CONCEPTUALIZATION OF SYMBOLIC SECURITY STRATEGIES OF AMERICAN CYBER DIPLOMACY
Main Article Content
Abstract
America's main cyber policies, as the fourth pillar of democracy, have a significant impact on the domestic and foreign policy of this country. On the other hand, nowadays, the cyber space has become one of the most important aspects of security, so that with the growth and development of cyber technology, we see an increase in risks in this field. Different actors, both governmental and non-governmental, have emerged in this field, and each of them has taken actions against American national security in a way and based on their goals. In the meantime, although America is considered as the main developer of cyber space, it is a leading country in this field. The comprehensive development of the Internet and the excessive dependence of this government's sensitive infrastructure on information technology have exposed it to a variety of cyber threats. The banking network and Malaya to public services, civil and military networks are all dependent on the network. In case of cyber disruption, all of them will stop working. By examining the cyber incidents from the era of the previous presidents of the United States to the present day, the stages of the cyber threat in the order The political and then security work of the American government in details of the logical process that went through so that cyber security rose from a marginal issue under the general title of sensitive infrastructure to the top of American security threats. In this article, with the aim of identifying the components of cyber diplomacy in the United States of America, An attempt is made to analyze and examine the dimensions and frameworks of American diplomacy in the field of national security, as an indicator and example of the current national affairs of this country from the conceptual aspect of cyber diplomacy's symbolic security strategies.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
Ghasemi, Rooh A... and others (2016). Prioritizing the applications of Internet of Things technology in Iran's healthcare sector: a stimulus for sustainable development, Information Technology Management Journal, No. 1, 155-176
Qureshi, Seyyed Ali, Shabro, Maryam (2013). An introduction to the application of Internet of Things technology in the smart network of the country's electricity industry, 29th International Electricity Conference, Tehran, Iran
Valvi, Mohammadreza. Mohadi Sefat, Mohammad Reza and Bagheri Iman. (2016). Providing a strategic model for the migration of defense organizations to the cloud computing environment. Military Management Quarterly, 17th year, No. 1. pp. 106-130
Halili Khodadad. Kazemi, Seyyed Mohsen and Dehghani, Mehdi. (2014). Examining security requirements and mechanisms in command and control systems based on cloud computing (CBC4I). The 9th National Conference of Command and Control of Iran. kharazmi University.
Advisory Group on Public Diplomacy for the Arab and Muslim World. (2003). “Changing Minds, Winning Peace”, U.S. Dept. of State, Washington D.C. Available at: http://www.state.gov/documents/organization/24882.pdf, (Accessed at 1 October 2013).
Barston, Ronald Peter, (2006), Modern Diplomacy, Cambridge: Pearson Education.
Biener, Hansjoerg, (2003), “The Arrival of Radio Farda: International Broadcasting to Iran at a Crossroads”, Rubin Center Research in International Affairs, Available at: http://www.rubincenter.org/2003/03/biener-2003-03-02/, (Accessed at 2 March 2013).
Bruce, Gregory, (2011), “American Public Diplomacy: Enduring Characteristics, Elusive Transformation”, The Hague Journal of Diplomacy, Vol.6, No.2.
Clinton, Hillary, (2014), Hard Choices, Simon & Schuster Publication, London.
Fialho, Lívia Pontes & Matthew Wallin, (2013), “Reaching for an Audience: U.S. Public Diplomacy towards Iran”, The American Security Project (ASP), Available at: https://www.americansecurityproject.org/ASP%20Reports/Ref%200131%20- %20US%20Public%20Diplomacy%20Towards%20Iran.pdf, (Accessed at 1 August 2013).
Hanson, Fergus, (2012), “Revolution @State: The Spread of Ediplomacy”. Lowy Institute for International Policy, Available at: http://www.brookings. edu/~/ media/ research/files/reports/ 2012/3/ediplomacy%20hanson/03_ediplomacy_ hanson, (Accessed at 2 March, 2012).
Jiang, Xiaoying, (2013), “U.S. Internet Diplomacy on China”, Master Thesis in China and International Relations, Aalborg University and University of International Relation, Available at: projekter. aau. dk/ projekter/ files/ 76941438.
U.S._Internet_Diplomacy_on_China_Xiaoying_Jiang
Lydia, Gordon, (2009), “Regional Focus: Growing Internet usage in the Middle East and North Africa”, Available at: http://blog.euromonitor.com/2009/08/ regional-focus-growing-internet-usage-in-the-middle-east-and-north-africa.html, (Accessed at 4 August, 2009).
Nweke, Eugene N, (2012), “Diplomacy in Era of Digital Governance: Theory and Impact”, Information and Knowledge Management, Vol. 2, No. 3.
Congressional Budget Request”, Available at: https://www.bbg.gov/wp- content/uploads/2015/11/BBG-FY2015-PAR.pdf, (Accessed at 12 March, 2015).
The Broadcasting Board of Governors, (2015), “Fiscal Year 2016 Congressional Budget Request”, Available at: https://www.bbg.gov/ wp-content/ uploads/ 2015/03/ FY2016 Budget_CBJ_Final_WebVersion.pdf, (Accessed at 8 March, 2015).
The Broadcasting Board of Governors, (2016), “BBG Networks Provide Timely News of Iranian Nuclear Deal, Prisoner Swap”, Available at: nuclear-deal-prisoner-swap, (Accessed at January 21, 2016).
Halili, Khodadad. Valvi, Mohammadreza. (2016). Big data technology, opportunities, challenges and strategies. The scientific research quarterly of interdisciplinary studies of strategic knowledge. The seventh year, number 28. pp: 7-28
Majdi, Reza, (2023), Cyber Diplomacy towards Iran from 2006 to 2012, Publisher: Tehran City Publishing (affiliated to Tehran Municipality Cultural and Artistic Organization).
Halili, Khodadad. Mazloum, Jalil and Hadian, Behrang. (2014). Investigating military applications of big data technology and its role in battlefield management. Quarterly Journal of Military Sciences and Techniques, Year 11, No. 33, pp. 47-62
Halili, Khodadad. Sultanpour, Mohammad Reza and Mousavi, Fatemeh Sadat. (2014). The necessity of using big data technology in C4I systems and examining its challenges. The 9th National Conference of Command and Control of Iran. kharazmi University
Halili, Khodadad. Valvi, Mohammadreza and Mohdi Sefat, Mohammadreza. (2016). Modeling C4I processes by physical-cyber-social systems (CPSS). The 10th National Command and Control Conference of Iran. Khatam La Anbia University (pbuh)