نوع مقاله : مقاله پژوهشی

نویسنده

دانشجوی دکتری اقتصاد و مدیریت، دانشگاه فدرال جنوبی، رستوف، روسیه.

چکیده

فضای مجازی یک حیطه سیاسی اجتماعی و فناوری با ویژگی های منحصر به فرد است که از مرزهای سرزمینی و قانونی کشورها فراتر رفته است و بیشتر توسط بخش خصوصی اداره می‌شود، اما کشورهای توسعه یافته با سازوکارهایی همچون همکاری با سازمان‌های بین‌المللی و دیگر کشورها، سعی در اعمال نفوذ در این فضا هستند. این واقعیت باعث شده تا موثرترین مدل حکمرانی در کنترل جوامع مطرح شود تا با وجود کنترل‌ها همچنان آزادی‌های نسبی حفظ گردد. روش تحقیق در این مقاله با انتخاب نمونه هدفمند و تجزیه و تحلیل اطلاعات گردآوری شده، صورت گرفته است. از این رو نحوه مواجهه حاکمیت دولت عربستان با معارضان در فضای مجازی به عنوان مطالعه موردی مورد بررسی قرار گرفته است. یافته ها نشان داد که حاکمیت کنونی فضای مجازی در سیطره و سلطه استکبار جهانی است و دولت پادشاهی عربستان نیز از طریق قدرت سانسور، فیلتر و کنترل فضای مجازی امکان بهره‌مندی انقلابیون و معترضان از این بستر را با محدودیت هایی روبرو نموده است. با این وجود شناخت و سازمان دهی معارضین در این فضا، به عنوان بهترین بستر ارتباطی در جهان معاصر، می تواند نقش شتاب دهنده در روند بیداری اسلامی‌ در جهان عرب داشته باشد.

کلیدواژه‌ها

عنوان مقاله [English]

Examining government sovereignty in cyberspace; A case study of Saudi Arabia in the face of opposition

نویسنده [English]

  • Seyed Mahdi Soheili Moghadam

PhD student in Economics and Management, Southern Federal University, Rostov, Russia.

چکیده [English]

Cyberspace is a socio-political and technological field with unique features that goes beyond the territorial and legal borders of countries and is mostly governed by the private sector, but developed countries with mechanisms such as cooperation with international organizations and other countries, They are trying to influence this space. This fact has led to the introduction of the most effective model of governance in the control of societies in order to maintain relative freedoms in spite of controls. The research method in this article has been done by selecting a purposeful sample and analyzing the collected information. Therefore, how the Saudi government deals with the opposition in cyberspace has been studied as a case study. The findings show that the current rule of cyberspace is dominated by global arrogance, and the government of the Kingdom of Saudi Arabia, through the power of censorship, filtering and control of cyberspace, has limited the possibility for revolutionaries and protesters to benefit from this platform. However, recognizing and organizing the opposition in this space, as the best communication platform in the contemporary world, can play an accelerating role in the process of Islamic awakening in the Arab world.

کلیدواژه‌ها [English]

  • Cyberspace
  • Government sovereignty
  • Saudi Arabia
  • Filtering
Alassim, M., Alfayad, M., & Abbott-Halpin, E. F. (2017). Understanding Factors Influencing E-Government Implementation in Saudi Arabia from an Organizational Perspective. InternationalJournalofInformationandCommunicationEngineering, 11(7). http://eprints.leedsbeckett.ac.uk/id/eprint/4323/
AlBar, A. M., & Hoque, Md. R. (2019). Factors affecting the adoption of information and communication technology in small and medium enterprises: A perspective from rural Saudi Arabia. InformationTechnologyforDevelopment, 25(4), 715–738. https://doi.org/10.1080/02681102.2017.1390437
Albugami, S., & Ahmed, V. (2015). Success Factors for ICT Implementation in Saudi Secondary Schools: From the Perspective of ICT Directors, Head Teachers, Teachers and Students. InternationalJournalofEducationandDevelopmentUsingInformationandCommunicationTechnology, 11(1), 36–54.
Al-Maliki, S. (2013). InformationandCommunicationTechnology (ICT) InvestmentintheKingdomofSaudiArabia: AssessingStrengthsandWeaknesses.
Almarhabi, K. (2016). Adherence to ICT Security and Privacy Policies in Saudi Arabia. InternationalJournalofComputerApplications, 147(4), 13–18.
Alsowailm, F., Spidalieri, F., & Hathaway, M. (n.d.). KINGDOMOFSAUDIARABIACYBERREADINESSATAGLANCE. https://www.belfercenter.org/sites/default/files/files/publication/cri-2.0-ksa.pdf
Barlow, J. P. (2016, January 20). A Declaration of the Independence of Cyberspace. Electronic Frontier Foundation. https://www.eff.org/cyberspace-independence
Betz, D., & Stevens, T. (2011). Cyberspace and the state.
Black, I., & editor, M. E. (2009, June 30). Saudia Arabia leads Arab regimes in internet censorship. The Guardian. https://www.theguardian.com/world/2009/jun/30/internet-censorship-arab-regimes
Boothby, W. H. (2014). Conflict law: The influence of new weapons technology, human rights and emerging actors. Springer.
Chertoff, M., Simon, T., & Innovation, C. for I. G. (2015). The Impact of the Dark Web on Internet Governance and Cyber Security. Centre for International Governance Innovation.
Choucri, N. (2012). Cyberpolitics in international relations. MIT Press.
Connell, N. (n.d.). Saudi Arabia’s draft Cloud Cybersecurity Controls—Al Tamimi & Company—Lexology. Retrieved January 15, 2021, from https://www.lexology.com/library/detail.aspx?g=7e35491b-6ab0-40c6-8d10-26351fb2bc37
Cornish, P. (2015). Governing Cyberspace through Constructive Ambiguity. Survival, 57. https://doi.org/10.1080/00396338.2015.1046230
Cukier, K. N., & Mayer-Schönberger, V. (2013). The rise of big data. 92.
Deibert, Ron. (2015). The Geopolitics of Cyberspace After Snowden. Current History (New York, N.Y.: 1941), 114, 9–15. https://doi.org/10.1525/curh.2015.114.768.9
Deibert, Ronald, & Crete-Nishihata, M. (2012). Global Governance and the Spread of Cyberspace Controls. Global Governance: A Review of Multilateralism and International Organizations, 18, 339–361. https://doi.org/10.1163/19426720-01803006
Demchak, C. C., & Dombrowski, P. J. (2014). Rise of a Cybered Westphalian Age: The Coming Decades. In M. Mayer, M. Carpes, & R. Knoblich (Eds.), The Global Politics of Science and Technology—Vol. 1: Concepts from International Relations and Other Disciplines (pp. 91–113). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-55007-2_5
Demidov, O. (2014). ICT in the Brics Agenda Before The 2015 Summit: Installing the Missing Pillar? Security Index: A Russian Journal on International Security, 20, 127–132. https://doi.org/10.1080/19934270.2014.965968
DeNardis, L. (2014). The global war for internet governance. Proceedings of the 2014 ACM Conference on Web Science - WebSci ’14, 3–3. https://doi.org/10.1145/2615569.2618146
Developing National Information Security Strategy for the Kingdom of Saudi Arabia. (n.d.). https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/SaudiArabia_NISS_Draft_7_EN.pdf
Dilipraj, E. (2014). NTERNET GOVERNANCE : THE SHIFT FROMMONOPOLY TO MULTI-PARTY. Centre for Air Power Studies. http://capsindia.org/files/documents/CAPS_IB_15-MAY-2014.pdf
Dunn Cavelty, M. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20(3), 701–715. https://doi.org/10.1007/s11948-014-9551-y
Ebert, H., & Maurer, T. (2013). Contested Cyberspace and Rising Powers. Third World Quarterly, 34(6), 1054–1074. https://doi.org/10.1080/01436597.2013.802502
Emerson, R. G. (2016). Limits to a cyber-threat. Contemporary Politics, 22(2), 178–196. https://doi.org/10.1080/13569775.2016.1153284
Finkelstein, L. (1995). What Is Global Governance? GLOBAL GOVERNANCE,1,367–37 https://doi.org/10.1163/19426720-001-03-90000007
ITU: Committed to connecting the world. (n.d.). Retrieved January 5, 2021, from https://www.itu.int/en/Pages/default.aspx
Jayawardane, S., Larik, E., & Jackson, E. (2015). Cyber Governance: Challenges, Solutions, and Lessons for Effective Global Governance. The Hague Institute for Global Justice Policy Brief.
Kremer, J.-F., & Müller, B. (Eds.). (2014). Cyberspace and International Relations: Theory, Prospects and Challenges. Springer-Verlag. https://doi.org/10.1007/978-3-642-37481-4
Land-Pejoska, A., & Rehman, Z. U. (n.d.). Cyberabia. Retrieved January 15, 2021, from https://www.tamimi.com/law-update-articles/cyberabia-developments-in-the-cybersecurity-regulatory-landscape-in-saudi-arabia/
Lewis, J. (2010). Cybersecurity: Next steps to protect critical infrastructure, testimony to the US Senate Committee on commerce, science and transportation. https://www.govinfo.gov/content/pkg/CHRG-111shrg57888/html/CHRG-111shrg57888.htm
Liaropoulos, A. (2015). A Human-Centric Approach to Cybersecurity: Securing the Human in the Era of Cyberphobia, Journal of Information Warfare, 14, 4 (2015). Journal of Information Warfare, 14.
Liaropoulos, A. N. (2016). Reconceptualising Cyber Security: Safeguarding Human Rights in the Era of Cyber Surveillance. International Journal of Cyber Warfare and Terrorism, 6(2), 32–40. https://doi.org/10.4018/IJCWT.2016040103
Malki, Z. (2015). Analyzing the Internet Filtering Policies in KSA and USA. International Journal of Science, Technology and Society, 3(3), 83. https://doi.org/10.11648/j.ijsts.20150303.13
Middle East Internet Stats and Telecommunications Reports. (n.d.). Retrieved December 30, 2020, from https://www.internetworldstats.com/middle.htm
Mihr, A. (2014). Good Cyber Governance: The Human Rights and Multi-Stakeholder Approach. Georgetown Journal of International Affairs, 24–34.
Ministry of Communications and Information Technology. (n.d.). https://www.mcit.gov.sa/
National Cybersecurity Authority. (2020, October 31). National Cybersecurity Authority (Saudi Arabia). https://nca.gov.sa/
NCDC Signing Platform. (n.d.). Retrieved January 5, 2021, from https://www.ncdc.gov.sa/
Nocetti, J. (2015). Contest and conquest: Russia and global internet governance. International Affairs, 91(1), 111–130. https://doi.org/10.1111/1468-2346.12189
Nye, J. S., & Donahue, J. D. (Eds.). (2000). Governance in a globalizing world. Visions of Governance for the 21st Century ; Brookings Institution Press.
Paterson, M., Rosenau, J., & Czempiel, E.-O. (1992). Governance without Government: Order and Change in World Politics. International Affairs (Royal Institute of International Affairs 1944-), 68, 733. https://doi.org/10.2307/2622748
Patrick, S. (2014). The Unruled World The Case for Good Enough Global Governance. Foreign Affairs (Council on Foreign Relations), 93, 58-+.
Pohle, J. (n.d.). Multistakeholderism unmasked: How the netmundial initiative shifts battle-grounds in internet governance. Global Policy. Retrieved January 5, 2015, from Multistakeholderism unmasked: How the NetMundial Initiative shifts battlegrounds in internet governance
Rahimi, N., & Gupta, B. (2020). A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East. EPiC Series, 69, 60–68. https://easychair.org/publications/open/6hvn
Rosenau, J. (1995). Governance in the Twenty-first Century. Global Governance, 1, 13–43. https://doi.org/10.1163/19426720-001-01-90000004
Saudi Arabia | OpenNet Initiative. (n.d.). Retrieved December 30, 2020, from https://opennet.net/research/profiles/saudi-arabia
Slack, C. (2016). Wired yet Disconnected: The Governance of International Cyber Relations. Global Policy, 7(1), 69–78. https://doi.org/10.1111/1758-5899.12268
Vision2030. (n.d.). The Owner of This Website (Www.Vision2030.Gov.Sa) Has Banned the Country or Region Your IP Address Is in (IR) from Accessing This Website. Retrieved December 30, 2020, from http://www.vision2030.gov.sa/
Weber, R. H. (2013). Internet of things – Governance quo vadis? Computer Law & Security Review, 29(4), 341–347. https://doi.org/10.1016/j.clsr.2013.05.010
Weitzenboeck, E. M. (2014). Hybrid net: The regulatory framework of ICANN and the DNS. International Journal of Law and Information Technology, 22(1), 49–73. https://doi.org/10.1093/ijlit/eat016
West, S. (2014). Globalizing Internet Governance: Negotiating Cyberspace Agreements in the Post-Snowden Era. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2418762
Zittrain, J., & Edelman, B. (n.d.). Documentation of Internet Filtering in Saudi Arabia. Retrieved January 15, 2021, from https://cyber.harvard.edu/filtering/saudiarabia/