Keyword Index

A

  • Antagonism An Understanding of the Pattern of Knowing the Enemy from the Perspective of Imam Khamenei with an Emphasis on United States of America [Volume 10, Issue 38, 2022, Pages 99-130]

C

  • Communication systems Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2022, Pages 7-44]
  • Covert Diplomacy Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
  • Cyber-Security Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]

D

  • Deception The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]

E

  • Evaluation Presenting the Evaluation Model of Information Systems Development Measures [Volume 10, Issue 39, 2022, Pages 7-28]

F

  • Foreign Policy Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]

G

  • Governance Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
  • Grounded Theory Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2022, Pages 7-44]

H

  • Hefa Commanders Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]

I

  • Identity Strategic Needs of Countering Terrorism in Iraq [Volume 10, Issue 38, 2022, Pages 71-98]
  • Imam Ja’far Sadegh (PBUH) Intelligence dominance in the biography of Imam Ja’far Sadegh (PBUH) [Volume 10, Issue 37, 2022, Pages 45-72]
  • Implementation Methods Presenting the Evaluation Model of Information Systems Development Measures [Volume 10, Issue 39, 2022, Pages 7-28]
  • Indigenous Model Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
  • Inhibition The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
  • Intelligence Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
  • Intelligence dominance Intelligence dominance in the biography of Imam Ja’far Sadegh (PBUH) [Volume 10, Issue 37, 2022, Pages 45-72]
  • Internal Security ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]
  • Iraq Strategic Needs of Countering Terrorism in Iraq [Volume 10, Issue 38, 2022, Pages 71-98]
  • ISIS ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]
  • ISIS Thinking ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]
  • Islamic republic of Iran Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]

J

  • Jihadist Management The strategies for implementing jihadist management in the security organizations of armed forces [Volume 10, Issue 37, 2022, Pages 133-162]

K

  • Khodaafrin Border City Explaining the Factors Affecting Sustainable Security in Border Urban Areas (Case Study: Khodaafrin City) [Volume 10, Issue 39, 2022, Pages 117-144]
  • Knowing of the Enemy An Understanding of the Pattern of Knowing the Enemy from the Perspective of Imam Khamenei with an Emphasis on United States of America [Volume 10, Issue 38, 2022, Pages 99-130]

N

  • National Security of Iran Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
  • Needs Assessment Explaining and designing the needs assessment model of the required communication systems in the intelligence-security organizations through the qualitative method of grounded theory [Volume 10, Issue 37, 2022, Pages 7-44]

P

  • Pattern An Understanding of the Pattern of Knowing the Enemy from the Perspective of Imam Khamenei with an Emphasis on United States of America [Volume 10, Issue 38, 2022, Pages 99-130]

R

  • Reliability Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]

S

  • Security Management ISIS Thinking and Internal Security Management of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 91-116]
  • Security Managers Expected Value Competencies for the Appointment of Security Managers [Volume 10, Issue 38, 2022, Pages 7-36]
  • Security organizations The strategies for implementing jihadist management in the security organizations of armed forces [Volume 10, Issue 37, 2022, Pages 133-162]
  • Semantic Reaction Time The Application of Semantic Reaction Time in The Separation of Deceptive and Non-Deceptive People [Volume 10, Issue 39, 2022, Pages 145-164]
  • Senior Managers Designing and Explaining the Security Intelligence Model of Senior Governance Managers [Volume 10, Issue 38, 2022, Pages 37-70]
  • Socialized Security Strategic Needs of Countering Terrorism in Iraq [Volume 10, Issue 38, 2022, Pages 71-98]
  • Social network Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]
  • Strategy Identifying the requirements of security intelligence and ranking the improvement strategies of it in the governmental organizations [Volume 10, Issue 37, 2022, Pages 73-92]

T

  • Takfiri Terrorist Groups Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]
  • Theoretical Approach Theoretical Approaches to Covert Diplomacy in Intelligence Organizations; Presenting the Native Theoretical Model [Volume 10, Issue 38, 2022, Pages 131-166]
  • Threat Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]
  • Threat assessment Assessing Possible Future Threats Against the Islamic Republic of Iran (Case Study: ISIS Takfiri Terrorist Groups) [Volume 10, Issue 39, 2022, Pages 29-56]

V

  • Validity Designing and Constructing a Tool for the Evaluation of Cyber Security Culture and Awareness [Volume 10, Issue 38, 2022, Pages 167-192]
  • Virtual space Conceptual Model of the Influence of Social Networks on the National Security of the Islamic Republic of Iran [Volume 10, Issue 39, 2022, Pages 57-90]