving towards technological sovereignty: a new global trend and the Russian specifics. Baltiiskii region [Baltic Region], 16 (3), 108–135. https://doi.org/10.5922/2079–8555-2024-3-6 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref38"><label>38</label><citation-alternatives><mixed-citation xml:lang="ru">Savage, S., Avila, G., Chávez, N. E., &amp; Garcia-Murillo, M. (2024). AI and national security. In M. Garcia-Murillo, I. MacInnes, A. Renda (Eds), Handbook of Artificial Intelligence at Work (pp. 276–290). Edward Elgar Publishing. https://doi.org/10.4337/9781800889972.00022 </mixed-citation><mixed-citation xml:lang="en">Suchkov, M. А. (2022). “The geopolitics of technology”: International relations and the fourth industrial revolution. Vestnik of Saint Petersburg University. International Relations, 15 (2),138–157. https://doi.org/10.21638/spbu06.2022.202 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref39"><label>39</label><citation-alternatives><mixed-citation xml:lang="ru">Schmidt, E. (2023, February 28). Innovation Power: Why technology will define the future of geopolitics. Foreign Affairs. https://www.foreignaffairs.com/united-states/eric-schmidt-innovation-power-technology-geopolitics (дата обращения: 10.09.2024).</mixed-citation><mixed-citation xml:lang="en">Supyan, V. B. (2019). R&amp;D in the USA: Funding, Structure and Results. Zhurnal Novoi ekonomicheskoi assotsiatsii [Journal of the New Economic Association], (1(41)), 201–207. https://doi.org/10.31737/2221–2264-2019-41-1-9 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref40"><label>40</label><citation-alternatives><mixed-citation xml:lang="ru">Seidl, T., &amp; Schmitz, L. (2023). Moving on to not fall behind? Technological sovereignty and the ‘geo-dirigiste’ turn in EU industrial policy. Journal of European Public Policy, 31 (8), 2147–2174. https://doi.org/10.1080/13501763.2023.2248204</mixed-citation><mixed-citation xml:lang="en">Voloshenko, K. Yu. (2024). Economic security as a driver of Russian exclave development in alignment with national interests. Baltiiskii region [Baltic Region], 16 (4), 31–50. https://doi.org/10.5922/2079–8555-2024-4-2 (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="ref41"><label>41</label><citation-alternatives><mixed-citation xml:lang="ru">Weiss, L. (2014). America Inc.? Innovation and Enterprise in the National Security State. NY: Cornell University Press, 262.</mixed-citation><mixed-citation xml:lang="en">Weiss, L. (2014). America Inc.? Innovation and Enterprise in the National Security State. NY: Cornell University Press, 262.</mixed-citation></citation-alternatives></ref><ref id="ref42"><label>42</label><citation-alternatives><mixed-citation xml:lang="ru">Zegart, A. (2024, August 20). The Crumbling Foundations of American Strength: Knowledge Is Power—and the United States Is Losing It. Foreign Affairs. https://www.foreignaffairs.com/united-states/crumbling-foundations-american-strength-amy-zegart (дата обращения: 10.01.2025).</mixed-citation><mixed-citation xml:lang="en">Zegart, A. (2024, August 20). The Crumbling Foundations of American Strength: Knowledge Is Power—and the United States Is Losing It. Foreign Affairs. https://www.foreignaffairs.com/united-states/crumbling-foundations-american-strength-amy-zegart (Date of access: 10.01.2025).</mixed-citation></citation-alternatives></ref></ref-list></back></article>