Author Index

A

  • Afsari, Rasoul Explaining the Factors Affecting Sustainable Security in Border Urban Areas (Case Study: Khodaafrin City) [Volume 10, Issue 39, 2022, Pages 117-144]
  • Aghaei, Mohsen Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
  • Ahmadi, Masoud Identifying the requirements of security intelligence and ranking the improvement strategies of it in the governmental organizations [Volume 10, Issue 37, 2021, Pages 73-92]
  • Ahmadi, Masoud Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
  • Alvandi, Hooman Analysis of the contents represented the Islamic revolutionary guard corps in the news agencies of ISNA (the Iranian students’ news agency) and Fars and the analytical news database of Asre Iran [Volume 10, Issue 37, 2021, Pages 93-132]
  • Asgari, Mahmood Cultural security in the Islamic Republic of Iran [Volume 10, Issue 37, 2021, Pages 163-196]
  • Avar, Amin Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]

B

  • Barzegar, Majid Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]

G

  • Ghaderi, Ruhollah Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]

H

  • Hamidi, Akbar Explaining the Factors Affecting Sustainable Security in Border Urban Areas (Case Study: Khodaafrin City) [Volume 10, Issue 39, 2022, Pages 117-144]
  • Hashemi, Toraj The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
  • Heydari, Seddigheh Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]

K

  • Keykhaei, Hadi Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
  • Khadem Daghigh, Amir Hushang Presenting the Evaluation Model of Information Systems Development Measures [Volume 10, Issue 39, 2022, Pages 7-28]
  • Khalili, Ibrahim Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]
  • Khatirpasha, Kioumars Identifying the requirements of security intelligence and ranking the improvement strategies of it in the governmental organizations [Volume 10, Issue 37, 2021, Pages 73-92]
  • Khatirpasha, Kioumars Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
  • Khazai, Amir Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]
  • Khodadadi, Mojtaba The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]

M

  • Mehri Karnami, Mohammad Identifying the requirements of security intelligence and ranking the improvement strategies of it in the governmental organizations [Volume 10, Issue 37, 2021, Pages 73-92]
  • Mehri Karnami, Mohammad Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
  • Moghimpour Bizhani, Mahmood Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2021, Pages 7-44]
  • Mohammaddavoudi, Amirhossein Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]
  • Mohammadi, Mehdi Intelligence dominance in the biography of Imam Ja’far Sadegh (PBUH) [Volume 10, Issue 37, 2021, Pages 45-72]

N

  • Namjoo, Yahya The strategies for implementing jihadist management in the security organizations of armed forces [Volume 10, Issue 37, 2021, Pages 133-162]
  • Nasoohi Dehnavi, Majid Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2021, Pages 7-44]
  • Nezamipour, Ghadir Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
  • Noroozani, Shahram Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]

Q

  • Qara Daghi, Hamed ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]

R

  • Rafiei Rad, Seyyed Mehdi Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
  • Rahmani Saed, Hadi Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]

S

  • Sabouri Moghadam, Hassan The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
  • Shamlou, Reza Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]
  • Shirazi, Jafar An Understanding of the Pattern of Knowing the Enemy from the Perspective of Imam Khamenei with an Emphasis on United States of America [Volume 10, Issue 38, 2022, Pages 99-130]
  • Soleymani, Majid Analysis of the contents represented the Islamic revolutionary guard corps in the news agencies of ISNA (the Iranian students’ news agency) and Fars and the analytical news database of Asre Iran [Volume 10, Issue 37, 2021, Pages 93-132]

T

  • Tanhayi, Alireza The strategies for implementing jihadist management in the security organizations of armed forces [Volume 10, Issue 37, 2021, Pages 133-162]

V

  • Vahedi, Morteza Presenting the Evaluation Model of Information Systems Development Measures [Volume 10, Issue 39, 2022, Pages 7-28]

Z

  • Zamani Mahjoob, Habib Intelligence dominance in the biography of Imam Ja’far Sadegh (PBUH) [Volume 10, Issue 37, 2021, Pages 45-72]
  • Zarean, Ahmad Strategic Needs of Countering Terrorism in Iraq [Volume 10, Issue 38, 2022, Pages 71-98]
  • Zavartorbati, Ahmad Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2021, Pages 7-44]