Explaining the concept and scope of political geography of cyber space
Subject Areas : Journal of Iranian Social Development Studiesافشین متقی 1 , arash ghorbani sepehr 2 , Parisa Ghorbani Sepehr 3
1 - Associate Professor of Political Geography, Faculty of Geographical Sciences, Kharazmi University, Tehran, Iran
2 - Postdoctoral Researcher of Political Geography, Faculty of Geographical Sciences, Khwarazmi University, Tehran, Iran
3 - Doctoral student of Political Geography, Faculty of Geographical Sciences, Khwarazmi University, Tehran, Iran
Keywords: Conceptology, space, cyber space, political geography, Political geography of cyber space.,
Abstract :
Cyber space cannot be fully understood without understanding the role of space. Cyber space is a complex, decentralized and dynamic space with many components and diverse features. Therefore, the field of cyberspace geography is relatively new and much more variable than other environments. But what initially seemed like the Internet was supposed to end geography; But this was not the case and the cyber space was used as a complement to the geographical space. Therefore, in the current era, each of the geographical sciences seeks to understand the dimensions of cyber space, among which political geography is a science that discusses and examines the concepts of cyber space. Based on this, the current research is based on the method of content analysis and the use of library data in order to answer the question, what is the conceptualization and scope of the political geography of cyber space? The findings show that cyberspace and related technologies are one of the most important sources of power in the third millennium. Therefore, cyberspace is considered one of the geopolitical power generating components for countries; So that today powerful countries influence other countries by using the capacities of cyber space. On this basis, the political geography of cyberspace is formed from human action with a political dimension on cyberspace. Therefore, political geographers can study the cyberspace and present plans to the statesmen to organize this space in line with [its better management].
1. انصاری، ز.، حسین پور مطلق، م.، و قربانی سپهر، آ. (1397). دیدگاهی نوین به مشارکت سیاسی (با تأکید بر نقش فضای سایبر در انتخابات ریاست جمهوری دوره دوازدهم). تهران، انجمن ژئوپلیتیک ایران.
2. حافظ¬نیا، م. ر. (1390). جغرافیای سیاسی فضای مجازی، تهران: انتشارات سمت.
3. حافظ¬نیا، م. ر.، و کاویانی راد، م. (1393). فلسفه جغرافیای سیاسی. تهران، انتشارات پژوهشکده مطالعات راهبردی.
4. حقیقت، س. ص. (1394). روششناسی علوم سیاسی. قم: انتشارات دانشگاه مفید.
5. رحیمی، ح. ا. (1395). برنامه¬ریزی فضایی با رویکرد پویش ساختاری – کارکردی: به سوی پیوند جبرگرایی فضایی با انسان¬گرایی، فصلنامة برنامه¬ریزی و آمایش فضا، 20(4)، 114-91. URL: http://hsmsp.modares.ac.ir/article-۲۱-۷۲۵۴-fa.html
6. قربانی سپهر، آ. (1397). تبیین مفهوم و قلمرو جغرافیای سیاسی فضای شهری، پایان نامه کارشناسی ارشد، به راهنمایی محسن جان پرور، دانشگاه فردوسی مشهد.
7. قربانی سپهر، آ.، و انصاری، ز. (1397). نقش و جایگاه فضای سایبر در توسعه کشور به عنوان الگویی راهبردی. تهران، دوازدهمین کنگره پیشگامان پیشرفت ایران اسلامی.
8. قصری، م.، جان پرور، م.، و حیدری، ط. (1390). مدیریت مرزهای فضای سایبر، گام نخست دفاع سایبری“، مجموعه مقالات نخستین همایش ملی دفاع سایبری.
9. منوچهری میاندوآب، ا.، رهنمایی، م. ت. (1398). تحلیلی بر فرایند تولید فضای سرمایه¬داری دولتی در ایران مورد: شهر تهران، فصلنامة برنامه¬ریزی و آمایش فضا، 23(1)، 116-85. .20.1001.1.16059689.1398.23.1.5.6.
10. Ablon, L., Martin, C. (2014). Libicki and Andrea A. Golay, Markets for Cybercnme Tools and Stolen Data: Hackers, Bazaar, 1-85.
11. Aghajani, G., Ghadimi, N., 2018. Multi-objective energy management in a micro-grid, Energy Rep, 4, 218–225.
12. Akhtar, N., Parwej, F. Perwej, Y. (2017). A Perusal of Big Data Classification and Hadoop Technology, International Transaction of Electrical and Computer Engineers System (ITECES), USA, 4 (1), 26-38. DOI: 10.12691/iteces-4-1-4.
13. Alibasic, A., et al. (2016). Cybersecurity for smart cities: A brief review. In: Nternational Workshop on Data Analytics for Renewable Energy Integration. Springer.
14. Ansari, Z., Hosseinpour Motlagh, M., and Ghorbani Sepehr, A. (2017). A new perspective on political participation (with an emphasis on the role of cyberspace in the 12th presidential election). Tehran, Geopolitical Association of Iran. (In Persian).
15. Autio, E. (2017). Digitalisation, Ecosystems, Entrepreneurship and Policy.
16. Blacksell, M. (2006). Political Geography, London and New York: Routledge.
17. Bordelon, E. B. (2016). Approaching Cyber Warfare: Geopolitics, Deterrence, and International Law. Cyber War and Geopolitics in the Honors Program Liberty University, 22(3), 1-30.
18. Bordelon, E. B. (2016). Approaching Cyber Warfare: Geopolitics, Deterrence, and International Law. Cyber War and Geopolitics in the Honors Program Liberty University, 22(3), 1-30.
19. Bronson, K. (2019). Looking through a responsible innovation lens at uneven engagements with digital farming. NJAS Wageningen J. Life Sci. 90–91, 100-294 https://doi.org/10.1016/J.NJAS.2019.03.001.
20. Brunet, R. (1996). Building Models for Spatial Analysis, special issue in English, geography and anthology, CNRS, Paris, 1996.
21. Burnett, A. D. and Taylor. P. J. (1993). Political Geography, London Publishing longman Group.
22. Cagri, B A., Rahime, B. S., and Shujun, L. (2018). Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example, SMSociety.
23. Clark, D. D. (2010). Characterizing Cyberspace: Past, present and future, Characterizing cyberspace: Past, present and future (ECIR Working Paper No. 2010-3). MIT Political Science Department. Version: Author's final manuscript.
24. Dawson, J. and Thomson, R. (2018). The future cybersecurity workforce: Going beyond technical skills for successful cyber performance, Frontiers in Psychology, 9(JUN), 1–12. doi:10.3389/fpsyg.2018.0074.
25. Douzet, F. (2014). Understanding Cyberspace with Geopolitics, In Hérodote, 1 (152), 3-21, Translated from the French by JPD Systems.
26. Gallaher, M. Link, A., and Rowe, B. (2008). Cyber Security: Economic Strategies and Public Policy Alternatives, Edward Elgar Publishing.
27. Ghorbani Sepehr, A. (2017). Explaining the concept and scope of the political geography of urban space, master's thesis, under the guidance of Mohsen Jan Peror, Ferdowsi University of Mashhad.
28. Ghorbani Sepehr, A., and Ansari, Z. (2017). The role and place of cyberspace in the country's development as a strategic model. Tehran, the 12th Congress of Pioneers of Islamic Iran's Progress. (In Persian).
29. Glassner, M. I. (1993). Political Geography, New York: John wiley and Sons.
30. Hafeznia, M. R. (2011). Political Geography of Virtual Space. Tehran, Samt Publications. (In Persian).
31. Hafeznia, M. R., and Kaviyani Rad, M. (2014). Philosophy of political geography. Tehran, Strategic Studies Research Institute Publications. (In Persian).
32. Haghigat, S. S. (2014). Political science methodology. Qom: Mofid University Press. (In Persian).
33. Hillier, B and Hanson, J. (1984). The Social logic of Space, Cambridge Univercity Press, Cambridge.
34. Interrogate the Internet. (1996). Contradictions in cyberspace: collective response. In Shields, R., editor, Cultures of Internet: virtual spaces, real histories and living bodies, London: Sage.
35. Jedrej, M.C. (2000). Time and Space, in Barnard, A. Spencer, Jonathan.
36. ji, Z., et al. (2021). Harmonizing safety and security risk analysis and prevention in cyber–physical systems. Process Saf. Environ. Prot. 148, 1279–1291.
37. Judge, M.A., et al. (2021). Price-based demand response for household load management with interval uncertainty. Energy Rep.
38. Kellerman, A. (2018). Geography of Cyberspace, LAST MODIFIED. DOI: 10.1093/OBO/9780199874002-0190.
39. Kitchin, R. and Thrift, N (2009). International Encyclopedia of Human Geography. Uk: Elsevier.
40. Kitchin, R. M. (1998). Towards geographies of cyberspace. Progress in Human Geography, 22(3), 385-406.
41. Kitchin, R. M. (1998). Towards geographies of cyberspace. Progress in Human Geography, 22(3), 385-406.
42. Kitchin, R.M. (1997). Social transformations through spatial transformations: from `geospace' to `cyberspaces'. In Behar, J., editor, Sociological studies of telecommunications, computerization and cyberspace, New York: Dowling College Press.
43. Kramer, F. (2009). Cyberpower and National Security, in Kramer, cited.
44. Leiner, B. M., et. al. (2009). A Brief History of the Internet, ACM SIGCOMM Computer Communication Review, 39 (5), 22-31. http://doi.acm.org/10.1145/1629607.1629613.
45. Li, A., Zhao, P., He, H., Mansourian, A., & Axhausen, K. W. (2021). How did micro- mobility change in response to Covid-19 pandemic? A case study based on spatial- temporal-semantic analytics. Computers, Environment and Urban Systems, 90, Article 101703.
46. Li, N., et al. (2020). Early validation of cyber–physical space systems via multi-concerns integration. J. Syst. Softw. 170.
47. Lyon, D. (1994). The electronic eye: the rise of the surveillance society. Oxford: Polity Press.
48. Maigron, P. (2020). World - autonomous system number statistics - sorted by number.
49. Manouchehri Miandoab, A., rahnemaie, M. T. (2019) an analysis of the process of producing the state capitalist space in Iran, Case Study: Tehran City. The Journal of Spatial Planning, 23 (1), 85-116. URL: http://hsmsp.modares.ac.ir/article-21-25111-fa.html. (In Persian).
50. Mejias, U.A., Couldry, N. (2019). Datafication. https://policyreview.info.
51. Mitterer, J. and O'Neill, K. (1992). The end of `information': computers, democracy and the university.
52. Nye, J. (2010). Cyber Power, Harvard Kennedy School, Cambridge.
53. O Tuathail, G. (1996). Critical Geopolitics: the political of writing global space, London, Routledge.
54. Pacione, M. (1985). Progress in Political Geography, Publication of London, Croom Helm.
55. Park, K. (2005). The internet as a complex system. In: The Internet as a Large-Scale Complex System.
56. Parwej, F., Nikhat, A., Perwej, Y. (2018). A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application (IJERA), ISSN: 2248-9622, 8 (1), 26-41. DOI: 10.9790/9622-0801022641.
57. Perwej, Y. (2019). The Hadoop Security in Big Data: A Technological Viewpoint and Analysis, International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), E-ISSN: 2320-7639, 7 (3), 1- 14. DOI: 10.26438/ijsrcse/v7i3.1014.
58. Philip, C. L., Chen, Q. and Zhang, C. Y. (2014). "Data-intensive applications challenges techniques and technologies: A survey on big data", Information Sciences, vol. 275, pp. 314-347.
59. Prause, L., Hingley, M., Luis Vilalta-Perdomo, E. (2021). Digital agriculture and labor: a few challenges for social sustainability. Sustainability 13 (11), 59-80. https://doi. org/10.3390/SU13115980.
60. Qasri, M., Jan Prover, M., and Heydari, T. (2011). Management of cyber space boundaries, the first step of cyber defense", Proceedings of the First National Cyber Defense Conference. (In Persian).
61. Rahimi, H. (2016). Tructural-Functional Dynamics Approach to Spatial Planning: toward Linking Spatial Determinism with Humanism. The Journal of Spatial Planning, 20(4), 91-114. http://hsmsp.modares.ac.ir/article-21-7254-fa.html. (In Persian).
62. Rid, T. and Buchanan, B. (2015). Attributing cyber-attacks", Journal of Strate St., 38 (1), 4-37.
63. Rijswijk, K., Klerkx, L., Bacco, M., Bartolini, F., Bulten, E., Debruyne, L., Dessein, J., Scotti, I., Brunori, G. (2021). Digital transformation of agriculture and rural areas: a socio-cyber-physical system framework to support responsibilisation. J. Rural. Stud. 85, 79–90. https://doi.org/10.1016/J.JRURSTUD.2021.05.003.
64. Rose, D.C., Lyon, J., de Boon, A., Hanheide, M., Pearson, S. (2021). Responsible development of autonomous robotics in agriculture. Nat. Food 2 (5), 306–309. https://doi.org/10.1038/s43016-021-00287-9.
65. Sakhnini, J., et al. (2021). Physical layer attack identification and localization in cyber–physical grid: An ensemble deep learning based approach. Phys. Commun. 47.
66. Sheldon, J. B. (2014). Geopolitics and Cyber Power: Why Geography Still Matters,” American Foreign Policy Interests, 36 (5), 286-288.
67. Skrjanc, I., Ozawa, S. Ban, T. and Dovzan, D. (2018). Large-scale cyber-attacks monitoring using Evolving CauchyPossibilistic Clustering, in Applied Soft Computing, Elsevier, 62, 592-601.
68. Soja, E. (1990). Postmodern geographies, reassertion of space in critical social theory, Verso, second expression, London.
69. Sparrow, R., Howard, M. (2021). Robots in agriculture: prospects, impacts, ethics, and policy. Precis. Agric. 22 (3), 818–833. https://doi.org/10.1007/s11119-020-09757- 9.
70. Squire, S.J. (1996). Re-territorializing knowledge(s): electronic spaces and virtual geographies. Area 28, 101-103.
71. Sun, C.-C., Hahn, A., Liu, C.-C. (2018). Cyber security of a power grid: State-of-the-art. Int. J. Electr. Power Energy Syst. 99, 45–56.
72. Tan, S., et al. (2021). Attack detection design for dc microgrid using eigenvalue assignment approach. Energy Rep. 7, 469–476.
73. The Theory of Communicative Action. (1987). Life world and system: a critque of functionalist reason, trans by: Thomas Mccarthy. vol. 2. Boston: Beacon Press.
74. Thomas, R. (1995). Access and inequality. In Heap, N., Thomas, R., Einon, G., Mason, R. and MacKay, H., editors, Information technology and society: a reader, Milton Keynes: Open University Press.
75. Thomson, J.R. (2015). Cyber security, cyber-attack and cyber-espionage. In: Thomson, J.R. (Ed.), High Integrity Systems and Safety Management in Hazardous Industries. Butterworth-Heinemann, Boston, 45–53.
76. van Dijck, J. (2014). Datafication, dataism and dataveillance: big data between scientific paradigm and ideology. Surveill. Soc. 12 (2), 197–208. https://doi.org/10.24908/ss. v12i2.4776.
77. Vial, G. (2019). Understanding digital transformation: a review and a research agenda. J. Strateg. Inf. Syst. 28 (2), 118–144. https://doi.org/10.1016/J.JSIS.2019.01.003.
78. W. Stallings, R.V. (2001). Slyke, Business Data Communication, Upper Saddle River, 4th ed., New Jersey, USA: Prentice-Hall.
79. Zhang, X., et al. (2021). Ensuring confidentiality and availability of sensitive data over a network system under cyber threats. Reliab. Eng. Syst. Saf. 214, 107697.
80. Zhao, J., et al. (2020). TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data. Comput. Secur. 95, 101867.
81. Zhu, B. Joseph, A. and Sastry, S. (2011). A taxonomy of cyber-attacks on SCADA systems, 2011 International conference on internet of things and 4th international conference on cyber physical and social computing, 380-388.
82. Zou, T., et al. (2020). Smart grids cyber–physical security: Parameter correction model against unbalanced false data injection attacks. Electr. Power Syst. Res. 187, 106490.