فهرست منابع
الف- منابع فارسی
- خلیل، طارق (1383)، مدیریت تکنولوژی، رمز موفقیت در رقابت و خلق ثروت، ترجمه: اعرابی، سید محمد و ایزدی، داود، تهران، دفتر پژوهشهای فرهنگی.
- سیاستهای کلی علم و فناوری، ابلاغی از سوی مقام معظم رهبری، مورخه 29/6/1393.
- سیاستهای کلی برنامه پنجم توسعه، ابلاغی از سوی مقام معظم رهبری، مورخه 21/10/1387.
- سیاستهای کلی نظام در خصوص پدافندغیرعامل، سایت مقام معظم رهبری؛ 29/11/1389:
- http://farsi.khamenei.ir/
- مجموعه مقالات دومین همایش علم و فناوری (1382)، مرکز تحقیقات استراتژیک، معاونت علوم و تکنولوژی.
- نرم افزار حدیث ولایت (مجموعه بیانات رهبر معظم انقلاب حضرت آیت الله امام خامنهای).
ب- منابع انگلیسی
- Chossudovsky, Michel (2012)Towards a World War III Scenario? The Role of Israel in Triggering an Attack on Iran, [online]https://store.globalresearch.ca/store/towards-a-world-nuclear-war/
- Cordesman, Anthony (2006) Iranian Nuclear Weapons? The Threat from Iran’s WMD and Missile Programs, available at:
- http://csis.org/files/media/csis/pubs/060221_iran_wmd.pdf
- Cordesman, Anthony (2013) U.S. and Iranian Strategic Competition; Sanctions, Energy, Arms Control, and Regime Change, Center for Strategic and international Studies: http://csis.org/files/publication/120124_Iran_Sanctions.pdf
- Cornish, Paul (2010) On Cyber Warfare, available at:
- https://www.chathamhouse.org/sites/files/1110_cyberwarfare.pdf
- Crane, Keith (2008) Iran’s Political, Demographic, and Economic Vulnerabilities, available at: http://www.rand.org/MG693.pdf
- Gancia, Gino (2008) Technological Change and the Wealth of Nations, available at: http://www.crei.cat/people/GZannrev.pdf
- Govindaraju, Rajesri (2010) Analysis of the Influence of Technology on the Business, available at: http://apiems.net/archive/apiems2010/pdf/SE/128.pdf
- Green, Jerrold (2009) Understanding Iran, available at: http://www.rand.org/content/dam/rand/pubs/RAND_MG771.pdf
- Haeni, Reto E. (1997) Information Warfare an introduction, The George Washington University, available at: http://www.trinity.edu/rjensen/infowar.pdf
- McGuinn, Martin G. (2004) Prioritizing Cyber Vulnerabilities, available at: http://www.dhs.gov/ NIAC_CyberVulnerabilities.pdf
- Molander, Roger C. (1996) Strategic Information Warfare: a new face of war, National Defense Research Institute, available at: http://www.rand.org/content/rand_reports/2005/MR661.pdf
- Perkovich, George (2006) Five Scenarios for the Iranian Crisis, Security Studies Department, available at: www.ifri.org/
- Perry, Walter (2004) Exploring Information Superiority, A Methodology for Measuring the Quality of Information and Its Impact on Shared Awareness, National Defense Research Institute, available at: http://www.rand.org/content/2005/MR1467.pdf
- Raushenbakh, Boris V. (2010) Computer War, available at: http://www-ee.stanford.edu/Breakthrough/book/pdfs/raushenbakh.pdf
- Reimer, Dennis (2007) Psychological Operations Process: Tactics, Techniques, and Procedures, FM 3-05.301, available at: http://info.publicintelligence.net/USArmy-PsyOpsTactics.pdf
- Rosenau, William (2006) Waging the ‘‘War of Ideas’’, Georgetown University available at: ttp://www.rand.org/pubs/ RP1218.pdf
- , Dr.K (2014) Cyber War, Methods and Practice, University OSNABRUCk, available at: http://www.dirk-koentopp.com/methods-and-practice.pdf
- Salsabili, Mansour (2013) Iran and Weapons of Mass Destruction, the Military Dynamics of Nonproliferation, Harvard Kennedy School, available at: http://belfercenter.ksg.harvard.edu/files/salsabili-dp-march-2013.pdf
- Sechrist, Michael (2012) New threats, old technology Vulnerabilities in Undersea Communications Cable Network Management Systems, [online] http://ecir.mit.edu/images/stories/sechrist-dp-2012-03-march-5-2012-final.pdf
- Shaihebrew,Nachman (2013) Media War Reaching for Hearts and Minds, Publisher; yediot, available at: http://www.amazon.com/
- Shaw, John (2011) ‘Satellite Wars in the Middle East: A Battle for Hearts and Minds’ Durham University: https://www.dur.ac.uk/resources/MediaPoster22.pdf
- Sherrill, Clifton (2012) Why Iran Wants the Bomb and What IT Means for US Policy, available at: http://cns.miis.edu/iran_bomb.pdf
- Solomon, Richard H. (2000) U.S. Foreign Policy Agenda: The Internet and the Diffusion of Diplomacy, available at: http://guangzhou.usembassy-china.org.cn/uploads/images.pdf
- Streenhuis, Harm-Jan (2006) High Technology Revisited: Definition and Position, Eastern Washington University, [online] http://doc.utwente.nl/high_technology.pdf
- Work, Robert (2014) Preparing for War in the Robotic Age, Center for a New American Security, Available at: http://www.cnas.org/publications-pdf/WorkBrimley.pdf