فهرست مطالب

نشریه امنیت ملی
پیاپی 14 (زمستان 1393)

  • بهای روی جلد: 60,000ريال
  • تاریخ انتشار: 1393/12/13
  • تعداد عناوین: 6
|
  • شاخص های دفاع ملی در امنیت داخلی جمهوری اسلامی ایران
    محسن مرادیان، پرویز یعقوبی صفحه 9
  • کارکردهای جنگ نرم دشمن در دانشگاه ها با تاکید بر مولفه علم و ارائه راهبردهای مقابله
    سید علی مرتضویان، اسکندر صفری صفحه 35
  • طراحی الگوی تدوین راهبرد امنیت ملی با رویکرد بومی مبتنی بر مدل های تجربی
    قدیر نظامی پور، شیرزاد برزگر لداری صفحه 61
  • فرماندهی و مدیریت انتظامی از منظر آموزه های اسلامی
    غلامرضا گودرزی، جواد جهانشیری* صفحه 89
  • راهبردهای مقابله با نقش آفرینی ضد امنیتی رسانه های بیگانه با تاکید بر فتنه 88
    سیامک باقری، حمیدرضا مقدم فر صفحه 119
  • نقش فناوری اطلاعات در همگرایی و ارتقاء توان دفاعی ج.ا.ا
    ابراهیم حسن بیگی، علیراض عین القضاتی* صفحه 151
|
  • National Defense Indices in the IRI's Homeland Security
    Mohsen Moradian, Parviz Yaqubi Page 9
    Homeland security is an essential component of national security. Given the arrogant nature of America and Iran's role in global equations of power, the IR of Iran faces many potential threats, if materialized, a comprehensive strategy could contribute the national security of the former. In the same vein, national defense is a comprehensive strategy in this field. Meanwhile, this study bears importance as it develops the security literature based on the national indices of defense, maintenance of homeland security and avoidance of West security theories in the frame of an applied type. This study exploits qualitative-quantitative (combined) method and gathers data on desk and in field and applies instruments such as fische, questionnaire and interview. This study aims to explain national defense indices in homeland security; lastly, it offers popularity, justice-seeking and elitism in the government as the overriding mental indices; then, with regard to governing institution, the functionality of fundamental institutions and cohesion and performance of political, security and disciplinary are the most important indices. In terms of human forces, commitment, loyalty and sightedness of managers wield the utmost significance. Finally in homeland security, value-basedness of policies and high laws and execution of high laws bear the utmost importance.
    Keywords: Index, national defense, homeland security
  • Enemy's Soft War Functionality in University in reliance with Science: Countering Strategies
    Sayed Ali Mortazavian, Iskandar Safari Page 35
    As a new type of war, soft war came to the fore by enemies of the revolution after cold war. In the same vein, enemies applied diverse hardware-software methods in order to counter the Islamic revolution and not to permit it to progress in other fields specially in science and technology. Hence, given the capacity of university and the measures taken by enemies in the events of 2009 and 1999, and targeting university by enemy, this study seeks to determine the dimensions, constituents and indices of the soft war conducted by enemy in universities at the present and on the future horizon. Doing so, it exploits high legal documents, objective in-depth interview, review of the related literature and studying the theoretical fundamentals of other sources and to design a questionnaire. In the following, by means of psychiatric indictors for determination of validity and reliability, it is demonstrated that the total average of the questionnaire %746; the reliability of inner indicators of the questionnaire hits %990 through Cronbach ɑ at the status quo, and for the future it hits %993. The outcome of the study reveals that dimensions, constituents and indicators of soft war is substantiated as %99 of assurance at the present and for the future it hits %99 of assurance higher than the average. In the following, 18 indicators are achieved for the status quo and 18 for the future horizon which are assessed. Finally, it is revealed that the indicators related to enemy's attempt for employment of academic experts, undermining scientific and technological developments, intellectual theorization infused with west's culture amongst academic associations and hindering innovation in the former are the measures which leave the utmost impact. In the last stage, some strategies for counteraction are presented.
    Keywords: Soft War, University, Enemy, Science, Strategy
  • Development of Strategy for National Security with a Local Approach upon Empirical Models: Designing a Model
    Qadir Nezamipur, Shirzad Barzgar Ledari Page 61
    Like a roadmap, the model for development of national security strategy is a guideline for the officials engaging in national security in terms of developing national security strategy. In effect, it is a strategic instrument which could bring the vision and action of a nation from dispersion to unity. To achieve a general model with indigenous approach while not having any developed strategic instrument in the IR of Iran, exploitation of the experiences possessed by the countries which have a long record in this field could complement a part of the required process. Accordingly, the national security deeds of five international actors are examined in this study and a variety subjects and constituents are extracted from them. Following, to indigenize the extracted elements, they are delivered to the experts and managers engaging in national security in the frame of questionnaire in order to recognize their impact and the necessity of their embedding in the indigenous models. Finally, 20 constituents and elements are considered necessary to be embedded in the model for development of national security strategy in a sequenced manner.
    Keywords: national security strategy, national security instrument, indigenous model
  • Disciplinary Commanding and Management from the View of Islamic Teachings
    Qolamreza Gudarzi, Javad Jahanshiri Page 89
    Disciplinary commanding and management rests in humane society. Therefore, the security and disciplinary strategies have to be developed in reliance with social circumstance and implemented upon management. On the other side, the methods of commanding and management in the Police must be in commensurate with religious ordinances and extracted from Islamic teachings, Holy Quran and narrations of the infallible Imams in order to, besides establishment of order and security in the society upon Islamic values, implement an appropriate management in the organization and promote security in the society. Accordingly, this study is intended to examine commanding and management from the view of Islam along with explaining the significance and introduction. Following, in reliance with precepts in diverse sectors, the dimensions and indicators of the study are discussed in light of holy Quran, narration of Mohammad (a.s.) and those of the infallible Imams (peace be upon them), speeches of Imam Khamenei (r.a.) and those of the supreme leader (may Allah prolong his life) in this field. Typologically, this study is an applied one and methodologically (gathering data), it lies in the category of instrumental and on-desk researches. The data are gathered through fische from books, articles, dissertations, speeches, etc. In the same vein, the examination of the study is conducted through the pentagon principles of management including planning, organizing, mobilization of resources-facilities, and leadership and control. The outcome of the study suggests that the scientific principles of management have to be complied with in disciplinary commanding and management and it is necessary to exercise the ethical principles of Islamic teachings in order that the desired results be manifested and touched in the dimensions of organization management and social security.
    Keywords: commanding, disciplinary management, security, Islamic teachings
  • Anti-security Roles of Foreign Media in Reliance with Sedition 88 (2009): Counteractive Strategies
    Siamak Baqeri, Hamidreza Moqaddamfar Page 119
    Given the high danger of soft threats posed by foreign media against the IR of Iran which reached its zenith in the sedition of 2009; with regard to the continuation and severity of this threat in the future as well as the incremental progress of software technologies in the world, it is required to study the nature of media soft war and its function and develop necessary strategies to counter the former and renovate the vulnerabilities. Needless to say, sustainable security and hindering the route to possible seditions in the future is contingent upon deep perception of the former. Accordingly, this study aims to meet the strategies to deter and counter the anti-security roles played by the alien media and then answer the question what strategies exist for access to the mentioned purpose? Typologically, this paper is an applied one which exploits survey (quantitative analysis), Delphi Techniques and Brainstorming to do meet the foresaid objectives. Finally, this paper develops 10 macro strategies in linkage with countering the threats posed by the foreign media and then proffers the executive approaches.
    Keywords: media, national security, sedition 88 (2009)
  • The role of information technology in converging & promoting I.R. Iran's defense capability
    Ebrahim Hassan Beigi, Alireza Einolghozati Page 151
    According to the directives of the Supreme Commander-in-Chief of of Iran, relying on improvement of defense capabilities, this paper explains the role of information technology as one of the component of the Islamic Republic of Iran's defense overall deterrence power. Then, based on documents and thinkers‟ views in various technology fields, Indicators of this technology extracted & conducted by using mixed methods research through descriptive and survey methods. The study population in the first phase consisted of 63 people including scientific-Technical Experts knowing the strategic Issues and also innovative technologies (NBIC) from different universities and other centers such as Iran University of Science and Technology, Amirkabir University of Technology, deputy of scientific and technological development Presidential ,DOD Defense industry enterprises ,Institute of Cognitive Sciences, to obtain the main aspects of dimensions of converging technologies. Then in the second phase data collection is done among 30 military experts including Board Chairman and members of the four and five forces of Army, Guard Corps and heads of departments in the General Staff of the Armed Forces and higher, students or teachers at the superem National Defense University (familiar with the converging technologies), and the results show, 7 components and 22 indicators, achievements represent the interaction and mutual relationship among the paired independent variables and dependent variable (convergence or NBIC). The results of this study suggest that the use of IT as a sensitive military technologies, in addition to strengthening national security and military capabilities, causing to production of military lightweight equipment, upgrading software and electronic systems, increasing decision-making speed and decisiveness of commanders in military operations, increasing deterrence and preventive defense, improving intelligence and excellency in strategic information war, reducing organized crime and espionage, and information & data storing, protection, maintenance, processing and refresh information with respect to security issues ultimately transmission of information will better retain.
    Keywords: information technology, convergence, I.R. Iran's defense apability