Legal rules and regulations in cyberspace and legal claims of the Islamic Republic of Iran

Document Type : Original Article

Authors

1 Associate Professor, Payame Noor University

2 Asisstant Professor, Department ofislamic,faculty of Theology, Payamnoor university Tehran,iran

3 Graduated in M.A Public International Law

Abstract

The living environment has always faced many threats, and today another form of these threats is observed. What governments and political systems have used in the recent and distant past has been the use of force or war against a country with which they have engaged in war or conflict. But today the form of threats has changed and cyberspace is being used as a vehicle to threaten others and achieve national interests. Threatening the use of cyberspace is subject to domestic and international laws and regulations. The present study also examines the legal laws in cyberspace and the legal claims of the Islamic Republic of Iran. The question is, what are the legal provisions for dealing with threats and attacks in cyberspace from Iran? The answer is that although there are several domestic legal approaches to investigating cyber threats, they are not very effective due to their limited internal space. But in order to apply the teachings of international law, to invoke threats to peace and security, such as the so-called Security Council and the Charter of the United Nations; Recourse to regional and international declarations and charters, recourse to the International Court of Justice to identify and punish aggressors, and finally invoking the principle of legitimate defense are recognized in various sections of cyber law. In the present study, a descriptive-analytical method was used.

Keywords


باقری، رضا (1397)، پدیده­های ناامنی نرم­افزاری و امنیت هستی­شناختی در جمهوری اسلامی ایران(تأثیر فضای سایبر بر هویت فردی و ملی)، پایان­نامه دکتری، گروه علوم سیاسی، دانشگاه شهید باهنر.
جلالی، محمود، توسلی اردکانی، سعیده (1398)، ضرورت ایجاد نظام هماهنگ حقوقی بین‌المللی در مقابله با جرایم در فضای مجازی، فصلنامه مطالعات حقوق عمومی، دوره 49، شماره 4، صص 1372-1351.
جی پست، دیوید (1385)، هرج ومرج، دولت واینترنت، جستاری در باب قانون‌گذاری در فضای شبکه ای، ترجمه پرویزعلوی، فصلنامه علمی ـ پژوهشی دانشگاه آزاد اسلامی واحد آشتیان، پیش شماره ۱، پاییز ۱۳۸۵.
زمانی، سید قاسم (1377)، جایگاه قاعده آمره در میان منابع حقوق بین‌الملل، مجله حقوقی شماره 22، صص 334-305.
سلیمانی­پورلک، فاطمه (1392)، قدرت نرم در استراتژی خاورمیانه­ای آمریکا، چاپ سوم، تهران، انتشارات پژوهشکده مطالعات راهبردی.
ضیایی، سیدیاسر؛ شکیب‌نژاد، احسان (1396)، "قانونگذاری در فضای سایبر"، مجله حقوقی بین‌المللی، دوره 34، شماره57.
عظیمی، فاطمه، خشنودی، هادی (1395)، "نقش تروریسم سایبری در تهدید علیه امنیت ایران و راه‌های پیش‌گیری از آن"، فصلنامه مطالعات سیاسی، سال نهم، شماره 34، صص 172-159.
قاسمی، علی، چهاربخش، ویکتوربارین (1391)، "حملات سایبری و حقوق بین‌الملل"، مجله حقوقی دادگستری، شماره 78، صص 146-115.
قنبری جهرمی، محمدحسین (1399)، "فلسفه جنگ‌های نیابتی در عصر جدید"، مجله سیاست دفاعی، (113)29.
Akeherst, Micheal (1984), A Modern Introduction to International Law, op.cit.pp.259 - 262
Albakri, M., Sturm, L., Williams, C. B., & Tarazaga, P. (2017). Impedance-based non-destructive evaluation of additively manufactured parts. Rapid Prototyping Journal, 23(3), 589–601. https://doi.org/10.1108/RPJ-03-2016-0046.
Anthony Aust, Handbook of International Law, Cambridge University Press, New York, 2010, p. 40.
Chander, Anupam & Madhavi Sunder, “The Romance of the Public Domain”, California Law Review, vol. 92, 2004.
Chesterman,S.  T.M.Franck and D.M.Mallone,(2008) Law and Practice of the United Nations, Oxford.
Elhabashy, Ahmad E., Lee J. Wells, Jaime A. Camelio & William H. Woodall (2014),  A cyber-physical attack taxonomy for production systems: a quality control perspective, Journal of Intelligent Manufacturing volume 30, pages2489–2504.
Everard, Jerry (2000) Virtual StatesThe Internet and the boundaries of the
nation-state, Rutledge publication.
Garner, B.A. (2009), Black’s Law Dictionary, Eagan: West Group, 9th ed.
Gellman, Barton(2002), Cyber Attacks by Al Qaeda Feared; Terrorists at Threshold of Using Internet as Tool of Bloodshed, Experts Say, WASH. POST, June 27, 2002, at A01.
Hathaway, Oona and Crootof, Rebecca(2012), Levitz Philip, “The Law of Cyber Attack”, California Law Review.
Ignarski, Jonathan , Barrister Alfred M. de Zayas  (1982), Encyclopedia of Public International Law, Use of force, War and Neutrality Peae Treaties (vol 3), Amsterdam: Published under the Auspices of the Max Planck institute, North Holand Publishing company.
Jiaxuan Fei ; Congcong Shi ; Xuechong Yuan ; Rui Zhang (2019), Wei Chen Reserch on Cyber Attack of key Measurement and Control Equipment in Power Grid, IEEE Digital Library, https://ieeexplore.ieee.org/abstract/document/87913016.
Lewis, James Andrew(2020), “Cyber Stability, Conflict Prevention, and Capacity Building”,  Center for Strategic and International Studies in Washington, D.C.
Michele L., Frank, Jonathan H. Grenier, and Jonathan S. Pyzoha (2019), How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. Journal of Information Systems: Vol. 33, No. 3, pp. 183-200.
Weisbord, N.(2009), “Conceptualizing Aggression”, Duke J.Comp. & Int’l L., No. 20.