Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Journal Issue Information

Archive

Year

Volume(Issue)

Issues

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Title: 
Author(s): 

Journal: 

امنیت ملی

Issue Info: 
  • Year: 

    0
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    -
Measures: 
  • Citations: 

    0
  • Views: 

    929
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 929

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Title: 
Author(s): 

Journal: 

امنیت ملی

Issue Info: 
  • Year: 

    0
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    -
Measures: 
  • Citations: 

    0
  • Views: 

    2581
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2581

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

حقی مجید

Journal: 

امنیت ملی

Issue Info: 
  • Year: 

    1398
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    277-310
Measures: 
  • Citations: 

    0
  • Views: 

    1300
  • Downloads: 

    0
Abstract: 

شدت تغییرات در فضای سایبر و متناظر آن تنوع گونه های ناامنی و ضرورت پاسخگویی به تهدیدات روزآمد این فضا، به ویژه جایگاه راهبردی خدمات و اطلاعات موجود در این فضا، ضرورت داشتن مدلی برای مدیریت راهبردی امنیت این فضا را لاجرم ساخته است. از سوی دیگر داشتن اطلاعات محیطی اعم از محیط داخلی و خارجی به خصوص با توجه به سرعت تغییرات آن ها و لزوم داشتن اطلاعات دقیق، ما را برای مدیریت امنیت به سوی کلان داده های این فضا رهنمون می سازد. شناخت محیطی برای انتخاب راهبردی های مناسب در کلیه مدل های مدیریت راهبردی جزئی از ارکان مدل ها می باشد. کلان داده های فضای سایبر علاوه بر آنکه حاوی اطلاعات بلادرنگ فضای سایبر می باشند، امکان ارزیابی و شناسایی کاملی از محیط را فراهم می سازند. همچنین در این پژوهش با استفاده از چارچوب استاندارد ایزو 31000 مدل نهایی پیاده سازی گردیده است. در این استاندارد بخش ارزیابی مخاطره با توجه ظرفیت های کلان داده های موجود در فضای سایبر، توابع چگالی احتمال تهدیدات، به روش های مختلف داده کاوی استخراج گردید. مقدار مخاطرات در هر یک از مؤلفه های استخراج شده، امنیت فضای سایبر با بهره گیری از توابع احتمالات شرطی شبکه بیز، محاسبه و با استفاده از مدل مارکف مدوله شده با توزیع پواسن و از ترکیب چرخه مارکف با تابع چگالی احتمال پواسن و توابع شرطی آن در شبکه بیز، استخراج شده از کلان داده های فضای سایبر، ارزیابی مخاطرات انجام شد. در بخش تدوین راهکارهای مقابله با مخاطرات نیز با به کارگیری المان های استخراج شده از مطالعات انجام شده بر مدل های مدیریت راهبردی و مدیریت مخاطرات، پیاده سازی استاندارد ایزو 31000 کامل گردید. در نهایت مدل به دست آمده با نمونه ای از سناریوی تهدیدات سایبر در خصوص شبکه های اجتماعی شبیه سازی شده است.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1300

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    7-48
Measures: 
  • Citations: 

    0
  • Views: 

    3837
  • Downloads: 

    0
Keywords: 
Abstract: 

Background and Aim: The greatest task of law enforcement is to safeguard values. Based on the vision of 1404 NAJA, private and public institutions and agencies should seek to identify the most effective factors in reducing ethical security when establishing, identifying and maximizing family effectiveness, ensuring public safety and managing the community. The basic policing in this area is aimed at identifying and providing appropriate solutions to them. Method: From the practical point of view, the data collection is a combination of qualitative and thematic analysis of the thematic analysis. The statistical population consists of 70 commanders, managers and experts in ethical security field. In the quantitative part of the sample size, 70 individuals were selected in total. Data collection was done by a semi-structured and researcher-made questionnaire whose validity was provided by experts and reliability of the closed questionnaire by Cronbach's alpha coefficient (0. 89). Content analysis and rank test were performed by Friedman. findings: Seven components of the discovery component were found to be in the first rank in the "inadequacy in education" component with a mean of 38/90 and "management conflict" with a mean of 38/84 in the first component; Below are four components of the discovery (legal) background that have a mean of "cultural problems" with a mean of 38. 83 and a "legal vacuum" with a mean of 38. 58. Results: The results showed that Friedman's mean rank was not the same for the items, even though the difference between the means was not very high. On the other hand, most of the respondents are in the first place on the Tasum scale for structural challenges with a mean of 38. 51%, behavior with a mean of 38. 27 (legal) with a mean of 38. 20.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3837

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

ERFANMANESH IMAN

Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    49-78
Measures: 
  • Citations: 

    0
  • Views: 

    1021
  • Downloads: 

    0
Keywords: 
Abstract: 

Socially regulating cyber delinquencies and social damages arising from social networks needs to recognize the approaches and dimensions of prevention programs. Relying on the first prevention, empowering users, reinforcing the setting of self-controlling and preparing interventional methods are some part of necessities for those programs in order to achieve the sustainable safety and discipline. As yet, vast numbers of researches have been done that offer some suggestions and solutions for preventing social damages arising from social networks. It is noteworthy to methodologically and purposively analyze and evaluate them. This article seeks to evaluate and categorize those suggestions and solutions (112 cases) by applying the meta-analysis technique and relying on the theoretical basis of the sustainable safety and social discipline. According to the findings, the prevention approaches are ‘ being affirmative or privative’ , ‘ preparing relationship in the real world’ , ‘ relying on users’ role and capacities’ , and ‘ changing the attitude toward the positive features of the new technologies’ . Moreover, the prevention dimensions include ‘ cultural-religious’ , ‘ familial-marital’ , ‘ educational-practical’ , ‘ research based-cognitive’ , ‘ political-legislative’ , ‘ police based-judicial’ , and ‘ technical-infrastructural’ .

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1021

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    79-124
Measures: 
  • Citations: 

    0
  • Views: 

    438
  • Downloads: 

    0
Keywords: 
Abstract: 

Given the strategic position and ideological tendencies of the Islamic Republic of Iran, which assumes the defense of the country's independence and protection of the oppressed society, and the assault on the hegemony of the superpowers, the threat of infiltration and intelligence gathering by foreign intelligence services in the armed forces There has been a dramatic increase in the need for more attention to self-control. Therefore, the lack of effective self-control will make it difficult for the armed forces to maintain information, protect their capabilities, their intelligence, and their personnel. In this regard, the purpose of this study is to "identify the legal components of security self-control in the armed forces of the Islamic Republic of Iran". This study, based on library resources and field research, seeks to answer the question "the legal components of security self-control in the armed forces". What are the Islamic Republic of Iran? “ The research method used in this study is a mixed method (qualitative and quantitative) and the statistical population of managers and commanders of the Armed Forces with information protection and management background and at least 18 positions is considered. Accordingly, the most important components were extracted in the library studies section by referring to reputable sources and interviewing reporters. It was argued that based on the analysis of the questionnaires, the most important legal components affecting the self-control of the armed forces of the Islamic Republic of Iran have been identified and ranked, which can be used to identify the legal weaknesses of achieving security self-control. And approving, restoring, and enforcing laws to officials and decision makers to assist the armed forces of the Islamic Republic of Iran.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 438

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Sabouri Reza | Saghafi Kamyar

Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    125-152
Measures: 
  • Citations: 

    0
  • Views: 

    874
  • Downloads: 

    0
Keywords: 
Abstract: 

The social sphere cybercrime in the Islamic Republic of Iran is growing rapidly and imposes significant material and spiritual damages to the country and the people every year. According to the occurrence of these crimes in the national dimension and the impact of cyberspace from the internal factors and environmental factors, the fight against it also requires the great and inclusive strategies at the national level. For this purpose, the present study done to with the aim of achieve cybercrime prevention and confrontation strategies in the Islamic Republic of Iran. The method of this research is "descriptive-analytic" of type "survey and documentary". The population was 68 people and the sampling method was total number. To collect data, was used a researcher-made questionnaire with 46 items based on Likert scale. Validity of the questionnaire was obtained through content validity and reliability through Cronbach Alpha. In order to environment analysis and achieving strategies, was used the SWOT technique, to strategic position and action evaluation was used the the SPACE matrix, to prioritize strategies was used the QSPM matrix and to select the top strategies was used the critical evaluation criterion. The findings indicate that the social sphere of the Islamic Republic of Iran's cyberspace has a competitive strategic position and in order to prevention and confrontation cybercrime in this sphere, should be used the 12 counted top strategies.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 874

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

KIANKHAH EHSAN

Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    153-174
Measures: 
  • Citations: 

    0
  • Views: 

    1505
  • Downloads: 

    0
Keywords: 
Abstract: 

The cyberspace with its attractive and captivating technologies is penetrating without minute resistance among the administrative elite, folks and all the society pillars. Due to empowerment and power building attributes of the cyber space all the vital infrastructure of the country are adopting cyber technologies at high pace both at surface and nature levels. This rapid and unconcerned tendency for employment of cyber technologies will lead to the formation of challenges and obstacles in the way of internal soundness of the Islamic society. The present study using combinational method, firstly explores through the application of qualitative descriptive analysis and afterwards through collecting and surveying the expert views using structural equations and SmartPLS software, describes the cyber dominance dimensions in two levels of ruling power and Islamic identity. US hegemony in controlling the cyberspace, ultra-governmental identification and monitoring of the empowerment the society capabilities, cyber threats and invasions, acceptance and trans-national and trans-cultural behavior and life style patterns, trans-national cultural engineering and management as well as decadent and Humanistic culture are the major challenges in the way of the country empowerment in the globalization arena and cyber hegemony.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1505

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    175-210
Measures: 
  • Citations: 

    0
  • Views: 

    950
  • Downloads: 

    0
Keywords: 
Abstract: 

Adhering to the principle of revolution and the sacred system of the Islamic Republic and adhering to the principles and goals of the revolution and striving for its revolution and its globalization requires being revolutionary, staying revolutionary, and acting revolutionary that involves the development of revolutionary discourse in all matters of life, and for this expansion also needs to be well explained on the eve of the fifth decade of the revolution. After identifying the dimensions and components of the revolutionary discourse, the researchers sought to develop appropriate strategies and executive strategies for achieving the desired situation by identifying the current state of affairs. The present research is based on a mixed approach in terms of research method, in that the qualitative method with structured interview as well as the use of various scientific, jurisprudential documents, books and sources has been used substantially from the beginning to the end of the research. While analyzing the qualitative content of the material, the rest of it has been quantitatively analyzed by surveys. In this regard, by asking questions in the form of a questionnaire and reviewing its results, strengths, weaknesses, threats and opportunities are identified and appropriate strategies for resolving related problems are extracted and the most important strategies are presented as follows. 1) To deepen the belief in the comprehensiveness of the Velayat Faghih to advance the ideals and goals of the revolution and to thwart enemy conspiracies and propaganda. 2) To promote the Basij, epic morale and jihadist spirit among the authorities and the people 3) To increase defense-security deterrent authority and power 4) To promote active and revolutionary diplomacy 5) To reform the economic system of the country based on Islamic principles and with a resistance economy approach

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 950

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    211-244
Measures: 
  • Citations: 

    0
  • Views: 

    722
  • Downloads: 

    0
Abstract: 

The contemporary world has been exited from the national framework by more than ever before thanks to cyberspace and its rapid and pervasive growth in all social layers, crossing the political and geographical boundaries of States and the limits of national sovereignty, It has become one of the major challenges for countries. The main subject of this research is the lacking of appropriate strategies for cultural guidance in cyberspace and implementation it and deal with leading issues in cyberspace. The main target of this research is to develop strategies for cultural guidance in cyberspace with emphasis on cultural engineering plan of Iran. The research type is applied-developmental and its method is Explanatory-Exploratory, which has been conducted using SOAR model, field and library collection method, and with the guidance of targeted expert community. Based on the findings of the research, by analyzing the strategic factors of cultural guidance in cyberspace and determining the matrix of position evaluation and strategic action, four strategic situations are described, developed and presented as: (a) Exit Strategies of Everyday life (SR); (b) Active Action Strategies (OR); Leadership Action Strategies (AO); d) Leapfrog Strategies (AS).

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 722

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    245-276
Measures: 
  • Citations: 

    0
  • Views: 

    419
  • Downloads: 

    0
Keywords: 
Abstract: 

The sense of security is multidimensional. Security is as important as security and is a psychological-sociological phenomenon that has many dimensions and comes from the direct and indirect experiences of people from the surrounding environment and people experience it in various ways. The main purpose of this paper is to investigate the level of public security among the citizens of Mazandaran province and to evaluate the impact of factors affecting the feeling of security among citizens of Mazandaran province. This research is a descriptive survey. Questionnaires and face-to-face interviews were the main tools for data collection. The main purpose of this paper is to investigate the level of public security among the citizens of Mazandaran province and to evaluate the impact of factors affecting the feeling of security among citizens of Mazandaran province. This research is a descriptive survey. Questionnaires and face-to-face interviews were the main tools for data collection. The statistical population of this study was the citizens of Mazandaran towns over 15 years old who were selected by quota sampling method and multi-stage cluster sampling. 1105 persons were selected as the sample size. Respondents observed a significant difference in terms of demographic and contextual variables (age, sex, marital status, activity status, literacy level, socioeconomic class, and city of residence).

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 419

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Haghi Majid

Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    277-309
Measures: 
  • Citations: 

    0
  • Views: 

    228
  • Downloads: 

    0
Abstract: 

The intensity of the changes in cyberspace and its according diversity of insecurity and the need to respond to the current threats of this space, especially the strategic position of the services and information available in this space, have necessitated the need for a model for strategic management of this space's security. On the other hand, having environmental information, both indoor and outdoor, especially with regard to the speed of their changes and the need for accurate information, allows us to manage security in the bigdata of this space. Understanding the environment for selecting the right strategies in all strategic management models is part of the model. Cyber-space bigdata, in addition to providing real-time cyber-space information, enables complete assessment and identification of the environment. In this study, the final model was implemented using ISO 31000 standard framework. In this standard, the risk assessment section was extracted with regard to the macro features of the data available in cyberspace. The risk values in each of the extracted components of cyberspace security by using Bayesian conditional probability functions and using Poisson distribution modulated Markov model by combining Markov cycle with Poisson probability density function and its conditional functions in Bayesian network, Extracted from large cyberspace data, risk assessment was performed. The implementation of ISO 31000 standard was also completed in the formulation of risk management strategies by applying elements extracted from studies on strategic management and risk management models. Finally, the model is simulated with an example of a cyber threat scenario on social networks.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 228

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Sadatian Seyyed Jalal

Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    311-346
Measures: 
  • Citations: 

    0
  • Views: 

    2630
  • Downloads: 

    0
Keywords: 
Abstract: 

According to the 1921 and 1940 treaty between Iran and Russia, the use of the Caspian Sea and the exploitation of its resources was common. Kazakhstan, Turkmenistan and Azerbaijan, each adopted positions that would not make it possible to agree on a common procedure for the fair use of the resources of the world's largest lake. The purpose of this study is considering the relationship between the legal regime of the Caspian Sea and the national security of Iran. The bilateral agreements of some coastal countries with each other, exploitation of subterranean and subordinate resources, and consequently contracts, the presence of foreigners, have pushed the situation to the detriment of the national interests and national security of Iran. The Aktau Kazakhstan summit, and the signing of the convention, and consensus on the source line, seems to be a new solution to determined in the near future of the countries, The convention contains the “ prohibition of the presence of alien armed forces” , “ the monopoly of any maritime traffic exclusively with the flag of the five countries” , “ the prohibition of the assignment of coastal states to foreigners for acts of aggression against other coastal states” . This research is applied by content analysis method. The national security of the Islamic Republic of Iran based on the political, economic, social, environmental and cultural components has been studied and proposed to continue the expert and above talks. And the consequence is that the continuation of the talks should be urged.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2630

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MEHRI ALI

Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    347-388
Measures: 
  • Citations: 

    0
  • Views: 

    602
  • Downloads: 

    0
Keywords: 
Abstract: 

In fact, acceptance is one of the four pillars of the Islamic state and is in some way related to the security and continuity of the political system. Maintaining the state and government is also the highest factor of national security and, of course, indispensable. So the security of a country depends on the acceptance of the government by the people. In other words, there is a meaningful relationship between government acceptance and security that influences one another. On the other hand, the political system is putting measures in place to increase its security and its people. Providing welfare, security and responding to the legitimate demands of society are among the most important issues of national security in the Islamic system that work to the extent that they are most successful. This article attempts to explain the concepts of acceptance and security in the province's discourse, inspired by Islamic teachings and the views of contemporary scholars. Descriptive analysis and field research (library and interview) have been used for data collection and presenting effective acceptance factors leads to increased security in provincial discourse in response to the question of A Relationship Between Acceptance and A. Is there ego in the provincial discourse? Assuming a direct, meaningful relationship between the two, it analyzes and analyzes the relationship.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 602

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    389-426
Measures: 
  • Citations: 

    0
  • Views: 

    1013
  • Downloads: 

    0
Keywords: 
Abstract: 

Economic diplomacy is a dynamic and evolving phenomenon, and its degree of dynamism must be assessed by taking into account the harmony of all influential domestic, regional, and global circles in normal and abnormal situations. At the domestic level, any society What is the situation if he first knows? Second, where is he going to go? Third, what are his abilities and tools? And finally, if it is able to balance its foreign policy structure, goals, tools and functions, it can move forward and reach its intended home. He considered foreign policy and paid some attention to it First, the design of Iran's economic diplomacy under normal circumstances differs from the security situation and requires its own strategies; second, Iran's economic diplomacy is not separate from the country's overall diplomacy; Domestic and foreign noted, fourth, that Iran has a unique destiny, namely that it is located in an area where the interference of foreign powers has impeded the natural dynamics of this region; Based on the definition they have of themselves or the image that others make of them, Nakhth are. In this regard, exponential security is one of the strategies used against Iran, in exponential security space, the interaction of ordinary countries, especially in the field of foreign trade and investment, is costly, One of the most appropriate solutions is to enlighten the people of the world. The second key component is impact Economic security means simultaneously focusing on efficiency and vulnerability, and of course, trying to reduce the country's economic vulnerability and increase efficiency and effectiveness in national arenas and global competitiveness. The next topic is economic power and efficiency, focusing on strengthening the nongovernmental and private sectors and enhancing their ability to compete in global competition, and ultimately emphasizing resilience and deterrence against economic threats as a grand strategy. Foreign trade and the development of sustainable economic relations with other countries, including emerging economic neighbors and powers, are emphasized.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1013

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    427-456
Measures: 
  • Citations: 

    0
  • Views: 

    359
  • Downloads: 

    0
Keywords: 
Abstract: 

Goal: The present study is the first research that is related to designing the pattern of public security of Islamic Republic of Iran. This study has been done to recognize different dimensions, factors and indexes that can be used for better understanding the public security and promoting the present situation of it. Also the designed pattern that has been extracted from studying different internal and external theories and exclusive data, can be used by related researchers. Research method: Mixed method is used as research method in this study. By this method, different internal and external studies and Focus Group Discussion (FGD) have been used. Then for evaluating the model, Delphi with 35 sample size beside analyzing the quantitative data by SPSS were used. Findings: Among three final dimensions. Activity has the best factors and indexes. Second dimension is human and third one is geography that have higher means and have the most favorite factors and indexes. Conclusion: By looking at the ideas of different experts, some factors like management, economy, science and culture, population and social factors like social capital and collective identity all are prior compare with other factors like policy and geography. Although their importance have been proved in mentioned pattern.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 359

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

CHERAGHI AHMAD

Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    457-492
Measures: 
  • Citations: 

    0
  • Views: 

    2069
  • Downloads: 

    0
Keywords: 
Abstract: 

Information arithmetic on mission topics is one of the most controversial and controversial issues in the oversight bodies and mission sectors of the coasts, while the mission and executive ranks claim full information aristocracy; Continued and honored by these organizations in gaining intelligence and successes, the Supreme Command also emphasizes the promotion and expansion of the aristocracy, and sometimes failures and surprises highlight some of the weaknesses of the intelligence arena. This pattern pattern is comprehensive and acceptable at all To be able to explain the organization and how information aristocracy there. These assumptions and researcher service backgrounds, exploratory interviews and consultations with coastal experts and policy makers and the need for a policy office on the subject prompted the researcher to seek to determine what strategic model is appropriate for coastal intelligence aristocracy. The objectives of the following sub-questions were: What are the concepts and literature of information aristocracy on the coasts? What are the dimensions, components, and factors of this intelligence arena in the coasts? What are the relationships between the agents of this intelligence arena on the coast? The research method used in this research is developmental-applied, in terms of nature, descriptive-survey and in terms of data type, is a mixed research method, in which using interviewing, surveying and factor analysis and Friedman tests, Component and attributes related to each of the dimensions of instrumentation, goals of aristocracy on the coasts, missions of the coasts, and requirements of the information aristocracy of the coasts were obtained, and quantitatively, in order to establish the relationships and priorities of the factors and components with the researcher-made questionnaire and the statistical population of 57 individuals. Experts and elites on the coasts and the armed forces, the following and the pattern of information aristocracy.-According to the results of the research, priority was identified; upstream documents in the coasts, value bases, approaches, adversary and adversary, and landscape were identified as the instruments.-The goals of the nobility include: discovery, identification, prevention and neutralization.-Coast Guard missions include: preparing security plans, news and documents, information and reference purposes and monitoring them, detecting and neutralizing plots, subversion and espionage and sabotage, examining the security competencies of staff and affiliated organizations, training and guidance. And Protecting staff, alerting commanders of their mission, obtaining and collecting classified news and information, planning and conducting technical operations and communications controls, reporting news and security information to appropriate authorities, detecting and identifying The political activities of the staff and the influence of the political currents in the NA. And the priorities, information management, infrastructure, methodological foundations, networking, information interaction and organization structure came from the requirements of the information aristocracy.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2069

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    9
  • Issue: 

    34
  • Pages: 

    493-524
Measures: 
  • Citations: 

    0
  • Views: 

    1826
  • Downloads: 

    0
Keywords: 
Abstract: 

Background and Aim: The greatest task of law enforcement is to safeguard values. Based on the vision of 1404 NAJA, private and public institutions and agencies should seek to identify the most effective factors in reducing ethical security when establishing, identifying and maximizing family effectiveness, ensuring public safety and managing the community. The basic policing in this area is aimed at identifying and providing appropriate solutions to them. Method: From the practical point of view, the data collection is a combination of qualitative and thematic analysis of the thematic analysis. The statistical population consists of 70 commanders, managers and experts in ethical security field. In the quantitative part of the sample size, 70 individuals were selected in total. Data collection was done by a semi-structured and researcher-made questionnaire whose validity was provided by experts and reliability of the closed questionnaire by Cronbach's alpha coefficient (0. 89). Content analysis and rank test were performed by Friedman. findings: Seven components of the discovery component were found to be in the first rank in the "inadequacy in education" component with a mean of 38/90 and "management conflict" with a mean of 38/84 in the first component; Below are four components of the discovery (legal) background that have a mean of "cultural problems" with a mean of 38. 83 and a "legal vacuum" with a mean of 38. 58. Results: The results showed that Friedman's mean rank was not the same for the items, even though the difference between the means was not very high. On the other hand, most of the respondents are in the first place on the Tasum scale for structural challenges with a mean of 38. 51%, behavior with a mean of 38. 27 (legal) with a mean of 38. 20.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1826

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button