The function of regional organizations in cyber wars
Subject Areas : Recent Developments in public lawTajmohammad Sadeghi 1 , Leila raisi 2 , Alireza ansari mahyari 3
1 - Department of Law, Najaf Abad Branch, Islamic Azad University, Najaf Abad, Iran
2 - Associate Professor, Department of Law, Isfahan Branch (Khorasgan), Islamic Azad University, Isfahan, Iran (Responsible Author)raisi.Leila.@Gmail.com
3 - Assistant Professor, Department of Law, Najaf Abad Branch, Islamic Azad University, Najaf Abad, Iran
Keywords: opportunities, regional organizations, Cyber attacks, challenges,
Abstract :
With the expansion of the cyber space, a new arena of threats has been created for governments in the form of cyber threats, and it has affected various aspects of national security, including social, economic, military and political security. It has affected international and regional security, which requires the necessary solutions to minimize the damage caused by this type of threats and maintain international security. Therefore, this article examines the role of regional organizations in preventing cyber-attacks by using the descriptive-analytical method, The hypothesis proposed in this research is that since governments are increasingly focused on unilateral policies and initiatives to deal with cyber threats, regional organizations should play an active role in shaping cooperation among members in the form of approaches focused on International and regional cooperation in the field of cyber security and prevention of cyber threats and the development of the global cyber security system. The findings of the research show that regional organizations such as NATO, the European Union, Shanghai, ASEAN, the Organization for Security and Cooperation in Europe and the Organization of American States have taken measures to reduce damages caused by cybercrimes and counter cyber-attacks, including They have started to increase knowledge and establish cyber laws, regional cooperation, information sharing, infrastructure strengthening and trust building
_|-ترابی، قاسم(1394)«تکامل ناتو در قبال جنگ سایبری؛ دلایل؛ ابعاد و مؤلفه ها» فصلنامه مطالعات راهبردی، سال هیجدهم، شماره اول، مسلسل67،133-158
-تقی زاد، مهرداد، زمرد ، کیوان و حاجیان، مهدی(1396)« نقش اتحادیه اروپا در قاعده مند سازی جرائم سایبری» فصلنامه مطالعات بین المللی پلیس، سال هفتم، شماره29،104-143.
-دزیانی، زهرا(1383)« مقدمه ای بر ماهیت و تقسیم بندی تئوریک جرایم سایبری» خبرنامه انفورماتیک، شماره87.
-ضیایی، محسن(1397)«نقش و عملکرد سازمان های بین المللی در تامین صلح جهانی» مجله بین المللی پژوهش ملل، دوره سوم: ماره30،75-.89
-مشیر زاده، حمیرا(1388)« تحول در نظریه های روابط بین الملل» تهران، نشر سمت.
-Abhishek Kumar Singh, (2016)" Jurisdictional Issues in Cybercrime: An Analytical Study (University of Luck now,
-Abase Mohammad, (2021)" Security in cyber space in the field of international Relations" Journal of Archives in Military medicine: Vole, 8, issue four, 44-85, DoI: https://doi.org/10,5812.
-Benincasa Eugenio (2020)"the rile of regional organizations in building cyber resilience: SEAN and EU, Issues insights, working paper, vole, and 20.wp3.1-41
-Beidleman Scott w (2009)" Defining and Deterring cyber war" USAWC strategy Research
Project, PA17013-5050.www.indianstrategicknow ledgeonline.com.
-Dismal Carlo (2019)"The evolving cyber warfare landscape" www.jstor.org.
-Finkelstehn, Claire and Govern, Kevin H, (2015) "Cyber and the changing Face of war" Faculty scholarship at Penn Carey law.
-Hathaway Oona, and others (2012)" The Law of cyber-Attack" Vole 100, No 4, pp. 717-885, https://www.jstor.org/stable/232498823.
-Levinson, Paul (2020) "Micro cyber war VS. Macro-cyber war: towards the beginning of afaxonomy" Digital war 1, pp.: 171-173, open access.
-Li Yu Chong and Liu Qinghai, (2021)" A comprehensive review study of cyber- attacks and cyber security: Emerging trends and recent developments "Energy Reports7, 8176-8186, http://creativecohmons.org.
-Lilli Eugenio (2023)" How can we know what we Think we Know about cyber operation?
'Journal of Global security studies, Volume, 8, issue, 2, p1-18, https://doi.org/10.1093/jogss/ogad 11.
- K Lukas, Timothy j Elves, frank j, Evans, cilluffo, and Alec a Neadeau, (2016)" European Union and Nato Global cyber security challenge: A Way Forward" Vole, 6, No 2,126-141,
www.jator.org/stable/26470452
-Kert-staubyn, Mari (2016)" Osce confidence building measures for cyberspace" www.ccdcoe.org
-Marie Louise and Deveanny Joe (2023)" Raising the Political of cyber security in Latin America" www-cfr-org.
-Mawgoud Ahmed A. (2020)"Cyber Security Rests in Mena Region: Threats, challenges and counter measures" A. E. Hassanienet al. AISC, 1058, pp912-921.
-Meltzer Nils (2011) "Cyber warfare and international law" ideas for peace and security.
-Madubuike ekwe Joseph n (2021)" cyber-attack and the use of force in international law" Scientific Research an academic publisher, Beijing Law Review, Vole 12, No 2, pp. 631-649
DoI: 10.4236/bar. Www-scrip-org.
-Molyakov, Andrei (2021) "The information and PSY wars of the future: Chinese cyber troops" Journal of scientific-Technical Research, volume 33, issue, 2 pp.: 25603-25608, Dole: 10.26717/bestir.
-Neethu N, (2020)' Role of international organization in prevention of cybercrimes an
Analysis" https://www.researchgate.net/publication/350525198.
-Oakley, John T (2013)" cyber warfare: china's strategy to Dominate in cyber space"www.jstor.org
-Obi, Festus C. and Oludere, Alaba M. (2022)" Taming the shrew of rising cyber warfare"
Open Access Library journal, Volume 9, https://doi.org/104236/oalib.1109003
-Poli, Sara and Sommario Emanuel (2023)" The Rationale and the Perils of Failing to Invoke State Responsibility for Cyber-Attacks: The Case of the EU Cyber Sanctions, German Law Journal, pp. 522–536 doi:10.1017/glj.2023.25
-Kavanagh Stephen (2021)"African cyber Herat Easement Report" www.interpol.int.
-Rohith, cheerala and Singh bath, ranbir (2019) "cyber warfare: Nations cyber conflict cyber cold war between nations and its repercussion"
-Saroha Rashmi (2014)" Proflingacyber criminal" international journal of in formal and computation Technology, Issn0974-2239, Velum 4, Number3, pp253-258.
-Sanou Brahma (2012)" Cybercrimes/e-crimes: Assessment Report" HIPCAR, www.itu.int.
-WA lid Mahmoud Khalid (2013)" cyber-attacks: The Electronic Battlefield"
www.dohainstitute.org.
-Walter Dom A, and Webb Stewart, (2019) "New Ways to prevent and manage cyber-attacks" International journal of cyber warfare and Terrorism, Volume 9, issue 1,
DoI: 10, 40181ijcwt-2019010102.
-"The Role of Regional organizations in strengthening cyber security and stability" (2022), www.diplomacy-edu.
-"Cyber war: the challenge to National security" Global security studies, winter (2013), Vole 4, issue 1, pp. 93-115,
https://www-cybercrimelaw.net.translate.goog/International_organizations.htm-
-United Nations Office on Drugs and Crime, Cybercrime Trends (Nov. 27, 2020, 06:15 PM),
-United nationals institute for Disarmament research 8, (2019)" The center for strategic and international states"
-https://www.unodc.org/e4j/en/cybercrime/module-1/key-issues/cybercrime-trends.html.
-ASEAN cyber security cooperation strategy, 2021-2025(draft), www.asean.org
-https://www.tasnimnews.com/fa/news/1400/09/20/2623648
-Www-f-marc-Gov.-cu.
|_