فهرست مطالب

امنیت پژوهی - پیاپی 59 (پاییز 1396)

فصلنامه امنیت پژوهی
پیاپی 59 (پاییز 1396)

  • تاریخ انتشار: 1396/09/28
  • تعداد عناوین: 6
|
|
  • younes forouzan, abdolreza alishahi *, ali mohammad doost Pages 5-27

    Qatar and Saudi Arabia can be considered as societies that have played both effective and destructive roles in adopting converging and unified policies in many political, security, cultural and economic crises in the West Asian region; But theoretical and pragmatic unity and pragmatism in Riyadh-Doha policies, especially after the visit of President Donald Tramp on May 20, 2017, was thwarted. The main question of the present study focuses on what factors can be considered as the basis for deepening the gaps in Qatar and Saudi Arabia relations, which ultimately resulted in a complete political breakdown between the two countries. The findings of this study, using the method of historical sociology and the theory of social gaps, confirm that most of the factors that led to the divergence and disconnection of political relations between Saudi Arabia and Qatar Are; a broad ideological gap between the two countries, Saudi Arabia's successive defeats in the struggle against the resistance fronts (Syria, Iraq, and to a large extent Yemen) and, ultimately, Saudi Arabia's vast accusations of Qatar on protecting terrorists and the Muslim Brotherhood groups.

    Keywords: Social Gaps, Political Convergence, Divergence, Qatar, Saudi Arabia, Brotherhood Islam
  • reza khalili, hadi chehri* Pages 29-52

    Despite the fact that the West Asia region has always been pregnant with tension and conflict, but at various times different factors have caused tension and crisis in this region. Furthermore, with the formation and development of ISIS, these challenges became more widespread and reinforced each other, as the result the whole Western Asian security system was undergoing fundamental changes. These changes in the West Asian security system have revealed the structure, existing processes, and the role of its actors, which has resulted as the consequences of all countries' actions in the region. Regarding the importance of the issue, this study is an attempt to answer the question that; what are the impact of ISIL's formation on the West Asian countries' security system. Moreover, It was hypothesized that the formation of ISIS has increased the interference of foreign powers in the Western Asian security order and strengthened anarchy in the region. In collecting the data, library resources and related documents were used, and for analyzing the content we employed historical analysis in a comparative framework. By describing and analyzing the security system before and after the formation of ISIS, we tested the research hypothesis.

    Keywords: Security System, Takfiri Terrorists, West Asia, Foreign Powers
  • reza musa zadeh, mahmoud ganj bakhsh Pages 53-77

    By increasing the number of victims of terrorist attacks, global attention was focused on the fight against takfirist in various ways. In response to this security challenge, Canada emphasizes the international responsibility of the terrorist governments; However, the measures related to this state immunity law have solely been imposed on Iran. The main question is that, in what areas does Canada's legal and legislative measures threaten Iran's security and interests, especially the economic interests of Iran? The hypothesis of this study is based on the idea of the negative impact of violation of the Iranian government's property rights on the rights and security of the Iranian people, and as a result the negative impact on the national security and interests of our country. This implies Canadian international responsibility. Economic security is the access to resources, capital and money, and essential markets that are necessary to maintain acceptable levels and degrees of prosperity and government power. Since Iran's economy and trade are largely state-owned, the seizure of such assets in the enforcement of internal rulings or the enforcement of sentences imposed on foreigners, which is also going to expand, and also direct and indirect Cutting off any financial relationships, seriously affects the economic and commercial security of our country.

    Keywords: Canadian State Immunity Act, Threatening States, Economic Security, Judicial Immunity, Government Property, International Government, Islamic Republic of Iran
  • mohammadreza hafez nia, zahra pishgahi fard, abdulreza faraji rad, mehdi hossein pour motlagh * Pages 79-105

    In the 21st century, the formation of cyberspace which is the result of information and communication technology and the Internet, Caused unprecedented challenges to the political systems and concepts such as national interests, national security, and governmental values in ruling over the countries, and government structures have been criticized and challenged through cyberspace. In this new era, protest movements and revolutions were shaped through civil spaces. With the expansion of cyberspace, new aspects of the transformation of governments have been created; in a way that the changes in West Asia and North Africa illustrate this issue. Therefore, this study examines how much cyberspace can create the context for the challenges and changes to the governments. To this end, attention was given to the theories of Castells, Toffler, Lucien Pie, alternative media and theories of governance. In one part, the library study and Chronicle developments of Tunisia and Libya's were considered , and in the other part, using the questionnaire's technique, the viewpoint of 176 experts in this field were analyzed. The findings show that cyberspace has a significant relationship with all the components of the government's challenge. Among the components of cyberspace, the social media space (Gumbo and Twitter), blog space, e-mail, interactive spaces and newsgroups, respectively, have the greatest impact on the changes and developments. Moreover,Among the challenges of governments, the political existence of the country, the values of government, national interests and national security are threatened by cyberspace, respectively.

    Keywords: Cyberspace, Challenges for Governments, Tunisia, Libya
  • mohammad nazari farokhi, ibrahim nazari farokhi, saeed saeedi *, narges saleh pour Pages 107-128

    Due to the growth of computer networks, network security has also been raised as a major challenge. Intrusion detection systems have been developed to ensure secure data processing and storage on the network; they are also considered as major components of network security. Because traditional intrusion detection systems do not respond to new attacks, therefore, data-mining penetration detection systems are suggested in this study.Data mining techniques is Used to increase the accuracy of intrusion detection systems, and it is typically increases the network security.Due to the wide range of data mining techniques, self-organized neural networks and backup machines have been used to detect and predict the influence of this study;Therefore, the combination of the two above mentioned technologies ,to some extent ,improves the anomaly detection. However, using self-organized neural networks and backup carriers, normal behavior and network traffic can be categorized in one category, and heterogeneous attacks or heterogeneous neurons are classified in the other categories.The KDD CUP 99 dataset is used to train and evaluate the proposed method. In other words, because of the use of competitive learning for training in this study this method was used;Therefore, compares the accuracy of the proposed method with the self-organized neural network learning and decision making tree learning.The results show that the proposed system has a high accuracy for intrusion detection, and also less time is needed in comparison with the other techniques .

    Keywords: Intrusion Detection Systems, Backup Machines, Self Organized Nervous Networks, Attacks, Data mining
  • hamidreza nadi * Pages 129-146

    National power is one of the most important components of sovereignty and national development and the stability of the political system. So that, in the light of these components, it is possible to realize the national aspirations and goals; Although the creation of security in various dimensions reflects the realization of the functional capacities of national power, its continuance requires the consolidation of the internal power of the state, especially in the functional dimension of the security and defense institutions. The information protection community, as one of the most influential security institutions in the nation's power ,is among the main actors in this field, that, when functioning nationally in both institutional complement and national synergy dimension, will be able to strengthen the internal strength of the national power. this study was an attempt to answer this question that; what is the role of national information protection in the internal strengthening of the national power? And how it is possible to achieve this goal by stablishing this institution. In response to this question, by explaining the requirements for the creation of national information protection, its functional role in creating cohesion and integration within the intelligence community, which is an important factor in achieving the internal strength of the national power, was studied .In this study, using the data-driven methodology and using expert opinions, and also using snowball sampling, the necessity and requirements for developing a strategic model from three perspectives of national threats, national interests, and national goals were examined and analyzed and the impact of coherent functions and the consolidation of this national institution in strengthening the construction of the internal national power was emphasized.

    Keywords: internal power, information protection, strength