نوع مقاله : مقاله پژوهشی
نویسندگان
1 دانشجوی دکتری مدیریت رفتارسازمانی، واحدساری، دانشگاه آزاداسلامی، ساری، ایران
2 استادیار گروه مدیریت دولتی، واحدساری، دانشگاه آزاداسلامی، ساری، ایران
3 استادیار گروه مدیریت آموزشی، واحدساری، دانشگاه آزاداسلامی، ساری، ایران
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
The purpose of this study is to identify the requirements of security intelligence and rank the improvement strategies of it in the governmental organizations. The present study follows a three-step process. For this purpose, in the first stage, semi-structured interviews were conducted with 12 experts through theoretical sampling method. Then, with the help of MAXQDA software, the data were analyzed and during open coding, 48 items were identified as basic concepts from the text of the interviews, which were classified into 10 sub-indexes and 2 main indexes. In the quantitative part of the study, in the second stage, the Shannon’s entropy method was used to determine the degree of the importance of the requirements of security intelligence, and in the third stage, the MOBAK method was used to rank the mentioned strategies. The study’s results showed that the specialized requirements of security intelligence, the interactive requirements of security intelligence, the requirements of facing with enemy, the religious and legal requirements, the individual and self-improvement requirements and the requirements of utilization of security intelligence, respectively achieved the highest degree of importance among the requirements of security intelligence. Furthermore, it showed that the improvement of the infrastructure of security intelligence, the improvement of the tactical security intelligence, designing the strategic system of security intelligence and the management of organization’s security thoughts, respectively ranked highest among the improvement strategies of the security intelligence of the governmental organizations.
کلیدواژهها [English]
ب)منابع لاتین
1.Crump, Justin. (2015). Corporate security intelligence and strategic decision making. Crc press.
2.Gardner, Howard. (2006). Intelligence reframed: Multiple intelligences for the new millennium. Basic Books.
3.Gardner, Howard; & Hatch, Thomas. (1990). Multiple Intelligences Go to School: Educational Implications of the Theory of Multiple Intelligences. Technical Report No. 4.
4.Kaiser, Robert. (2015). The birth of cyberwar. Political Geography, 46, 11-20.
5.Manogaran, Gunasekaran; Thota, Chandu; Lopez, Daphne; & Sundarasekar, Revathi. (2017). Big data security intelligence for healthcare industry 4.0. In Cybersecurity for Industry 4.0 (pp. 103-126). Springer.
6.Pamucar, Dragan; & cirovic, Goran. (2015). The selection of transport and handling resources in logistics centers using Multi-Attributive Border Approximation area Comparison (MABAC). Expert Systems with Applications, 42(6), 3016-3028. https://doi.org/10.1016/j.eswa.2014.11.057
7.Pham, Hiep Cong; Brennan, Linda; & Furnell, Steven. (2019). Information security burnout: Identification of sources and mitigating factors from security demands and resources. Journal of Information Security and Applications, 46, 96-107.