مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

4,443
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

IDENTIFICATION AND PRIORITIZATION OF THE THREATS POSED BY SOCIAL NETWORKS IN THE AREA OF NATIONAL SECURITY

Pages

  57-78

Abstract

 Today, the influence of internet-based SOCIAL NETWORKS on the lives of human beings has affected many aspects of human life. In addition to producing opportunities which had not been existing before, these networks have produced many threats and problems against their users; in a way that those threats are imposed against the users through other users of these networks on the one hand, and by the institutions and states that are dependent on the hostile states. It follows that the extensiveness of the use made of the SOCIAL NETWORKS based on the virtual space should not make us ignore to address the potential threats posed in these networks. So, the present article has come to identify and prioritize such threats in the area of national security. Using AHP technique, the present article prioritizes the various kinds of threats imposed on users by the states and institutions dependent on the hostile states and the criteria that are used to assess them by studying the literature and the backgrounds of the research and identifying those threats. After this stage, those threats are prioritized by using AHP analysis model with a view to the criteria concerned. The results showed that the significance of the criteria that are used to choose the threats can be expressed in the form of the complexity of the threats (rate One), the speed at which the threats become prevalent (rate 2), the duration of the threats (rate 3), and extent and scope of the threats (rate 4). The threats in order of significance are as follow: street riots, regional and racial differences; cultural terror; rumors; and auditing the information in the society. Finally, suggestions are presented for the policy-makers in the fields of information technology and communications in the country.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    AKBARI, MOHSEN, DOOSTAR, MOHAMMAD, & HOOSHMAND CHAIJANI, MILAD. (2016). IDENTIFICATION AND PRIORITIZATION OF THE THREATS POSED BY SOCIAL NETWORKS IN THE AREA OF NATIONAL SECURITY. JOURNAL OF DEFENSE POLICY, 23(2 (90)), 57-78. SID. https://sid.ir/paper/261102/en

    Vancouver: Copy

    AKBARI MOHSEN, DOOSTAR MOHAMMAD, HOOSHMAND CHAIJANI MILAD. IDENTIFICATION AND PRIORITIZATION OF THE THREATS POSED BY SOCIAL NETWORKS IN THE AREA OF NATIONAL SECURITY. JOURNAL OF DEFENSE POLICY[Internet]. 2016;23(2 (90)):57-78. Available from: https://sid.ir/paper/261102/en

    IEEE: Copy

    MOHSEN AKBARI, MOHAMMAD DOOSTAR, and MILAD HOOSHMAND CHAIJANI, “IDENTIFICATION AND PRIORITIZATION OF THE THREATS POSED BY SOCIAL NETWORKS IN THE AREA OF NATIONAL SECURITY,” JOURNAL OF DEFENSE POLICY, vol. 23, no. 2 (90), pp. 57–78, 2016, [Online]. Available: https://sid.ir/paper/261102/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top