امروزه، قدرت هوشمند بهعنوان عامل کاربردی و یک اهرم فشار قابلاطمینان از سوی دولتها معرفیشده است. قدرت هوشمند با توجه به سیر تکاملی بودن خود نیازمند سامانۀ حمایتی همهجانبه برای پیشبرد اهداف میباشد و برای حرکت روبهجلوی خود در نظامهای بینالمللی نیازمند حمایت کنندهای قوی دارد تا بتواند با توجه به رابطه مداریهای بینالمللی اهداف خود را پیش ببرد. این حمایتکننده قوی فضای سایبری میباشد. ادبیات در حوزههای مشترک امنیت سایبری و قدرت هوشمند هنوز در دوران اولیۀ رشد خود به سر میبرد. این پژوهش براساس اهداف توسعهای و ازنظر روش گردآوری دادهها، از نوع همبستگی میباشد، به این دلیل که پژوهشگر درصدد یافتن رابطهای بین دو متغیر قدرت هوشمند و فضای سایبری، تعریف مکانیسمهای هوشمندانه فضای سایبری و بهدست آوردن ساختاری جامع از روابط متقابل قدرت هوشمند و فضای سایبری میباشد. در این پژوهش از منابع کتابخانهای و پژوهشهای میدانی بهره برده شده است و ازنظر هدف، صورت توسعهای – کاربردی و ازنظر گردآوری دادهها توصیفی میباشد. این پژوهش به بررسی عوامل هوشمند در فضای سایبری پرداخته و رابطهای سامانمند میان جنبههای مختلف این دو عامل را موردبررسی قرار داده است. عوامل قدرت هوشمند و فضای سایبری شناسایی گردید. مدل مفهومی نهایی براساس مؤلفههای بهدستآمده طراحی گردید.
Cyber resilience , The cyber risk challenge and the role of insurance. (2014). CRC FORUM.
Richard L. Armitage, J. S. (2007). CSIS COMMISSION ON SMART POWER. CSIS.
Abbott, M. (2014). Log Analysis of Cyber Security Training Exercises. Elsevier, 5-7.
Alleyne, M. D. (2012). International Communication And World Affairs. Journalism And Mass Communication, 2.
(2016). Degrees of Freedom, Dimensions of Power. MIT Press Journals, 19-20.
Clarke, R. A.Securing Cyberspace Through International Norms. (2011).
Cliff Joslyn, S. C. (2013). Massive Scale Cyber Traffic Analysis: A Driver for Graph Database.ACM. 1.
Henshela, M. G. (2015). Trust as a human factor in holistic cyber security risk. 1118.
Henshela, M. G. (2015). Trust as a human factor in holistic cyber security risk assessment. ScienceDirect, 1118.
Danielson, M. E. ((2009)). Economic Espionage: A Framework for a Workable Solution. Minnesota Journal of Law, Science & Technology, 504-507.
David A. Lane a, S. v. (2011). (2011). Innovation, sustainability and ICT. ELSEVIER, 83-86.
Dealing With Today’s Asymmetric Threat to U.S, Global Security. Employing Smart Power. ((2009)).
Dutton, J. M. (2016). The New Cybersecurity Agenda:Economic and Social Challenges to a Secure Internet. Michigan State University.
Eadie, P. (2016). Counter-terrorism, Smart Power and the United States. GlobalPolicy, 328.
Eadie, P. (2016). Counter-terrorism, Smart Power and the United States. 323-324.
Eadie, P. (2016). Counter-terrorism, Smart Power and the United States. Global Policy, 324.
Elena Ramona STROIE, A. C. (2011). Security Risk Management - Approaches and Methodology.. Informatica Economică,, 229-230.
Ernest J. Wilson, I. (2008). Hard Power, Soft Power, Smart Power. The ANNALS of the American Academy of Political and Social Science. 111-122.
european commission. Cybersecurity. (2016).
(2016). China’s Security Strategy towards East Asia.. The Chinese Journal of International Politics(OXFORD), 7.
Fischer, E. A. (2014). Cybersecurity Issues and Challenges: In Brief. 1.
Fischer, E. A. (2016). Cybersecurity Issues and Challenges. 12.
Fry, R. (2014).. (2014). Smart Power and the Strategic Deficit. The RUSI Journal, 31.
Gallarotti, G. M. (2011). Soft power: what it is, why it’s important, and the conditions for its effective use. Journal of Political Power, 25-30.
Gallarotti, G. M. (2011). Soft power: what it is, why it’s important, and the conditions for its effective use. Journal of Political Power, 25-28.
Gallarotti,G. M. (2014).Smart Power:Definitions,Importance,and Effectiveness. Social Sciences, 4-8.
(2016). Soft power: Media influence and its limits. 1.
HARE, F. (2015). Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?.. George Mason University, 2.
Haugaard, M. (2012). reflections upon power over, power to,power with, and the four dimensions of power. Journal of Political Power. 353.
Henga, Y.-K. (2015). Smart Power and Japan’s Self-Defense Forces. 284.
(2010). Understanding cybercrime: Phenomena, challenges and legal response.
Wilson, E. (. (2008). Hard Power, Soft Power, Smart Power. The ANNAL Of American Academy of Politicalad Social Sciece, 114.
James A. Lewis, K. T. (2011). (2011). Cybersecurity and Cyberwarfare.. CSIS, 3.
Jason Creasey, I. G. (2013). Cyber Security Incident Response Guide. 4.
Joseph S. Nye, J. (2008). Public Diplomacy and Soft Power. SAGE, 94-102.
Kabay, M. E. (2008). Industrial Espionage. Network World Fusion Security. 3.
KAGAN, R. (n.d.). OF PARADISE, AND P OWER. Vintage. 2003,2004.
Kashiam, M. A. (2012). The Italian role in the Libyan spring revolution: is it a shift from soft to hard power? Routledge Taylor AndFrancis Group.
Keir Giles, K. H. (2015). Cyber Defense:An International View. The United States.
Kuromiya, H. (2009). STALIN’S GREAT TERROR AND ESPIONAGE. The National Council for Eurasian and East European Research. 3.
Lampros Litosb, c (2017). Management tool design for eco-efficiency improvements in manufacturing.ScienceDirect, 505.
Lee Gillam, A. V. (2012). Investigating Cyber Law and Cyber Ethics: Issues, Impacts, and Practices.. Information Science Reference, 79.
Lee, G. (2009). A theory of soft power and Korea's soft power Strategy. Korean Journal of Defense Analysis, 211.
Lee,G.A theory of soft power and Korea's soft power Strategy.Korean Journal of Defense Analysis. (2009) 211.
LIBICKI, M. C. (2009). Cyber Deterence And Cyberwar. 12-13.
Lindsley Boiney, J. C. (2015). Cyber Operations Rapid Assessment (CORA). 4-8.
LuisOrtega, J. (2016). Reference Management Tools. Elsevier Ltd, 65.
(2018). Efficiency and effectiveness of factors affecting renewable energy projects; an empirical perspective. 6-13.
Marco Angelini. Maria Cristina Arcuri, R. B. (2013). Italian Cyber Security Report.
Margarita Kefalaki, Y. P. (2012). Challenges in International Communication. Athens Institute for Education and Research, 1.
Martin, A. (2012). Political participation among the young in Australia. Routledge.
Martin, A. (2012). Political participation among the young in Australia Routledge.
Mason Ricea, J. B. (2011). A signaling framework to deter aggression in cyberspace. ELSEVIER, 58.
Mason Ricea, J. B. (2011). A signaling framework to deter aggression in cyberspace.. ELSEVIER, 58.
MATTHEW S. COHEN, C. D. (2015). Israel and Cyberspace: Unique Threat and Response.. International Studies Perspectives Advance Access.
Mayfield, M. (2011). Innovation. Elsevier, 1.
(2016). Soft power, Russia and the former Soviet states: a case study of Russian language and education in Armenia. International Journal of Cultural Policy, 1.
Moore, T. (2010). Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy.
Navráti, D. (2014). National Cyber Security Strategy OF THE CZECH REPUBLIC. 20.
Noluxolo Gcaza, R. v. (2017). Information & Computer Security.. EMERALD INSIGHT, 4.
Nor’azuwa Muhamad Pahri, N. A. (2010). 3rd Party Information Security Assessment Guideline.CyberSecurity Malaysia, 12
Nye, J. S. (2006). Soft Power, Hard Power and Leadership. 3-4.
Nye, J. S. (2011). Power and foreign policy. Journal of Political Power, 20.
Nye, J. S. (2012). China and soft power. Journal of International, 151-152.
Nye, J. S. (2015). China and soft power. Routledge, 151.
Patterson, W. R. (2008). Smart power in reunified Germany. pp.340-49. Journal of Power, 340-49.
(2008). Smart power in reunified Germany. Journal of Power, 350.
Petress, K. (2016). Power: Definition, Typology, Description, Examples, and Implications. 1-3.
Purdy, A. (2016). The Global Cyber Security Challenge. Huawei Technologies, 7.
(2013). Negotiating meanings for security in the cyberspace. 32-34.
(2013). Negotiating meanings for security in the cyberspace. Emerald Insight, 32-34.
(2013). Negotiating meanings for security in the cyberspace. Emerald Insight, 32-34.
(2013). Negotiating meanings for security in the cyberspace. Emerald Insight, 32-34.
Ramsaroop, P. (2003). Cybercrime, Cyberterrorism, and Cyberwarfare. Technology and Health Services Delivery Health Services Organization Unit (THS/OS). 14.
Randall J. Murphy, M. S. (2015). Guidebook on Best Practices for Airport Cybersecurity. 7.
(391). I Will Follow: Smart Power and the Management of Wartime Alliances.. Journal of Strategic Studies, 215.
Richard L. Armitage, D. J. (2008). IMPLEMENTING SMART POWER: SETTING AN Agenda For National Security Reform. CSIS, 3.
Robert G. Abbott, J. M. (2015).. (). Log Analysis of Cyber Security Training Exercises.ScienceDirect, 5089.
Robert V. Kozinets, A. H. (2008). The Wisdom of Consumer Crowds: Collective Innovation in the Age of Networked Marketing. Journal of Macromarketing, 340.
Rubenstein, D. (2014). Nation State Cyber Espionage and its Impacts. CSE, 2.
Saroyan, D. (2015). SMART POWER. PUBLIC DIPLOMACY MAGAZINE,, 14-19.
Sherr, J. (2011). Hard power in the Black Sea region: a dreaded but crippled instrument.. 11.
SKINNER, C. P. An International Law Response to Economic Cyber Espionage.. (2014).
Stall, S. T. (2011). The Future Of Cyber Security. 7.
Stephen J. Mariano, C. B. (2009). US Army Africa: Smart Power in Action. Small Wars Journal, 2.
(2015). Cyber security, community, time. cyber security and the politic. 20-41.
(2015). Cyber security, community, time. Cyber Security and the Politics of Time. 21-40.
Strategy, A. t. (2009). Lee, G.. Korean Journal of Defense Analysis, 1.
Stratton, J. (2009). International law. 2-7.
Susana Borrás, C. E. (2013). The choice of innovation policy instruments. 1.
Tana, S. S. (2015). Mailed Fists and Velvet Gloves: The Relevance of Smart Power to Singapore’s Evolving Defence and Foreign Policy. Journal Strategic Studies, 332-333.
Understanding cybercrime: Phenomena, challenges and legal response.. (2010). ITU.
Wamala, F. (2011). The ITU National Cybersecurity Strategy.
Wamala, F. (2011). (2011). The ITU National Cybersecurity Strategy Guide. ITU.
Wamala, F. (2011). The ITU National Cybersecurity Strtategy Guide. ITU.
YONG-SOO EUN, J. S. (2014). Cyberwar: Taking Stock of Security and Warfare in the Digital Age. International Studies Perspectives, 4.