An Approach to the Components of Cyberspace in the Discourse of the Islamic Revolution

Document Type : Original Article

Authors

1 Associate Professor, Department of Islamic Mysticism, Imam Hussein University, Tehran, Iran

2 Member of the Academic Staff, National Defense University, Tehran, Iran

3 PhD student in Strategic Cyberspace Management, National Defense University, Tehran, Iran, corresponding author. Zoghi@ihu.ac.ir

Abstract

The principles and foundations of the Islamic Revolution have been manifested and embedded in the Supreme Leader’s excellence model for the advancement of the Islamic Revolution. Therefore, this model can serve as a framework for normalizing cyberspace. Achieving the desired state requires progressing through this logical excellence, and the revolutionary discourse must inevitably implement it step-by-step to reach the new Islamic civilization.
The first phase represents a revolution in cyberspace, parallel to the victory of the revolution in the physical realm, the consequence of which will be the conquest of territory and establishment of cyber sovereignty. Subsequently, we require administrative software and governance tools obtained through designing various systems in cyberspace. Following the formation of an Islamic cyber system, the next stage will be establishing an Islamic government in cyberspace - the most crucial phase that necessitates enacting required cyber governance laws and implementing all systems designed in the previous stage.
The realization of a cyber government meeting Islamic standards, relying on established cyber systems and necessary legislation, will pave the way for an Islamic cyber society where citizens benefit from cyber government services while experiencing virtuous digital living.
In this research, using thematic analysis method, we have identified the components of balanced cyberspace or the components of normative cyberspace theory in the thought of the two Imams of the Islamic Revolution. Their integration into this domain through the structured model provides the groundwork for achieving normative conditions and optimal governance.

Keywords

Main Subjects


  • حافظ نیا، محمدرضا (1385)، «مقدمه‌ای بر روش تحقیق در علوم انسانی»، تهران، سمت.
  • خیامی، کیا (1403)، " گزاره‌های هنجاری رسانه از منظر رهبر معظم انقلاب"، نشریه مطالعات میان رشته‌ای تمدنی انقلاب اسلامی، سال سوم، ص 12- 49.
  • عابدی جعفری، حسن؛ محمدسعید تسلیمی؛ ابوالحسن فقیهی؛ محمد شیخ‌ز (1390)، «تحلیل مضمون و شبکه مضامین: روشی س و کارآمد برای تبیین الگوهای موجود در د‌های کیفی»، اندیشه مدیریت راهبردی، سال پنجم، شماره 2 (پیاپی 10) پاییز و زمستان، ص 154-155.
  • فرزندی، عباسعلی (1399)، «گفتمان انقلاب اسلامی منطبق بر آموزه‌های اسلام ناب»، بازیابی شده از: https://sndu.ac.ir/maktab/fa/news/2626
  • قاسمی، یارمحمد و هاشمی، علی (1398)، «انجام پژوهش به روش تحلیل تماتیک: راهنمای عملی و گام به گام برای یادگیری و آموزش»، فصلنامه علمی فرهنگ ایلام، دورة بیستم، شماره 64 و 65؛ پاییز و زمستان 1398.
  • علیز، الهه (1397)، «اخلاق و فضای سایبری»، ماهنامه ندای قلم، شماره هشتم. مهرماه.
  • مک‌کویل، دنیس (1381)، «نظریه‌های ارتباطات اجتماعی»، ترجمه افشین رزاقی، تهران پیکان، چاپ اول، ص 127.
  • معتمدنژاد کاظم (1387)، «حقوق ارتباطات»، تهران، دفتر مطالعات و توسعه رسانه‌ها.
  • یوسف ز، حسن، (1394)، «ارتباطات جمعی از منظر اسلام»، قم، انتشارات موسسه امام خمینی.

 

ج) منابع انگلیسی

 

  • Gupta Shivam Kumar & Singh Preeti, (2025), “Global Cybersecurity Governance: The Role of International Norms in Cyberspace”, Part of the book series: Studies in Computational Intelligence(SCI,volume 1181), February 2025, pp 113–127.

 

  • Hogeveen, Bart. (2022). “The UN norms of responsible state behaviour in cyberspace”, Guidance on implementation for Member States of ASEAN, March 2022.
  • Nowell, L. S. Norris1, J. M., White D. E., & Moules, N. J. (2017). Thematic analysis: Striving to meet the trustworthiness criteria. International Journal of Qualitative Methods, 16, 1–13.
  • Libicki, Martin C. (2020). “Norms and Normalization”, A work of the U.S. Government, The Cyber Defense Review, Spring 2020, pp. 41-52.
  • Pettigrew, Karen E. (1998). The role of community health nurses in providing information and referral to the elderly: A study based on social network theory. Unpublished doctoral dissertation, University of Ontario, London, Ontario, Canada. Available at: http://projects.ischool.washington.edu/fisher/dissertation/Tp&TOC.pdf (A ccessed on 24 Feb. 2010).
  • Rogers, A., Castree, N., & Kitchin, R. (2013). normative theory. In A Dictionary of Human Geography: Oxford University Press. Retrieved 25 Jan. 2022, from https://www.oxfordreference.com/view/10.1093/acref/9780199599868.001.0001/acref-9780199599868-e-1311.
  • S. Department of Defense (2022). “Joint Publication 3-12: Cyberspace Operations”.
  • Receive Date: 26 November 2024
  • Revise Date: 03 January 2025
  • Accept Date: 15 February 2025
  • First Publish Date: 21 March 2025
  • Publish Date: 21 March 2025