فصلنامه بین المللی ژئوپلیتیک

فصلنامه بین المللی ژئوپلیتیک

Geopolitics of Cybernetics: Visualizing of Emerging New Power

نوع مقاله : مقاله پژوهشی

نویسنده
Assistant Prof., Geography Department, Faculty of Social sciences, Payam Noor University, Tehran, Iran.
چکیده
One of the most significant breakthroughs in technology is the evolution of computing sciences and cybernetics. This development has had a global impact, with the widespread use of computer sciences leading to worldwide issues. In the third wave, time and place have become intertwined, eliminating the effects of distance and creating a new version of space. These characteristics have transformed the geography of virtual space into the geopolitics of virtual space.
The findings of this analytical article, conducted using a library method and the strategy of cyberspace geography studies, suggest that the geography of virtual space is an emerging academic topic. When the geography of cyberspace addresses inequality in cyberspace security, it becomes a geopolitical issue. The paper explores how cybernetics is changing traditional notions of power, sovereignty, and conflict. The research also considers the implications of emerging technologies on global governance, the balance of power, and the potential for new forms of cyber-hegemony, concluding with recommendations for future policy and strategic considerations in this rapidly evolving field.
کلیدواژه‌ها

موضوعات


عنوان مقاله English

Geopolitics of Cybernetics: Visualizing of Emerging New Power

نویسنده English

Sohrab Asgari
Assistant Prof., Geography Department, Faculty of Social sciences, Payam Noor University, Tehran, Iran.
چکیده English

One of the most significant breakthroughs in technology is the evolution of computing sciences and cybernetics. This development has had a global impact, with the widespread use of computer sciences leading to worldwide issues. In the third wave, time and place have become intertwined, eliminating the effects of distance and creating a new version of space. These characteristics have transformed the geography of virtual space into the geopolitics of virtual space.
The findings of this analytical article, conducted using a library method and the strategy of cyberspace geography studies, suggest that the geography of virtual space is an emerging academic topic. When the geography of cyberspace addresses inequality in cyberspace security, it becomes a geopolitical issue. The paper explores how cybernetics is changing traditional notions of power, sovereignty, and conflict. The research also considers the implications of emerging technologies on global governance, the balance of power, and the potential for new forms of cyber-hegemony, concluding with recommendations for future policy and strategic considerations in this rapidly evolving field.

کلیدواژه‌ها English

Cyberspace
Geography of Virtual Space
Geopolitics of Cyberspace
  1. Ahmadi, B. (2023). “Emerging cyber geopolitics; an opportunity for convergence in the Persian Gulf” Scientific Journal Quarterly of Middle East Studies, Vol 29. No 4. Pp: 1-13. [In Persian]
  2. Ahmadiyaghin, M. (2022). “The Role of Geopolitics of Information in the Design of Modern Combat Strategy with Emphasis on Complexity-Chaos Theory” Journal of Geography, Vol.20, No.72, PP: 113-135. [In Persian]
  3. Bordelon, E.B. (2016). Approaching Cyber Warfare: Geopolitics, Deterrence, and International Law, A Senior Thesis submitted in partial fulfillment. Liberty University.
  4. Castronova, E. (2005). Synthetic Worlds: The Business and Culture of Online Games. University of Chicago Press.
  5. Castells, M. (2009). The Rise of the Network Society. Blackwell Publishers.
  6. Castells, M. (2001). The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford University Press.
  7. Davis, N.C. (1996). AN INFORMATION-BASED REVOLUTION IN MILITARY AFFAIRS: In Athena's Camp. John Arquilla and David Ronfeldt Published by RAND Corporation.
  8. Deibert, R. (2013). Black Code: Inside the Battle for Cyberspace. Signal.
  9. Dodge, M; Kitchin, R. (2001). Atlas of Cyberspace. Addison Wesley.
  10. Rheingold, H. (2000). The Virtual Community: Homesteading on the Electronic Frontier. MIT Press.
  11. Fruhlinger, J. (2023). "How AI is Making Cyberattacks More Dangerous." CIO. Retrieved from https://www.cio.com/article/362108/how-ai-is-making-cyber- attacks-more-dangerous.html.
  12. Gleick, J. (2011). The information: A history, a theory, a flood. Pantheon Books.
  13. Goldsmith, J; Wu, T. (2006). Who Controls the Internet? Illusions of a Borderless World. Oxford University Press.
  14. Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books.
  15. Guiora, A.N. (2017). CYBERSECURITY, Geopolitics, Law and Policy. Routledge, London.
  16. Gul, F; Pesendorfer, W. (2011) “The War of Information” Review of Economic Studies, No. 79, PP: 707-734.
  17. Isaacson, W. (2014). The innovators: How a group of hackers, geniuses, and geeks created the digital revolution. Simon & Schuster.
  18. Hafeznia, M.R. (2006). Principles and Concepts of Geopolitics. Mashhad, Papoli Publications. [In Persian]
  19. Hafeznia, M.R. (2010). “Geopolitical conceptualization of internet and virtual space” Geopolitics quarterly, Volume 7, No. 1, PP: 1-13. [In Persian]
  20. Heim, M. (1993). The Metaphysics of Virtual Reality. Oxford University Press.
  21. IBM (2024). X-Force Threat Intelligence Index 2024.
  22. Koh, D. (2020). The Geopolitics of Cybersecurity. The Diplomat, 9 December.
  23. Kello, L. (2017). “The Virtual Weapon and International Order” Yale University Press, pp. 98-112.
  24. Kitchin, R; Dodge, M. (2011). Code/Space: Software and Everyday Life. MIT Press.
  25. Goldsmith, J Wu, T. (2006). Who Controls the Internet? Illusions of a Borderless World. Oxford University Press.
  26. Libicki, M.C. (2012). Conquest in Cyberspace: National Security and Information Warfare. Cambridge University Press.
  27. Leiner, B.M; Cerf, V.G; Clark, D.D; Kahn, R.E; Kleinrock, L; Lynch, D.C; ...; Wolff, S. (2009). “A brief history of the internet” ACM SIGCOMM Computer Communication Review, 39(5), 22-31.
  28. Lobastova, S. (2020). “Geopolitics of Cyberspace and Virtual Power” Journal of Liberal Arts and Humanities (JLAH) Issue: Vol. 1; No. 3, PP: 97-113.
  29. Mackinder, H.J. (1904). “The Geographical Pivot of History” The Geographical Journal, 23(4), Pp: 421-437.
  30. Malek Mohammadi, H. (2015). “Techno-Geopolitics; a pro classical geopolitics challenging critical approach, Geopolitics Quarterly” Volume: 10, No 4, PP: 109-121. [In Persian]
  31. Mueller, R. (2019). Report on the Investigation into Russian Interference in the 2016 Presidential Election. U.S. Department of Justice.
  32. Mojtahedzadeh, P; Asgari, S. (2011). Political Geography and Geopolitics, Payam Noor University, Tehran, Iran. [In Persian]
  33. Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom. Public Affairs.
  34. National Institute of Standards and Technology (NIST). (2020). Framework for Improving Critical Infrastructure Cybersecurity. NIST.
  35. Nye, J.S. (2004). Soft Power: The Means to Success in World Politics. Public Affairs.
  36. Nye, J. (2010). “Cyber Power and National Security” Harvard University Press, Pp. 125-130.
  37. Ralston, A; Reilly, E.D; Hemmendinger, D. (2003). Encyclopedia of Computer Science. John Wiley & Sons.
  38. 38-Clarke, R.A; Knake, R.K (2010). Cyber War: The Next Threat to National Security and What to Do about It, Harper Collins, New York.
  39. Clarke, R.A; Knake, R.K (2019). The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats, Penguin Press.
  40. Rosenbach, E; Mansted, M. (2019). The Geopolitics of Information, Harvard Kennedy School, Belfer Center for Science and International Affairs.
  41. Rostami, F. (2016). “Changes in the nature of future wars, the Islamic Republic of Iran, Scenarios, opportunities and challenges” Defense Policy Journal, No. 97, Pp. 145-190. [In Persian]
  42. Ruhl, Ch. and Others, (2020). Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads, CARNEGIE ENDOWMENT FOR INTERNATIONAL PEACE.
  43. Shackleford, S. (2022) “AI in Cyber Warfare: How AI is Revolutionizing Cyber Attacks. CSO Online” Retrieved from https://www.csoonline.com/article/ 3536282/ ai-in-cyber-warfare-how-ai-is-revolutionizing-cyber-attacks.html.
  44. Sherman, W; Alan C. (2003). Understanding Virtual Reality: Interface, Application, and Design. Morgan Kaufmann.
  45. Sanger, D.E; Perlroth, N. (2023). "The New Cyberwarfare Threat: AI-Powered Malware" The New York Times. Retrieved from https://www.nytimes.com/ 2023/05/21/technology/ai-cyberwarfare.html.
  46. Singer, P.W; Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know, Oxford University Press.
  47. Spykman, N.J. (1944). The Geography of the Peace. Harcourt, Brace and Company.
  48. Ó Tuathail, G; Dalby, S. (1998). Rethinking Geopolitics. Routledge.
  49. Wellman, B; Haythornthwaite, C. (2002). The Internet in Everyday Life. Wiley-Blackwell.
  50. Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown Publishing Group.
  51. Zook, M; Graham, M. (2007). “The Creative Reconstruction of the Internet: Google and the privatization of cyberspace and DigiPlace” Global Networks, 38(6), Pp: 1322-1343.
  52. https://www.livescience.com/20718-computer-history.html.
  53. https://www.statista.com/statistics/617136/digital-population-worldwide/.
  54. https://www.techtarget.com/searchnetworking/answer/What-are-the-3-most-common-network-issues-to-troubleshoot.
  55. https://www.anonymoushackers.net/cybersecurity-news/countries-with-the-best-hackers-in-the-world-2023/.
  56. https://www.bbc.com/news/articles/cz04m913m49o.
  57. https://www.idc.com/getdoc.jsp?containerId=IDC_P33198.
  58. https://www.statista.com/statistics/273018/number-of-internet-users-worldwide/.
  59. https://www.visualcapitalist.com/mapped-the-number-of-ai-startups-by-country/.
  60. https://finance.yahoo.com/news/ai-godfather-yoshua-bengio-were-creating-monsters-more-powerful-than-us-120042014.html.
دوره 21، شماره 2
تابستان 1404
صفحه 312-337

  • تاریخ دریافت 18 آبان 1403
  • تاریخ بازنگری 17 فروردین 1404
  • تاریخ پذیرش 21 فروردین 1404