فهرست مطالب

نشریه امنیت ملی
پیاپی 23 (بهار 1396)

  • بهای روی جلد: 60,000ريال
  • تاریخ انتشار: 1396/03/18
  • تعداد عناوین: 7
|
|
  • Asghar Eftekhari, MohammdJavad Nasrollahzadeh, Abolfazl Sedghi Page 11

    Since the Islamic Revolution of Iran is a civilization-building revolution and as it has initiated new paths to humanity in general and to the Muslim world in particular, it calls for development of knowledge specific to its ideas and identity. Security Sciences as one discipline of Human Sciences and as an important component of the great Islamic civilization, plays a part in the strategic role of human sciences. In this study, the question arises: what is the development pattern of security sciences pertaining to ultimate security?This paper is aimed to develop a pattern of the transformation of secular security sciences into monotheistic one concerning the key pivots of ontology and ultimate security. To answer the question, achieve the objective, and understand the ultimate security in the monotheistic school, we had to understand secular security sciences and secular human sciences. Therefore, in the study, we reviewed the history of security sciences. Then, the theoretical framework for development pattern was extracted using the combined philosophies embodied in anthropological and ontological principles of transcendent wisdom of Islamic philosophy. Subsequently, using Grounded Theory, semi-open interviews were conducted with 15 experts of development in human sciences and security sciences until theoretical saturation is reached. After performing Open Coding, Axial Coding and Selective Coding, there was obtained the development pattern of security sciences pertaining ultimate security. The result is that, security sciences is in need of changes in four main pivots of anthropology, ontology, epistemology and methodology. In respect of ontology, there were answered two questions of ultimate security and security agent. In the key pivot of ontology, development pattern of security sciences was obtained by using transcendental philosophy, theologian's approach, and the indexes and components extracted from the interviews. In this pattern, God is the ultimate security, divine leaders are security brokers and Believers are security agents. Divine revelation is Essential ultimate security and Islam is accidental ultimate security. In the proposed model, stages of development, strategies, effective factors and the ultimate development of security sciences were specified.

    Keywords: Development, security science, ultimate security
  • Abbasali Jabbari Sani*, Seyyed Mostafa Abtahi Page 35

    Religious democracy as a novel concept in the political climate and culture of our society discussed And as a political philosophy and a specific model of government and independent alternative government against political philosophies and patterns, especially secularism and fundamentalism has to offer.The main claim of religious democracy in Iran is that no mere glance the material to the principles of customary Ansanmhvranh, individualistic and utilitarian (an approach purely secular), the government of, but based on religious values and the laws of God that provide and guarantee the security of the country ; also held. The main question is whether the developed paper pattern religious democracy in Iran's ability to provide and maintain security in the country? According to the documentary and historical. The opinions and analysis experts and the logical reasoning researcher, based on components recognized by religious democracy and comparison with secularism was achieved was detected, the formation and preservation of religious democracy in Iran as an alternative security well done is raised against secularism and this form of government can accumulate and activate cultural divides, religious and political Mlavrdh prevent and to maintain stability and security in the lead.

    Keywords: religious democracy, security, secularism, Islam, Democracy
  • Ali Saeedi Shahroudi, Azizmorad Moradi Page 61

    The world's monotheistic revolution as a revolution in stages with success and failure, respectively. Revolution Prophet Noah (peace be upon him) in stages, the revolution of the Prophet Moses (peace be upon him) on the stage of the revolution Prophet Muhammad (PBUH & HP) at the continuing and characteristics and challenges faced defeat. This study aimed to investigate the matter and identify the causes permeability of the monotheistic revolution and with the question "What are the causes permeability monotheistic revolution?" It has been done. In this study, combined with quantitative and qualitative approach was used. According to the study: apostasy and return, separation Sharyt of creativity, deflection properties, the influence of wrong in power, not with the people for breaking the law and leadership of the remnants of the habits and customs of ignorance, deviance thought, symbolism and religion the conversion of merit criteria to measure people Democracy activists, the people and properties at critical junctures, the most important factors are the permeability of the monotheistic revolution. The important factors victory Quran and permeability are the people's revolution.

    Keywords: revolution, revolution monotheistic civilization, permeability, religious leaders, community
  • Jafar Finizadeh Bidgoli Page 85

    The complexity of the security environment is due to a number of factors, among which these factors, the lack of a dominant paradigm in this environment, provide the context of the security environment in transition conditions. The existence of transition conditions in the security environment does not reduce its impact on the security of the actors. Therefore, the existence of a scientific and bioscience model in order to create, deepen and manage influence in this environment is essential, while paying attention to the transition situation in the security environment, also the promotion of influence in it. To give Accordingly, the main objective of this study is to provide a model for enhancing influence in the transitional security environment. To this end, using a qualitative approach based on the method of document collection and interviewing, the design of the penetration pattern in the transitional security environment in two general areas of the basis and process It is noted that the basics have subsets of the characteristics, principles, and rules of security penetration, and the process includes three stages of disrupting the existing relative order, creating a new order, and managing a new order. The spectral view of the major paradigms is in contrast to In terms of the basic and operational indicators in the security environment, Bekaa Combining the dimensions of influence with reliance on cultural dimension, the simultaneous use of hard and soft power in the transitional security environment, the selection of one of the three approaches of adaptation, transformation, rulemaking, or a combination of them in the approaches to influence the security environment In the final drawing of the resulting pattern, the title "sailing pattern" is chosen for the model of promotion of influence in the transitional security environment, which has two sails of "principles and rules" and "dimensions" with the management of the new order management and management based on the agent and agent The balance of penetration characteristics in dealing with paradigm wave of moving security imbalances Set.

    Keywords: security environment, influence, transition
  • Amirhosein Elhami, Mohammadreza Hafeznia, Abdoreza Farajirad Page 121

    Development of the main paradigms of contemporary human interaction is dominant. Important source of insecurity and instability underdevelopment countries. Economic development is an important aspect of the development of comprehensive and inclusive growth which means stable indicators of economic well-being, along with structural changes in it. In this study, the relationship between the theoretical factors affecting the political security and economic development are explained and analyzed. Based on the theoretical model of the relationship between political security and economic development is traced.

    Keywords: building political security, economic development, theoretical model
  • Mohammad Farhadi Page 139

    September 11 attacks on New York’s world trade center towers was a significant turning point for major developments in international system, regional order and existing concepts. After the attacks, the Middle East became the pivot of U.S Foreign Policy, considered to be a block on its worldwide hegemony. During the recent years, however, a new approach can be detected in U.S Foreign Policy with the shift moving from the Middle East to the Central Asia. The present paper tries to explore the shift in U.S Foreign Policy, its implications for the security sphere of the I.R Iran, and proposing specific approaches to counterbalance it. Explaining the conceptual framework of the research first, a quantitative method is being used in order to collect the required data. The findings of the study which has been analyzed using discourse analysis shows that: the shift in U.S Foreign policy has directly resulted in economic, political instability in the region, in turn creating political, cultural, security and economic challenges for Iran, Russia, China, and India. In doing so, proposals are made to reassuring Iran’s political, cultural, security and economic interests which has been challenged by U.S increasing engagement in the Central Asia region.

    Keywords: United States, Foreign Policy Shift, Middle East, Central Asia, Iran. Security Sphere
  • Mahmoodreza Shams Dowlatabadi, Seyyedjavad Amini, Mahdi Zrvandi* Page 165

    Today, unmindful destruction of the environment and natural resources in the light of the teachings of Capitalism promoting profit maximization can account for the reason why the issue of sustainable development is paid global attention. Humanity's trust in the power of technology and science has wavered, as a result of the fact that they have become more cautious in their treatment of nature, struggling invariably to codify environmental ethics. By contrast, the Islamic texts, if studied, clearly highlight how rich those texts are in terms of the rules and instructions about how to properly treat the nature without going to any extremes. However, the negligence on the part of the Islamic scholars caused them to inadvertently pave the way for the Westerners, who were themselves the main factor in destructing the environment, to pretend to be qualified for codifying and introducing the environmental ethics, and even to describe religion, in their works, as provoking and encouraging man in destructing the nature. On the other hand, some part of the authorities involved in the country's developmental affairs is not driven by any pragmatic obsession with safeguarding the environment, thereby causing the loss of natural resources. This research is aimed at presenting a strategic theory of environmental security. The methodology employed in this article draws on "grounded theory". The result from this research is how valid extrapolated concepts and data can be translated to a theory. a convenient and optimized theory achieved through extrapolated and generalized concepts that postulate the principle of paying attention to theoretical foundations, and abide by bioethics and general culture-building along with deterrent rules in objectives and policies, by which a purified and stable environment can be achieved. This would be a strategic theory as well as a successful and preferable output in the area of environmental security.

    Keywords: the discourse presented by the Guardianship of Faqih, environmental security, strategic theory