Araştırma Makalesi
BibTex RIS Kaynak Göster

Dijital Dünyada Kuvvet Dağılımı ve Anonimlik: Uluslararası Sistemde Yeni Bir Güç Dengesi

Yıl 2021, Cilt: 23 Sayı: 3, 681 - 698, 31.12.2021
https://doi.org/10.26745/ahbvuibfd.1008523

Öz

Günümüzde bilgi teknolojileri, devletleri ve uluslararası ilişkileri de içeren, fiziksel dünyadaki tüm katılımcılarının bir arada ve iletişim içerisinde olduğu dijital bir dünyaya doğru evirilmiştir. Uluslararası İlişkiler disiplininde birçok teori, devlet davranışı ve devletlerin birbirleriyle olan ilişkileri hakkında açıklamalar sunmaktadır. Bu teorilerin önde gelenlerinden bir tanesi, devletler arasında kuvvet dağılımına odaklanan ve dolayısıyla sistemsel bir yaklaşıma sahip Neo-Realizmdir. Bu makale, Neo-Realist bir perspektiften, bilgi teknolojileri, devlet davranışı ve devletlerin ilişkileri arasındaki bağın daha iyi anlaşılabilmesi için devletlerin fiziksel ve dijital kuvvetlerinin, ayrı ayrı analiz edilmesi gerektiğini iddia etmektedir. Fiziksel ve dijital dünya arasındaki etkileşim, dijital dünyanın daha az maliyetle güç ve anonimlik artışı sağlaması nedeniyle kısıtlıdır. Dijital dünyada, kuvvetlerin dağılımı, uluslararası sistemin kutupluğunu önemli ölçüde değiştirebilecek kadar farklıdır ve fiziksel dünyanın büyük güçleri, dijital dünyada artık eskisi gibi yüksek bir güvenlik ortamından faydalanamamaktadır.

Kaynakça

  • Acosta, J. and Liptak, K., 2015. U.S. slaps new sanctions on North Korea after Sony hack [online]. CNN. Available from: https://www.cnn.com/2015/01/02/politics/new-sanctions-for-north-korea-after-sony-hack/index.html [Accessed 3 Apr 2021].
  • Armstrong, M., 2019. All of the data created in 2018 is equal to… [online]. Statista Infographics. Available from: https://www.statista.com/chart/17723/the-data-created-last-year-is-equal-to/ [Accessed 4 Apr 2021].
  • Ashmore, W.C., 2009. Impact of Alleged Russian Cyber Attacks.
  • Berthold, O., Federrath, H., and Köhntopp, M., 2000. Project “anonymity and unobservability in the Internet”. In: Proceedings of the tenth conference on Computers, freedom and privacy challenging the assumptions - CFP ’00. Presented at the the tenth conference, Toronto, Ontario, Canada: ACM Press, 57–65.
  • Castells, M., 2010. The rise of the network society. 2nd ed. Chichester, West Sussex; Malden, MA: Wiley-Blackwell.
  • Christopherson, K.M., 2007. The positive and negative implications of anonymity in Internet social interactions: “On the Internet, Nobody Knows You’re a Dog”. Computers in Human Behavior, 23 (6), 3038–3056.
  • Collier, M., 2007. Estonia: Cyber Superpower. Bloomberg.com, 17 Dec.
  • Cyber Security Intelligence Index, 2014. IBM Security Services.
  • Davenport, D., 2002. Anonymity on the Internet: why the price may be too high. Communications of the ACM, 45 (4), 33–35.
  • Deutsch, K.W. and Singer, J.D., 1964. Multipolar Power Systems and International Stability. World Politics, 16 (3), 390–406.
  • DOD Releases Fiscal Year 2021 Budget Proposal [online], 2020. U.S. Department of Defense. Available from: https://www.defense.gov/Newsroom/Releases/Release/Article/2079489/dod-releases-fiscal-year-2021-budget-proposal/ [Accessed 31 Mar 2021].
  • Eichensehr, K.E., 2016. Public-Private Cybersecurity. Texas Law Review, 95 (467), 72.
  • FY 2021 Budget in Brief, 2020. Department of Homeland Security.
  • Geers, K., Kindlund, D., Moran, N., and Rachwald, R., 2014. WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks. FireEye.
  • Geller, E., 2020. How U.S. agencies’ trust in untested software opened the door to hackers. POLITICO, 19 Dec.
  • Gusovsky, D., 2016. How investigators decide that a country is behind a cyberattack [online]. CNBC. Available from: https://www.cnbc.com/2016/09/19/how-investigators-decide-that-a-country-is-behind-a-cyberattack.html [Accessed 3 Apr 2021].
  • Guttentag, D., 2010. Virtual reality: Applications and implications for tourism. Tourism Management, 31, 637–651.
  • How Estonia became a global heavyweight in cyber security [online], 2017. e-Estonia. Available from: https://e-estonia.com/how-estonia-became-a-global-heavyweight-in-cyber-security/ [Accessed 1 Apr 2021].
  • Kaplan, M.A., 1957. System and Process in International Politics. New York: Wiley.
  • Lieberman, M., 2013. Language Log: Zettascale Linguistics [online]. Available from: http://itre.cis.upenn.edu/~myl/languagelog/archives/000087.html [Accessed 4 Apr 2021].
  • Marchionini, G., Samet, H., and Brandt, L., 2003. Digital Government. Communications of the ACM, 46.
  • Mearsheimer, J.J., 1994. The False Promise of International Institutions. International Security, 19 (3), 5.
  • Mearsheimer, J.J., 2001. The tragedy of Great Power politics. New York: Norton.
  • Mikalauskas, E., 2020. Critical US infrastructure can be hacked by anyone [online]. CyberNews. Available from: https://cybernews.com/security/critical-us-infrastructure-can-be-hacked-by-anyone/ [Accessed 3 Apr 2021].
  • Mikalauskas, E., 2021. The Oldsmar water treatment facility hack was entirely avoidable – and it can happen again [online]. CyberNews. Available from: https://cybernews.com/editorial/oldsmar-water-treatment-facility-hack-was-avoidable-can-happen-again/ [Accessed 3 Apr 2021].
  • Musil, S., 2014. Sony hack leaked 47,000 Social Security numbers, celebrity data [online]. CNET. Available from: https://www.cnet.com/news/sony-hack-said-to-leak-47000-social-security-numbers-celebrity-data/ [Accessed 1 Apr 2021].
  • Nye Jr., J.S., 2010. Cyber Power. Belfer Center for Science and International Affairs.
  • Park, M. and Ford, D., 2015. North Korea denies being behind Sony hack [online]. CNN. Available from: https://www.cnn.com/2015/01/13/asia/north-korea-sony-hack/index.html [Accessed 1 Apr 2021].
  • Parrish, M.E., 2001. Soviet Espionage and the Cold War. Diplomatic History, 25 (1), 105–120.
  • Perlroth, N., 2012. In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back. The New York Times, 24 Oct.
  • Perlroth, N. and Krauss, C., 2018. A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try. The New York Times, 15 Mar.
  • Romerstein, H. and Breindel, E., 2014. The Venona secrets: the definitive expose of Soviet espionage in America.
  • Rue, F.L., 2011. Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development.
  • Sanger, D.E., 2020. Russian Hackers Broke Into Federal Agencies, U.S. Officials Suspect. The New York Times, 13 Dec.
  • Schneier, B., 2004. Secrets and lies: digital security in a networked world. Paperback ed. Indianapolis, Ind: Wiley.
  • Schofield, J., 2008. The Russian defence against global cybercrime [online]. the Guardian. Available from: http://www.theguardian.com/technology/2008/jan/31/eugene.kaspersky [Accessed 29 Mar 2021].
  • Severed cables disrupt internet, 2008, 31 Jan.
  • Shackelford, S.J., Sulmeyer, M., Deckard, A.N.C., Buchanan, B., and Micic, B., 2017. From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It. Nebraska Law Review, 96 (2), 20.
  • Tidy, J., 2019. ‘I kept my multimillion dollar business secret’. BBC News, 21 Jul.
  • Waltz, K., 1964. The Stability of a Bipolar World. Daedalus, 93 (3,), 881–909.
  • Waltz, K., 2010. Theory of international politics. Long Grove, Ill: Waveland Press.

Distribution of Capabilities and Anonymity in the Digital World: A New Balance of Power in the International System

Yıl 2021, Cilt: 23 Sayı: 3, 681 - 698, 31.12.2021
https://doi.org/10.26745/ahbvuibfd.1008523

Öz

Information technology has evolved to the extent that there is now a digital world where all participants in the physical world are also present and interact with each other, including the states and international relations. Many theories provide explanations for the behaviour of states and their relations. One of the prominent approaches is the systemic approach of Neorealism which focuses on the distribution of the capabilities among states. We argue that states' physical and digital capabilities must be analyzed separately to provide better explanations from the Neorealist perspective. The interactions between these two worlds are limited due to the reduced cost of gaining more power and higher anonymity provided by the digital world. There is a considerable difference in the distribution of capabilities that cause significant changes in the polarity of the international system in the digital world, and the great powers of the physical world no longer enjoy the same level of security in the digital world.

Kaynakça

  • Acosta, J. and Liptak, K., 2015. U.S. slaps new sanctions on North Korea after Sony hack [online]. CNN. Available from: https://www.cnn.com/2015/01/02/politics/new-sanctions-for-north-korea-after-sony-hack/index.html [Accessed 3 Apr 2021].
  • Armstrong, M., 2019. All of the data created in 2018 is equal to… [online]. Statista Infographics. Available from: https://www.statista.com/chart/17723/the-data-created-last-year-is-equal-to/ [Accessed 4 Apr 2021].
  • Ashmore, W.C., 2009. Impact of Alleged Russian Cyber Attacks.
  • Berthold, O., Federrath, H., and Köhntopp, M., 2000. Project “anonymity and unobservability in the Internet”. In: Proceedings of the tenth conference on Computers, freedom and privacy challenging the assumptions - CFP ’00. Presented at the the tenth conference, Toronto, Ontario, Canada: ACM Press, 57–65.
  • Castells, M., 2010. The rise of the network society. 2nd ed. Chichester, West Sussex; Malden, MA: Wiley-Blackwell.
  • Christopherson, K.M., 2007. The positive and negative implications of anonymity in Internet social interactions: “On the Internet, Nobody Knows You’re a Dog”. Computers in Human Behavior, 23 (6), 3038–3056.
  • Collier, M., 2007. Estonia: Cyber Superpower. Bloomberg.com, 17 Dec.
  • Cyber Security Intelligence Index, 2014. IBM Security Services.
  • Davenport, D., 2002. Anonymity on the Internet: why the price may be too high. Communications of the ACM, 45 (4), 33–35.
  • Deutsch, K.W. and Singer, J.D., 1964. Multipolar Power Systems and International Stability. World Politics, 16 (3), 390–406.
  • DOD Releases Fiscal Year 2021 Budget Proposal [online], 2020. U.S. Department of Defense. Available from: https://www.defense.gov/Newsroom/Releases/Release/Article/2079489/dod-releases-fiscal-year-2021-budget-proposal/ [Accessed 31 Mar 2021].
  • Eichensehr, K.E., 2016. Public-Private Cybersecurity. Texas Law Review, 95 (467), 72.
  • FY 2021 Budget in Brief, 2020. Department of Homeland Security.
  • Geers, K., Kindlund, D., Moran, N., and Rachwald, R., 2014. WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks. FireEye.
  • Geller, E., 2020. How U.S. agencies’ trust in untested software opened the door to hackers. POLITICO, 19 Dec.
  • Gusovsky, D., 2016. How investigators decide that a country is behind a cyberattack [online]. CNBC. Available from: https://www.cnbc.com/2016/09/19/how-investigators-decide-that-a-country-is-behind-a-cyberattack.html [Accessed 3 Apr 2021].
  • Guttentag, D., 2010. Virtual reality: Applications and implications for tourism. Tourism Management, 31, 637–651.
  • How Estonia became a global heavyweight in cyber security [online], 2017. e-Estonia. Available from: https://e-estonia.com/how-estonia-became-a-global-heavyweight-in-cyber-security/ [Accessed 1 Apr 2021].
  • Kaplan, M.A., 1957. System and Process in International Politics. New York: Wiley.
  • Lieberman, M., 2013. Language Log: Zettascale Linguistics [online]. Available from: http://itre.cis.upenn.edu/~myl/languagelog/archives/000087.html [Accessed 4 Apr 2021].
  • Marchionini, G., Samet, H., and Brandt, L., 2003. Digital Government. Communications of the ACM, 46.
  • Mearsheimer, J.J., 1994. The False Promise of International Institutions. International Security, 19 (3), 5.
  • Mearsheimer, J.J., 2001. The tragedy of Great Power politics. New York: Norton.
  • Mikalauskas, E., 2020. Critical US infrastructure can be hacked by anyone [online]. CyberNews. Available from: https://cybernews.com/security/critical-us-infrastructure-can-be-hacked-by-anyone/ [Accessed 3 Apr 2021].
  • Mikalauskas, E., 2021. The Oldsmar water treatment facility hack was entirely avoidable – and it can happen again [online]. CyberNews. Available from: https://cybernews.com/editorial/oldsmar-water-treatment-facility-hack-was-avoidable-can-happen-again/ [Accessed 3 Apr 2021].
  • Musil, S., 2014. Sony hack leaked 47,000 Social Security numbers, celebrity data [online]. CNET. Available from: https://www.cnet.com/news/sony-hack-said-to-leak-47000-social-security-numbers-celebrity-data/ [Accessed 1 Apr 2021].
  • Nye Jr., J.S., 2010. Cyber Power. Belfer Center for Science and International Affairs.
  • Park, M. and Ford, D., 2015. North Korea denies being behind Sony hack [online]. CNN. Available from: https://www.cnn.com/2015/01/13/asia/north-korea-sony-hack/index.html [Accessed 1 Apr 2021].
  • Parrish, M.E., 2001. Soviet Espionage and the Cold War. Diplomatic History, 25 (1), 105–120.
  • Perlroth, N., 2012. In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back. The New York Times, 24 Oct.
  • Perlroth, N. and Krauss, C., 2018. A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try. The New York Times, 15 Mar.
  • Romerstein, H. and Breindel, E., 2014. The Venona secrets: the definitive expose of Soviet espionage in America.
  • Rue, F.L., 2011. Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development.
  • Sanger, D.E., 2020. Russian Hackers Broke Into Federal Agencies, U.S. Officials Suspect. The New York Times, 13 Dec.
  • Schneier, B., 2004. Secrets and lies: digital security in a networked world. Paperback ed. Indianapolis, Ind: Wiley.
  • Schofield, J., 2008. The Russian defence against global cybercrime [online]. the Guardian. Available from: http://www.theguardian.com/technology/2008/jan/31/eugene.kaspersky [Accessed 29 Mar 2021].
  • Severed cables disrupt internet, 2008, 31 Jan.
  • Shackelford, S.J., Sulmeyer, M., Deckard, A.N.C., Buchanan, B., and Micic, B., 2017. From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It. Nebraska Law Review, 96 (2), 20.
  • Tidy, J., 2019. ‘I kept my multimillion dollar business secret’. BBC News, 21 Jul.
  • Waltz, K., 1964. The Stability of a Bipolar World. Daedalus, 93 (3,), 881–909.
  • Waltz, K., 2010. Theory of international politics. Long Grove, Ill: Waveland Press.
Toplam 41 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Ana Bölüm
Yazarlar

Kürşad Turan 0000-0002-7622-5412

Mesut Aslan 0000-0003-0299-0928

Yayımlanma Tarihi 31 Aralık 2021
Yayımlandığı Sayı Yıl 2021 Cilt: 23 Sayı: 3

Kaynak Göster

APA Turan, K., & Aslan, M. (2021). Distribution of Capabilities and Anonymity in the Digital World: A New Balance of Power in the International System. Ankara Hacı Bayram Veli Üniversitesi İktisadi Ve İdari Bilimler Fakültesi Dergisi, 23(3), 681-698. https://doi.org/10.26745/ahbvuibfd.1008523