Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Journal Issue Information

Archive

Year

Volume(Issue)

Issues

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Title: 
Author(s): 

Journal: 

امنیت ملی

Issue Info: 
  • Year: 

    0
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    -
Measures: 
  • Citations: 

    0
  • Views: 

    5875
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 5875

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Title: 
Author(s): 

Journal: 

امنیت ملی

Issue Info: 
  • Year: 

    0
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    -
Measures: 
  • Citations: 

    0
  • Views: 

    717
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 717

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    7-24
Measures: 
  • Citations: 

    0
  • Views: 

    644
  • Downloads: 

    0
Keywords: 
Abstract: 

Today, the establishment of a national information security network is considered as an essential strategy for the enforcement of cyberspace, and most countries have focused on creating and providing services on this platform. Determining the security of national information networks requires quantifying and providing an evaluation model that can be used to assess and design or select a national information security network. In this regard, the purpose of this study is to achieve the National Geospatial Information Network Assessment Model for JHA. So the main question of the research is, "What is the National Information Network's National Information Network Assessment Model? " The type of research is also in terms of applied-developmental purpose and the mixed research method has been used. Based on this, firstly, in the library studies section, by referring to valid sources, the most important indicators and variables affecting the assessment of the National Information Network for Secure Data were extracted and, according to their nature and role, these variables were classified. The following questionnaire was designed and made available to experts, experts and cyber experts. Based on the analysis of the questionnaires, the most important variables and indicators for assessing the national security information network for JHA were counted. Finally, based on the findings of the library and field studies, as well as the analyzes made, the suggested conceptual model for assessing the national information security network for JHA was presented in three dimensions, nineteen components and seventy one indicators after the final validation of the cyber elites.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 644

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SHAMS DOLATABADI SEYED MAHMOOD REZA | ASGARI MAHDI

Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    25-51
Measures: 
  • Citations: 

    0
  • Views: 

    672
  • Downloads: 

    0
Keywords: 
Abstract: 

The Islamic Republic of Iran, as one of the Western Asian countries, has always been exposed to the security threats of the Zionist regime, so that the Zionist regime is now considered one of the main problems of the foreign policy and national security of the Islamic Republic of Iran at the regional and international levels. It goes. Given that the threats of the Zionist regime against the Islamic world are a real and serious threat. Therefore, taking advantage of the capacities of the occupied Palestinian territories to reduce the threats of this regime is felt more and more. The purpose of this research is to "explain the geopolitical impact of Syria on the national security of the Islamic Republic of Iran in the face of the Zionist regime. " The question posed in this study is, "What impact can the geopolitics of Syria have on the national security of the Islamic Republic of Iran in the face of the Zionist regime? In this research, the theory of grounded theory (grounded theory) of Strauss is used. The results of the research indicate that the accurate, systematic and continuous identification of the geopolitical developments in Syria and the transformation of these factors into geopolitical interests can enhance Iran's national security and deteriorate production and, in turn, create security concerns for the Zionist regime. . Therefore, it is suggested that continuous monitoring of Syrian geopolitical developments be put on the agenda of the responsible centers and institutions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 672

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

RAJAEI HOSSEIN | SALIMI ALIREZA | HOSSEINI SEYED ALI REZA | Nazemi Ashani Mohammad Hossein

Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    53-74
Measures: 
  • Citations: 

    0
  • Views: 

    5964
  • Downloads: 

    0
Keywords: 
Abstract: 

Science and technology are one of the foundations of the endogenous authority of a nation. So far, there are no suitable strategies for solidifying science and technology, or if provided, this does not provide the desired goal. Considering that this research seeks to study and identify the strategies of science and technology affecting the strength of the internal construction of the national power of the system, it is therefore applicable on the basis of the objective. In terms of collecting data, this paper is also included in field surveys. The method of collecting information is through surveys, libraries and in-depth interviews with experts. In this research, after studying and analyzing the statements of Imam Khomeini (RA), Supreme Leader (Supreme Leader), reviewing upstream documents, library studies and analysis of trends, dimensions and components of science and technology affecting the internal strength of national power were identified and exposed. Selected experts in the field of science and technology as the statistical community were identified and then the opportunities and threats, strengths and weaknesses were identified by quantitative and qualitative methods of analysis, and from the intersection of the components, appropriate strategies were obtained. The results show that the strategy is to produce indigenous knowledge based on Iranian sources and bases, to promote the production of advanced science and technology infrastructure, and to use widespread use of secure virtual space, in accordance with the achievement of the authority of science and technology of the world, from the chosen selective strategies of the case Confirmation of experts is based on scores of charm.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 5964

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Enayati Lotfali | Langari Ali

Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    75-112
Measures: 
  • Citations: 

    0
  • Views: 

    666
  • Downloads: 

    0
Keywords: 
Abstract: 

Replication have had an special place in Islam sources such as holy Quran. Human beings in with any dignity, must be responder in case of their operation. Without replication, immorality will fill society. Importance of issue clearly emphasized in supreme leader´ s speeches which comes from Islamic studies. This article codified in case of “ recognition and specification of replication concept in supreme leader´ s speeches. Findings of this research have to answer this basic question that: What are concepts and components of replication from supreme leader´ s point of view? Replication concept, such as any other concepts, has two general and particular extent. This article will talk about general domain. This research leads to survey supreme leader´ s speeches about replication by descriptive, analyzing and survey method. To find best proposition, Concentration of researcher is on words “ replication” and “ answering” . Replication is impression of commitment in case of securement of desires, others satiation, behavior explanation and rationalization, based on a complex of social relations. Research conclusions shows: characterization of questioning and replication in society, based on Islamic studies, leads to cognition and transparency, belief and justice, safety, consistence and finally human felicity and accomplishment in Islamic society and in same way basics for replication characterizes in society are commitment, proficiency and acquit based on law and imposition.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 666

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    113-140
Measures: 
  • Citations: 

    0
  • Views: 

    537
  • Downloads: 

    0
Keywords: 
Abstract: 

The Joint Comprehensive Plan of Action (JCPOA) was an agreement on the Islamic Republic of Iran's nuclear program, which was approved by the United Nations Security Council on July 14, 2015, after the signature of the Iranian Foreign Ministers and the P5 + 1 countries. Despite the full implementation of its commitments by Iran, the new US government withdrew from JCPOA based on its strategy and presented a new challenge to the Islamic Republic of Iran internationally. This article aims to help decision-makers to improve the national security factor by identifying US strategies to exit from JCPOA, after describing the two countries' approach to the issue by using "descriptive-analytical" approach, through the creation of "elite working group and In-depth Interview Technique" has analyzed and extracted US strategies to exit from JCPOA against Iran's national security. According to the results obtained in accordance with the US approach to withdrawal, the country's key strategies include six areas: forcing the Islamic Republic to surrender by imposing severe economic sanctions, overthrowing the Islamic Republic through instability and regime change; Iran's containment by limiting the Islamic Republic of Iran's missile program, resolving the challenge of Southwest Asia by reorienting power and reducing regional influence of the Islamic Republic of Iran, isolating Iran by forcing the Islamic Republic of Iran to violate the JCPOA and preventing the Islamic Republic of Iran from gaining benefits of JCPOA through the violation 2231 statement, were identified and classified.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 537

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    141-172
Measures: 
  • Citations: 

    0
  • Views: 

    497
  • Downloads: 

    0
Keywords: 
Abstract: 

The cultural structure of Iran is composed of different ethnicities. Unless this is taken seriously in the media There is a serious problem in media discourse As a result, there will be a disruption to the integration of Islamic-Iranian culture. To this end, the main purpose of this study is to identify strategic challenges National media policies are in the area of ethnicity. Using in-depth interviewing techniques from 30 executives And media professionals gathered information. Data with open coding methods, Axial and selective were analyzed using the approach of Grundt Theory with the Strauss and Corbin approach. The results showed that some regional and ethnic inequality In the country. As a result, This research is a paradigmatic model and strategies for Solving the challenges of audio and video has presented ethnicity.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 497

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    173-194
Measures: 
  • Citations: 

    0
  • Views: 

    1389
  • Downloads: 

    0
Keywords: 
Abstract: 

Land administration must be implemented in a manner that guarantees the participation of the people and their political representatives. The requirements for the implementation of the land development plan for the long-term development of the country are based on the principles of land management, including security and defense considerations, efficiency and economic efficiency, the unity and integrity of the land of Iran, the expansion of social justice and regional equilibrium, protection Environment and natural resources rehabilitation, preservation of Islamic, Iranian identity and protection of cultural heritage, facilitating and regulating the internal and external relations of the country's economy, removing exclusions, especially in rural areas of the country. A region that has the power of political security can be a prerequisite for the development of balanced development in the region and the land. By increasing security and providing appropriate security solutions to the territory of the land, we can see the establishment and sustainability of maintaining the population and preventing demographic migration. The present research is based on the purpose of applied scientific research and based on the nature and method of the descriptive-analytical method has been used. The nature of the data used is small and is a way of collecting data and information from the field and documents. The writing framework can be based on the interrelationship between security indicators in the political dimension, information gathering through library studies and field research (interviewing), and the preparation of a questionnaire. For analysis of the data, this method has been used to analyze the AHP technique. Question of Political Security Political situation in Sistan and Baluchestan province in what condition and how is the province of the province? And the overall objective: the achievement of sustainable security in the political dimension in Sistan and Baluchestan Province, is the minor objective: to examine the political security of the Sistan and Baluchestan province in the Territorial Territory. Based on the results obtained in the area of political security in Zabol, Dargan, Nimroz, Zahak and Mehrestan (Zabali), the priority is more secure than other cities.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1389

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    195-220
Measures: 
  • Citations: 

    0
  • Views: 

    569
  • Downloads: 

    0
Keywords: 
Abstract: 

The research, which is derived from a doctoral thesis, shows that Iran and Turkey, two neighboring and important Islamic countries in the region, have competing fields at the same time. Many factors and variables are involved in the security rivalries formed between Iran and Turkey and the created security bottleneck that can be attributed to political, economic, cultural and geopolitical factors. Security theories also show that countries in a security dilemma cannot reasonably find solutions to the effects of misunderstandings and mistrust and reduce uncertainty by relying solely on the levels at which they work together. Can reach the management status. This study seeks to explain the security bottlenecks and dilemmas between the two countries and to foster and enhance the relations and cooperation, while explaining the security bottlenecks and dilemmas between the two countries, a process for strategic management of security bottlenecks between the two countries based on national interests. Offer. Finally, it was identified that the process should include identifying and explaining the security bottleneck, locating security bottlenecks in the security policy and foreign policy of the Islamic Republic of Iran and Turkey, and in large part in the security environment of both countries and regions Identifying the points of commonality, differentiation, and key factors in each of the security bottlenecks between Iran and Turkey should be precise about the national interests of the Islamic Republic in the security bottlenecks with Turkey, and determining and identifying management strategies for the security bottlenecks.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 569

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

DAVOODI MOHAMMAD

Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    221-240
Measures: 
  • Citations: 

    0
  • Views: 

    2201
  • Downloads: 

    0
Keywords: 
Abstract: 

The great Islamic ummah during the many centuries after the early centuries of Islam failed to achieve the purpose and end that Islam had foreseen and intended for him. This was what had kept them away from Islam, the dispersion and neglect of the Muslims. Their divisions have endured the enemies' domination over them. But what is certain is that the role of unity in spreading the unity of the ummah cannot be denied. And maintaining unity is a very profound and important value that the Prophet (peace be upon him) and the Imams (AS) have invited us to. The issue of unity is one of the most important Islamic issues that many scholars, scholars, peacekeepers and leaders of the Islamic world are concerned with and whose purpose is to identify the role of national unity in strengthening the internal power of the system and the main research question corresponding to the purpose of the strategies. What is National in Strengthening the Internal Power of the Islamic Republic of Iran System by Emphasizing on the Statements of the Supreme Leader? The type of research is applied and its method is descriptive-analytical which is used to collect information from the "scientific and specialized library" tool of "Internet". And in fieldwork using the opinions of the scientific elite, the sample size is 30 people. The results show that wise and wise leadership at the head of government and compliance with the law are the most important strengths and strategies in fostering national unity to resolve differences and unity of people and officials. This is achieved by doing systematic scientific work through the SWOT matrix.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2201

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    241-272
Measures: 
  • Citations: 

    0
  • Views: 

    861
  • Downloads: 

    0
Keywords: 
Abstract: 

Deterrence is one of the key discussions in the coutery’ s security and defence. Hence, the promotion and development of strategic literature on deterrence and in particular on cybersecurity and cyberdefence in order to exploit responsible institutions for formulating and implementing cyberspace policies is one of the most important and urgent issues. Creating a valid deterrence power plays key role in cyber defence, to achieve this, the public, private and governmental institutions needed to carry out the main missions coordinately. In this research, based on Interpretive Structural Modelling (ISM) method, we intend to identify effective institutions on the process of creating the deterrence power and the prevention of threats and cyber attacks in the cyber defense system and examin which institutions at what level will take effecte from other institutions. Finally, the results of the research show that all 14 cybersecurity organizations are effective on the process of creating deterrent power and preventing threats and cyber attacks, and are needed to achieve deterrence goals. In the second step, considering the effect of institutions on each other, based on the input and output of each entity, the level of influence of each entity is determined. Higher-level institutions have more influence over other institutions and have higher decision-making power and lower-level institutions are more dependent on other institutions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 861

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    273-314
Measures: 
  • Citations: 

    0
  • Views: 

    1126
  • Downloads: 

    0
Keywords: 
Abstract: 

The cyberspace of the country is a space consisting of communication networks in which the content and useful services are provided within the framework of Islamic foundations and values and the laws and regulations of the country, and despite the great merits of creating a place for cybercrime, there are risks to the cybersecurity of space and consequently, the national interests of the country, their pursuit requires the cooperation of legal authorities and the cybercrime of all affected countries (due to the transboundary nature). In view of the lack of a specific strategic model in this regard, the present-day applied development study aims to achieve the strategic model of international cooperation to enhance the security of cyberspace based on the national interests of Iran and the approach to combating cybercrime in a Case-based approach (Mixed research method), while collecting and studying the related theoretical foundations, we codify and categorize the notable (qualitative data) grounded theory by maxqda software (dimensions, components and indices), and the model Describes the concept of research and then, by modeling the equations The related questionnaire in smartpls software and the extraction of 4 main hypotheses and 10 sub-hypotheses for evaluation, modeling the model by Snowball method was performed by a questionnaire, faculty members, operational managers and strategic executives familiar with the research The results of the research showed that 12 hypotheses approved, 2 hypotheses rejected, and universal cybersecurity (bilateral agreements, multilateral agreements, organizational partnerships, public-private partnerships, international partnerships) are also effective tools for enhancing cybersecurity, thus structuring The finalized indicators, in accordance with the OODA decision-making cycle, are divided into four stages, observation, guidance, decision-making and action, and the establishment of relationships (interactive, feedback, monitoring and control) among them, The Strategic Model of International Collaboration to Promote Cybersecurity and Combat Cybercrimes Based on The National Interests of the Islamic Republic of Iran was designed and presented. Keyword: strategic model, international cooperation, promotion of cybersecurity, national interests of Islamic Republic of Iran, fight against cybercrime.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1126

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    315-353
Measures: 
  • Citations: 

    0
  • Views: 

    1117
  • Downloads: 

    0
Abstract: 

Cyber space has been tremendously progressing and has led to various activities, such as information provision, service delivery, communications management, and social, political, cultural, and governance interactions through cybersecurity mechanisms. This space is exposed to various challenges, threats and threats such as organized crime, disruptive service attacks, spyware, sabotage, data bank destruction, privacy defects, and intellectual property rights violations. Cyber security threats by exploiting the complexity and increasing connectivity of existing systems in organizations, and in particular critical, critical, and critical infrastructure, compromise the security of the economy, safety and public health. Protecting information to create a safe, secure and resilient community of cyberattacks is essential, which requires mechanisms to preserve the confidentiality, integrity and availability of assets. Considering the emergence of the concept of information security in cyberspace and considering its impact on the national security of the country, addressing this issue and institutionalizing it is considered a necessity and priority. In this regard, in order to protect the country's information in the cyberspace, there is a need for full knowledge of this space and its threats. Accordingly, the preparation of a macroeconomic model for information security in the Islamic Republic of Iran's cyberspace would help to identify the areas needed and to take the necessary steps. Information security will be the focus of this article. In order to achieve a macroeconomic model for cyberspace security, it is necessary to examine theoretical foundations, upstream documents of the country in this area. It is also necessary to study the comparative study of country documents, which are discussed in this article and based on this. Dimensions, components, subcomponents and cyber security information indicators were measured. By summarizing the research findings (theoretical foundations, comparative studies, etc. ), 8 dimensions and for each dimension, 4 components, and for each component, 3 subcomponents and 13 indicators for cybersecurity data, then a questionnaire based on the Likert scale of 5 options The expert opinion was adjusted and reviewed. By studying the methodology of similar research, modeling of structural equations by partial least squares (PLS) using SmartPLS software was selected to analyze the data. The fitting of the model, the fitting of the structural model and the general fitting of the model were calculated by fitting the analysis and fitting the model was evaluated. The results are presented in the form of final tables.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1117

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    355-388
Measures: 
  • Citations: 

    0
  • Views: 

    1119
  • Downloads: 

    0
Abstract: 

The security amazement of the defense sector as a result of enemy threats, as well as high-risk behaviors, and the network of its colleagues, is the main issue of this study. The purpose of this study is to provide a military platform for the Department of Defense Future Studies to address the issue. The weakness in this regard results in continued neglect and security damage, including assassination, disclosure of information, vandalism, and so on. In order to achieve the desired system, a total of 63 different systems, including futures studies and common systems in legal issues as well as management among related scientific literature, were studied and based on it, as well as the security issues in the field of the Ministry of Defense, the framework and pattern The concept of research was extracted. The results were then evaluated through a semi-open interview with 26 specialists. Individuals were selected randomly, purposefully and by proportions. Individual remarks after theoretical saturation were analyzed and 61 corrective propositions were made in the form of 10 general themes, 32 organizing themes and 128 basic themes. A research achievement is a system that provides a mechanism for focusing on security authorities and actors in the security environment and on the awareness of their future. The proposed system has the dimensions of input, operation, output, environment and organizational components, as well as components including: organizational, human, security authorities, environment, processes, operational requirements, outcomes, outcomes, field and task environment and infrastructure. The components of the figure are explained through 35 components and 91 cases.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1119

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    389-424
Measures: 
  • Citations: 

    0
  • Views: 

    757
  • Downloads: 

    0
Abstract: 

Cyber terrorism is one of the threats to the cyber space that has faced many countries in recent years, including the Islamic Republic of Iran. In this article, after studying the backgrounds related to terrorism and cyber terrorism, its position among other cyber threats, features of cyber terrorism, ontology, actors, its components, cyber terrorism strategies, types of attacks of cyber terrorism are described and the researcher's definition of cyber terrorism is stated. In the field of cyber terrorism, the methods of assessing the threat of cyber terrorism are discussed and a conceptual model is presented while extracting the relevant components and factors from the research literature, then, by using snowball method, experts of strategic areas of cyberspace, 31 people were gathered and with their Opinions through interview and questionnaire, also using SPSS, SMART PLS software, the proposed conceptual model was tested and final model were Drawn.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 757

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    425-451
Measures: 
  • Citations: 

    0
  • Views: 

    1911
  • Downloads: 

    0
Abstract: 

This paper explains the goals of ministry of intelligence as the pillar of intelligence in Islamic Republic of Iran based on Velayat-e Faqih discourse, the constitution and experiences of the staff of the ministry. Based on this problem the main question of the research is this: “ How is it possible to analyze ministry of intelligence goals based on Velayat-e Faqih discourse, the constitution and experiences of Islamic Republic of Iran? ” The main purpose of the research is to analyze the ministry of intelligence goals based on qualitative data. The type of research is applied and developmental, and Grounded Method Theory (GMT) is used in the research. The paper's findings suggest that the ministry of intelligence has a wide range of goals, such as: enforcement, persistence, protection and stabilization of Islamic revolution, to progress to an advanced intelligence system in different aspects, enforcement and providing environmental security and security environment, developing intelligence contest, surprise prevention, to maintain and support national decisions, to alert in different dimensions, to enhance the transparency of goals and avoid overlapping security goals and to reinforce the idealistic and revolutionary spirit.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1911

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button