Search Results/Filters    

Filters

Year

Banks



Expert Group







Full-Text


Author(s): 

Seddigh Mir Ibrahim

Issue Info: 
  • Year: 

    2016
  • Volume: 

    19
  • Issue: 

    1 (71)
  • Pages: 

    71-92
Measures: 
  • Citations: 

    0
  • Views: 

    1075
  • Downloads: 

    0
Abstract: 

The paper aims at illustrating the nature of the cyber revolution and its impacts on the character as well as contents of ESPIONAGE. It seems that the cyber space has led to go beyond of time and place constraints with regard to ESPIONAGE and therefore, variety of ESPIONAGE and new actors in this field as well as introduction of different field of ESPIONAGE have caused profound impacts on the nature and contents of ESPIONAGE. With this development, the cyber ESPIONAGE heralds a turning point in the field of ESPIONAGE, so one can argue that by the revolution in cyber technology, a revolution in ESPIONAGE will be inevitable.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1075

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    51
  • Issue: 

    3
  • Pages: 

    973-994
Measures: 
  • Citations: 

    0
  • Views: 

    224
  • Downloads: 

    0
Abstract: 

Governments have always sought to obtain the secret and strategic intelligence of other countries in order to protect national security and respond to domestic and international threats, thereby applying their covert policies in the target country. This, in most cases, inflicts numerous injuries on the victim country. But the question is, can ESPIONAGE make the government responsible for that act? Given the absence of any regulations in international law on ESPIONAGE, there is a strong disagreement over the legal status of ESPIONAGE. The present study first elucidates the position of ESPIONAGE in international law and then assesses the attribution of ESPIONAGE to the responsible State. Finally, the terms of the international courts' proceedings and alternative measures are analyzed. Research results show that ESPIONAGE is a wrongful international act because of its incompatibility with the principles of international law, but it is not usually possible to take legal action in international courts. The best solution is to use political ways and countermeasures in ESPIONAGE cases.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 224

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    13
  • Issue: 

    2
  • Pages: 

    589-608
Measures: 
  • Citations: 

    0
  • Views: 

    88
  • Downloads: 

    37
Abstract: 

ESPIONAGE, as one of the most important crimes against security, has long been the focus of various legal systems, including Iran's criminal system. Due to its harmful nature for the national security and political stability of countries, this crime has always been at the top of the crimes that have been the focus of lawmakers and judicial authorities. In Iran's criminal system, the crime of ESPIONAGE is included in various laws, including the Law on Punishment of Armed Forces Crimes. , the Islamic Penal Code and the Criminal Procedure Code of the Armed Forces have been discussed. However, due to the increasing complexity of ESPIONAGE in today's era and the increasing spread of new spy tools and methods, it seems that there are gaps and ambiguities in the existing laws in this field. The findings of this research show that the crime of ESPIONAGE in Iran's criminal system has a special position and there are many laws and regulations to deal with this crime. However, in some cases, these laws and regulations have gaps and ambiguities that need to be resolved. Also, in the judicial procedure regarding some There is no complete unanimity of the elements and elements of the crime of ESPIONAGE

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 88

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 37 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

LITERARY CRITICISM

Issue Info: 
  • Year: 

    2023
  • Volume: 

    16
  • Issue: 

    64
  • Pages: 

    159-206
Measures: 
  • Citations: 

    0
  • Views: 

    21
  • Downloads: 

    0
Abstract: 

Criticism of methodology and analysis of literary works is one of the important topics in the field of scientific and research works, which can shed light on the intertextual influence of literary texts, especially in fiction. In the present study, the authors, using the method of content analysis and comparative comparison, found one of the ways of ESPIONAGE in the war in seven famous literary and historical stories "King of Jahud and Nasranian" in Masnavi and Hayat Al-Hayvan Demiari, "Boom and Ghorab" in Kelileh. and Demeneh, "Firouzshah and Hitalian" in Tabari's history, "Shaghad and Rostam" in Ferdowsi's Shahnameh, "Zaba and Qasir Ebn-e Saad" in Balami's history, "Bibi Seti and Abu Muslim" in Abu Muslimnameh. The results showed that the method of ESPIONAGE in the story of King of Jahud and the Christians in Masnavi and Hayat al-Haiwan is stronger than other stories in terms of structure and content. The method of penetrating is based on a kind of cognitive warfare, which without any military conflict, and only with mastering the power of knowledge and identifying the religious beliefs of the enemy, created differences among the fearful and destroyed them. This principle has not been observed in other stories. Extended Abstract Introduction One of the tools of war is deception, and one of the ways to deceive and overcome the enemy is to "infiltrate" the enemy's army with various methods and tactics, which is interpreted as ESPIONAGE, and in fact, ESPIONAGE in today's military literature is the collection of discourse, which is breaking into the enemy's camp to covertly collect military secrets, sabotage, or influence commanders and soldiers to defeat the military war. The method of hard penetration and ESPIONAGE is one of the old tactics in war, when a person volunteered to defend the ideals of their country, nation, group or tribe by risking their life, this is somewhat reminiscent of the same jurisprudential ruling of "Tatarros" is also in Islam. Therefore, in the present study, an attempt has been made to criticize the methodology of war tactics and the method of "infiltration" in the enemy's army and overcoming them in seven famous literary and historical stories of King Jahoud and his Vazir-e Makkar Boles in Hayat al-Haivan Demiari, King Jahoud and Nasranian in Masnavi, Boom and Ghorab in Kelila and Demeneh, Shaghad and Rostam in Ferdowsi's Shahnameh, Firozshah's battle with Hayatla in Tabari's history, Bibi Seti in Abu Muslimnameh and the battle of Zaba and Jezima in Balami's history. The study is an attempt to answer these questions: To what extent the methodological criticism and the comparative comparison of ancient literary and historical texts have been influenced by each other? Can the analysis of the content of ancient historical and literary texts help to reflect the unity of these texts? So far, many studies have been done on some of the historical and literary stories presented in this research separately,But in none of them, there is mention of methodological criticism and comparative comparison of the methods and tactics of infiltrating the enemy's army. Therefore, the authors have tried to, through methodological criticism, comparative comparison and analysis of the content of seven famous historical stories, look into the matter. In terms of the method of influence and war strategy, the authors looked at the intertextual influence of these texts and their similarities and differences and the extent of their influence on each other. In the current paper, seven famous literary and historical stories "King Jahoud and the Nasranians" in Masnavi and Hayat al-Haiwan Demiari, "Boom and Ghorab" in Kelileh and Demeneh, "Firouzshah and Hitaliyan" in Tabari's Tarikh, "Shaghad and Rostam" in Ferdowsi's Shahnameh, "Zaba and Qasir Ebn-e Saad" in Balami's history, "Bibi Seti and Abu Muslim" in Abu Muslim's book are critically reviewed and the differences and similarities of these texts are evaluated. The results showed that the ESPIONAGE method in the story of King Jahoud and the Christians in Masnavi and Hayat al-Haiwan is stronger than other stories in terms of structure and content. 2. Results Criticism of the methodology and comparative comparison of war tactics and the method of hard penetration in the enemy army in seven famous historical and literary stories showed that based on the components of comparative literature, it can be said that there were sometimes interactions and exchanges between the two nations,As in Masnavi, Kelila and Demna, we can clearly understand this cultural exchange between the two nations of Iran and India in Masnavi, Kelila and Damna. However, according to the theory of intertextuality, one cannot be considered the original version and the other a copy, rather, basically, such a plot has existed in thousands of other stories before these two stories in different nations. In other words, in the story of King Jahud, Bibi Seti in dealing with Abu Muslim's enemies, Firoz Shah's battle with Hayatele, Buf and Zagh, Shaghad and Rostam, Zaba and Qusayr Ebn-e Saad, Siavash and Sudabah, Yusuf and Zulikha, Shahzad and Kanizak. One of the characters in the story has tried to deceive the enemy's army with trickery, such as tearing his clothes, scratching his face, injuring himself (self-mutilation), humiliating and insulting him in public. The use of this trick in wars is one of the common ways,But in the three recent love stories, the difference can be seen that at the end of the story, the deceiver is disgraced and punished for his actions, such as Sudabah who was killed by Rostam or the scandal of Zulikha with the interpretation of Yusuf's dreams in prison. And also the disgrace and scandal of the maid can be mentioned with the testimony of the prince. Therefore, in the present study, the review and comparative comparison of seven famous literary and historical stories showed that the method of hard influence in the story of King Jahud in Hayat al-Hiyavan Damiri and Masnavi is stronger than the other mentioned stories in terms of structure and content. The method of penetrating is based on a kind of cognitive warfare, which without any military conflict, and only with mastering the power of knowledge and identifying the religious beliefs of the enemy, created differences among the fearful and destroyed them. This principle has not been observed in other stories.  As in the stories of Bom, Gharab, Firouzshah, Hayatle, Zaba, and Qusayr, hard influence and ESPIONAGE are introduced through the lever of praising the military power of the enemy group and being rejected and accused among the insider forces. In the story of Bibi Seti in Abu Muslim Nameh, he used oppression and oppression by his own forces as a means of his hard influence on the enemy group, and in the story of Shaghad and Rostam, humiliation and insults and destruction of his personality by his own forces were his means of influence. What is certain is that the analysis of the qualitative content of the above-mentioned stories showed that the method of hard penetration in the story of Hayat al-Hiyavan and Masnavi was stronger and more effective than other stories.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 21

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SHAHALI AHMADREZA

Issue Info: 
  • Year: 

    2012
  • Volume: 

    2
  • Issue: 

    3
  • Pages: 

    143-171
Measures: 
  • Citations: 

    0
  • Views: 

    5904
  • Downloads: 

    0
Abstract: 

After the victory of glorious Islamic revolution that ended autarchy in Iran, the seizure of U.S ESPIONAGE den in Tehran led to abolishment of colonial domination over the country's affairs. The importance and various domestic and foreign reflections of this incident forced political activists, parties and different groups across the country to take clear stances. The main question to be answered in this paper is that the impact and consequences of this event on Iranian domestic political events.In this regard different viewpoints of political parties and groups evaluated. The result showed that the seizure of U.S ESPIONAGE den in Tehran cause to disclosure the real positions and attitudes of individuals and major groups linked to the Islamic Republic of Iran and also led to the refinement of domestic political system.The logical outcome of this process includes: elimination of rightist and leftist non-Islamic, eclectic thoughts, gradual control of politically sensitive posts by genuine revolutionary youths, increase of their self-esteem and self confidence and ultimately strengthen national integration and unity of the Iranian society. In fact, by seizure of U.S ESPIONAGE den in Tehran, the revolutionary forces who followed the path of Imam, corrected the route of Islamic Republic and prevented its deviation.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 5904

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

JALALI MAHMOOD

Issue Info: 
  • Year: 

    2021
  • Volume: 

    51
  • Issue: 

    1
  • Pages: 

    329-353
Measures: 
  • Citations: 

    0
  • Views: 

    145
  • Downloads: 

    0
Abstract: 

ESPIONAGE has been exercised throughout world history. By the new advancements in technology and emergence of the phenomenon of terrorism and taking necessary measures against it, however, it has gained its particular complexities and leading to many international disputes. International law distinguishes between peacetime and wartime ESPIONAGE. In peacetime, it applies principle of separation of national and international jurisdictions and consequently that of State equality. Therefore, any intervention including through ESPIONAGE entailing aggression against State national jurisdiction is considered as unlawful. The principle of equality of States implies non-intervention by States in each other’, s affairs. Nevertheless, in new international legal order there exist certain instances of justified interventions including through ESPIONAGE such as interventions permitted by the UN Security Council when collective peace and security of the world demands,intervention for self-defence,intervention by invitation,and intervention for humanitarian and human rights purposes. In war time, under certain circumstances, ESPIONAGE is recognized as a legitimate ruse of war. There is an urgent need to have a world document for codification of provisions governing ESPIONAGE and its new forms including cyber ESPIONAGE and ESPIONAGE violating the individual’, s privacy. ESPIONAGE has become a global issue and therefore a new treaty can identify the instances of legitimate and illegitimate ESPIONAGE.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 145

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    45
  • Issue: 

    4
  • Pages: 

    609-629
Measures: 
  • Citations: 

    0
  • Views: 

    1112
  • Downloads: 

    0
Abstract: 

ESPIONAGE is one of the most important challenges in human rights field and such importance shows itself more egregiously when intelligence agencies commit spying under the aegis of human rights or circumvent human rights under the cover of fighting against ESPIONAGE. A legal study on this subject may clarifies vague points and solves the existing conflicts in a way which neither individuals’ fundamental rights nor national security of states is breached. Since a solid cornerstone, its serious supervisory mechanism and its enforcement, human rights obligations, travers more quickly and more purposeful than any other areas of law and a huge part of such traversing has been caused by restricting states’ sovereignty and establishing observing organs which observe activities of states and their institutions and organs.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1112

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MAJIDI SEYED MAHMOUD

Journal: 

MAJLIS & RAHBORD

Issue Info: 
  • Year: 

    2021
  • Volume: 

    28
  • Issue: 

    105
  • Pages: 

    245-275
Measures: 
  • Citations: 

    0
  • Views: 

    475
  • Downloads: 

    0
Abstract: 

In recent decades, the realm of criminalization of crimes against security and the issue of ESPIONAGE, in particular, have undergone essential changes. Despite this fact, the Iranian criminal policy on this issue has not changed over the last one hundred years. Thus, this policy suffers from various shortcomings. The lack of consistency of the Iranian criminal policy with the new developments of ESPIONAGE consists of three bases and their criminal responses. The legal basis consists of: the existence of legislative ambiguities regarding evidence of ESPIONAGE, the lack of distinction between ESPIONAGE and treason, and the use of various unnecessary restrictions. The physical and psychological basis consists of: restrictions in cases of ESPIONAGE, lack of inclusion of new security aspects, and limiting the criminalization of ESPIONAGE to certain criminal intentions. Due to the above-mentioned shortcomings and the legislator’ s lack of support for the essential interests of society, it is necessary that the legislator expands the scope of criminalization to include economic, cultural and social aspects of security and to also expand it to refer to information and objects. Therefore, if the criminalization of ESPIONAGE is not limited to certain criminal intentions, a rigid definition of ESPIONAGE is not given and different types of ESPIONAGE are not itemized, the regulations may gain some relative order and improve.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 475

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    21
  • Issue: 

    41
  • Pages: 

    133-168
Measures: 
  • Citations: 

    0
  • Views: 

    93
  • Downloads: 

    0
Abstract: 

1. Introduction One of the manifestations of the traditional influence paradigm in political science discussions is ESPIONAGE, which, because of its tangibility and visibility, falls under the category of hard influence. In international relations, obtaining information from political, military, economic, etc. rivals have a necessary and effective role in seeking the supremacy of nations and helps them to determine fundamental strategies. Hence, the spies try to provide comprehensive information on the quality and quantity of the enemy's potential capabilities through their actions in order to be able to influence the political and military rival and to achieve the desired goals. In other words, it is possible to change political currents through the use of ESPIONAGE tactics and access to vital competitors' information. In general, in international relations, the principle of power is of particular importance and is at the heart of the study of international politics. Examining the exact dimensions of the act of infiltration (ESPIONAGE) in the enemy shows that power is a means to an end. The nature of a government's foreign policy goals and the skill of nations in using their capabilities to achieve foreign policy goals are directly linked to the principle of foreign influence and ESPIONAGE. Hence, intrusion (ESPIONAGE) is defined as a type of communication with aliens with the intention of changing or stabilizing the behavior of reciprocal forces. A government tries to influence another government or governments in various ways,because it has set specific goals for itself, the realization of which is possible by having comprehensive information on economic, political, military issues of the rival. Consequently, the process of infiltration and ESPIONAGE plays a crucial role in international politics. ESPIONAGE is not an emerging phenomenon of the present century and is common in the political culture of civilizations. Of course, it must be acknowledged that the techniques used for ESPIONAGE have changed over the centuries and become more sophisticated today. However, the importance of maintaining the survival of governments has always led to this issue in security and intelligence issues. Ferdowsi's Shahnameh is one of the most important epic works in Persian which narrates the efforts of the Iranian nation and the governments in this land to push back the foreigners from the borders and protect the people from the enemies. 2. Methodology This research has been compiled based on descriptive-analytical method and inductive method (part to whole) and to collect data and analyze it, documentary studies including books, articles, etc. have been used. Also, the statistical population of the research, Ferdowsi's Shahnameh and the sample size, include all the verses drawing on the ESPIONAGE category. The general structure of the article is such that first the main concepts of the research are explained, namely influence and ESPIONAGE, and in the main part, various headlines are addressed to issues such as tools, goals and motives of spies and its political and governmental positions. 3. Discussion The spy is described as a "detective" in the Shahnameh. This word indicates that the spy in the first step must be a person who is aware of various issues and with special expertise and skill seeks to gather information from the enemy. In other words, the spy in sensitive situations must, in addition to recognizing critical points and threats and external and internal influencing factors, recognize the negative actions affecting the security of the government and the territorial integrity of the land and have a comprehensive knowledge of its details and generalities. And finally, by transferring it to its own forces, to be effective in neutralizing undesirable political events. Therefore, the spy is at the forefront of the fight against enemy threats. The tactics and tasks of the spies described in the Shahnameh have a classical approach and naturally do not have the complexities of ESPIONAGE in the contemporary era. However, the results obtained through ESPIONAGE are important. ESPIONAGE and obtaining military and political information from a rival group play a role in the survival or extinction of a civilization. “, Today, information is considered as one of the national resources of any country and supports any planning, policy-making and management”,(Davoodi Dehaghani et al., 2018, p. 54). Spying on outsiders and gathering information is a public duty in the early stages, and spreading a culture of intelligence cooperation will protect society from all kinds of crime and threats, and deterrence should be based on gathering sources of information and their analysis. (Also see Peterson, 2005, p. 212). Information is a means to an end (See: Gill & Phythian, 2007, p. 1). Deceptive influence based on strategic deception is manipulating the audience's mentality and making computational mistakes through forging and creating information. Influential actors take a series of actions to deceive, confuse, seduce, or hasten the decision-makers to make unrealistic estimates. In fact, the purpose of deceptive influence is to deviate from the opponent's decisions by providing guided and sometimes erroneous information and forcing him to act or not to act in the national interests of his own country or to the detriment of his own interests (See: Bagheri Choukami, 2016, p. 20). Spying and gathering information through trained manpower is difficult, time consuming, costly and dangerous, and if the mission is revealed and disclosed, it creates problems for the target country and the country of origin (Borisudi & Goodman, 2005, p. 129). ESPIONAGE in classical and traditional form is conducted based on observation and information with emphasis on human senses and creativity (see: Locker, 2001, p. 48). Human resources, considering their discernment and initiative, review and analyze situations in order to take advantage of opportunities and constantly increase their access to the goal (see: Yaghoubi & Ishaqifar, 2013, p. 12). Rostam's goal and motivation in this infiltration was to access sensitive and public information. This ESPIONAGE should be considered military. “, The purpose of military reconnaissance is to obtain knowledge and information about the armed forces in times of peace and war. The enemy seeks to steal the country's defense intelligence, and obtains information about the types and size of weapons, the number of armed forces, and the form of their organization, and that this type of ESPIONAGE is taken into consideration in the laws of most countries”,(Evera, 1992, p. 237). One of the important issues in ESPIONAGE is the ideological unity of spies. Believing in a common ideology between the spy and the organization is the surest way to get it,because with this idea, such a person considers himself obliged to serve and work with the necessary faith and commitment (see: Almjan, 1990, p. 209). The world's intelligence and counterintelligence agencies generally list four motives for ESPIONAGE as money, ideology, coercion, and selfishness. No spy is potentially as useful as an ideologically motivated agent. Ideology and school are binding and permanent motives and are considered as the most stable motives. Spy, which is influenced by positive ideological motives, acts because of its commitment to a specific subject (see: Friedel, 2003, p. 39). One of the fundamental goals in the issue of infiltration is to identify the enemy’, s strategy and provide appropriate solutions to deal with it. “, The essence of a serious threat is the use of military force and even killing, and its target is mainly the territory or military power of the other side. The aim and intention of the enemy is mainly to secure geopolitical, political, economic and sometimes doctrinal interests”,(Ahmadian, 2015, p. 40). Spies sometimes obtained classified and vital information about the enemy's military structure. “, Spying is the acquisition of classified information without the permission and knowledge of its owner. ESPIONAGE is usually an organized, transnational crime,because in it, the vital information of a country is provided to the country or other countries through an organized system and human resources”,(Karimi, 2015, p. 67). ESPIONAGE is carried out with specific planning and goals to dominate predetermined interests (see: Mir Mohammadi, 2013, p. 37). Hence, the intelligence knowledge enables the prevention of crimes and security breaches and the confrontation of threats and vulnerabilities by obtaining news and information, and by mastering the peripheral issues and anticipating inaccessible events. (See: Jamshidian, 2009, p. 12). The main task of a spy is to report from within the enemy's decision-making body. (See: Nirmal & Astana, 2012, p. 229) Access to the classified and special information has always been the main key to the success of political actors (see: Security Studies Group, 2008, p. 70). 4. Conclusion The most important manifestation of the hard influence in the Shahnameh is the preparation and acceleration of the ESPIONAGE process, or in other words, the security influence in the political and military structure of the enemy. The study of ESPIONAGE techniques in Shahnameh shows that the realm and scope of influence includes objective and real space. The spies’,actions to infiltrate the enemy were mission-oriented and of an intelligence and security nature. The main function of this infiltration was to gather strategic information and news, identify the weaknesses and strengths of the enemies, estimate their military tools and weapons, be aware of the geographical conditions of the camps and infiltrate key and sensitive points to facilitate the control process. The method of obtaining information was limited in a human and physical way based on positivism through observation. As a result, this infiltration has a onedimensional and simple structure, and in this regard, the type of infiltration and ESPIONAGE should be considered as a case and as an agent or spy infiltration in the target group. The human targets were spies, commanders and military elites of the enemy. Influential actors include the states involved (Iran, Turan, Rome) and the parties involved (kings and their internal opponents) who were using the capabilities of the intelligence services and achieving their security, intelligence and military objectives. The sphere of this influence in Shahnameh is of tactical-military and intelligence. Ferdowsi considers the two great qualities of "commitment" and "expertise" to be necessary for spies, and believes that by creating these two qualities, detectives will achieve great success in carrying out their missions. In general, the scope of the spies’,duties under Ferdowsi includes the following: a) obtaining information from foreign forces,b) monitoring internal social movements,c) ensuring the security of the passage or location of military and national leaders,d) making suggestions to the Shah to adopt appropriate political and military strategies and analyze them,and e) surveillance of soldiers and military leaders of local forces.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 93

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MORADI MAJID

Issue Info: 
  • Year: 

    2020
  • Volume: 

    8
  • Issue: 

    32
  • Pages: 

    89-104
Measures: 
  • Citations: 

    0
  • Views: 

    1329
  • Downloads: 

    0
Abstract: 

Disclosure of information includes management analysis, financial reporting accompanying notes and supplementary reports. Various theories have been used to explain the disclosure. These theories are representation theory, the theory of signification, the theory of capital need, the theory of legitimacy, and the theory of political costs. Disclosure of information can be used to reduce costs, reduce information asymmetries between companies and providers of financial resources, and reduce political costs. Industrial spy means spying for the discovery of the secrets of a rival industrial company, manufacturer, and so on. In industrial spyware, they are acquiring industrial and economic knowledge or practically supporting the actions of companies and industrial centers active in this area. Economic information; Competition factor; Reduce research and development costs. Economic spy operations lead to the production of economic information. if companies disclose less information, signaling theory is regarded as bad news and negatively affects stock prices. If volunteering provides more information according to the theory of ESPIONAGE, according to industrial spy phenomena, different companies and companies The rival, use this disclosure of information for their own purposes. In this paper, first, theories that affect the disclosure of accounting information, then describe the spy industry and its effects on the economy, and finally a conceptual model is presented.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1329

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button