5G is widely regarded as the backbone of digital transformation due to its high speed, low latency, and massive connectivity. However, its software-defined architecture, virtualization, and network slicing introduce new cybersecurity challenges. In Türkiye, the transition to 5G, supported by domestic production requirements and new cybersecurity regulations, extends beyond a technical upgrade toward issues of digital sovereignty. This study identifies key literature clusters and highlights a critical gap at their intersection, proposing an analytical framework to assess 5G-related security, governance, and geopolitical implications in the Turkish context. Keywords: Digital Transformation, Artificial Intelligence, Management Information System, Management Organization, MIS, 5G, Cybersecurity, Türkiye REFERENCES T. C. Ulaştırma ve Altyapı Bakanlığı, (2026). https: //www. uab. gov. tr/haberler/cumhurbaskani-erdogan-5g-doenemini-resmen-baslatti/ adresinden alındı 3GPP. (2023). 5G system architecture and spectrum framework (Release 17). https: //www. 3gpp. org adresinden alındı Ahmad, I. K. (2017). 5G security: Analysis of threats and solutions. IEEE Conference on Standards for Communications and Networking (CSCN). doi: https: //doi. org/10. 1109/CSCN. 2017. 8088621 Andrews, J. G. (2014). What will 5G. 32. doi: https: //doi. org/10. 1109/JSAC. 2014. 2328098 Asadi, A. W. (2014). A survey on device-to-device communication in cellular networks. IEEE Communications Surveys & Tutorials. doi: https: //doi. org/10. 1109/COMST. 2014. 2319555 Bilgi Teknolojileri ve İletişim Kurumu. (2011). Türkiye’de elektronik haberleşme sektörü: Yetkilendirme ve frekans tahsisleri raporu. https: //www. btk. gov. tr adresinden alındı Bowen, G. A. (2009). Qualitative Research Journal. doi: https: //doi. org/10. 3316/QRJ0902027 Doppler, K. R. (2009). Device-to-device communication as an underlay to LTE-advanced networks. IEEE Communications Magazine. https: //doi. org/10. 1109/MCOM. 2009. 5350367 adresinden alındı ENISA. (2019). ENISA Threat Landscape For 5G Networks. 04 07, 2026 tarihinde https: //www. enisa. europa. eu/publications/enisa-threat-landscape-for-5g-networks adresinden alındı Ganatra, A. N. (2017). Developments of 5G Technology. Governors State University. https: //opus. govst. edu/theses/104/ adresinden alındı Gur, B. A. (2022). Cybersecurity, European digital sovereignty and the 5G rollout crisis. Computer Law & Security Review. Elsevier (Computer Law & Security Review). doi: https: //doi. org/10. 1016/j. clsr. 2022. 105736 International Telecommunication Union. (2023). Framework and overall objectives of the future development of IMT for 2030 and beyond (Recommendation ITU. https: //www. itu. int/en/ITU-R/study-groups/rsg5/rwp5d/imt-2030/pages/default. aspx adresinden alındı José Dias, P. P. (2025). 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches. (Sensors, Derleyici) Multidisciplinary Digital Publishing Institute. doi: https: //doi. org/10. 3390/s25133940 Madi, T. A. (2021). NFV security survey in 5G networks: A three-dimensional threat taxonomy. Science. doi: https: //doi. org/10. 1016/j. comnet. 2021. 108288 Mueller, M. (2017). Will the Internet Fragment? : Sovereignty, Globalization and Cyberspace. 04 07, 2026 tarihinde https: //www. wiley. com/en-it/Will+the+Internet+Fragment%3F%3A+Sovereignty%2C+Globalization+and+Cyberspace-p-9781509501229 adresinden alındı NGMN. (2015). 5G White Paper. https: //www. ngmn. org/wp-content/uploads/NGMN₅GWhitePaperV1₀. pdf adresinden alındı Organisation for Economic Co-operation and Development. (2022). Developments in spectrum management for communication services. https: //www. oecd. org/en/publications/developments-in-spectrum-management-for-communication-services₁75e7ce5-en. html adresinden alındı Öz, S. , (2020). Genel Teknoloji ve Dijital Dönüşüm Teorisine Giriş, A chapter in the book, “Teknolojik ve Dijital Dönüşüm”, Ankara, Nobel, pp. 269-292. Öz, S. , Kalkan, M. , (2023). GIG Ekonomisi ve Emek Piyasaları Bibliometrik Analizi, A book in the chapter, “Cumhuriyetin 100. Yılında Türk Emek Piyasasının Güncel Sorunları”, Filiz Kitabevi, (1), pp. 189-212. Öz, S. , Yilmaz, R. , (2026). Dönüşüm 5G - 5G Çağında Siber Güvenlik ve Risk Yönetimiyle 3 Sektör: Tarım Sanayi ve Hizmetler Dönüşümü, İstanbul, Beyin Takımı İlim Derneği Yayınları, https: //doi. org/10. 5281/zenodo. 194 Samuele Fratini, E. H. (2024). Digital Sovereignty: A Descriptive Analysis and a Critical Evaluation of Existing Models. Springer. https: //link. springer. com/article/10. 1007/s44206-024-00146-7 adresinden alındı Scalise, P. e. (2024). A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas. Basel, Switzerland. doi: https: //doi. org/10. 3390/fi16030067 Simon Forge, K. V. (2020). Forming a 5G strategy for developing countries: A note for policy makers. Telecommunications Policy. sciencedirect. doi: https: //doi. org/10. 1016/j. telpol. 2020. 101975 T. C. Türkiye Büyük Millet Meclisi. (2025). 7545 sayılı Siber Güvenlik Kanunu. 04 07, 2026 tarihinde https: //www. resmigazete. gov. tr/eskiler/2025/03/20250319-1. htm adresinden alındı T. C. Ulaştırma ve Alt Yapı Bakanlığı. (2024). Ulusal Siber Güvenlik Stratejisi ve Eylem Planı (2024-2028) Yayımlandı. https: //hgm. uab. gov. tr/duyurular/ulusal-siber-guvenlik-stratejisi-ve-eylem-plani-2024-2028-yayimlandi adresinden alındı Türk Telekom. (2026). Türk Telekom 5G+ Bilgi Notu: 5GTT. Strateji. Planlama ve İş Geliştirme Genel Müdürlüğü Yayınları. https: //www. turktelekom. com. tr/5g adresinden alındı Yücel, E. (2025). Türkiye’nin Siber Güvenlik Yaklaşımı ve 7545 Sayılı Siber Güvenlik Kanunu Üzerine Bir Değerlendirme. Selçuk Üniversitesi Hukuk Fakültesi Dergisi. https: //www. jurix. com. tr/article/42500? u=0&c=0 adresinden alındı Zhang, J. Y. (2020). Hybrid beamforming for 5G and beyond millimeter-wave systems: A holistic view. doi: https: //doi. org/10. 1109/OJCOMS. 2019. 2959595
Building similarity graph...
Analyzing shared references across papers
Loading...
Rızvan Yılmaz
Istanbul Commerce University
Tau Beta Pi Association
Building similarity graph...
Analyzing shared references across papers
Loading...
Rızvan Yılmaz (Sun,) studied this question.
www.synapsesocial.com/papers/69e7143fcb99343efc98d97f — DOI: https://doi.org/10.5281/zenodo.19655344