فهرست مطالب

نشریه پدافند غیر عامل و امنیت
پیاپی 2 (پاییز 1391)

  • تاریخ انتشار: 1391/07/15
  • تعداد عناوین: 7
|
|
  • Mohsen Moradian, Khosrow Bolhasany, Bahram Rezai Pages 7-26
    The purpose of present paper is that by using the experiences of war and the distance variable, as an important variable in land use planning and passive defense, to determine Communications, the traits of the variables involved and the relationships between them. The study is practical, and uses descriptive, correlational- agreement method and study of scientific documents with Contextual approach. The data for this study have been collected through the library search (books and technical articles), and internal and external databases. The results show that despite the arrival of new technologies and equipment in battle, Distance still act as a major barrier in disappointing the enemy. International Journal of vital centers in central region and away from the borders, International Journal of vital centers in central region and away from the borders, is an important passive defense. However, the way distance affects is contrary to traditional notions, And to a certain threshold, by increasing distance, the severity of threats also increase. It is only after this threshold that the traditional view concerning the mode of the effectiveness of variable of distance is an indication of accuracy.
    Keywords: passive defense_border threats_land use planning_as a blocks away
  • Jafar Hassan Pour, abolghasem alikhah Pages 27-60
    Protection of property, interests and values of the top priorities of every individual and society, And in fact, provide a desirable level of protection can be considered secure. Measures to counter threats that may have endangered the above construction And injure and damage them are divided into two measures: active and passive activities And history show that active action is not sufficient to deal with the threats posed, And hence passive defense against unnatural or man-made disasters in all spheres of human life can be defined. This study examines "What influence do security features have on the principles and actions of passive defense that ignoring them causes variety of results different from the accomplished estimates?"; with targeting of the “"Understanding the function of security features in passive defense measures" Find the answer to his question that the "What security features are passive defense functions action?" Using the case - context of the implementation process, to gather information from the library collection and to obtain the views of the elite (Including managers and professionals working in the areas of management, administration and security related research and Passive defense) the findings of the research A query tool is used. Method of used to analyze the issues this study to analyze the findings of "relying on theoretical issues" with the aim to achieve new perspectives and insight issues related to Security futurism and passive defense is used. Findings of the study's hypothesis CONFIRMING mutual respect and sorrow of the main security features (combination of objective and subjective aspects, relative complexity and comprehensiveness) Passive
    Keywords: principles of passive defense, safety features, passive defense measures
  • Reza Koohi Pages 61-92
    Method of networking is the most effective tool of enemy is in soft war. What has already happened is the usage of Powerful tool of internet to speed up networking that has doubled efficiency of this strategy. The main goal of the research is to deal with the threats cyber social networks which is studied by secondary objectives, identification of virtual social networks, the way of finding people on social networks, effectively identifying and reducing threat of virtual social networks, through analytical and descriptive method; Data validity is assessed by two forms of content and structure and its Reliability by using Cronbach's alpha. The results show that Virtual social networks are online community of users that communicate with hardware and software features to achieve the desired goals. By Data mining we can identify effective people on social networks and realized targets and threats that arise from these networks. Control and penetration in effective people, creation of split in the net and doing notification programs will reduce cyber threats to social networks. It was proposed to develop a Center for monitoring virtual social networks to identify the anomalies in this area and further studies are necessary.
    Keywords: social networking, data mining, cyber threats
  • Mohammad Hassan Sabouri, Alireza Moradi Saleh Pages 93-112
    Soft war is one method of war that Has a long history, In which by means of various and new ways and tools including the launch of psychological war, it is tried to realize Victory over an opponent without the use of weapons and violence campaign. Global arrogance (especially the U.S.) and other enemies of the Islamic Republic of Iran Since the beginning of the revolution has tried to overthrow the nascent Islamic republic of Iran, and often have tried ways of soft and hard war. One of the ways of soft war is to create Skepticism and separation between Pillars of the system and people. In this way it is trying to achieve this goal through different methods of psychological warfare, computer war, internet war, soft subversion, setting up radio and television networks and networking. Therefore, it is necessary to predict appropriate defensive actions in different offensive dimensions of enemy by the relevant authorities to increase prevention, reduce vulnerability, continuity of essential operations, promoting national stability and facilitating crisis management. Thus, identifying and explaining passive defense against soft war of enemy is the main aim of this study and the researcher's main concern. To collect data, Considering the descriptive research method used in this paper, Documentation style (examining documents and Internet search) is used. The findings of this study show, with greater understanding of the terminology, procedures, and tactics used in soft war, and ways of to deal with them and review different opinions and perspectives, Tricks and Tips of the enemies of the system in soft war domain, and Identifying the necessary tasks (passive defense), we could achieve our goals.
    Keywords: soft war, passive defense, forms of soft war, tactics of soft war
  • Abbas Khorshidi, Akbar Astaraky, Ali Ghanbari Pages 113-138
    Security has always been one of the main concerns has been the rulers,governors of the distant past to the present. Over the ages,and changes in societies,the emergence of new technologies,Security threats facing society,how politics,war colonial countries also experienced major changes,and battles with hard fighting equipment,personnel in place to fight a lot,have thought of soft war. All of this necessitates show a change in how the country's defense policy is to prepare for new threats,enemies. According to experts,the best way to deal with these threats,security communities set preventive actions that are in passive defense domain. Effect of NAJA passive defense measures on social security,social assistance of Tehran,Population,141 were recruited the senior managers,middle,administrative,social affairs Naja experts working in Tehran with a higher degree of Bachelor of choice among these,118 were randomly selected,questionnaires were administered on them. To determine the validity of the questionnaire was measured 118 using Cronbach's alpha,the overall alpha coefficient of 15955,that is statistically very satisfying. this study passive defense measures in the area of social assistance tasks of NAJA,is divided into four main branches of public education,Public participation,Interaction with the media,scientific activities – social,the impact of each one on social security in Tehran were reviewed,analyzed The results showed that there is a relationship between them.
    Keywords: Social Security, passive defense, public education, Community Participant, Media, social scientific activities
  • Hamid Reza Rafati, Hani Hushny Pages 139-168
    City of Tehran is a metropolis in which critical governmental, and industrial places, and academic centers are located; the establishment of these centers, and have caused traveling and quartering to this big city to be more than other cities; this also lead to population growth and rise in traffic; paying special attention to the importance of reducing traffic and execution of defensive measures to minimize the damage caused by the crisis is of crucial importance. Passive defense is such a case which is done With the aim of Continuation of operations infrastructure, providing critical needs, continuity and facilitating of public service in terms of threats and crises through the accomplishment of Passive defense projects In order to reduce the vulnerability of the critical, vital and important equipment of the state. Considering the population of City of Tehran and high traffic of people and vehicles there, researcher faced the question “how to institutionalize the culture of traffic in Tehran in order that people suffer from less harm in time of trouble. Research is based on descriptive method, and Methods of data collection are library and Field research methods using questionnaire; After summarizing the evidence obtained and analyzing them, the findings show that 55/55% population believe that Classical education of citizens, instructional advertising through radio and television, advertising brochures, Warning signs in traffic compliance with binding regulations with passive defense approach Play a major role And 58/55% also believe that psychological security Factor in the citizens of Tehran, Including comfort, enjoyment of public order, citizens quick and easy access to shelter, proper and quick use of aiding capabilities, and Displacement and resettlement of people in crisis are effective as Components of with passive defense.
    Keywords: culture, traffic, passive defense, crisis, emotional security
  • Abbas Ghodsi, Gholamreza Asadpour Pages 169-194
    One of the suitable solutions to counter possible enemy attacks and Reduction damage caused by attacks on passive defense land is the creation of artificial obstacles. In general Barriers are defined as follows: Any kind of land, air, maritime and special case of soil, climate and mock objects except firepower and equipment is used to delay, canalize, or stop the enemy. In fact the artificial swamp is the special case of soil Created by humans that causes the enemy military equipment being trapped. The aim of this study was to investigate the possibility of turning soil to swamp-like land So that the enemy will stop or slow the mobility of Enemy armored and motorized equipment (Anti-motility). In this study, after examining the Material of soil types, the possibility of Creation, designing and implementation of swamp with specific dimensions and using chemicals are considered. So that in case of entering armored equipment into it, it was not possible to leave, or at least leads to the slow moving and mobility, and The term referred to as the anti-motility actions.
    Keywords: quasi-swamp barrier, soil, equipment, armor, anti-movement, passive defense