Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Journal Issue Information

Archive

Year

Volume(Issue)

Issues

مرکز اطلاعات علمی SID1
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    7-34
Measures: 
  • Citations: 

    0
  • Views: 

    1283
  • Downloads: 

    1017
Abstract: 

The Future of Science and Art is the discovery and construction of the future that has witnessed dramatic progress over the past two decades. Future studies in the Department of Biosciences are located where the toolbox can be used to help develop other disciplines. Techniques that provide futures studies can open new horizons to the security researchers. One of these techniques is the scenario that futurists believe is "describing the environment as alternative futures for ordering thinking in relation to the future. « The scenarios, now describing the possible and possible future, present the future to the decision makers Get acquainted with possible problems and management strategies The purpose of this study is to provide a preliminary explanation of the importance of future study methods with an emphasis on scenario techniques in security studies. In the meantime, the method of GBN, which is an expert-centered and qualitative method for writing a scenario, is considered by the researchers of this paper because, given the type of data related to security threats and issues, the presentation of strategic recommendations and related techniques during the Conducting focal groups and expert meetings are features that can not be ignored.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1283

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 1017 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Khozin Hassan

Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    35-62
Measures: 
  • Citations: 

    0
  • Views: 

    754
  • Downloads: 

    598
Abstract: 

The present article is an exploratory study of the concept of personal security from the perspective of the Qur'anic revelations and verses of the Holy Quran and seeks to elaborate and compile personal security based on Qur'anic evidence from spiritual and individual perspectives. The scripture has a scientific, practical, modern, and modern view of the evolving and complex concept of personal security; on the one hand, faith and spiritual security are the source and basis of all aspects of security, especially its individual type; It is deeply rooted, while any security and in all its dimensions, ultimately in Ray's spiritual and divine beliefs and beliefs. Any insecurity in any realm, in the end, is rooted in disbelief and the reciprocal attributes of faith such as idolatry, iniquity, disbelief, oppression, arrogance, and the like. Faithfulness and faithfulness are also the main sources of individual security actions and can be said in the final conclusion: the establishment of a pure and good spiritual life for the upbringing and illumination of individuals, whether in the sphere of personal or social behavior. It is also the most important mechanism for securing individual security in the Islamic system.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 754

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 598 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

ASGARI MAHMOUD

Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    63-92
Measures: 
  • Citations: 

    0
  • Views: 

    1332
  • Downloads: 

    723
Abstract: 

In this study, considering the importance of identifying internal threats, it has been attempted to study and analyze the statements of the supreme leader in this regard. This research is based on a qualitative paradigm using content analysis research method. The data needed for this research was first identified by searching the words of threat in the words of the Supreme Leader of the revolution. Among the concepts of risk, damage, challenge, insecurity and disturbance, the most widely used word was danger. Secondly, by referring to the indexed section of his statements on the Supreme Leader's website, more than 1, 800 flyers were obtained. The data were analyzed using Maxqda software and coding method. The results showed that the data obtained from the Supreme Leader's analysis of internal threats can be categorized into six themes; "political", "economic", "cultural", "social", "environmental", and "cyberspace. " They also identified 33 basic themes.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1332

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 723 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    93-130
Measures: 
  • Citations: 

    0
  • Views: 

    451
  • Downloads: 

    177
Abstract: 

Univocalism in differentiating material material causes very serious differences in the dimensions, levels, and methods of security, which, by focusing on each one, can also distinguish between two different attitudes towards security. Based on these two types of attitudes, the foundations of ontology, epistemology and a different methodology have been formed. After examining these attitudes, one can study the security foundations of monotheistic and teaching schools based on these levels. The need to address this is to examine the challenges in the real world of security of the world and the confrontation between different security approaches and, consequently, to identify the exact cause of these differences and contradictions in the context of the ruling space of today's international relations. Therefore, the purpose of this study is to become familiar with the fundamental and The basis of the worldview is the intellectual and theological ideology of various security schools ruling the world and examining the various components of the most important security schools of the ruling and analyzing the objective and practical outcomes of these schools in different scenes of individual and social life of humans as well as on the international scene. The study of the main cause of the difference in meaning and concept of security, the purpose of security, the origin of security, the issue of security, the dimensions of security and mechanisms for achieving security in the divine books and the question of this research. By analyzing and comparing the theoretical foundations and the security approach, the examples of material schools (realism, liberalism) and the study of the divine school (Islam) revealed that the difference in the security approach of these three streams originated from the difference in their ontology constraints. This research has been developed in a descriptive-analytical manner and with the use of credible library resources.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 451

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 177 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    131-154
Measures: 
  • Citations: 

    530
  • Views: 

    445
  • Downloads: 

    296
Abstract: 

sense of security is a Psychological and social phenomenon that has many dimensions. This feeling rise of direct and indirect experience people of the conditions and environment situation and different people experience it for different method. The aim of this article is to investigate the status of a sense of societal security among youth. this study sought to measure the effects of variables age, gender, education, employment status, married status, social class, membership in various society, amount of utilization mass media on societal security. Research methodology in this study was quantity that was done using survey method. the population study consist of all young 18-29 years of Lar city which using Cochran formula, 300 young to Lar city of whom were randomly selected as sample. Data was collected through questionnaire technique and its validity provided by face validity and its reliability was established through cronbachs alpha. After collecting the questionnaires, the data were analyzed using spss statistical software. The results showed that among the variables including age, gender, employment status, membership in various society and dependent variable there is a significant relationship but there is not asignificant relationship between education, married status, social class, amount of utilization mass media and societal security.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 445

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 296 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 530 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

ESLAMI MOHSEN | davand hojjat

Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    155-178
Measures: 
  • Citations: 

    0
  • Views: 

    512
  • Downloads: 

    184
Abstract: 

Following the aftermath of the Middle East Democratic transformation after 2010, the United States faced a new challenge as a major player in this strategic area. The American order in the region has been challenged following these protests, and some US allies in a region where non-democratic regimes have failed. American foreign policy analysts have expressed a variety of views on how the country faced a wave of democratization in the region, including a range of optimistic views (claiming US support for democracy), pessimistic (based on US opposition to democracy in the region). What has been questioned in this research is how can we get an accurate analysis of the American standard of conduct towards democracy in the region? In response, it was hypothesized that the United States' dual standards of behavior in the countries of the region are rooted in a policy of strategic balance, and the most striking feature of this strategy can be seen in Syria and Bahrain. The findings show that, on the Security Council and beyond, the United States has used its diplomatic, financial and military tools to weaken Syria, while at the same time it has strengthened the Bahraini government with the same tools. In addition to the situation in both countries, maintaining the balance of power in the entire region was also sought by the United States, which has been pursued with the support of Israel and Saudi Arabia against the deterrence of Iran and Russia in the region.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 512

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 184 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    179-204
Measures: 
  • Citations: 

    0
  • Views: 

    435
  • Downloads: 

    346
Abstract: 

Cyberspace has made opportunity for creating group and movement by its user. These capabilities created a new kind of crisis by the name of cyberspace effected security-political crisis(CSPC). Understanding the transition from security-political crisis(SPC) to CSPC is the first step for managing this kind of crisis. Main problem of this research is Characterizing and modeling SCP transition to CSCP, on the other word the goal of this research is to characterize transition of causal parameter of SCP by cyberspace. The research method of this article is The exploratory sequential design. qualitative phase of the research was done by survey on scientific article, literature and world experience reviewing for extracting transition of SPC causal parameter to cyberspace which represented as researchers’ transition model. The quantitative phase of research was done by using questioner for endorsement the output model of previous phase. The results of research have shown transition of causal parameter of SCP to cyberspace make them affected by cyberspace based network’ s power and this alongside with physical power has a critical role to onset, control and continuation of SCP.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 435

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 346 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    205-230
Measures: 
  • Citations: 

    0
  • Views: 

    1708
  • Downloads: 

    809
Abstract: 

The Islamic Revolution, led by Imam Khomeini (r. a), based on the monotheistic worldview of Islam and the Centrality of Velayat-e Faqih, emerged in a situation that the world was divided between materialistic and atheistic discourses. The issue of the present study is to shed more light on the possibility of revising the plan of revolutionary discourse from the Imam Khamenei's Perspective to provide an alternative plan for reconstructing the monotheistic and humanist Islamic society among the sub-discourses which were created by the East and the West during the twentieth century. This research is based on social sciences studies and through using a set of statements, strategic plan of revolutionary discourse has been adapted in line with the research methodology and Imam Khamenei’ s expectations. First of all, the research indexes were extracted from the research literature and was discussed with 65 elites. Finally, we came to the conclusion that the pivotal concept of "revolutionary" which was frequently used in Imam Khamenei's lectures is a sufficient condition for making a monotheistic society and it is also a major step towards the establishment of modern Islamic civilization. In fact, through the revolutionary discourse considered by the supreme leader of the Islamic revolution in a logical and intellectual manner has become widespread and accepted by people, to create a kind of public opinion and widespread cognition in the society.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1708

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 809 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    231-264
Measures: 
  • Citations: 

    0
  • Views: 

    390
  • Downloads: 

    166
Abstract: 

Following the unilateral abolition of the Joint Action Plan by Donald Trump, tensions between the Islamic Republic of Iran and the NeoCons reached their highest levels. Indeed, Trump considered the JCPOA as a tool for the growing development of the power of the Islamic Republic. Therefore, by imposing the most economic sanctions on the one hand, and considering the terrorists as the Islamic Revolutionary Guards Corps, publicly expressed his positions towards Iran. The full-fledged side of the war led to the expansion of the scope of the military conflict with the threat of deploying troops to the Gulf region. The main issue here is the nature and type of opposition between the Islamic Republic of Iran and the United States. Therefore, the authors' efforts in this paper are about providing answer to this question what is the main paradigm of deterring the Islamic Republic of Iran over US military threats? The author's hypothesis is based on the principle that military confrontation and direct between the two countries will not occur, and the findings of the paper, which are based on the theory of defensive realism and the use of synthetic methods of historical sociology and futures studies, indicate that for three major causes of this confrontation will not occur. At the national level, a deep coalition of military and official forces, including the army, the Islamic Revolutionary Guard Corps, the Parliament and the missile power Iran, At the regional level, the powerful Shiite coalition to support Iran and the fragile nature of the United States in the Middle East And internationally, the structural barriers of Russia and Trump's Narcissist personality are the most important obstacles to the realization of the US military strike against the Islamic Republic of Iran.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 390

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 166 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    265-290
Measures: 
  • Citations: 

    0
  • Views: 

    733
  • Downloads: 

    568
Abstract: 

Three decades after the establishment of the Islamic Republic of Iran and in the stage of civilization, the development of the Iranian Islamic model of progress is one of the vital necessities of this system and has always been emphasized by the wise leader of the Islamic Revolution. Have been defined and designed in four areas (life, thinking, science and spirituality). The present study was conducted with the aim of "recognizing the role of security in the spirituality of the Iranian Islamic model of progress" and has tried to study and study the role of security in the "field of spirituality" using the mixed research method and its components and indicators. Determine. The statistical population of the research is a set of theoretical and practical experts in the field of security and strategic management who have valuable security experiences and scientific works. The required data were collected by fisheries, questionnaire and interview tools and 70 people were surveyed using all methods, using inferential statistics techniques such as t-test, a sample and Friedman ranking test using soft SPSS software has been analyzed. The results show that, firstly, the field of spirituality takes precedence over other pre-existing fields of grace, and secondly, three components and six indicators have been confirmed as the most important components and indicators in the field of spirituality and improving the level of security. Given the two-way relationship between security and progress, paying attention to the components of spirituality will lead to the rule of spirituality and ethics in society and the production of a secure human being who, in turn, is responsible for security and progress.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 733

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 568 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Ferasati Amir

Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    291-326
Measures: 
  • Citations: 

    0
  • Views: 

    463
  • Downloads: 

    203
Abstract: 

The country's cyberspace is a space of communication networks in which useful content and services are provided within the framework of Islamic principles and values and the country's laws and regulations, and despite the many benefits, creating a platform for cybercrime risks to security. Virtual and consequently the national interests of the country. Due to the lack of a clear strategic model in this regard, the present development-applied research aims to achieve a strategic model of international cooperation to improve cyberspace security based on the national interests of the Islamic Republic of Iran and with a case-by-case approach to cybercrime. Mixed), while collecting and studying the relevant theoretical foundations, noteworthy concepts (qualitative data) Draws and codifies (categorizes, categorizes, measures, and categorizes the research method by MaxiCode software software (methodology, components, and indicators) and then models the structural structural equations in Smart PLAS software by modeling. Extracting 4 main hypotheses and 10 sub-hypotheses for evaluation, model expertise by snowball method by questionnaire, from faculty members, operational managers and strategic managers familiar with the field of research (statistical community) and by analyzing and analyzing the obtained quantitative data, Kelly assessed the model as strong. The research results showed that 12 approved hypotheses, 2 rejection hypotheses and global indicators of cyberspace security (bilateral agreements, multilateral agreements, organizational partnerships, public and private partnerships, international partnerships) are also effective tools for improving cyberspace security.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 463

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 203 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    327-358
Measures: 
  • Citations: 

    0
  • Views: 

    1910
  • Downloads: 

    1106
Abstract: 

Economics is at the core of the development of every technology, including cryptography, and the digital economy is one of the drivers of the development of cryptographic science and technology. The purpose of this article is to help improve the security of information and communication in the country because the science and technology of cryptography is at the heart of information and communication security in cyberspace that cannot be achieved by any import. The main issue in this area is the lack of a well-designed and strategic model for the development of cryptographic science and technology in the I. R. Iran, what the dimensions, components and indicators are, and how to provide the appropriate conditions for achieving the 1404 vision. In this article, we have dealt only with one of the important dimensions of the strategic model of the development of cryptographic science and technology in the country. Together with the conceptual model of the research was drawn and based on this, the model of achieving optimal status in the field of digital economy was determined. Using Structural Equation Modeling (PLS), two questionnaires were provided and handed them in. There are three kindes of study such as measuring, structural and overall model (GOF) and how this model is fit or otherwise. According to the four-step PDCA Deming loop, the strategic model for the development of cryptographic science and technology in the I. R. Iran, designed and presented.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1910

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 1106 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

امنیت ملی

Issue Info: 
  • Year: 

    1399
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    359-400
Measures: 
  • Citations: 

    0
  • Views: 

    379
  • Downloads: 

    163
Abstract: 

پایتخت به عنوان مهم ترین شهر هر کشور، نقشی اساسی در اداره کشور و زندگی ملت ها دارد. تا سال 2000 میلادی کشورهای زیادی اقدام به انتقال پایتخت کرده اند که هر کدام دلایل خاص خود را برای انتقال پایتخت دارند. در پاکستان، قزاقستان و ترکیه دلایل دفاعی مطرح گردید. درحالی که در بلیز این جابه جایی به دلیل بلایای طبیعی صورت گرفت. ایران کشوری است که بنا به دلایلی مانند ترافیک آلودگی هوا، زلزله خیز بودن و تمرکز جمعیت در شهر تهران، می کوشد تا پایتخت خود را انتقال دهد. جابه جایی پایتخت در ایران از دو منظر اهمیت ویژه ای پیدا می کند؛ اول ساماندهی شهر تهران و تعادل بخشی به نظام شهری و منطقه ای کشور و دوم حفظ امنیت سیاسی کشور. ازاین رو هدف از نگارش این مقاله که با روش توصیفی – تحلیلی و پیمایشی نگاشته شده، شناسایی اصلی ترین موانع و چالش های فراروی جابه جایی پایتخت و ارائه راهکارهای بهینه در جهت رفع این موانع، مهم ترین هدف آن است. به همین منظور روش مقاله، با توجه به ماهیت نظری آن توصیفی-تحلیلی است و گردآوری داده ها به روش کتابخانه ای و اسنادی انجام گرفته است. نتایج تحقیق برگرفته از جامعه آماری تحقیق که متخصصین علوم انسانی در حوزه های مرتبط با موضوع است، می باشد و حجم نمونه 100 نفر کارشناس است که از روش نمونه گیری گلوله برفی انتخاب شده اند و حاکی از آن است که عوامل مختلف امنیتی مانند: «به وقوع پیوستن نزاع های سیاسی بر سر تفویض قدرت و اختیارات و توزیع وزارتخانه ها در شهرهای مختلف»؛ «موفق نبودن انتقال پایتخت های دیگر در سایر نواحی جهان»؛ «مقاومت مردم، جناح ها و گروه های سیاسی به دلایلی چون ترس از بیکاری، از دست دادن منافع و. . . » و «رابطه گرایی شدید سیاسی در واگذاری ها (اختیارات و منابع)» و. . . مؤلفه موانع دفاعی «موقعیت جغرافیایی مناسب پایتخت فعلی از نظر مرکزیت و دسترسی»؛ «تمرکز بالای نیروهای دفاعی و امنیتی در پایتخت و شناخت کافی نسبت به نقاط ضعف و قوت پایتخت هنگام بروز تهدید»؛ «آگاهی سیاسی بالای پایتخت نشینان و عکس العمل مناسب در مقابل فتنه های دشمن (داخلی و خارجی)»؛ «سیستم حمل ونقل سریع (مترو) جهت جابه جایی اضطراری و وجود پناهگاهی مناسب و امن در صورت لزوم» و. . . به ترتیب بیشترین اثر را در این مؤلفه داشته اند؛ بنابراین مهم ترین پیشنهاد و راهکار نویسندگان ساماندهی سیاسی فضا جهت تمرکززدایی از تهران، پراکنده ساختن وزارتخانه ها، ادارات و مراکز غیر ضروری در سطح کشور برای جلوگیری از ازدحام جمعیت در تهران است.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 379

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 163 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    401-432
Measures: 
  • Citations: 

    0
  • Views: 

    406
  • Downloads: 

    474
Abstract: 

After the collapse of the Soviet Union, the Americans, with the power vacuum created in Central Asia, introduced a strategy of infiltrating the backbone of their Asian rivals, China, Russia, and Iran. After the 9/11 attacks, it formally set up a military base in Central Asia and dispatched troops to the region under the pretext of countering Islamic extremism and suppressing terrorist groups. This US strategy has been the beginning of its direct involvement in the Central Asian security environment. Accordingly, one of the goals of the US presence in the security environment of the Central Asian region is to operationalize the Islamic Republic of Iran's containment strategy. In this descriptive-analytical study, through a field study and the opinions of experts and experts in the field of Central Asian Studies, a strategic analysis of the consequences of the US presence in the security environment of the Islamic Republic of Iran was undertaken. Based on the SWOT analysis, the optimized strategy is a "ST" competitive strategy, employing strengths to avoid threats; it will work effectively to counter US aggressive strategies against the country in the Central Asian security environment.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 406

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 474 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

KARAMI REZA

Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    433-464
Measures: 
  • Citations: 

    0
  • Views: 

    992
  • Downloads: 

    609
Abstract: 

Conflicts and insecurity in Southwest Asia have a variety of reasons, the most important of which are: 1) border-territorial disputes, 2) ethnic-religious disputes, 3) ideological conflicts, 4) oil, and 5) power interference. The alien pointed out. The political-geographical structure of Southwest Asia has always been conducive to the emergence and formation of extremist religious movements. The current situation in the region is a good indication of the fact that religious extremist movements are the source of some instability in the region and, as the case may be, have the capacity to organize security crises at various national and transnational levels for the entire region and sometimes beyond. Are. Religious extremist movements, by challenging the software and infrastructure of the national security management of governments, such as political legitimacy, political participation, national cohesion and integration, etc., have taken anti-security and subversive measures with the support of various foreign actors. They are pursuing both regional and trans-regional. In this descriptive-analytical study based on the document, using experts and analyzing the data from the questionnaire, the software components are effective in managing internal security crises caused by religious extremism in Southwest Asia. In eight components, as described in the text, the effectiveness of each component in the management of these crises has been determined as a percentage. The component of political legitimacy with 15. 41 percent has the highest and the component of development with 10. 56 percent has the least effectiveness in managing the crises in question.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 992

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 609 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0