Exercising sovereignty over national cyberspace by relying on international law

Document Type : Original Article

Authors

1 Cyber ​​space strategic management student- Supreme National Defense University

2 Educational Department of Cyberspace Strategic Management of National Defense University

Abstract
At the beginning of the formation of cyberspace, some theorists believed that the development of cyberspace and the establishment of economic, political and cultural interactions at the global level would be accompanied by definitions such as demarcation, land demarcation, demilitarization and de-governance, but it is now widely accepted. Cyberspace is not a law-free area where anyone can engage in any hostile activity by engaging in unregulated behavior without regard to internationally accepted rules, regulations and rules. The main issue of this study is whether the current principles and rules of international law, with determination and transparency, prevent cyber-hostile acts that violate the sovereignty of countries on cyber territory, and these reliable principles and rules in protecting the sovereignty of countries. Are they on national cyber territory? This paper concludes by reviewing the documents, principles and rules of international law related to national cyber sovereignty, which has been done using the qualitative content analysis method and the software tool of Mexico City, the principles and rules of current international law of the necessary efficiency and ability to protect Countries do not have national cyber sovereignty, and generally acts of violation of national cyber sovereignty of moderate and low severity (including: use of force, unauthorized intervention, etc.) are not prosecuted. Therefore, these rules and principles do not have the necessary deterrent against destructive actions and violations of national cyber sovereignty.

Keywords


احمدپور، محسن؛ خداوردی، حسن و کشیشیان سیرکی، گارینه(1402). بررسی و تحلیل روش‌ها و شاخص‌های سنجش قدرت نرم، مطالعات قدرت نرم، 13(34)، 141-164.
جعفرنیا، امید و کریمی قهرودی، محمدرضا(1399). اهمیت و الزامات حاکمیت فضای سایبری، چهارمین کنفرانس ملی دانش و فناوری مهندسی برق کامپیوتر و مکانیک.
حافظ نیا محمدرضا(1390). جغرافیای سیاسی فضای مجازی. انتشارات سمت.
شعبانی، محمدعلی؛ بخشایش‌اردستانی، احمد؛ توحیدفام، محمد و مطلبی، مسعود(1402). مؤلفه‌های قدرت نرم ایالات‌متحده آمریکا در قبال جمهوری اسلامی ایران (دولت یازدهم و دوازدهم)، مطالعات قدرت نرم، 13(34)، 185-211.
فضائلی، مصطفی و کرمی، موسی(1399). تحول تاریخی حقوق بین‌المللِ توسل به زور تا شکل‌گیری نظام ملل متحد؛ بیم‌ها و امیدها، مطالعات دفاع مقدس، 6(21)، 31-60.
کریمی قهرودی، محمدرضا و زارعی، وحید(1399). حاکمیت فضای سایبری. تهران: انتشارات موسسه آموزشی تحقیقاتی صنایع دفاعی.
کیان خواه، احسان(1398). چالش‌های راهبردی حکمرانی با گسترش فضای سایبر، امنیت ملی، 9(34)، 153-174.
مظاهری، مسعود؛ صلاحی، سهراب و مرادی، مریم(1401). بکارگیری قدرت نرم علیه حاکمیت دولتها از طریق جریان آزاد اطلاعات، مطالعات قدرت نرم، 12(30)، 185-204.
2013, 2015 & 2017 UN GGE – Reports of the group of governmental experts on developments in the field of information and telecommunications
Baur-Ahrens, A. (2017). The power of cyberspace centralisation: analysing the example of data territorialisation. Security/mobility: Politics of movement, 37-56.
Falk, R. (1997). Nuclear Weapons Advisory Opinion and the New Jurisprudence of Global Civil Society. Transnat'l L. & Contemp. Probs, 7, 333.
Iman Mohammad Taghi and Noshadi Mahmoud Reza, 2011, Qualitative content analysis, research, third year, second issue (In Persian)
Keller, H. (2009). Friendly Relations Declaration (1970). Max Planck Encyclopedia of Public International Law.
Leigh, M. (1985). Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v. United States of America). 1984 ICJ Reports 392. American Journal of International Law, 442-446.
Lilli, E., & Painter, C. (2023). Soft power and cyber security: The evolution of US cyber diplomacy. In Soft power and the future of US foreign policy (pp. 161-179). Manchester University Press.
Möllers, N. (2021). Making digital territory: Cybersecurity, techno-nationalism, and the moral boundaries of the state. Science, Technology, & Human Values, 46(1), 112-138.
Oppenheim, L. (1921). The future of international law (Vol. 43). Clarendon Press.
Schmitt, M. N. (Ed.). (2017). Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press.
United States. President (1945-1953: Truman). (1945). The Charter of the United Nations with the Statute of the International Court of Justice Annexed Thereto: Address by the President of the United States Delivered Before the Senate on July 2, 1945 Presenting the Charter of the United Nations, with the Statute of the International Court of Justice Annexed Thereto: and a Message from the President of the United States Transmitting a Certified Copy of the Charter of the United Nations, with the Statute of the International Court of Justice Annexed Thereto .... US Government Printing Office.