Passive Defense Strategy in Technology

Document Type : Original Article

Authors

Doctor of Strategic Defense Sciences and Assistant Professor of University

Abstract

Typologically, this study is an applied-developmental one and also a descriptive and case-based research in relation to gathering and processing data which combines passive defense and technology and seeks to deliver strategies to protect the national technological infrastructures at a strategic level. Accordingly, it cooperates with 20 persons engaging in passive defense and technology as the population who are selected upon conference with the administrators of the Passive Defense Organization and analyses the related variables: "passive defense" and "elements of technology". In the following, it presents approaches and strategies for invigoration, development, production, research and fortification in order to secure and perpetuate the tetra-pronged elements of technology, i.e. human, information, device and organization.

Keywords


فهرست منابع
الف- منابع فارسی
-    خلیل، طارق (1383)، مدیریت تکنولوژی، رمز موفقیت در رقابت و خلق ثروت، ترجمه­: اعرابی، سید محمد و ایزدی، داود، تهران، دفتر پژوهش­های فرهنگی.
-    سیاست­های کلی علم و فناوری، ابلاغی از سوی مقام معظم رهبری، مورخه­ 29/6/1393.
-    سیاست­های کلی برنامه پنجم توسعه، ابلاغی از سوی مقام معظم رهبری، مورخه 21/10/1387.
-    سیاست­های کلی نظام در خصوص پدافندغیرعامل، سایت مقام معظم رهبری؛ 29/11/1389:
-    http://farsi.khamenei.ir/
-    مجموعه مقالات دومین همایش علم و فناوری (1382)، مرکز تحقیقات استراتژیک، معاونت علوم و تکنولوژی.
-    نرم افزار حدیث ولایت (مجموعه بیانات رهبر معظم انقلاب حضرت آیت الله امام خامنه­ای).
 
ب- منابع انگلیسی
-         Chossudovsky, Michel (2012)Towards a World War III Scenario? The Role of Israel in Triggering an Attack on Iran, [online]https://store.globalresearch.ca/store/towards-a-world-nuclear-war/
-         Cordesman, Anthony (2006) Iranian Nuclear Weapons? The Threat from Iran’s WMD and Missile Programs, available at:
-         http://csis.org/files/media/csis/pubs/060221_iran_wmd.pdf 
-         Cordesman, Anthony (2013) U.S. and Iranian Strategic Competition; Sanctions, Energy, Arms Control, and Regime Change, Center for Strategic and international Studies: http://csis.org/files/publication/120124_Iran_Sanctions.pdf 
-         Cornish, Paul (2010) On Cyber Warfare, available at:
-         https://www.chathamhouse.org/sites/files/1110_cyberwarfare.pdf
-         Crane, Keith (2008) Iran’s Political,  Demographic, and Economic Vulnerabilities, available at: http://www.rand.org/MG693.pdf
-         Gancia, Gino (2008) Technological Change and the Wealth of Nations, available at: http://www.crei.cat/people/GZannrev.pdf
-         Govindaraju, Rajesri (2010) Analysis of the Influence of Technology on the Business, available at: http://apiems.net/archive/apiems2010/pdf/SE/128.pdf
-         Green, Jerrold (2009) Understanding Iran, available at: http://www.rand.org/content/dam/rand/pubs/RAND_MG771.pdf
-         Haeni, Reto E. (1997) Information Warfare an introduction, The George Washington University, available at: http://www.trinity.edu/rjensen/infowar.pdf
-         McGuinn, Martin G. (2004) Prioritizing Cyber Vulnerabilities, available at: http://www.dhs.gov/ NIAC_CyberVulnerabilities.pdf
-         Molander, Roger C. (1996) Strategic Information Warfare: a new face of war, National Defense Research Institute, available at: http://www.rand.org/content/rand_reports/2005/MR661.pdf
-         Perkovich, George (2006) Five Scenarios for the Iranian Crisis, Security Studies Department, available at: www.ifri.org/
-         Perry, Walter (2004) Exploring Information Superiority, A Methodology for Measuring the Quality of Information and Its Impact on Shared Awareness, National Defense Research Institute, available at: http://www.rand.org/content/2005/MR1467.pdf
-         Raushenbakh, Boris V. (2010) Computer War, available at: http://www-ee.stanford.edu/Breakthrough/book/pdfs/raushenbakh.pdf
-         Reimer, Dennis (2007) Psychological Operations Process: Tactics, Techniques, and Procedures, FM 3-05.301, available at: http://info.publicintelligence.net/USArmy-PsyOpsTactics.pdf
-         Rosenau, William (2006) Waging the ‘‘War of Ideas’’, Georgetown University available at: ttp://www.rand.org/pubs/ RP1218.pdf
-         , Dr.K (2014) Cyber War, Methods and Practice, University OSNABRUCk, available at: http://www.dirk-koentopp.com/methods-and-practice.pdf
-         Salsabili, Mansour (2013) Iran and Weapons of Mass Destruction, the Military Dynamics of Nonproliferation, Harvard Kennedy School, available at: http://belfercenter.ksg.harvard.edu/files/salsabili-dp-march-2013.pdf
-         Sechrist, Michael (2012) New threats, old technology Vulnerabilities in Undersea Communications Cable Network Management Systems, [online] http://ecir.mit.edu/images/stories/sechrist-dp-2012-03-march-5-2012-final.pdf
-         Shaihebrew,Nachman (2013) Media War Reaching for Hearts and Minds, Publisher; yediot, available at: http://www.amazon.com/
-         Shaw, John (2011) ‘Satellite Wars in the Middle East: A Battle for Hearts and Minds’  Durham University: https://www.dur.ac.uk/resources/MediaPoster22.pdf
-         Sherrill, Clifton (2012) Why Iran Wants the Bomb and What IT Means for US Policy, available at: http://cns.miis.edu/iran_bomb.pdf
-         Solomon, Richard H. (2000) U.S. Foreign Policy Agenda: The Internet and the Diffusion of Diplomacy, available at: http://guangzhou.usembassy-china.org.cn/uploads/images.pdf
-         Streenhuis, Harm-Jan (2006) High Technology Revisited: Definition and Position, Eastern Washington University, [online] http://doc.utwente.nl/high_technology.pdf
-         Work, Robert (2014) Preparing for War in the Robotic Age, Center for a New American Security, Available at: http://www.cnas.org/publications-pdf/WorkBrimley.pdf