نوع مقاله : مقاله پژوهشی
نویسندگان
1 دانشجوی دکتری دانشگاه عالی دفاع ملی و عضو هیئت علمی دانشگاه جامع امام حسین(ع)
2 استاد دانشگاه امام صادق(ع)
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
The subject of security in the holly Quran is presented in the context of specific concepts among which the word 'fear' is of great importance for its negative aspect of security. Failure in addressing these issues analytically can lead to the weakness of discourse and Islamic security model ofsecurity. The purpose of this study is to explain 'fear' from security perspective through the deduction of the security implications of the verses related to the word fear in the holly Quran. Accordingly, the main question is: what are the security implications of fear in the holly Quran? The text-based content method is used to answer this question.The study findings show that security reference, security providers, policies of reaching to no-fear, types of security, backgrounds and context of fear and insecurity creation, factors of fear creation, ways of preventing fear and the types of fear are the main concepts which can be deduced, exploited and extracted from the verses of the holly Quran that are related to the word fear in relation to security. There are two types of fear, negative fear and positive fear. Positive fear is good from the view of Islam and the holly Quran. The reference of security is sometimes all humans and sometimes part of humans, especially those who believe (in God) and do righteous deeds. Most of the Quran verses are related to the security providers and the highest one of them is God and the prophets. The greatest emphasis is on charity, having faith in God, the hereafter and righteous deed as the policies of reaching to no-fear.Uncovering classified secrets and spreading rumors are some of the grounds and contexts for creating fear. The devil and his commanders and practitioners are effective factors in creating fear and justifying and informing the public are the ways to prevent fear. The results of this study are also applicable to analysts, experts and managers of security domain
کلیدواژهها [English]