A
-
Afsari, Rasoul
Explaining the Factors Affecting Sustainable Security in Border Urban Areas (Case Study: Khodaafrin City) [Volume 10, Issue 39, 2022, Pages 117-144]
-
Aghaei, Mohsen
Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
-
Ahmadi, Masoud
Identifying the requirements of security intelligence and ranking the improvement strategies of it in the governmental organizations [Volume 10, Issue 37, 2021, Pages 73-92]
-
Ahmadi, Masoud
Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
-
Alvandi, Hooman
Analysis of the contents represented the Islamic revolutionary guard corps in the news agencies of ISNA (the Iranian students’ news agency) and Fars and the analytical news database of Asre Iran [Volume 10, Issue 37, 2021, Pages 93-132]
-
Asgari, Mahmood
Cultural security in the Islamic Republic of Iran [Volume 10, Issue 37, 2021, Pages 163-196]
-
Avar, Amin
Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
B
-
Barzegar, Majid
Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]
G
-
Ghaderi, Ruhollah
Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
H
-
Hamidi, Akbar
Explaining the Factors Affecting Sustainable Security in Border Urban Areas (Case Study: Khodaafrin City) [Volume 10, Issue 39, 2022, Pages 117-144]
-
Hashemi, Toraj
The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
-
Heydari, Seddigheh
Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]
K
-
Keykhaei, Hadi
Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
-
Khadem Daghigh, Amir Hushang
Presenting the Evaluation Model of Information Systems Development Measures [Volume 10, Issue 39, 2022, Pages 7-28]
-
Khalili, Ibrahim
Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]
-
Khatirpasha, Kioumars
Identifying the requirements of security intelligence and ranking the improvement strategies of it in the governmental organizations [Volume 10, Issue 37, 2021, Pages 73-92]
-
Khatirpasha, Kioumars
Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
-
Khazai, Amir
Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]
-
Khodadadi, Mojtaba
The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
M
-
Mehri Karnami, Mohammad
Identifying the requirements of security intelligence and ranking the improvement strategies of it in the governmental organizations [Volume 10, Issue 37, 2021, Pages 73-92]
-
Mehri Karnami, Mohammad
Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
-
Moghimpour Bizhani, Mahmood
Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2021, Pages 7-44]
-
Mohammaddavoudi, Amirhossein
Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]
-
Mohammadi, Mehdi
Intelligence dominance in the biography of Imam Ja’far Sadegh (PBUH) [Volume 10, Issue 37, 2021, Pages 45-72]
N
-
Namjoo, Yahya
The strategies for implementing jihadist management in the security organizations of armed forces [Volume 10, Issue 37, 2021, Pages 133-162]
-
Nasoohi Dehnavi, Majid
Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2021, Pages 7-44]
-
Nezamipour, Ghadir
Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
-
Noroozani, Shahram
Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]
Q
-
Qara Daghi, Hamed
ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]
R
-
Rafiei Rad, Seyyed Mehdi
Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
-
Rahmani Saed, Hadi
Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]
S
-
Sabouri Moghadam, Hassan
The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
-
Shamlou, Reza
Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]
-
Shirazi, Jafar
An Understanding of the Pattern of Knowing the Enemy from the Perspective of Imam Khamenei with an Emphasis on United States of America [Volume 10, Issue 38, 2022, Pages 99-130]
-
Soleymani, Majid
Analysis of the contents represented the Islamic revolutionary guard corps in the news agencies of ISNA (the Iranian students’ news agency) and Fars and the analytical news database of Asre Iran [Volume 10, Issue 37, 2021, Pages 93-132]
T
-
Tanhayi, Alireza
The strategies for implementing jihadist management in the security organizations of armed forces [Volume 10, Issue 37, 2021, Pages 133-162]
V
-
Vahedi, Morteza
Presenting the Evaluation Model of Information Systems Development Measures [Volume 10, Issue 39, 2022, Pages 7-28]
Z
-
Zamani Mahjoob, Habib
Intelligence dominance in the biography of Imam Ja’far Sadegh (PBUH) [Volume 10, Issue 37, 2021, Pages 45-72]
-
Zarean, Ahmad
Strategic Needs of Countering Terrorism in Iraq [Volume 10, Issue 38, 2022, Pages 71-98]
-
Zavartorbati, Ahmad
Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2021, Pages 7-44]
Your query does not match with any item