<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Bulletin of Kemerovo State University. Series: Political, Sociological and Economic sciences</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Bulletin of Kemerovo State University. Series: Political, Sociological and Economic sciences</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Вестник Кемеровского государственного университета. Серия: Политические, социологические и экономические науки</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2500-3372</issn>
   <issn publication-format="online">2542-1190</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">48084</article-id>
   <article-id pub-id-type="doi">10.21603/2500-3372-2021-6-4-435-443</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>ПОЛИТИЧЕСКИЕ НАУКИ</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>POLITICAL SCIENCES</subject>
    </subj-group>
    <subj-group>
     <subject>ПОЛИТИЧЕСКИЕ НАУКИ</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">Saudi Arabia National Cyber Security System: Specificity and Development Risks</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Система национальной кибербезопасности Саудовской Аравии: специфика и риски развития</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Цуканов</surname>
       <given-names>Леонид Вячеславович</given-names>
      </name>
      <name xml:lang="en">
       <surname>Cukanov</surname>
       <given-names>Leonid Vyacheslavovich</given-names>
      </name>
     </name-alternatives>
     <email>leon.tsukanov@mail.ru</email>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Уральский Федеральный университет им. Б.Н. Ельцина</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Уральский Федеральный университет им. Б.Н. Ельцина</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2022-01-12T18:43:55+03:00">
    <day>12</day>
    <month>01</month>
    <year>2022</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2022-01-12T18:43:55+03:00">
    <day>12</day>
    <month>01</month>
    <year>2022</year>
   </pub-date>
   <volume>6</volume>
   <issue>4</issue>
   <fpage>435</fpage>
   <lpage>443</lpage>
   <history>
    <date date-type="received" iso-8601-date="2021-08-31T00:00:00+03:00">
     <day>31</day>
     <month>08</month>
     <year>2021</year>
    </date>
    <date date-type="accepted" iso-8601-date="2021-11-15T00:00:00+03:00">
     <day>15</day>
     <month>11</month>
     <year>2021</year>
    </date>
   </history>
   <self-uri xlink:href="https://jstrategizing.kemsu.ru/en/nauka/article/48084/view">https://jstrategizing.kemsu.ru/en/nauka/article/48084/view</self-uri>
   <abstract xml:lang="ru">
    <p>В статье рассматриваются особенности системы обеспечения национальной кибербезопасности Королевства Саудовская Аравия. Опираясь на стандарты кибербезопасности, разработанные Международным союзом электросвязи при ООН, раскрыты институционально-правовые основы саудовской системы, определена степень вовлеченности страны в международное сотрудничество по вопросам защиты глобального и национального киберпространства, выявлены ключевые риски развития архитектуры саудовской кибербезопасности. Автор приходит к выводу, что в вопросах цифровой защиты Саудовская Аравия придерживается догоняющей модели развития и, несмотря на положительную оценку ее деятельности со стороны Международного союза электросвязи, по-­прежнему испытывает некоторые проблемы с защитой национального киберпространства как общемирового характера (например, пробелы в законодательстве), так и обусловленного спецификой национальной модели управления государством. В числе наиболее явных рисков развития цифровой защиты страны выделены дисбаланс между ее гражданским и военным секторами, наличие определенных разногласий между ее различными субъектами, слабая интегрированность местного хакерского сообщества в общую структуру национальной кибербезопасности. По мнению автора, Эр-Рияд нацелен на устранение указанных дисбалансов и в среднесрочной перспективе намерен выстроить комплексную систему кибербезопасности с опорой на расширение международного сотрудничества в области развития национальной и региональной цифровой среды и методов ее эффективной защиты.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The research featured the national cybersecurity system of the Kingdom of Saudi Arabia. The cybersecurity standards developed by the International Telecommunication Union of the United Nations made it possible to reveal the institutional and legal foundations of the digital security system, as well as the degree of involvement in international cybersecurity cooperation. The analysis demonstrated the key risks of the development of the Saudi cyber model. The assessment by the International Telecommunication Union standards gave quite positive results. However, Saudi Arabia proved to adhere to a catching-up development model and still experiences some problems with national cyberspace security. Some are of global nature, e.g. legislation gaps, while others result from the specifics of the national model of state governance. The most obvious risks include the imbalance between the civil and military sectors, the disagreements between various regions, and the poor integration of the local hacker community into the overall structure of national cybersecurity. Saudi Arabia plans to eliminate these imbalances in the medium term in order to build an integrated cybersecurity system by expanding its international cooperation.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>информационная безопасность</kwd>
    <kwd>цифровая защита</kwd>
    <kwd>киберпреступность</kwd>
    <kwd>стратегии цифрового развития</kwd>
    <kwd>Видение 2030</kwd>
    <kwd>государственно-частное партнерство</kwd>
    <kwd>международное сотрудничество</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>information security</kwd>
    <kwd>digital protection</kwd>
    <kwd>cybercrime</kwd>
    <kwd>digital development strategies</kwd>
    <kwd>Vision 2030</kwd>
    <kwd>public-private partnerships</kwd>
    <kwd>international cooperation</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Лебедева М. М., Харкевич М. В., Зиновьева Е. С., Копосова Е. Н. Архаизация государства: роль современных информационных тех-нологий // Полис. Политические исследования. 2016. № 6. С. 22-36. https://doi.org/10.17976/jpps/2016.06.03</mixed-citation>
     <mixed-citation xml:lang="en">Lebedeva M. M., Kharkevich M. V., Zinovieva E. S., Koposova E. N. State archaization: the role of information technologies. Polis. Political Studies, 2016, (6): 22-36. (In Russ.) https://doi.org/10.17976/jpps/2016.06.03</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Сапронова М. А. Арабский восток на современном этапе: эволюция институтов власти и модернизация традиционного общества // Вестник Томского государственного университета. 2009. № 318. С. 125-132.</mixed-citation>
     <mixed-citation xml:lang="en">Sapronova M. A. The Arab East on the modern stage: evolution of institutions of power and modernization of traditional society. Vestnik Tomskogo gosudarstvennogo universiteta, 2009, (318): 125-132. (In Russ.)</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Косач Г. Г. Саудовская Аравия: трансформация власти и политики // Мировая экономика и международные отношения. 2019. Т. 63. № 4. С. 59-67. https://doi.org/10.20542/0131-2227-2019-63-4-59-67</mixed-citation>
     <mixed-citation xml:lang="en">Kosach G. G. Saudi Arabia: transformation of power and policy. Mirovaya ekonomika i mezhdunarodnye otnosheniya, 2019, 63(4): 59-67. (In Russ.) https://doi.org/10.20542/0131-2227-2019-63-4-59-67</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Мелкумян Е. С. Развитие арабских монархий залива: прорыв в будущее // Азия и Африка сегодня. 2020. № 2. С. 37-42. https://doi.org/10.31857/S032150750008471-0</mixed-citation>
     <mixed-citation xml:lang="en">Melkumyan E. S. Development of Arab gulf monarchies: breakout to future. Aziya i Afrika segodnya, 2020, (2): 37-42. (In Russ.) https://doi.org/10.31857/S032150750008471-0</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Easttom C., Butler W. The Iran-Saudi cyber conflict // International Journal of Cyber Warfare and Terrorism. 2021. Vol. 11. № 2. P. 29-42. https://doi.org/10.4018/IJCWT.2021040103</mixed-citation>
     <mixed-citation xml:lang="en">Easttom C., Butler W. The Iran-Saudi cyber conflict. International Journal of Cyber Warfare and Terrorism, 2021, 11(2): 29-42. https://doi.org/10.4018/IJCWT.2021040103</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Nodelend B., Morris R. The impact of low self-control on past and future cyber offending // International Journal of Cyber Criminology. 2020. Vol. 14. № 1. P. 106-120. https://doi.org/10.5281/zenodo.3742075</mixed-citation>
     <mixed-citation xml:lang="en">Nodelend B., Morris R. The impact of low self-control on past and future cyber offending. International Journal of Cyber Criminology, 2020, 14(1): 106-120. https://doi.org/10.5281/zenodo.3742075</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Polat A. Effects of GDPR on the financial services sector in the Kingdom of Saudi Arabia //Journal of Data Protection &amp; Privacy. 2021. Vol. 4. № 3. P. 273-282.</mixed-citation>
     <mixed-citation xml:lang="en">Polat A. Effects of GDPR on the financial services sector in the Kingdom of Saudi Arabia. Journal of Data Protection &amp; Privacy, 2021, 4(3): 273-282.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Alrubaiq A., Alharbi T. Developing a cybersecurity framework for e-government project in the Kingdom of Saudi Arabia // Journal of Cy-bersecurity and Privacy. 2021. Vol. 1. № 2. P. 302-318. https://doi.org/10.3390/jcp1020017</mixed-citation>
     <mixed-citation xml:lang="en">Alrubaiq A., Alharbi T. Developing a cybersecurity framework for e-government project in the Kingdom of Saudi Arabia. Journal of Cybersecurity and Privacy, 2021, 1(2): 302-318. https://doi.org/10.3390/jcp1020017</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Albogami O., Alruqi M., Almalki K., Aljahdali A. Public key infrastructure traditional and modern implementation // International Jour-nal of Network Security. 2021. Vol. 23. № 2. P. 343-350. https://doi.org/10.6633/IJNS.202103_23(2).18</mixed-citation>
     <mixed-citation xml:lang="en">Albogami O., Alruqi M., Almalki K., Aljahdali A. Public key infrastructure traditional and modern implementation. International Journal of Network Security, 2021, 23(2): 343-350. https://doi.org/10.6633/IJNS.202103_23(2).18</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Abu-Taieh E., Alfaries A. A., Al-Otaibi S., Aldehim G. Cyber security crime and punishment: comparative study of the laws of Jordan, Ku-wait, Qatar, Oman, and Saudi Arabia // International Journal of Cyber Warfare and Terrorism. 2018. Vol. 8. № 3. P. 46-59. https://doi.org/10.4018/IJCWT.2018070104</mixed-citation>
     <mixed-citation xml:lang="en">Abu-Taieh E., Alfaries A. A., Al-Otaibi S., Aldehim G. Cyber security crime and punishment: comparative study of the laws of Jordan, Ku-wait, Qatar, Oman, and Saudi Arabia. International Journal of Cyber Warfare and Terrorism, 2018, 8(3): 46-59. https://doi.org/10.4018/IJCWT.2018070104</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">NSCA strength and conditioning professional standards and guidelines // Strength and Conditioning Journal. 2017. Vol. 39. № 6. P. 1-24. https://doi.org/10.1519/SSC.0000000000000348</mixed-citation>
     <mixed-citation xml:lang="en">NSCA strength and conditioning professional standards and guidelines. Strength and Conditioning Journal, 2017, 39(6): 1-24. https://doi.org/10.1519/SSC.0000000000000348</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Al-Mulhim R. A., Al-Zamil L. A., Al-Dossary F. M. Cyber-attacks on Saudi Arabia environment // International Journal of Computer Networks and Communications Security. 2020. Vol. 8. № 3. P. 26-31. https://doi.org/10.47277/IJCNCS/8(3)1</mixed-citation>
     <mixed-citation xml:lang="en">Al-Mulhim R. A., Al-Zamil L. A., Al-Dossary F. M. Cyber-attacks on Saudi Arabia environment. International Journal of Computer Net-works and Communications Security, 2020, 8(3): 26-31. https://doi.org/10.47277/IJCNCS/8(3)1</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ali A. M., Shamsuddin S. M., Eassa F. E., Saeed F., Alassafi M. O., Al-Hadhrami T., Elmisery A. M. Towards an intelligent framework for cloud service discovery // International Journal of Cloud Applications and Computing. 2021. Vol. 11. № 3. P. 33-57. https://doi.org/10.4018/IJCAC.2021070103</mixed-citation>
     <mixed-citation xml:lang="en">Ali A. M., Shamsuddin S. M., Eassa F. E., Saeed F., Alassafi M. O., Al-Hadhrami T., Elmisery A. M. Towards an intelligent framework for cloud service discovery. International Journal of Cloud Applications and Computing, 2021, 11(3): 33-57. https://doi.org/10.4018/IJCAC.2021070103</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Alzubaidi A. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia // Heliyon. 2021. Vol. 7. № 1. https://doi.org/10.1016/j.heliyon.2021.e06016</mixed-citation>
     <mixed-citation xml:lang="en">Alzubaidi A. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Heliyon, 2021, 7(1). https://doi.org/10.1016/j.heliyon.2021.e06016</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Mahmood H. The security challenges in cloud IoT - a review // Saudi Journal of Engineering and Technology. 2021. Vol. 6. № 7. P. 162-168. https://doi.org/10.36348/sjet.2021.v06i07.003</mixed-citation>
     <mixed-citation xml:lang="en">Mahmood H. The security challenges in cloud IoT - a review. Saudi Journal of Engineering and Technology, 2021, 6(7): 162-168. https://doi.org/10.36348/sjet.2021.v06i07.003</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Arab States call for heightened cybersecurity // ITU News. 2008. № 3. P. 32. Режим доступа: https://historicjournals.itu.int/viewer/516/?return=1&amp;css-name=include#page=34&amp;viewer=picture&amp;o=&amp;n=0&amp;q= (дата обращения: 14.08.2021).</mixed-citation>
     <mixed-citation xml:lang="en">Arab States call for heightened cybersecurity. ITU News, 2008, (3): 32. Available at: https://historicjournals.itu.int/viewer/516/?return=1&amp;css-name=include#page=34&amp;viewer=picture&amp;o=&amp;n=0&amp;q= (accessed 14 Aug 2021).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Шкваря Л. В. Интеграционные процессы в ССАГПЗ в условиях цифровизации // Экономика и предпринимательство. 2020. № 11. С. 453-455. https://doi.org/10.34925/EIP.2020.124.11.082</mixed-citation>
     <mixed-citation xml:lang="en">Shkvarya L. V. Integration processes in the GCC in the context of digitalization. Ekonomika i predprinimatelstvo, 2020, (11): 453-455. (In Russ.) https://doi.org/10.34925/EIP.2020.124.11.082</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Валиахметова Г. Н. Ближний Восток в цифровую эпоху: глобализация угроз региональной безопасности // Восток (Oriens). 2017. № 3. С. 6-15.</mixed-citation>
     <mixed-citation xml:lang="en">Valiakhmetova G. N. The Middle East in digital age: globalization of threats to regional security. Vostok (Oriens), 2017, (3): 6-15. (In Russ.)</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Леонова О. Г. Кибервойна и противоборство в цифровом информационном пространстве // Информационное общество. 2018. № 2. С. 43-46.</mixed-citation>
     <mixed-citation xml:lang="en">Leonova O. G. Cyber war and confrontation in the digital information space. Informatsionnoye obshchestvo, 2018, (2): 43-46. (In Russ.)</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Almomani I., Ahmed M., Maglaras L. Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia // PeerJ Computer Science. 2021. Vol. 7. https://doi.org/10.7717/peerj-cs.703</mixed-citation>
     <mixed-citation xml:lang="en">Almomani I., Ahmed M., Maglaras L. Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Computer Science, 2021, 7. https://doi.org/10.7717/peerj-cs.703</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Alammary A., Alshaikh M., Alhogail A. The impact of the COVID-19 pandemic on the adoption of e-learning among academics in Saudi Arabia // Behaviour &amp; Information Technology. 2021. https://doi.org/10.1080/0144929x.2021.1973106</mixed-citation>
     <mixed-citation xml:lang="en">Alammary A., Alshaikh M., Alhogail A. The impact of the COVID-19 pandemic on the adoption of e-learning among academics in Saudi Arabia. Behaviour &amp; Information Technology, 2021. https://doi.org/10.1080/0144929x.2021.1973106</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ouassini A., Boynton K. W. The «Silicon Valley of the Middle East»: cybersecurity, Saudi Arabia, and the path to Vision 2030 // Routledge Companion to Global Cyber-Security Strategy / eds. S. N. Romaniuk, M. Manjikian. 1st ed. London: Routledge, 2021. P. 427-434. https://doi.org/10.4324/9780429399718-36</mixed-citation>
     <mixed-citation xml:lang="en">Ouassini A., Boynton K. W. The &quot;Silicon Valley of the Middle East&quot;: cybersecurity, Saudi Arabia, and the path to Vision 2030. Routledge Companion to Global Cyber-Security Strategy, eds. Romaniuk S. N., Manjikian M., 1st ed. London: Routledge, 2021, 427-434. https://doi.org/10.4324/9780429399718-36</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Aleidan M. Commercial diplomacy as a part of national transformation and its impact on the internationalization of SMEs: evidence from Saudi Arabia // Asian Economic and Financial Review. 2019. Vol. 9. № 9. P. 1019-1031. 10.18488/journal.aefr.2019.99.1019.1031</mixed-citation>
     <mixed-citation xml:lang="en">Aleidan M. Commercial diplomacy as a part of national transformation and its impact on the internationalization of SMEs: evidence from Saudi Arabia. Asian Economic and Financial Review, 2019, 9(9): 1019-1031. 10.18488/journal.aefr.2019.99.1019.1031</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B24">
    <label>24.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Albantan M. A. R. Social skills and cyberbullying behavior among students in Hail from the perspective of social work  // Cypriot Journal of Educational Sciences. 2021. Vol. 16. № 1. P. 96-113. https://doi.org/10.18844/cjes.v16i1.5512</mixed-citation>
     <mixed-citation xml:lang="en">Albantan M. A. R. Social skills and cyberbullying behavior among students in Hail from the perspective of social work. Cypriot Journal of Educational Sciences, 2021, 16(1): 96-113. https://doi.org/10.18844/cjes.v16i1.5512</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B25">
    <label>25.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Soliman N. S. The direct fatwa in the media, the pros and cons // Islamic Sciences Journal. 2020. Vol. 11. № 10. P. 192-221. http://dx.doi.org/10.25130/islam.v11i10.379</mixed-citation>
     <mixed-citation xml:lang="en">Soliman N. S. The direct fatwa in the media, the pros and cons. Islamic Sciences Journal, 2021, 11(10): 192-221. http://dx.doi.org/10.25130/islam.v11i10.379</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B26">
    <label>26.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Mowatt-Larssen R. Zawahiri's WMD fatwa. Symmetry between 2003 WMD fatwa and 2008 «Exoneration» // Islam and the Bomb: Reli-gious Justification For and Against Nuclear Weapons. Cambridge: Belfer Center for Science and International Affairs, 2011. P. 35-37.</mixed-citation>
     <mixed-citation xml:lang="en">Mowatt-Larssen R. Zawahiri's WMD fatwa. Symmetry between 2003 WMD fatwa and 2008 &quot;Exoneration&quot;. Islam and the Bomb: Religious Justification For and Against Nuclear Weapons. Cambridge: Belfer Center for Science and International Affairs, 2011, 35-37.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B27">
    <label>27.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ahmadian H., Mohseni P. From detente to containment: the emergence of Iran's new Saudi strategy // International Affairs. 2021. Vol. 97. № 3. P. 779-799. https://doi.org/10.1093/ia/iiab014</mixed-citation>
     <mixed-citation xml:lang="en">Ahmadian H., Mohseni P. From detente to containment: the emergence of Iran's new Saudi strategy. International Affairs, 2021, 97(3): 779-799. https://doi.org/10.1093/ia/iiab014</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
