Search Results/Filters    

Filters

Year

Banks



Expert Group











Full-Text


Issue Info: 
  • Year: 

    2020
  • Volume: 

    4
  • Issue: 

    2 (12)
  • Pages: 

    75-99
Measures: 
  • Citations: 

    0
  • Views: 

    97
  • Downloads: 

    0
Abstract: 

Numerous structural, political, economic, and tactical factors were involved in the strengths and weaknesses of the Safavid military forces, each of which requiring a separate evaluation opportunity. The present article focuses solely on the role and influence of the tactical factor in the military achievements and failures of the Safavids. Using a historical (descriptive-analytical) method, it tries to discuss the combat tactics used by the Safavid army and the role of these methods in the Safavid military defeats and victories. The findings show that the Safavids mainly chose their war tactics based on time and space requirements, offensive or defensive positions, number of troops and military equipment and other conditions. The most important of these tactics were regular warfare, irregular warfare, castle warfare, urban battle, and destruction of resources. Although the Safavids were generally successful in adopting the best war method, sometimes superior military methods of the enemy and some miscalculations by the Safavids, and consequently adopting inappropriate war method imposed huge costs to the country and the government in various respects.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 97

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    15
  • Issue: 

    47
  • Pages: 

    29-51
Measures: 
  • Citations: 

    0
  • Views: 

    475
  • Downloads: 

    0
Abstract: 

Combat power is the power of fighting, which is the hardware, software and supreme factors that make up its dimensions. Nonlinear warfare has recently entered military literature and war is far from its subcategory. Which indicates imbalance in the martial power of the parties involved and has a hard, complex, and uncertain operational environment. Fighting software is not a little bit intangible, but it is one of the most influential and determining factors in the fate of each war. In the forthcoming research, the intent and intention of the researchers is to elaborate the elements of martial law-making capabilities and prioritize them in an uneasy war. Therefore, the main question of the research that the researchers are trying to answer is the following: What are the priorities of the software for combat power in an uneven war? The general purpose of this research is to explain the priority of combat power software software in an unpleasant war. The type of applied research and its method is descriptive with mixed approach. The statistical population of the study consisted of commanders and successors of Nazaja and regional military units. Data collection was done through documents, interviews and questionnaires. The ranking of the elements of the martial law-fighting software was used to compare the data and to use SPSS software. The results of the research showed that its upper limit was related to education with a mean of 4. 49 and its lowest level Relative to partial assistance with an average of 3. 53.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 475

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

BIABANI Q.H.

Journal: 

Karagah

Issue Info: 
  • Year: 

    2009
  • Volume: 

    2
  • Issue: 

    5
  • Pages: 

    68-100
Measures: 
  • Citations: 

    0
  • Views: 

    1126
  • Downloads: 

    0
Abstract: 

The most dangerous crimes which threaten our economic, social and even political security, due its unique characteristics, are organized crimes which has emerged in new shapes as the technology progresses. Because of the complexity of criminal groups and their networks and accomplices it greatly affects the economy, politics and the international society. It is not easy to detect all of their activities but most of them are organizations which have strong and rich communities. The total assest of some of these organizations may be as huge as some countries total budget. Their target is profit seeking rather than getting political strength. According to Interpol research report, fourteen percents of the GBP for developing countries and two percents of the GBP for developed countries is consumed by them. This research investigates the organized crimes in a documentary method. Reinforcing the combating tools and signing new regional and international contracts for cooperation's between police forces as well as legal cooperations can reduce their threats.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1126

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

BIABANI GH.

Issue Info: 
  • Year: 

    2009
  • Volume: 

    2
  • Issue: 

    3
  • Pages: 

    1-16
Measures: 
  • Citations: 

    0
  • Views: 

    2170
  • Downloads: 

    0
Abstract: 

The purpose of author in this article was to know how cooperation in criminal organization is, how they identify their members, what rules they have got, what factors cause criminal to do these crimes, why police are unsuccessful to deal with criminal organization, and what is the reason that criminal organizations are powerful. To answer these questions, we should know about criminal organization, because criminal organization follow crime as a way of living and sometimes they assume that they are apart from society and behave with each other and with group member friendly. They do most of their criminal activities in relate to other countries and without cooperation of other countries battle against criminal organization is impossible. But, unfortunately different countries have got different legislation system against criminal organization.So, criminal organization can use these gallops to escape from investigations and law in the case of commitment to crime.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2170

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
Author(s): 

HAJIANI EBRAHIM

Issue Info: 
  • Year: 

    2009
  • Volume: 

    11
  • Issue: 

    3 (44)
  • Pages: 

    108-140
Measures: 
  • Citations: 

    0
  • Views: 

    1437
  • Downloads: 

    0
Abstract: 

Lack of literature in network analysis of organized crimes necessitates more theoretical and experimental works.This paper tries to elaborate on the organized crimes and their characteristics as well as their basic types. Definition, functions, basic concepts, the standard and the network structure in social sciences are clarified. The paper specifically aims at operating and benefiting from network analysis technique in data analysis of the organized crimes. Network analysis technique can be a useful and systematic tool to combine various data.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1437

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 3
Author(s): 

AALIPOUR HASAN

Issue Info: 
  • Year: 

    2009
  • Volume: 

    12
  • Issue: 

    2 (44)
  • Pages: 

    73-105
Measures: 
  • Citations: 

    0
  • Views: 

    951
  • Downloads: 

    0
Abstract: 

According to the criminal law, the organized crimes have a unique characteristic which is the planned way of accomplishing. This indicates that in comparison with others, these kinds of crimes are not new ones and in spite of it, every crime can be accomplished in an organized manner. In the mean time, based on criminology, other than way of accomplishing, the organized crimes have two other characteristics including their financial and trans-national features. Whenever the above characteristics are linked to the perpetrators of organized crimes, the role of security as the subject of this crime is highlighted. However, despite of terrorism which mainly targets the citizens, these crimes are behaviors against economic and national security. Pursuing those crimes is not comparable to those on the streets or other coercive crimes. Due to the linkage between organized crime perpetrators and the power and also because of formalistic respect to the law and norms by them, police has not been so successful in identification and hunting those criminals.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 951

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 2
Author(s): 

JOYCE B.A. | VVEDENSKY D.D.

Issue Info: 
  • Year: 

    2004
  • Volume: 

    46
  • Issue: 

    6
  • Pages: 

    127-176
Measures: 
  • Citations: 

    1
  • Views: 

    137
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 137

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SALIMI S.

Issue Info: 
  • Year: 

    2003
  • Volume: 

    -
  • Issue: 

    29
  • Pages: 

    169-212
Measures: 
  • Citations: 

    2
  • Views: 

    4183
  • Downloads: 

    0
Keywords: 
Abstract: 

Transnational organized crime is one of the most problematic matters for international community in 21st century. These crimes are committed by organized criminal groups consisting of three or more persons, a unique leadership and strict discipline with cruel sanctions in order to obtain, directly or indirectly, a financial or other material benefit. Commission of the crimes nationally and internationally has political, economic and social effects and threatens the existence of nations and states. The United Nations, acting on behalf of international community, elaborated an international document named “United Nations Convention against Transnational organized Crime” with two protocols. The documents were opened for signature of states in Palermo (Italy) in 2000. 147 states including Iran has signed the convention. This article is aimed firstly to determine the meaning of the transnational organized crime, secondly to analyzes its various effects justifying the necessity of combating it.  

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 4183

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2011
  • Volume: 

    11
  • Issue: 

    42
  • Pages: 

    127-146
Measures: 
  • Citations: 

    0
  • Views: 

    1629
  • Downloads: 

    0
Abstract: 

Given the complexities, dimensions, number of the effective variables and the effect of information warfare, architecting this field aimed at reducing the complexities and enhancing the capability of applying this notion, can be very effective to this end.One of the main areas of implementing organizational architecture projects is preliminary planning, selecting framework and methodology and developing project implementation plan. To this end, and thereby, first a review of literature is conducted then a respective operational model of information warfare is suggested.Information warfare architectural plan accommodates empowerment in information warfare suggested framework and methodology, and procedures are followed then.Last, a macro plan for the implementation is suggested along with its respective model whose dimensions are elaborated. The last part is followed by an evaluation of the plan and the conclusion.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1629

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Ghasemi Muhammed Ali

Issue Info: 
  • Year: 

    2017
  • Volume: 

    20
  • Issue: 

    3 (77)
  • Pages: 

    89-110
Measures: 
  • Citations: 

    0
  • Views: 

    205
  • Downloads: 

    0
Abstract: 

The end of the Cold War and termination of mutual support of the great powers from dear decedents, globalization, the fight against terrorism since 9/11 and decrease of support of terrorist groups by the states and etc. have led terrorist organizations to commence Mafia activities and to secure more financial resources for their own activities. Therefore, some new organizations have been established with a mixed feature, that is, mutual cooperation of mafia organizations and terror organizations. The paper offers an analysis about this development and focuses on the PKK as a case study. Since early 1990s PKK has been involved as a accomplice to mafia organizations but later it was involved directly with this kind of illegitimate activities and now it has a strong linkage we organized crimes. This linkage contributes to survival of this terror organization and therefore should be considered in developing strategies to contain terrorism.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 205

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button