2
Defense Industries Educational and Research Institute
3
phd student
Abstract
Organizations, centers and scientific and research institutions of different countries have provided various definitions for cyberspace and its main elements; The existence of relatively diverse definitions in our country has caused ambiguity, weak common language, complexity and inconsistencies in policy-making, planning and development of cyberspace and cyberspace security. The present study was conducted with the aim of typology of the concept and main elements of cyberspace in the strategic documents of cyber security of countries. First, the evolution of different definitions of cyberspace from the perspective of global thinkers is reviewed, and then in this article, 39 national strategy (cyber security) documents from 34 countries, published during the last ten years from 2009 to 2019, are examined. Is. And with a qualitative approach and based on the method of content analysis, the main concepts and elements of cyberspace in these documents have been studied and extracted. As a result, 5 different types of concepts and four main elements of cyberspace have been extracted from these documents. Different are grouped according to this typology. Based on the findings of this study, the four main elements of cyberspace include equipment, data, maps and operations, and 5 types of concepts extracted from these 39 documents are: cyberspace as an information and communication infrastructure, space Cyber as an information, communication and data infrastructure, cyberspace as a set of equipment, data and people, cyberspace as a set of equipment, data and operations, space Cyber as a comprehensive set of equipment, data, people and operations.
خلیلی، احمد. زبردست، اسفندیار و عزیزی، محمد مهدی، (زمستان 1396)، «گونهشناسی سیاستهای مدیریت شهری در مناطق شهربنیان»، فصلنامه معماری و شهرسازی آرمانشهر، شماره 21، 291-308.
دهقان اشکذری، محمدجواد. میرعمادی، طاهره و قاضی نوری، سید سپهر، (زمستان 1397)، «گونهشناسی نظریههای بینالمللیسازی نظامهای نوآوری»، پژوهشهای مدیریت عمومی، سال یازدهم، شماره 42، 33-60.
کریمی قهرودی، محمدرضا و زارعی، وحید، (1399)، «حاکمیت فضای سایبری اندیشههایی پیرامون جامعهای با آینده مشترک در فضای سایبر»، انتشارات مؤسسه آموزشی و تحقیقاتی صنایع دفاعی، 75-125 .
کریمی قهرودی، محمدرضا و کیانخواه، احسان، (تابستان 1394)، «چالش آفرینی اینترنت اشیا بر ارکان امنیت ملی کشور»، فصلنامه علمی امنیت ملی، سال چهارم، شماره شانزدهم، 81-106.
کیانخواه، احسان، (زمستان 1398)، «چالشهای راهبردی حکمرانی با گسترش فضای سایبر»، فصلنامه علمی امنیت ملی، سال نهم، شماره سیوچهارم، 153-174.
لطیفی، میثم (زمستان 1397)، «روششناسی گونهشناسی: رهنمونی بر نظریهپردازی در دانش مدیریت»، فصلنامه مطالعات مدیریت دولتی ایران، دوره اول، شماره 2، 25-52.
فهرست منابع و مآخذ انگلیسی
26 Years After Gibson, Pentagon Defines ‘Cyberspace’. https://www. wired.com/2008/05/pentagon-define/ [2016-9-7].
afieldfile/2013/12/17/NSS.pdf [20 16-9-24].
pdf [2016-9-24].
Annex 1 to Government Decision No. 1139/2013 National Cyber Security Strategy of Hungary, 2013: 3. https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss map/HU_NCSS.pdf [2016-9-4].
Braun, viriginia and Clarke(2006)”using thematic analysis in psychology” Qualititative research , Vol.3 No.2:76-101 Retrived from: http:eprints.uwe.ac.//11735.
Canada’s Cyber Security Strategy, For a Stronger and More Prosperous Canada, 2010: 2. http://www.publicsafety.gc.ca/cnt/rsrcs/p blctns/cbr-scrt-strtgy/index-eng.aspx [2016-9-24].
Conceptual Views Regarding the Activities of the Armed Forces of the Russian Federation in the Information Space, p. 5. https://ccdcoe.org/ strategies/Russian_Federation_unofficial_translation.pdf ,2016.
Cyber Security Strategy for Germany, 2011: 9. http://www.cio.bund. de/SharedDocs/Publikationen/DE.
Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyber Space, 2009:7. https://www.gov.uk/government/ uploads/system/uploads/attachment_data/file/228841/7642.pdf [2016-24].
Cybersecurity Strategy: Towards a world-leading, resilient and vigorous cyberspace, 2013: 5. http://www.nisc.go.jp/active/kihon/pdf/ cybersecuritystrategy-en.pdf [2016-9-24].
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, 2009: III. https://ww smartgrid.gov/files/Cyberspace_Policy_Review _Assuring_ Trusted_ Resilient_Informat_200908.pdf [2016-9-24].
Cyberspace Protection Policy of the Republic of Poland, 2013: 5. https: //www.enisa.europa.eu/topics.
Cyberspace: Definition and Implications. https://ccdcoe.org/multime dia/cyberspace-definitionand-implications.html [2016-9-6].
Czech Republic, Draft Act on Cyber Security and Change of Related Acts (Act on Cyber Security), 2014: 2. https://www.govcert.cz/downlo ad/legislativa/container-nodeid-1168/draftactcybersecurity-130415.pdf [2016-12-31].
Denmark A, Mulvenon J (2010) Contested commons. Contested commons: the future of American power in a multi-polar world, pp 3-48. https://s3.amazonaws.com/files.cnas.org/documents/CNAS-Contest ed-Commons_1.pdf [2016-12-31].
Department of Communications, Notice of Intention to Make South African National Policy, 2010: 12. http://www.gov.za/sites/www.gov. za/files/32963_118_0.pdf [2016-9-24].
Developing National Information Security Strategy for the Kingdom of Saudi Arabia, NISS, DRAFT 7: A-http://www.itu.int/en/ITUD/Cybersecurity/Documents/National_Strategies_Repositoy/SaudiArabia_NISS_Draft_7_EN.pdf 2016-12-31].
Discussion on origin and translation of cyberspace. http://www.360doc. com/content/16/0115/19/21966267 _ 528220372.shtml [2016-12-31].
Government of Kenya Cybersecurity Strategy, 2014: 2. http://www.ict a.go.ke/wp-content/uploads/2014 /03/ GOK-national-cybersecurity-strat egy.pdf [2016-9-25].
Government of the Republic of Lithuania Resolution No. 796 of 29 June 2011 on the approval of the programme for the development of electronic information security (cyber-security) for 2011-2019, 2011: 3. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National Strategies _Repository/ Lithuania_ 2011_ EIS(KS)PP_796_2011-06-29_E pdf [2016-9-24].
Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate Cibernetică a României şi a Planului de Acţiune la Nivel Naţional Privind Implementarea Sistemului Naţional de Securitate. Cibernetică,2013:7.https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncssmap/.
Information Systems Defence and Security: France’s Strategy, 2011: http://www.ssi.gouv.fr /uploads / IMG /pdf/2011-02-15_Information_ system_defence_and_security_-_France_s_strategy. pdf [2016-9-24].
International Organization for Standardization, ISO/IEC27032:2012, Information technology Security techniques - Guidelines for cyber security. https://www.iso.org/obp/ui/#iso:std:iso-iec:27032:ed-1:v1:en [2016-9-19].
Ministry of Communication and Information Technolory, India, National Cyber Security Policy-2013 (NCSP-2013), 2013: 1. http:// gov.in/sites/upload_files/dit/files/National%20 Cyber%20Security %20Policy%20(1).pdf [2016-9-24].
National Cyber Security Strategy for Montenegro 2013-2017, 2013: 5. http://www.mid.gov.me/ ResourceManager/FileDownload.aspx?rid=165416&rType=2&file=Cyber%20Security%20Strategy%20fo.
National Cyber Security Strategy of Afghanistan, 2014.http://nic.af/Content/files/National %20Cybersecurity%20 Strategy%20of%20Afghanistan%20(November2014).pdf [2016-9-25].
National Cyberspace Security Strategy. http://www.cac.gov.cn/2016-12/27/c_1120195926.htm [2016].
National Initiative for Cybersecurity Careers and Studies, Explore Terms: A Glossary of Common Cybersecurity Terminology. https://def com/a/download/document/11128 [2016-9-24].
National strategy for the protection of Switzerland against cyber risks, 2012: 5. https://www.enisa.europa .eu / topics/national-cybersecuritystrategies/ncssmap/National_strategy_for_the protection_of_Switzerland.
Qatar National Cyber Security Strategy, 2014: 23. https://www.itu.int /en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Qatar_2014_national_cyber_security_strategy.pdf [2016-9-25].
Rattray G, Evans C, Healey J. Chapter V: American security in the cyber commons. https://s3.amazonaws.com/files.cnas.org/documents/ CNAS-Contested-Commons_1.pdf [2016-12-31].
Series X: Data Networks, Open System Communications and Security. Telecommunication security. Overview of cybersecurity. http://www. itu.int/rec/T-REC-X.1205-200804-I [2016-12-31].
Some Principles of Cyber Strategy—Analysis—Eurasia Review. ISN Security Watch, 2014. http://maritimesecurity.asia/free-2/sea-lines-of-co mmunication/some-principles-of-cyber-strategyanalysis-eurasia-review/ [2016-9-6].
The NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual on the International Law Applicable to Cyber Warfare, 2013: 211. http://www.jku.at/intlaw/content/e275831/e275836/e276629/Talli pdf [2016-9-.
Turkey, National Cyber Security Strategy and 2013–2014 Action Plan, 2013: 8. https://www.enisa.europa.eu/topics/national-cyber-security-str ategies/ncss-map/national-cybersecurity-strategyand-2013-2014-action -plan/at_download/file [2016-9-24].
United Kingdom, The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World, 2011:11. https://www.gov.uk/ government/uploads/system/uploads/attachment_data/file/60961/uk-cy ber-security-strategy-final.pdf [2016-9-24].
White House, and United States of America. The National Strategy to Secure https://www.us-cert.gov/sites/default/files/publicat ions/cyberspace_strategy.pdf [2016-9-17].
Wiener N (1948) Cybernetics or control and communication in the animal and the machine, Vol 25. MIT press. http://www.allen-riley.com/ utopia/cybernetics.pdf [2016-9-24].
William G (1984) Neuromancer, Vol 4. Phantasia Press Edition, Bloomfield, MI. http://www.taodocs .com/p- 4046079.html [2016-12-31].
William G. BURNING CHROME. http://dinhe.net/*aredridel/.notmine /www.digipromo.com/vruz/ebooks /scifi/William%20Gibson-Burning %20Chrome.rtf [2016-11-30].
Wolff HVH (2013) Territorial sovereignty and neutrality in cyberspace. Intl L Stud Ser US Naval War 89:i. https://www.usnwc. edu/getattachment/ff9537ce-94d6-49a8- 51e335126c1e/vonHeinegg.aspx [2016-9-24].
Wolff HVH (2013) Territorial sovereignty and neutrality in cyberspace. Intl L Stud Ser US Naval War 89:i. https://www.usnwc. edu/getattachment/ff9537ce-94d6--a9ef-51e335126c1e/vonHeine aspx[2016-9-24].
Karimi Ghohroudi, M. R., moeinazad, S., & karimi, E. (2023). Typology of the concept and main elements of cyberspace in national cyber security strategy of selected countries. National Security, 13(47), 9-36.
MLA
Mohammad Reza Karimi Ghohroudi; shima moeinazad; Ebrahim karimi. "Typology of the concept and main elements of cyberspace in national cyber security strategy of selected countries", National Security, 13, 47, 2023, 9-36.
HARVARD
Karimi Ghohroudi, M. R., moeinazad, S., karimi, E. (2023). 'Typology of the concept and main elements of cyberspace in national cyber security strategy of selected countries', National Security, 13(47), pp. 9-36.
VANCOUVER
Karimi Ghohroudi, M. R., moeinazad, S., karimi, E. Typology of the concept and main elements of cyberspace in national cyber security strategy of selected countries. National Security, 2023; 13(47): 9-36.