Document Type : Research Paper

Authors

1 PhD Student in culture and communication, Imam Sadiq University, Tehran, Iran

2 Associate Professor, Faculty of Islamic Studies and Management, Imam Sadiq University, Tehran, Iran

3 Professor, Department of Jourrnalism, Faculty of Communication Sciences, Allameh Tabataba'i University, Tehran, Iran

Abstract

The governance of cyberspace in the Islamic Republic of Iran is faced with numerous challenges, leading to governance in this field being significantly far from the ideal point. The aim of this research is to identify the major factors affecting the improvement of the governance of cyberspace in the Islamic Republic of Iran, prioritize them, and provide strategic recommendations for each of them. In the first step, through semi-structured interviews with 11 experts and then analyzing their content, the components and factors affecting the improvement of cyberspace governance performance were identified. These components encompass the following elements: (1) the fundamental theory and governance model of cyberspace, (2) institutional structure, (3) laws and regulations, (4) macro policies and strategies, (5) the manner of interaction between governance and countries, institutions, and international companies, (6) the manner of interaction between governance and the private sector, (7) the manner of interaction between governance and individuals and non-governmental organizations, (8) the manner of interaction between governance and scientific and research institutions, (9) Officials and agents of cyberspace governance system, (10) Corruption, conflict. In the second step of the research, the importance-performance analysis (IPA) method was employed to assess the components of cyberspace governance identified in the first step. A questionnaire was distributed to 21 experts and specialists in the field of cyberspace governance to gather their insights on the relative importance and performance of each component. After data analysis, using the four-quadrant IPA matrix and the "normalized characteristic weight" table, the priority of each of the eleven components (such as the fundamental theory and governance model of cyberspace, institutional structure, laws and regulations, etc.) was determined. Additionally, strategic recommendations were provided for each of the eleven components to guide their improvement and effective governance.
After analysis using the IPA method, the following prioritization of factors is proposed:

The method of governance interaction with the private sector
Fundamental theory and model of cyberspace governance
The method of governance interaction with the public and public institutions
Institutional structure
The method of governance interaction with countries, international institutions, and companies
The method of governance interaction with academic and research institutions
Corruption, conflict of interest, and monopoly
Policies and grand strategies
Officials and agents of the cyberspace governance system
Laws and regulations
Enemy infiltration

Based on the positioning of the above factors in each of the four quadrants of the IPA matrix, the following strategic recommendations are suggested:

Strategy for the First Quadrant (keeping up the good work):

The institutional structure component is positioned in the first quadrant, indicating that its importance is high based on experts' opinions. Regarding its performance, it lies near the border area between the first and fourth quadrants. As a result, the relative performance value of this component lies in the borderline range, meaning that there is room for improvement in its implementation and effectiveness. Component 4, represented by "Policies and grand strategies," has a high relative importance, as it falls in the first quadrant. Additionally, its relative performance value is also high, indicating its current effectiveness in governance of cyberspace. Therefore, this component is considered to need less improvement compared to the other factors. This implies that the policies and grand strategies in place are mostly sound, but there is room for further refinement to enhance the overall effectiveness of the governance of cyberspace.

Strategy for the Second Quadrant (waste of resources):

Component 11, representing "Enemy infiltration," is situated in the second quadrant, indicating that it has low relative importance, yet its relative performance value is high. This scenario may suggest that the resources devoted to mitigate this factor are potentially excessive or disproportionate to its actual significance. Consequently, it is recommended that this factor be removed from the agenda in order to allocate resources more efficiently and focus on factors that possess higher importance values. Components 3 (Laws and regulations) and 9 (Officials and agents of the cyberspace governance system) are situated in the second quadrant and adjacent to the third, suggesting that their relative importance values are relatively low, yet their relative performance values are moderately high. This indicates that investment in either area may be unnecessary or excessive. It is recommended that a reassessment of the resources allocated to these components be conducted to ensure efficient use of resources and prioritization of factors with higher importance values.

Strategy for the Third Quadrant (indifference):

Components 5 (The method of governance interaction with countries, international institutions, and companies) and 10 (Corruption, conflict of interest, and monopoly) are positioned in the third quadrant, indicating that they have low relative importance values and low relative performance values. This suggests that there is no need to take action on them, as their impact on the governance of cyberspace is minimal. Instead, resources and efforts can be allocated to factors that have higher importance and significance.

Strategy for the Fourth Quadrant (improvement and investment priorities):

Components 1 (Fundamental theory and model of cyberspace governance), 6 (The method of governance interaction with the private sector), 7 (The method of governance interaction with the public and public institutions), and 8 (The method of governance interaction with academic and research institutions) are situated in the fourth quadrant, indicating their high relative importance and low relative performance values. Given this, it is recommended that these components be prioritized for improvement and investment, as they represent areas where significant improvement is necessary to enhance the overall governance of cyberspace. Upon examining the components in the fourth quadrant, it is notable that Component 8 lies on the border of the four quadrants, indicating a lower priority compared to the other three components in the fourth quadrant. Furthermore, Components 1 and 7 are situated near the first quadrant, suggesting their relative priority is slightly lower than that of Component 6.

Keywords

References
Boyatzis, R. E. (1998). Transforming qualitative information: Thematic analysis and code development. sage.
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative research in psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa.
Gillespie, T. (2017). Governance of and by platforms. The SAGE handbook of social media, 254–278.
Global Digital Compact Zero Draft. (2024). https://www.un.org/techenvoy/sites/www.un.org.techenvoy/files/Global_Digital_Compact_Zero_Draft.pdf
Hufty, M. (2011). Investigating policy processes: the governance analytical framework (GAF). Research for sustainable development: Foundations, experiences, and perspectives, 403–424.
Kaufmann, D. (2005). Myths and Realities of Governance and Corruption. SSRN Electronic Journal, 81–98. https://doi.org/10.2139/ssrn.829244.
Lorents, P., & Ottis, R. (2010). Cyberspace: Definition and implications. In International Conference on Cyber Warfare and Security (p. 267). Academic Conferences International Limited.‏
OECD. (2005). the Way Forward Organisation for Economic Co-Operation and Development Organisation for Economic Co-Operation. https://read.oecd-library.org/governance/modernising-government_9789264010505-en
Roadmap for digital cooperation. (2020). https://www.un.org/en/content/digital-cooperation-roadmap/assets/pdf/Roadmap_for_Digital_Cooperation_EN.pdf
Strate, L. (1999). The varieties of cyberspace: Problems in definition and delimitation. Western Journal of Communication (includes Communication Reports), 63(3), 382–412.
The age of digital interdependence. (2019). https://www.un.org/en/pdfs/DigitalCooperation-report-for%20web.pdf
Thompson, N. (2005). Inter-institutional relations in the governance of England’s national parks: A governmentality perspective. Journal of Rural Studies, 21(3), 323–334.
Umpleby, S. A. (2008). A Short History of Cybernetics in the United States: The Origin of Cybernetics. österreichische zeitschrift für geschichtswissenschaften, 19(4), 28–40.
UNESCO. (2023). Guidelines for the governance of digital platforms: safeguarding freedom of expression and access to information through a multi-stakeholder approach. https://unesdoc.unesco.org/ark:/48223/pf0000387339
Van Kersbergen, K., & Van Waarden, F. (2009). ‘Governance’as a bridge between disciplines: Cross-disciplinary inspiration regarding shifts in governance and problems of governability, accountability and legitimacy. in European Corporate Governance (pp. 64-80). Routledge.
Wiener, N. (1961). Cybernetics: Control and Communication in the Animal and the Machine--2nd.
Williamson, O. E. (1975). Markets and hierarchies: analysis and antitrust implications: a study in the economics of internal organization. University of Illinois at Urbana-Champaign’s Academy for Entrepreneurial Leadership Historical Research Reference in Entrepreneurship.
 
References (In Persian)
Abedi Jafari, H., Taslimi, M. S., Faqihi, A., & Sheikhzadeh, M. (2011). Thematic Analysis and Network of Themes: A Simple and Effective Method for Explaining Patterns in Qualitative Data. Strategic Management Thought, 10(5), 151-198. (In Persian)
Ashna, H., & Barzoui, M. R. (2011). ICT Policy Making in Iran (2002-2007); Evaluating Islamic Digital Content from TAKFA to TASMA. Religion and Communication, 40(18), 5-33. (In Persian)
Azadi, J. (2022). A Four-Level Framework for Cyber Governance in the Islamic Republic of Iran. Islamic Humanities Sadra, 40(1), 66-71. (In Persian)
Azar, A., & Khosravani, F. (2019). Soft Operations Research. Tehran: Industrial Management Organization. (In Persian)
Emamian, S. M. S., Zolfaghari, A., & Mohammadzadeh, E. (2018). National Regulatory System, the Concept of Regulation and its Relation to the Governance System. Expert Reports (Islamic Parliament Research Center), 96(26), 27-81. (In Persian)
Fathi Vajargah, K., Pardakhtchi, M. H., Aboulghasemi, M., & Mohammadi, F. (2011). Quality Assurance in Education Based on Importance-Performance Analysis Model. Educational Strategies in Medical Sciences (Educational Strategies), 12(4), 57-66. (In Persian)
Firoozabadi, S. A. (2020). An Introduction to Cyber Governance. Tehran: Imam Sadiq University. (In Persian)
Firoozabadi, S. A., & Ahmadabadi Azadi, J. (2020). Analysis of the Background of Cyber Governance in the Islamic Republic of Iran. Political Science, 32(16), 563-598. (In Persian)
Flick, U. (2017). An Introduction to Qualitative Research. Tehran: Ney Publishing. (In Persian)
Ghorbani, A. (2021). Macro Analysis of the Plan to Protect the Rights of Users and Basic Services of Cyberspace Applications. Think Tanks Society. Retrieved from: https://iranthinktanks.com/macro-analysis-of-the-plan-to-protect-the-rights-of-users-and-basic-services-of-cyberspace-applications/ (In Persian)
Karimi, S., & Nasr, A. R. (2013). Methods of Analyzing Interview Data. Research Value in Humanities, 7(4), 71-94. (In Persian)
Najafpour-Aqabigloo, A., Parsania, H., & Eslami-Tanha, A. A. (2021). Virtual Utopia; Theoretical Framework for Cyber Governance in the Islamic Republic. Religion and Communication, 59(28), 305-330. (In Persian)
Taghavi-Fard, M., Vafadar, Z., Rahimi, M., & Aghaei, M. (2016). An Analysis of Policy Coherence Cycle in Iran's ICT Governance System. Smart Business Management Studies, 16(4), 1-33. (In Persian)
The Comprehensive Plan and Architecture of the National Information Network (2020). Retrieved from: https://rrk.ir/Laws/ShowLaw.aspx?Code=22455 (In Persian)