چالش‌های امنیت سایبری در کشورهای آسه‌ آن

نوع مقاله : مقاله علمی- پژوهشی مستخرج از رساله

نویسندگان

1 دانشجوی دکتری تخصصی حقوق بین الملل عمومی، واحد مراغه، دانشگاه آزاد اسلامی، مراغه، ایران

2 دانشیار گروه حقوق جزا و جرم شناسی، واحد مراغه، دانشگاه آزاد اسلامی، مراغه، ایران

چکیده

تبدیلِ امنیتِ سایبری به یک مشکل اساسی در جهان، باعث شده «آسه آن» نسبت به رفع مشکل امنیتِ سایبری با احساس فوریت اقدام کند. ‌انجام اقداماتِ حفاظتی و سایر تلاش‌های صورت گرفته برای مقابله با حوادثِ سایبری در سطح منطقه‌ای و ملی نشان دهنده آگاهی «آسه آن» از اهمیت وجود یک روش مقاومِ سایبری است که دستیابی به آن از طریق بررسی شاخص‌های مربوط به امنیتِ سایبری با موضوعات دفاع در برابر حملاتِ سایبری نوآورانه، راهبردهایی در برابر تهدیداتِ امنیتِ سایبری، سیاست‌های دولت و محافظت در برابر حریمِ خصوصی، حمایت از زیرساخت‌های رایانه‌ای در دولت و مسائل حقوقی و اخلاقی در فضای سایبری به عنوان هدف این پژوهش با رویکرد توصیفی- تحلیلی میسر می‌باشد و سوالی که به ذهن متبادر می‌شود این است که کشورهای «آسه آن» برای دستیابی به روش مقاوم سایبری، محورهای مطالعاتی امنیت سایبری را بر کدام یک از شاخص‌ها استوار ساخته و تاکنون چه تعداد تحقیق در این شاخص‌ها انجام داده‌اند؟ یافته‌های پژوهش نشان می‌دهد که در مورد شاخص‌های مطالعاتی امنیتِ سایبری به خصوص در زمینه سیاست‌های دولت و محافظت در برابر حریم خصوصی در برخی کشورهای «آسه آن» تحقیقات محدود صورت گرفته است که این موضوع ارتباط مستقیم با افزایش جرایم سایبری دارد.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

Cyber Security Challenges in ASEAN Countries

نویسندگان [English]

  • Elnaz Katanchi 1
  • Babak Pourghahramani 2
1 PhD Student in Public International Law, Maragheh Branch, Islamic Azad University, Maragheh, Iran
2 Associate Professor at Criminal Law and Criminology Department, Maragheh Branch, Islamic Azad University, Maragheh, Iran
چکیده [English]

Cyber security has become a major problem in the world, and ASEAN has taken urgent steps to address cybersecurity. Security measures and other efforts to combat cyber incidents at the regional and national levels demonstrate ASEAN's awareness of the importance of a robust cyber approach that can be achieved by examining cyber security indicators with defense issues. Defense against innovative cyber-attacks, strategies against cyber security threats, government policies and protection of privacy, protection of computer infrastructure in government and legal and ethical issues in cyberspace are the objectives of this research with a descriptive-analytical approach. It comes to mind that the ASEAN countries have based their cyber security study axes on achieving a robust cyber approach, and how much research has been done on these indicators so far? The findings show that there has been limited research on cybersecurity research indicators, particularly government policies and privacy protection in some ASEAN countries, which is directly related to the increase in cybercrime.

کلیدواژه‌ها [English]

  • ASEAN
  • Challenges
  • Cyber Security
  • Cyber Attacks
  • Cybercrime
  • Member States Policy
  1. Abd, R, N. H., Hamid, S., Kiah, L. M., Shamshirband, S., Furnell. S. (2015). A Systematic Review of Approaches to Assessing Cybersecurity Awareness. Kybernetes 44(4):606–22. at: https://doi.org/10.1108/K-12-2014-0283
  2. Abdul Manap, N., Abdul Rahim, A., Taji, H. (2015). Cyberspace Identity Theft: The Conceptual Framework. Mediter. r. J. Soc. Sci., 6(4), 595–605. at: https://doi.org/10.5901/mjss.2015.v6n4s3p595
  3. Abdulmana, S., Saleh, B. (2015). Coordinate Negative Content Filtering and Threat Detection in Thailand on the Internet Infrastructure. 5th Int. Inf. Commun. Technol. Muslim World, at: https://doi.org/10.1109/ICT4M.2014.7020647, 6–10
  4. Adkanian, A.,Khosravi, M. (2018), the Position of Food Security from the Perspective of Transitional Justice. International Studies Journal (ISJ), 16(2), 155-139. (In Persian)
  5. Alberts, D. (2006). National Security Requirements in the Information Age. Research Institute for Strategic Studies. (In Persian)
  6. (2018). Conception and Evolution. In The 3rd ASEAN Reader. ISEAS –Yusof Ishak Institute Singapore, xiii–xviii.
  7. Brunot, R. (2018). United Nations Security Council Background Guide, at: http://www.ccwa.org/wp-content/uploads/2018/09/UNSC-Final.pdf: 1-11
  8. Chia, S. (2013). The ASEAN Economic Community: Progress, Challenges, and Prospects. at: https://doi.org/10.2139/ssrn.2346058
  9. Dai, C. T. (2015). Cybersecurity in Vietnam: Formulation and Implementation of a New Strategy. @ La cybersécurité au VIêt Nam: Formulation et mise en oeuvre d’une nouvelle stratégie. Herodote, no. 157, 126–140. at: https://doi.org/10.3917/her.157.0126
  10. Daud, M., George, M., Asirvatham, D. (2018). Bridging the Gap between Organisational Practices and Cyber Security Compliance: Can Cooperation Promote Compliance in Organisations?. J. Bus. Soc, 19(1), 161–180.
  11. B. a B. W. World. (2018), Cybersecurity for Industry 4.0 Cyber Security Implications for Government, Industry and Homeland Security.
  12. Einzenberger, R. (2016). If It's on the Internet It Must Be Right: An Interview with Myanmar ICT for Development Organisation on the Use of the Internet and Social Media in Myanmar. Austrian Journal of South-East Asian Studies, 9(2), 301-310.
  13. Faradilla, E., Agung, A., Perwita, B. (2017), Indonesia Cyber Security Development: The Analysis of Infrastructure, Regulation and Institutional Building (2007-2015). Information System Application Journal, 2(1), pp. 1–5.
  14. Ghazi-Tehrani, A. (2015). The Current State of Cybercrime in Thailand: Legal, Technological, and Economic Barriers to Effective Law Enforcement. Thai Justice Syst. Spec. Ed, 1–28.
  15. Gjesvik, L., Schia, N. N. (2018). Paper and Gjesvik. Managing a Digital Revolution Cyber Security Capacity Building in Myanmar. Norway: Published by the Norwegian Institute of International Affairs.
  16. Gorian, E. V. (2018). Singapore’s Leadership on Cyber security in ASEAN: Intermediate Results and Future Prospects.
  17. Gupta, R., Khari, M., Shirivastava, G. (2018). Role of Cyber Security in Today`s Scenario, Available at: www.igi-global.com/chapter/role-of-cyber-security-in-todaysscenario/
  18. Haddon, L. (2004). Information and Communication Technologies in Everyday Life. Berg Publishers, First Edition.
  19. Hashim, M. S., Masrek, M. N., Yunos, Z. (2016). Elements in the Cyber Security Framework for Protecting the Critical Information Infrastructure against Cyber Threats. International Information Institute (Tokyo). Information; Koganei, 19(7), 2989-2994.
  20. Hung, H. (2016). Confronting Cybersecurity Challenges through US- Singapore Partnership.
  21. Iranian Students Newsletter. (2018). "Things to do after the Account is Hacked". IT News Service, At: https://iusnews.ir/fa/print/295896/ (In Persian)
  22. Ismail, N. N. (2014). Greater Freedom in the Cyberspace? An Analysis of the Regulatory Regime of the Internet in Malaysia. South East Asia. Contemp. Business, Econ. Law, 5(4), 40–44.
  23. Jayabalan, P., Ibrahim, R., Manaf, A. A. (2014). Understanding Cybercrime in Malaysia: An Overview. Sains Humanika J, 2(2), 109-115.
  24. Kadis, M. R., Abdullah, A. (2017). A. Global and Local Clustering Soft Assignment for Intrusion Detection System: A Comparative Study. Asia-Pacific J. Inf. Technol. Multimed, 6(1), 30-38.
  25. Kargar, A., Sistani, R., Patel, A. (2016). A. M. Design and Evaluation of a Virtual Private Network Architecture for Collaborating Specialist Users. Asia-Pacific Journal of Information Technology and Multimedia, 5(1): 15–30.
  26. Katanchi, E.,Pourgharmani, B. (2019). Symbolic Policies Council of Europe Cybercrime Treaty. International Studies Journal (ISJ), 62(2), 31- 47. (In Persian)
  27. Kazeruni, M. (2016). The Challenge of Implementing the Right to Freedom of Expression with the Prohibition of the Use of Cyberspace by Terrorism. International Studies Journal (ISJ), 61 (4), 167-198. (In Persian)
  28. Khanisa, -. (2013), a Secure Connection: Finding the Form of ASEAN Cyber Security Cooperation. Journal of ASEAN Studies, 1(1), 41–53.
  29. Kiankhah, E. (2010). Information Security Management, Tehran: Naghos Publications, First Edition. (In Persian)
  30. Kiankhah, E.,Alavi Vafa, S. (2011). The Concept of Cyber Security. Proceedings of the First National Conference on Cyber Defense, 1-8. (In Persian)

31.  Koh, D. (2020). The Geopolitics of Cyber Security. At: https://thediplomat.com/2020/12/the-geopolitics-of-cybersecurity/

  1. Malaysian Administrative Modernisation and Management Planning Unit. (2016). the Malaysian Public Sector ICT Strategic Plan. Malaysian Public Sect. ICT Strateg. Plan 2016-2020, August, 23.
  2. Maung, T. M., Thwin, M. M. S. (2017). Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar. 15th Int. Conf. Computer.
  3. Maung, T. M., Thwin, M. M. S. (2017). Proposed Effective Solution for Cybercrime Investigation in Myanmar. J. Eng. Sci., 6(1), 01–07.
  4. Mizan, N., Ma’arif, M., Mohd Satar, N., Shahar, S. (2019). CNDS-Cybersecurity: Issues and Challenges in ASEAN Countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1), 113-119.
  5. Noor, E. (2014). Securing ASEAN’s Cyber Domain: Need for Partnership in Strategic Cyber Security. Rajaratnam Sch. Int. Stud. Singapore, no. 236, 01–03.
  6. Noor, E. (2015). Strategic Governance of Cyber Security: Implications for East Asia. Navigating Change: ASEAN-Japan Strategic Partnership in East Asia and in Global Governance, Tokyo: Japan Center for International Exchange.
  7. Omar, S. A., Hasbolah, F. (2018). Awareness and Perception of Accounting Students towards Industrial Revolution 4.0. in Proceedings of the 5th International Conference on Accounting Studies (ICAS 2018) 16-17 October 2018, Penang, Malaysia.
  8. Omar, S. A., Hasbolah, F., Zainudin, U. M. (2017). The Diffusion of Artificial Intelligence in Governance of Public Listed Companies in Malaysia. J. Business, Econ. Law, 14(2), 1–9.
  9. Ong, L., Chong, C. (2014). Information Security Awareness: An Application of Psychological Factors A Study in Malaysia. 2014 International Conference on Computer, Communications and Information Technology (CCIT 2014).
  10. Quisumbing, L. A. (2017). Global Perspectives on Cyber Security Using Latent Dirichlet Allocation Algorithm. J. Appl. Eng. Res., 12(20), 10310–10323.
  11. Rahmawati, I. (2019). The Analysis Ofcyber Crime Threat Risk Management to Increase Cyber Defense. Pertahanan Bela Negara.
  12. Razana, W. S. M. (2016). Cybersecurity: Towards Becoming A National Certification Body For Information Security Management Systems Internal Auditors. Sch. Sci. Res. Innov, 10(8), 2907–2910.
  13. Rizal, M., Yani, Y. (2017). Cyber Security Policy and Its Implementation in Indonesia. Journal of ASEAN Studies, 4(1), 61-78.
  14. Rizki, A. M. (2018). Langkah Singapura Dalam Meningkatkan Kesadaran Negara Anggota Asean Untuk Meningkatan Keamanan Siber, Pros. Senas POLHI ke-1 Tahun 2018.
  15. Salamzada, K., Shukur, Z., Abu Bakar, M. (2016). A Framework for Cybersecurity Strategy for Developing Countries: Case Study of Afghanistan. Asia-Pacific J. Inf. Technol. Multimed. 4, 1-10.
  16. Soheili Najafabadi, S.,Priests of Sir Ki, G.,Qaedi, M.,Simber, R. (2019). Study of Military Policies on the Security of the Persian Gulf Regions. International Studies Journal (ISJ), 61 (1), 155- 182. (In Persian)
  17. Staples, M., Niazi, M. (2007). Experiences Using Systematic Review Guidelines. Syst. Softw, at: https://doi.org/10.1016/j.jss.2006.09.046
  18. Suhaiza S., Zawiyah M. Y. (2017). Public Sector ICT Strategic Planning: Framework of Monitoring and Evaluating Process. Asia-Pacific J. Inf. Technol. Multimed, 6(1), 85–99.
  19. Sunkpho, J., Ramjan, S., Ottamakorn, C. (2018). Cybersecurity Policy in the ASEAN Countries. Inst. Conf, March.
  20. Supayah, G., Ibrahim, J. (2017). An Overview of Cyber Security in Malaysia. Kuwait Chapter Arab. J. Bus. Manag. Rev, 6(4), 12–20. At: https://doi.org/10.12816/0036698
  21. Teoh, C. S., Kamil Mahmood, A., Dzazali, S. (2018). Cyber Security Challenges in Organisations: A Case Study in Malaysia. 2018 4th Int. Comput. Inf. Sci. Revolutionising Digit. Landsc. Sustain. Smart Soc. ICCOINS 2018 - Proc., 1–6.
  22. Wardana, A., Pedrason, R., Prasetyo, T. B., and Pertahanan, U. (2018), Implementasi Digital Forensik Brunei Darussalam Dalam Membangun Keamanan Siber Implementation of Digital Forensic Brunei Darussalam in Building Cyber Security. Jurnal Prodi Perang Asimetris, 4, 1–22.
  23. Yuen, L. C. (2019). Strengthening Cybersecurity in Singapore: Challenges, Responses, and the Way Forward. In Security Frame works in Contemporary Electronic Government, 96-128. IGI Global, 2019. At: https://doi.org/10.4018/978-1-5225-5984-9.ch005
  24. Yunos, Z., Ahmad, R., Mohd Sabri, N. A. (2015). a Qualitative Analysis for Evaluating a Cyber Terrorism Frame work in Malaysia Inf. Security Journal, 24(1–3), 15–23. At: https://doi.org/10.1080/19393555.2014.998844
  25. Raska, M. (2018). Cyber Security in Southeast Asia. Note d’introduction à la table ronde du 22 Mai, 1-9.