A
-
Antagonism
An Understanding of the Pattern of Knowing the Enemy from the Perspective of Imam Khamenei with an Emphasis on United States of America [Volume 10, Issue 38, 2022, Pages 99-130]
C
-
Communication systems
Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2022, Pages 7-44]
-
Covert Diplomacy
Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
-
Cyber-Security
Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]
D
-
Deception
The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
E
-
Evaluation
Presenting the Evaluation Model of Information Systems Development Measures [Volume 10, Issue 39, 2022, Pages 7-28]
F
-
Foreign Policy
Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
G
-
Governance
Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
-
Grounded Theory
Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2022, Pages 7-44]
H
-
Hefa Commanders
Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]
I
-
Identity
Strategic Needs of Countering Terrorism in Iraq [Volume 10, Issue 38, 2022, Pages 71-98]
-
Imam Ja’far Sadegh (PBUH)
Intelligence dominance in the biography of Imam Ja’far Sadegh (PBUH) [Volume 10, Issue 37, 2022, Pages 45-72]
-
Implementation Methods
Presenting the Evaluation Model of Information Systems Development Measures [Volume 10, Issue 39, 2022, Pages 7-28]
-
Indigenous Model
Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
-
Inhibition
The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
-
Intelligence
Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
-
Intelligence dominance
Intelligence dominance in the biography of Imam Ja’far Sadegh (PBUH) [Volume 10, Issue 37, 2022, Pages 45-72]
-
Internal Security
ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]
-
Iraq
Strategic Needs of Countering Terrorism in Iraq [Volume 10, Issue 38, 2022, Pages 71-98]
-
ISIS
ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]
-
ISIS Thinking
ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]
-
Islamic republic of Iran
Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]
J
-
Jihadist Management
The strategies for implementing jihadist management in the security organizations of armed forces [Volume 10, Issue 37, 2022, Pages 133-162]
K
-
Khodaafrin Border City
Explaining the Factors Affecting Sustainable Security in Border Urban Areas (Case Study: Khodaafrin City) [Volume 10, Issue 39, 2022, Pages 117-144]
-
Knowing of the Enemy
An Understanding of the Pattern of Knowing the Enemy from the Perspective of Imam Khamenei with an Emphasis on United States of America [Volume 10, Issue 38, 2022, Pages 99-130]
N
-
National Security of Iran
Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
-
Needs Assessment
Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2022, Pages 7-44]
P
-
Pattern
An Understanding of the Pattern of Knowing the Enemy from the Perspective of Imam Khamenei with an Emphasis on United States of America [Volume 10, Issue 38, 2022, Pages 99-130]
R
-
Reliability
Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]
S
-
Security Management
ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]
-
Security Managers
Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]
-
Security organizations
The strategies for implementing jihadist management in the security organizations of armed forces [Volume 10, Issue 37, 2022, Pages 133-162]
-
Semantic Reaction Time
The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
-
Senior Managers
Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
-
Socialized Security
Strategic Needs of Countering Terrorism in Iraq [Volume 10, Issue 38, 2022, Pages 71-98]
-
Social network
Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
-
Strategy
Identifying the requirements of security intelligence and ranking the improvement strategies of it in the governmental organizations [Volume 10, Issue 37, 2022, Pages 73-92]
T
-
Takfiri Terrorist Groups
Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]
-
Theoretical Approach
Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
-
Threat
Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]
-
Threat assessment
Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]
V
-
Validity
Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]
-
Virtual space
Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
Your query does not match with any item