مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

647
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Presenting a model for assessment of future smart threats

Pages

  121-147

Abstract

 Contemporary Threats significantly differ from traditional ones. It is no longer enough to rely on traditional “ analytical-estimation” theories and models for the assessment of new Threats. Proportional to the transformations which took place in the nature, dimensions, and methods of the operationalization of Threats it is necessary to design and offer more advanced analytical frameworks and assessment models in the area of Threats. The present research is one of the first attempts to respond to this need. In this research, “ Futures studies" were performed in the field of defense-security and issues related to “ Threat identification” which resulted in the presentation of a model titled “ Threat dissection analysis” . This method performs a quantitative and qualitative assessment of the intensity of smart Threats via Raymond Quivy – Luc Van Campenhoudt’ s indexing method in form of three dimensions (hard, semi-hard and soft) four factors (approaching, behavioral, structural and implemental), eight major indices (type of Threat, size of Threat, extent of Threat, time of Threat, depth of Threat, repetition of Threat, domain of Threat and location of Threat), 24 basic indices and 120 relative sub-indices. This study employed a normative approach with a mixed methods research design. The tools utilized to collect explicit knowledge included documentary research and web mining. The tools used to collect implicit knowledge were distributed questionnaires. To verify and validate the data, interviews, expert opinion, and validity (credibility) and reliability (confidence) assessment of the questionnaires were employed to make sure that the questionnaire’ s questions match the research objectives and ensure its repeatability.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Kazempour, Zakaria, & BAHRAMI, MOHSEN. (2018). Presenting a model for assessment of future smart threats. DEFENSIVE FUTURE STUDY, 3(10 ), 121-147. SID. https://sid.ir/paper/397171/en

    Vancouver: Copy

    Kazempour Zakaria, BAHRAMI MOHSEN. Presenting a model for assessment of future smart threats. DEFENSIVE FUTURE STUDY[Internet]. 2018;3(10 ):121-147. Available from: https://sid.ir/paper/397171/en

    IEEE: Copy

    Zakaria Kazempour, and MOHSEN BAHRAMI, “Presenting a model for assessment of future smart threats,” DEFENSIVE FUTURE STUDY, vol. 3, no. 10 , pp. 121–147, 2018, [Online]. Available: https://sid.ir/paper/397171/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button