Identifying the requirements of security intelligence and ranking the improvement strategies of it in the governmental organizations

Document Type : Original Article

Authors

1 Ph.D. Candidate in the Organizational Behavior Management at Islamic Azad University, Sari Branch, Iran.

2 Assistant Professor at Islamic Azad University, Sari Branch, the Department of Governmental Management, Iran.

Abstract

The purpose of this study is to identify the requirements of security intelligence and rank the improvement strategies of it in the governmental organizations. The present study follows a three-step process. For this purpose, in the first stage, semi-structured interviews were conducted with 12 experts through theoretical sampling method. Then, with the help of MAXQDA software, the data were analyzed and during open coding, 48 items were identified as basic concepts from the text of the interviews, which were classified into 10 sub-indexes and 2 main indexes. In the quantitative part of the study, in the second stage, the Shannon’s entropy method was used to determine the degree of the importance of the requirements of security intelligence, and in the third stage, the MOBAK method was used to rank the mentioned strategies. The study’s results showed that the specialized requirements of security intelligence, the interactive requirements of security intelligence, the requirements of facing with enemy, the religious and legal requirements, the individual and self-improvement requirements and the requirements of utilization of security intelligence, respectively achieved the highest degree of importance among the requirements of security intelligence. Furthermore, it showed that the improvement of the infrastructure of security intelligence, the improvement of the tactical security intelligence, designing the strategic system of security intelligence and the management of organization’s security thoughts, respectively ranked highest among the improvement strategies of the security intelligence of the governmental organizations.

Keywords


  1. ‌‫بازرگان هرندی، عباس؛ حجازی، الهه؛ سرمد، زهره، 1397، روشهای تحقیق در علوم رفتاری، تهران: آگه.
  2. ‌‫باقری، مسعود؛ نمازیان، مریم؛ امیری، آتنا، 1391، «بررسی رابطه بین هوش معنوی با خلاقیت و انگیزه پیشرفت، مورد مطالعه: دانشآموزان متوسطه ناحیه یک کرمان»، مقاله ارائه‌شده در اجلاس ملی کارآفرینی و مدیریت کسب‌وکارهای دانش‌بنیان.
  3. ‌‫خدادادی، مجتبی؛ حسن‌پور، علی، 1392، «نقش هوش هیجانی در توانمندی مدیران امنیتی»، پژوهش‌های حفاظتی و امنیتی، 5(2)، ص 95 تا 110.
  4. ‌‫رضایت، غلامحسین؛ مرادیان، فیض‌الله، 1395، «ارائه الگوی راهبردی حفاظتاطلاعات اسلامی»، دانشگاه عالی دفاع ملی،‌ دانشکده امنیت ملی، 6(22)، ص 69 تا 94.
  5. ‌‫سیف، علی‌اکبر، 1398، روانشناسی پرورشی نوین: روانشناسی یادگیری و آموزش، دوران.
  6. ‌‫میرزایی، سعید، 1395، «بررسی عوامل مؤثر بر امنیت اجتماعی شهروندان شهر جدید پرند»، سومین اجلاس بین‌المللی پژوهش‌های نوین در علوم انسانی.
  7. ‌‫نجفی شهرضا، محمدمهدی؛ احمدی، سید علی‌اکبر؛ کمانی، سید محمدحسین؛ گرامی‌پور، مسعود، 1399، «طراحی و تبیین الگوی جامع هوش مدیریتی، مورد مطالعه: ادارهکل آموزشوپرورش استان قم»، پژوهش‌های مدیریت منابع انسانی، 42(12)، ص 9 تا 62.

ب)منابع لاتین

1.Crump, Justin. (2015). Corporate security intelligence and strategic decision making. Crc press.

2.Gardner, Howard. (2006). Intelligence reframed: Multiple intelligences for the new millennium. Basic Books.

3.Gardner, Howard; & Hatch, Thomas. (1990). Multiple Intelligences Go to School: Educational Implications of the Theory of Multiple Intelligences. Technical Report No. 4.

4.Kaiser, Robert. (2015). The birth of cyberwar. Political Geography, 46, 11-20.

5.Manogaran, Gunasekaran; Thota, Chandu; Lopez, Daphne; & Sundarasekar, Revathi. (2017). Big data security intelligence for healthcare industry 4.0. In Cybersecurity for Industry 4.0 (pp. 103-126). Springer.

6.Pamucar, Dragan; & cirovic, Goran. (2015). The selection of transport and handling resources in logistics centers using Multi-Attributive Border Approximation area Comparison (MABAC). Expert Systems with Applications, 42(6), 3016-3028. https://doi.org/10.1016/j.eswa.2014.11.057

7.Pham, Hiep Cong; Brennan, Linda; & Furnell, Steven. (2019). Information security burnout: Identification of sources and mitigating factors from security demands and resources. Journal of Information Security and Applications, 46, 96-107.

  1. Pirc, John; DeSanto, David; Davison, Iain; & Gragido, Will. (2016a). 3 - Security Intelligence. In J. Pirc, D. DeSanto, I. Davison, & W. Gragido (eds.), (J. Pirc, D. DeSanto, I. Davison, & W. Gragido, eds.), Threat Forecasting (pp. 29-45). Syngress.
  2. Pirc, John; DeSanto, David; Davison, Iain; & Gragido, Will. (2016b). Threat forecasting: Leveraging big data for predictive analysis. Syngress.
  3. Sallos, Mark Paul; Garcia-Perez, Alexeis; Bedford, Denise; & Orlando, Beatrice. (2019). Strategy and organisational cybersecurity: a knowledge-problem perspective. Journal of Intellectual Capital.
  4. Samonas, Spyridon; Dhillon, Gurpreet; & Almusharraf, Ahlam. (2020). Stakeholder perceptions of information security policy: Analyzing personal constructs. International Journal of Information Management, 50, 144-154.
  5. Shannon, Claude E. (1948). A mathematical theory of communication. The Bell system technical journal, 27(3), 379-423.
  6. Sternberg, Robert J; Grigorenko, Elena L; & Bundy, Donald A. (2001). The Predictive Value of IQ. Merrill-Palmer Quarterly, 47(1), 1-1.