نوع مقاله : مقاله پژوهشی

نویسندگان

1 دکترای مدیریت رسانه، گروه مدیریت رسانه‌ای، دانشگاه بین‌المللی امام رضا (ع)

2 دکترای مدیریت رسانه، استادیار گروه ارتباطات، دانشگاه آزاد اسلامی واحد تهران مرکزی

چکیده

پژوهش حاضر ضمن مرور متون پژوهشی در زمینه‌های سیاستگذاری عمومی فضای مجازی، طرح طبقه‌بندی جامعی را برای پژوهش‌های آتی در این حوزه ارائه می‌دهد. این پژوهش با اتکا به پیشینه ادبیات موجود در این حوزه مقالات منتشر شده در نشریات پژوهشی انگلیسی‌زبان بین سال‌های 1979 تا 2015 را بررسی کرده است.
با استفاده از روش تک معیاره ساده و با توجه به نتایج به دست آمده، 427 مقاله از 267 نشریه علمی معتبر شناسایی شده است که تمامی آنها بر اساس سال نشر، تعداد مقالات موجود در نشریه برگزیده و موضوعات یک حوزه خاص مورد تحلیل قرار گرفته‌اند. پژوهش صورت گرفته، به‌عنوان منبعی جامع و ارزشمند در پژوهش‌های سیاستگذاری عمومی فضای مجازی می‌تواند در تصمیمات و اقدامات کلان سیاستگذاران عمومی در این حوزه مددرسان باشد.

کلیدواژه‌ها

عنوان مقاله [English]

Identifying and Categorizing the General Policy of Virtual Space

نویسندگان [English]

  • Behzad Hassannejad Kashani 1
  • Akbar Nasrollahi Kasmani 2

1 Media Management, Imam Reza International University, Mashhad

2 Assistant Prof. in Media Management, Islamic Azad University, Tehran Department of Communication

چکیده [English]

The paper reviewing research texts in the field of general policy making of virtual space, provides a comprehensive classification plan for future research in this area. The study reviewed articles published in English-language research publications between 1979 and 2015, based on the existing literature.
 Using a simple single-criterion method, according to the results, 427 articles from 267 valid scientific journals were identified. All of them were analyzed based on the year of publication, the number of papers in the selected journal, and topics in a particular area. This research, can be used for public decision making and policy making in this field as a comprehensive and valuable resource in policy making of virtual space.

کلیدواژه‌ها [English]

  • Internet
  • Virtual Space
  • Public Policy Making
  • Content Analysis
Al-Kadhi, M. A. (2011). Assessment of the Status of spam in the Kingdom of Saudi Arabia. Journal of King Saud University – Computer and Information Sciences, Vol. 23, No. 2, P. 50. doi:10.1016/j.jksuci.2011.05.001
American Nurses Association. (1991, October 22). Retired PositionStatement: Cultural Diversity in Nursing Practice.
Archuleta, K. S. & Steinfeld, L. (2006). Privacy Protection and Compliance in Higher Education: The Role of the CPO. EDUCAUSE Review, Vol. 41, No. 5, P. 68.
Basel Committee on Banking Supervision. (1998, March). Risk Management for Electronic Banking and Eectronic Money Activities.
Benkler, Y. (2000). From Consumers to Users: Shifting the Deeper Structures of Regulation Towards Sustainable Commons and User Access. Federal Communications Law Journal, Vol. 52, No. 3, Pp. 561-579.
Best, S. J. & Teske, P. (2002). Explaining State Internet Sales Taxation: New Economy, Old-Fashioned Interest Group Politics. State Politics & Policy Quarterly, Vol. 2, No. 1, Pp. 37-51.
European Central Bank. (2012). Virtual Currency Schemes. Frankfurt am Main: European Central Bank.
Girsberger, D. & Schramm, D. (2002). Cyber-Arbitration. European Business Organization Law Review, Vol. 3, No. 3, Pp. 611-628. doi:10.1017/S1566752900001075
Iosifidis, P. (2002). Digital Convergence: Challenges for European Regulation. Javnost - The Public, Vol. 9, No. 3, Pp. 27-47. doi:10.1080/13183222.2002.11008805
Kelly, B. (1999). The Evolution of web Protocols. Journal of Documentation, Vol. 55, No. 1, Pp.71 - 81. doi:10.1108/EUM0000000007138
Kling, R.; Lee, Y. C.; Teich, A. & Frankel, M. S. (1999). Assessing Anonymous Communication on the Internet: Policy Deliberations. The Information Society: An International Journal, Vol. 15, No. 2, Pp. 79-90. doi:10.1080/019722499128547
Lamberton, D. (1996). A Telecommunications Infrastructure is not an Information Infrastructure. Prometheus: Critical Studies in Innovation, Vol. 14, No. 1, Pp. 31-38. doi:10.1080/08109029608632014
Lanham Act 15 U.S.C. & 1127. (1988). Retrieved from, https://www.law.cornell.edu/uscode/text/15/1127
Manheim, K. M. & Solum, L. B. (2003). An Economic Analysis of Domain Name Policy. Hastings Communications and Entertainment Law Journal, Vol. 25, No. 3, Pp. 359-498.
Mell, P. & Grance, T. (2011). The NIST Definition of Cloud Computing. Gaithersburg, MD: Computer Security Division Information Technology Laboratory National Institute of Standards and Technology. doi:dx.doi.org/10.6028%2FNIST.SP.800-145
Meuller, M. L. (2004). Ruling the Root: Internet Governance and the Taming of Cyberspace. Massachusetts London, England: MIT Press Cambridge.
Mueller, M. L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press.
Natarajan, M. (2006). Use of online Technology for Multimedia Education. Information Services & Use, Vol. 26, No. 3, P. 250.
Nord, J. H. & Nord, G. D. (1995). MIS Research: Journal Status Assessment and Analysis. Information & Management, Vol. 29, No. 1, Pp. 29 - 42. doi:10.1016/0378-7206(95)00010-T
OECD. (2001). Understanding the Digital Divide. Paris: OECD Publishing. doi:10.1787/236405667766
Perset, K. (2010). The Economic and Social Role of Internet Intermediaries. Directorate for Science Technology and Industry. Paris: Organisation for Economic and Co-operation and Development DSTI/ICCP (2009) 9/ FINAL.
Psannis, K. E.; Xinogalos, S. & Sifaleras, A. (2014). Convergence of Internet of things and Mobile Cloud Computing. Systems Science & Control Engineering, Vol. 2, No. 1, Pp. 476-483. doi:10.1080/21642583.2014.913213
Pusey, P. & Sadera, W. A. (2011). Cyberethics, Cybersafety, and Cybersecurity. Journal of Digital Learning in Teacher Education, Vol. 28, No. 2, P. 82. doi:10.1080/21532974.2011.10784684
Rosenoer, J. (1997). CyberLaw: the law of the Internet (1st ed.). New York, Inc.: Springer-Verlag. doi: 0.1007/978-1-4612-4064-8
Ryan, S. M.; Plzak, R. A. & Curran, J. (2007). Legal and Policy Aspects of Internet Number Resources. Santa Clara High Technology Law Journal, Vol. 24, No. 2, Pp. 335-374.
Shirey, R. (2007). Internet Security Glossary, Version 2. Retrieved from https://www.ietf.org/rfc/rfc4949.txt
The Universal Declaration of Human Rights. (1948, December 10). United Nations. Retrieved from http://www.un.org/en/universal-Declaration-human-rights/
Walker, D. B. (1999). Privacy in the Digital Age: Encryption Policy-A Call for Congressional Action. Stanford Technology Law Review, 3, P. 12.
Wall, D. (2004). What are Cybercrimes? Criminal Justice Matters, Vol. 58, No. 1, Pp. 20-21. doi:10.1080/09627250408553239
WGIG (The Working Group on Internet Governance). (2005). Report of the Working Group on Internet Governance. Retrieved from, http://www.itu.int/wsis/docs2/
World Trade Organization (WTO). (1998). Work Programme on Electronic Commerce. Geneva.
Wu, T. (2003). Network Neutrality, Broadband Discrimination. Journal of Telecommunications and High Technology Law, Vol. 2, No .1, Pp. 141-176.