• List of Articles Security

      • Open Access Article

        1 - Content rating a nessissity for spam management in social networks
        Simin Ghesmati
        Nowadays using of social networks is growing very rapidly. Meanwhile, inappropriate and unintended contents like spam in these networks could be published. Forwarding inappropriate content by friends or spam senders caused that user receive these contents in their profi More
        Nowadays using of social networks is growing very rapidly. Meanwhile, inappropriate and unintended contents like spam in these networks could be published. Forwarding inappropriate content by friends or spam senders caused that user receive these contents in their profiles.The purpose of this research is to design a system to manage, diagnose and deal with spam attacks through social networks to reduce the attack effects as greatest extent as possible. In this study, the content rating system is to rate spam, phishing and over 18 contents in accordance with feedbacks from users so that the spam, phishing, or over 18 logos show and contents will not be displayed. Users are to click on the logo to reach the mentioned contents. To determine limit in comment senders is another ability of this social network system. The outcome of this study confirms that applying the content management system, as 95.22% percent of users claimed, was effective to avoid spam displaying and 99.61% percent of users were highly satisfied with the procedures in spam reduction in the implemented social network. Manuscript profile
      • Open Access Article

        2 - Content rating for spam management in social networks a nessissity
        Simin Ghesmati
        Nowadays using of social networks is growing very rapidly. Meanwhile, inappropriate and unintended contents like spam in these networks could be published. Forwarding inappropriate content by friends or spam senders caused that user receive these contents in their profi More
        Nowadays using of social networks is growing very rapidly. Meanwhile, inappropriate and unintended contents like spam in these networks could be published. Forwarding inappropriate content by friends or spam senders caused that user receive these contents in their profiles.The purpose of this research is to design a system to manage, diagnose and deal with spam attacks through social networks to reduce the attack effects as greatest extent as possible. In this study, the content rating system is to rate spam, phishing and over 18 contents in accordance with feedbacks from users so that the spam, phishing, or over 18 logos show and contents will not be displayed. Users are to click on the logo to reach the mentioned contents. To determine limit in comment senders is another ability of this social network system. The outcome of this study confirms that applying the content management system, as 95.22% percent of users claimed, was effective to avoid spam displaying and 99.61% percent of users were highly satisfied with the procedures in spam reduction in the implemented social network. Manuscript profile
      • Open Access Article

        3 - An Approach to Agent- dependent Replicated in Fault-Tolerant Mobile Code Execution
        Hodjat Hamidi
        In this paper, we have presented the mobile code paradigm, which is a collection of remote evaluation, code on demand, and mobile agents, as an alternative to the conventional client/server paradigm. Security is a major problem of mobile agent systems, especially when m More
        In this paper, we have presented the mobile code paradigm, which is a collection of remote evaluation, code on demand, and mobile agents, as an alternative to the conventional client/server paradigm. Security is a major problem of mobile agent systems, especially when money transactions are concerned. Security for the partners involved is handled by encryption methods based on a public key authentication mechanism and by secret key encryption of the communication. In this paper, we examine qualitatively the security considerations and challenges in application development with the mobile code paradigm. We identify a simple but crucial security requirement for the general acceptance of the mobile code paradigm, and evaluate the current status of mobile code development in meeting this requirement. We find that the mobile agent approach is the most interesting and challenging branch of mobile code in the security context. Therefore, we built a simple agent based information retrieval application, the Traveling Information Agent system, and discuss the security issues of the system in particulars. This article discussed a mobile agent model for processing transactions, which manipulate object servers. An agent first moves to an object server and then manipulates objects. General possibilities for achieving fault tolerance in such cases were discussed and the respective advantages and disadvantages for mobile agent environments and the intended parallel and distributed application scenarios were shown. This leads to an approach based on warm standby and receiver side message logging. We have used dynamically changing agent domains to provide flexible, adaptive and robust operation. The performance measurement of Fault-Tolerant Mobile Agent System shows the overhead introduced by the replication mechanisms with respect to a non-replicated agent. Not surprisingly, it also shows that this overhead increases with the number of stages and the size of the agent. Manuscript profile
      • Open Access Article

        4 - modified division and replication of data in cloud for optimal performace and security (MDROPS)
        hossein hassanpour
        The tendency of organizations to use cloud services is increasing every day, due to the economic benefits that can be contained, the adoption of every service of information security topic is the most critical basic needs. Hence the need to Outsourcing data as well as t More
        The tendency of organizations to use cloud services is increasing every day, due to the economic benefits that can be contained, the adoption of every service of information security topic is the most critical basic needs. Hence the need to Outsourcing data as well as the significant growth of the hacker's knowledge may be considered as a major obstacle in the path of securing the cloud services. One of the proposed techniques to secure cloud computing using network platform, is divide and replicate data [5]. That this method suffers from problems like disclosure of Information through telephone (internet) tapping, incompleteness of encryption of location's data storage algorithm. Therefore, in this article we have tried to present a way to optimize the performance and increase the level of security, by dividing and replicating data using a methodology with the encryption of location's respondents and Finally, we want to indicate the increase of efficiency and security with the implementation of the algorithm in the context of data center networks that simulated with Cloudsim software, and also to compare the algorithm using the same proposed approaches. Manuscript profile
      • Open Access Article

        5 - IT Services Outsourcing Novation tactics and Entrepreneurial Strategies in the Financial Services (Case Study: Private and public banks in Markazi province)
        mahtab Eshghiaraghi
        With the rapid rise of global developments and  transition from the traditional society to the information society, paying attention to entrepreneurial strategies for the correct and optimal use of new opportunities and values has forced the banking system to be changed More
        With the rapid rise of global developments and  transition from the traditional society to the information society, paying attention to entrepreneurial strategies for the correct and optimal use of new opportunities and values has forced the banking system to be changed more and more. Outsourcing of information technolog( IT) services has changed to a strategy option in using IT services for organizations due to relatively large advantages for organizations. The aim of this study is to explain the role of Outsourcing strategies of IT services in the financial Services of Private and public Banks inMarkazi province. This research is practical in terms of objective and the method is correlational.The statistical population consists of managers and experts of Private and public banks in Markaziprovince which over 103 is members of the community.Research data collected via questionnaire with Cronbach's alpha 0.889 were analyzed throughSpss software. Besides, multivariate regression and Pearson correlation test were applied to analyze them.The result ideates that all hypotheses are accepted. Also findings show that there is a direct relationship between management variables and expenses reduction, novation technologies and accessibility to more specialty (Mobile Banking, Internet and Electronics), IT security and risk reduction, increasing the business flexibility with novation Tactics and strategies of information technology IT services outsourcing in financial Services. So it is concludee that Private and public banks in Markazi province can improve financial services through raising access to more profession and using new technologies, decreasing the expenses, focusing on the main activities, decreasing risks and contracting for IT security and incresing commercial flexibility by IT outsourcingWith the rapid rise of global developments and  transition from the traditional society to the information society, paying attention to entrepreneurial strategies for the correct and optimal use of new opportunities and values has forced the banking system to be changed more and more. Outsourcing of information technolog( IT) services has changed to a strategy option in using IT services for organizations due to relatively large advantages for organizations. The aim of this study is to explain the role of Outsourcing strategies of IT services in the financial Services of Private and public Banks inMarkazi province. This research is practical in terms of objective and the method is correlational.The statistical population consists of managers and experts of Private and public banks in Markaziprovince which over 103 is members of the community.Research data collected via questionnaire with Cronbach's alpha 0.889 were analyzed throughSpss software. Besides, multivariate regression and Pearson correlation test were applied to analyze them.The result ideates that all hypotheses are accepted. Also findings show that there is a direct relationship between management variables and expenses reduction, novation technologies and accessibility to more specialty (Mobile Banking, Internet and Electronics), IT security and risk reduction, increasing the business flexibility with novation Tactics and strategies of information technology IT services outsourcing in financial Services. So it is concludee that Private and public banks in Markazi province can improve financial services through raising access to more profession and using new technologies, decreasing the expenses, focusing on the main activities, decreasing risks and contracting for IT security and incresing commercial flexibility by IT outsourcing. Manuscript profile
      • Open Access Article

        6 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
        Asadollah Shahbahrami ramin rafizadeh kasani hossein pour yousefi dargah
        Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation More
        Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation. Therefore, assessing the situation and prioritizing information security risks and creating an overview and hierarchy of it, is important in the successful establishment of the information security system. However, in terms of dimensions, effects and various causes of security risks and considering the multiplicity of indicators and effective parameters of ISMS implementation, it is necessary to use multi-criteria decision-making models in their evaluation and ranking. . In this study, an attempt has been made to classify the factors affecting the information security management system into two groups of soft and hard factors and in order to accurately rank and focus more, especially in conditions of uncertainty that is inherent in human decision making, Fuzzy hierarchical analysis (FAHP) was performed. Based on this and with the help of a questionnaire to quantify the results, the opinions of technical experts including academic experts, managers and employees of the information technology department of social security branches in Guilan province have been used as a case study of this research. The results show that soft factors including managerial and cultural / social factors are more important than hard factors including financial and technical / technological factors in information security management system and management factors are more important than other soft factors as well as technical / technological factors. They are more important than other difficult factors. Manuscript profile
      • Open Access Article

        7 - Assessing the implications of climate change on food security and rural livelihoods Case Study : Rural Farmers in Migan Nehbandan
        Javad Mikaniki Morteza Esmailnejad Mohammad Akbarpour Mahmaoud Falsoleyman
        This paper aims to investigate the impact of climate change on food security in the villages of the Migan village of Nehbandan district of South Khorasan. In order to achieve this goal, target groups (100 households were randomly selected) were identified to measure th More
        This paper aims to investigate the impact of climate change on food security in the villages of the Migan village of Nehbandan district of South Khorasan. In order to achieve this goal, target groups (100 households were randomly selected) were identified to measure the impact of climate change on food security and were indexed to identify the various domains of food security. These indicators include indicators of access to rural food insecurity and food insecurity ranges of rural households. Finally, rural households were classified in terms of food security in four groups: mild food security, moderate food security, food insecurity. Changes in key food security and household livelihoods as a result of climatic changes in the region have been clarified with regard to field observations and key interviews with rural people. The main finding is that societies that have never experienced extreme temperatures, drought and dust have not experienced it, they are currently in abundance. The research findings revealed that all households in the statistical community have food insecurityHouseholds vulnerable to climate change recorded a high level of food insecurity. Households prefer to adopt a variety of strategies in response to climate change that helps improve household food security. Non-agricultural incomes play an important role in reducing food insecurity in households. Manuscript profile
      • Open Access Article

        8 - Study of Defense Climatic Conditions in the Kavir & Desert Region and Makran Coasts by using the Hierarchy Analysis Model(AHP
        Alireza  Karbalaei ali hanafi Seyed Asaad  Hosseini Abbas  Alipour
        Climate has always provided a suitable platform for creating political and military tensions and endangering the national security of nations. Imposed war experiences and other world wars have shown Climate science can take the fate of a great power in the war. So in th More
        Climate has always provided a suitable platform for creating political and military tensions and endangering the national security of nations. Imposed war experiences and other world wars have shown Climate science can take the fate of a great power in the war. So in this research, study of defense climatic conditions in Kavir & desert region and Makran coasts using by the Hierarchy Analysis Model)AHP( and Military Climate Index (MCI). For this purpose, were used the statistics of different meteorological parameters of 32 stations in the region during the statistical period of 30 years (1987 -2016). The results showed that most of the northern regions of the study area are in good military conditions in the spring and the southern regions in acceptable military climate. In the summer, the military situation in the northern parts of the region is relatively favorable, and conditions in the southern parts, especially in the late summer, are extremely unfavorable and extremely unpleasant. In the early of autumn, most of the northern and central parts of the region are in excellent condition, the southern of Sistan and Hormozgan provinces have inappropriate conditions, and at the end of this season, the military climate is particularly visible in the northern regions and with the onset of winter, climatic disadvantages in the northern parts of the region are rising sharply and in the late of winter, the Hormozgan province and the northeastern regions have acceptable conditions and other areas of the study area are generally very well-positioned in terms of military climate. Manuscript profile
      • Open Access Article

        9 - Investigating the Impact of Military Areas on the Safety of Citizens in Isfahan (Case Study: Garrison 44 and 55)
        yashar zaki keramat Ranjbar Dastenaei
        With the expansion of cities and urbanization, especially in metropolises, many of the military areas built outside the city are located in residential areas of the city. This research seeks to answer the question of whether the existence of military areas in Isfahan af More
        With the expansion of cities and urbanization, especially in metropolises, many of the military areas built outside the city are located in residential areas of the city. This research seeks to answer the question of whether the existence of military areas in Isfahan affects the security of citizens? And on the other hand, considering the distance dimension, what is the relationship between the distance from the military areas in the city and the security of the citizens? Based on this, GIS and SPSS software and the Likert spectrum questionnaire have been investigated. The results of the research show that young women and young boys and young boys are severely reduced by reducing their distance from the 44th and 55th barracks of Isfahan, especially at night. Residents of residential houses during the war, given the possibility of air strikes in the military areas, feel their safety until The distance of 1500 meters is quite low and as the distance increases from the garrison, the sense of safety goes up. Manuscript profile
      • Open Access Article

        10 - Analysis of the Social Pathology Due old Texture Dugonbadan City in Using the Security Approach (Gachsaran Town ship)
        Mohammad Hasel nejad Ali Shamsoddini Mohammad Reza Rezaei
        Today, urban old Texture have caused many anomalies to the inhabitants of this texture and even to other parts of the city. One of the most important problems and abnormalities is the social security issue of this Texture. Which has become one of the most imp More
        Today, urban old Texture have caused many anomalies to the inhabitants of this texture and even to other parts of the city. One of the most important problems and abnormalities is the social security issue of this Texture. Which has become one of the most important issues facing urban management. The main objective of this research is to identify the issues and social damage existing in the context of the worn-out urban areas of Gachsaran city (Douganbadan) in terms of security. This is an applied research, using descriptive-analytic method.The method of collecting information is also inductive-scorecard and deductive. The statistical population of this research is 384 people was obtained according to the Bridgesh and Morgan tables, which increased to 400 for more reliability. They were selected by random sampling method. Data were analyzed using SPSS software. The results of the study indicate that the Security damage to the earthenware in the old Texture with an average of 8.47 is higher than the average. The Q-test at a significant level of 95% confirms the poor condition of the security damage in the old Texture sites. Also, Pearson statistical analysis, one-sample t-test and multivariate regression analysis indicate a correlation between old Texture and social security, Inappropriate status of social security aspect of the old Texture from the viewpoint of citizens and in the multivariate analysis, the coefficient of explanation for all factors was significant at the level of 0.99. Manuscript profile
      • Open Access Article

        11 - The explanation of food patterns in rural settlements in Jiroft city With approach Land use planning
        ali shahdadi علي آذره
        Despite the central role of food production, villagers are now one of the most vulnerable groups in terms of food security due to climate, economic and social changes. Changes in food patterns have led to poor nutrition and severe food insecurity in these settlements du More
        Despite the central role of food production, villagers are now one of the most vulnerable groups in terms of food security due to climate, economic and social changes. Changes in food patterns have led to poor nutrition and severe food insecurity in these settlements due to the poor power and access of villagers to the supply of basic food. This research attempts to answer the question of how dietary patterns among rural households in Jiroft city are affected and what factors affect it. The survey was conducted using a survey method and a questionnaire. The theoretical model of research with the approach of land management has identified three types of environmental, social and economic factors as the main factors explaining the patterns of popular food among villagers. Findings of the research show that rural households had a total of 14 main lunches and dinners per week; rice (average 4.99 times); artificial sugars such as sugar, sugar and sweetmeats (average 4.71 times) and dairy products (average 4.7 Times) and fish and shrimp (average 1.61 times). The consumption of rice among the villagers was significantly correlated with consumption of other foods including milk and herbs, vegetables and fruits, legumes, and chicken grass (with the acceptance of the positive effect of the symmetry of the data collection time on harvesting the consumption of rural households ) Access to water needed for agricultural and livestock production is the most important factor explaining the use of milk and its products among rural households (R = 0.47, F = 5.628, Sig = 0.028). In sum, the annual income associated with the sale price of agricultural products is the most important factor explaining how the consumption of food, especially consumption of meat, dietary foods, canned foods, etc. with (R = 0.51, F = 11.615, Sig = 0.002) and how much interest They consume food with (R = 0.52, F = 7.44, Sig = 0.013). Manuscript profile
      • Open Access Article

        12 - Environmental Security Evaluation Using Space Syntax Theory and Place-Check Technique; Case Study: Saraseyb Neighborhood
        Mehdi Mirmini Samaneh Jalili Sadrabad
        Security has always been one of the most important human needs, this notion is defined once a person is present in an urban space. Therefore, the physical aspects of the city play an important role in its quality. One of the leading approaches to reducing crime, and con More
        Security has always been one of the most important human needs, this notion is defined once a person is present in an urban space. Therefore, the physical aspects of the city play an important role in its quality. One of the leading approaches to reducing crime, and consequently increasing security, is CPTED, which was inspired by Jane Jacobs's "Eyes on the Street" and Oscar Newman's "Defenseless Spaces" theories. But these theories have neglected addressing the quality of people's presence in the community and its relation with security issues. Bill Hayler's Space Syntax theory examines this phenomenon as a relation to co-presence of citizens. For this purpose, the present paper first examines the environmental security in Sarasiab neighborhood of Tehran using a checklist, based on the CPTED principles and strategies. Then, using Depth Map software, the neighborhood map has been extracted and the impact of space syntax on its environmental security has been evaluated. The results of the above findings, which have been gathered in the SWOT table, indicate a low level of environmental security in the Sarasiab neighborhood. For this reason, it has come up with the necessary suggestions for promoting environmental safety in the form of strategic design principles. Finally, modeling the impact of proposed physical changes to improve spatial configuration, interconnection and environmental security has been carries out. Manuscript profile
      • Open Access Article

        13 - Rural migration impact on food security with emphasis on water resources (Case study: villages of Khansar city in Isfahan province)
        hamidehsadat aghamiri  
        The present study was conducted to investigate the impact of water crisis on rural migration and food security in rural place in Khansar. Statistics show that in recent years, the decline in rural water resources has led to an increase in immigration in the area, red More
        The present study was conducted to investigate the impact of water crisis on rural migration and food security in rural place in Khansar. Statistics show that in recent years, the decline in rural water resources has led to an increase in immigration in the area, reducing the rural farmer's population and affecting the level of production and food security. Accordingly, the main question of this research is whether rural immigration from water resources is a threat to global food security? To answer this question, considering the regional attitude of the research, firstly, the status of rural water resources in these areas and the province was investigated and further the various definitions of food security were evaluated. According to theories and research indicators, 5 villages from 3 districts of central Khansar were randomly selected. Immigration index along with food security has been investigated and due to the close relationship between food security and agriculture, the social and economic conditions of villagers in this section have been considered. This indicator includes the goals and age of immigration, the environmental, economic and social conditions of rural migrants. The results of the study showed that more than 60% of immigration is migratory to rural areas where young people are at the top. Therefore, the decline in workforce in rural society and gender differences due to the high percentage of men migrating to women was the main outcome of the status of water dependent migration in rural areas. According to the results, despite the close relationship between agriculture and food security, the increase in rural migration due to water has reduced the production capacity of the villages and poses a serious threat to food security. This research is a reminder that has been done using descriptive-analytic method and considering the impact of this migration on economic conditions, the study of economic theory in this section is at the forefront. The conclusion of this study is based on the correlation coefficient of Kendall. Manuscript profile
      • Open Access Article

        14 - The trend of urban development with geographical foothold (Case Study: Municipality, District13)
        Somayeh Sadat  Sajjadi abbas arghan Zaenab karkah Abadi
        This study examines two important geographic footprint in layer management and sustainable urban development and urban planning.Methods of collecting and gathering information from the library, field work and questionnaires were used. This descriptive study, explain and More
        This study examines two important geographic footprint in layer management and sustainable urban development and urban planning.Methods of collecting and gathering information from the library, field work and questionnaires were used. This descriptive study, explain and through the geography footprint (ecological) for determining the safety of the urban population ) District 13 ( . The results show that the ecological footprint area of 1.913 hectares per person per year, This means that this area 1.376 times more than their share of ecologically sustainable capacity allocated The results of this study corroborates the notion that their needs for sustainable security in the region 13 to meet the needs of other regions is Tehran And the other regional development patterns, according to calculations by Gini coefficients of inequality and relative entropy and Shannon somewhat scattered and uneven distribution of population in urban areas it is evident. Manuscript profile
      • Open Access Article

        15 - Factors Affecting Security Approach in Kurdistan Region Affiliation with Emphasis on Border Regions of Kurdistan Province
        yashar zaki   eskandar moradi  
        The location of the tribes and religions in the territory of the country is of great importance in the management of space and space development. If there are ethnic groups in the border regions and there are regionalismist tendencies among those ethnic groups, this sit More
        The location of the tribes and religions in the territory of the country is of great importance in the management of space and space development. If there are ethnic groups in the border regions and there are regionalismist tendencies among those ethnic groups, this situation poses a country with a range of opportunities and threats. On the one hand, the existence of peoples in the border regions can act as geopolitical hinges and promote the sphere of influence of the country, and, on the other hand, ethno-regionalist tendencies can face the country with security, political, economic and social threats. Iran, with its unique position in the Middle East, has many tribes and religions in the border regions, which are also geographically located on the other side of the border. Kurds in Iran have many common interests with the central core of the country. But the security approach and security priority on development in the Kurdistan region, emphasizing the border regions of Kurdistan province, have caused the potentially natural and human potential of these regions not to be fertilized and the underdevelopment of these areas produces reproduction Get security issues. This applied research and using descriptive analytical method and Internet library sources has been used to collect the data. The factors affecting the security approach in Kurdistan regions are emphasized on the border regions of Kurdistan province, using existing data. has done. The results of the research show that geocultural, geo-political, geo-geomechanical and geostrategic factors have affected the security approach in the Kurdish regions of Iran with an emphasis on the border areas of Kurdistan province. Manuscript profile
      • Open Access Article

        16 - Geopolitical Analysis of Spatial Planinng View in Afghanistan and Providing Strategic Model
        Atiqullah Ghamari Qiuomars Yazdanpanah Dero Zahra Pishgahi fard Hossein Hataminejad
        In the structure of the political economy of the world, some countries are developed and some are developing. Some countries are not only not being developed due to geopolitical fragility and threats and internal crises and the external environment, but also on the pat More
        In the structure of the political economy of the world, some countries are developed and some are developing. Some countries are not only not being developed due to geopolitical fragility and threats and internal crises and the external environment, but also on the path to development. Afghanistan is now considered to be one of the world's worst-hit and underdeveloped countries, with no clear prospects for development, nor at the level of the basic development theorem, nor with clear, coherent development strategies, nor with any operational guarantee document. These problems in Afghanistan are rooted in internal and external issues of geography, culture, politics and security. Therefore, planning for the country's territorial development depends on solving these problems. Strategic planning with a framework and political and security considerations can reduce security threats and political challenges and, as a result, territorial development. Therefore, this article attempts to analyze the internal and external factors affecting territorial integration in Afghanistan from a geopolitical point of view. In this regard, there are two questions to be asked: 1) What are the strengths, weaknesses, opportunities, and geopolitical threats of Afghanistan in its spatial planinng? 2) How can the landscape of the land in Afghanistan be mapped based on internal and external geopolitical factors? This paper has been written in a descriptive-analytical manner, and the required data is also compiled in a library, documentary and bases and websites. Manuscript profile
      • Open Access Article

        17 - Survey of environmental impacts of security policies of Israel (From theory to practice)
          hassan kamran
        Main purpose of recent research is to survey of deferent aspects of military and security measures of authoritarian regime of Israel and focusing on environmental consequences of actions of this regime. Because, in despite of several research that has been done on measu More
        Main purpose of recent research is to survey of deferent aspects of military and security measures of authoritarian regime of Israel and focusing on environmental consequences of actions of this regime. Because, in despite of several research that has been done on measures and policies of Israel regime but in term of environment or environmentally, destructive actions and todays impacts of its security and military measures of this regime on the environment of occupation territories of Palestine and Israel neighborhoods and middle east has not studied in detail. This recent article tries to analyses this issue from deferent aspects in comprehensive. Findings of the research show that settlement-making and military measures of israel on environment of Palestine territories caused destructive consequences such as pollution of water resources of Palestine, destruction of plant and animal life, air pollution and transform of natural environment of Palestine by Israel settlers and as result creation economical insecurity and health problem for people of Palestine and other people of the region. It also causes destruction of cultural heritage of Palestine by road-building and constructions of Israel, pollution of dangerous solid garbages. Israel military and security actions of Israel also cause the pollution and threat of the Middle East environment. Military measures, canal construct, drainage of swamp, transport of heavy military vehicles, application of chemical, biological and conventional weapons against its neighborhoods(Palestine, Lebanon, Syria, Somalia, Jordan and other countries of middle east region) caused erosion of soil, remove of plant cover, air pollution and destruction of water and dry ecosystem and climate change of this region. Huge amounts of organic deposits has raised on soil surface and inflammation of this deposits led to development of new zones of deposits and in its subsequence, spread of soil and sand particles in air and spread of them in the regions countries. Also, warmongering of sad am and Americans and drying of swamp by sad am and transform of land surfaces and west hegemony on this region are another important factors of the environmental, social and economical threats in this region. Method of this research is causal- explanation method and method of data collection is use of library –documental resources. Manuscript profile
      • Open Access Article

        18 - Environmental security and national security in the context of cross-border hydropolitics developments (Case Study: Harirud)
        hassan kamran    
        Considered the most important environmental issues of our time, the water crisis and security challenges arising from it. Water is the source of production, effort and civilization, and life and death and not to be dependent on it. In situations where conflicts over wat More
        Considered the most important environmental issues of our time, the water crisis and security challenges arising from it. Water is the source of production, effort and civilization, and life and death and not to be dependent on it. In situations where conflicts over water resources are increasingly caused tension in the relations between states, increasing attention to issues of rivers, the importance of finding increasingly, we are seeing increased emphasis and hydro disputes among nations. Iran, through common border rivers is no exception. The river Harirud common rivers including Iran, Afghanistan and Turkmenistan lie that originates from Afghanistan. This is the most important source of water utility is the North East of Iran. This article is a descriptive study, with an emphasis on geographical and political issues, seeks to answer the question whether hydro-border development and utilization of Salma dam in Afghanistan can be a challenge for security, environmental and national security of the Islamic Republic of Iran is? And in case of challenges, approaches and Proper management what is it? Findings from the study indicate that according to Salma dam upstream position with respect to the seasonality factor Harirud water, can be the subject of environmental security, and from the perspective of national security, given the prospect of big cities northeastern dependence on water resources and the high risk of water security of the country, can be challenging. The challenges to Proper management, to look at the system, in the form of legal approaches, economic and political, are essential. Manuscript profile
      • Open Access Article

        19 - Investigation of environmental factors affecting the occurrence of urban crime (crime of theft) - Case study: District 1 and 7 of Qom-
           
        Usually there is a place in every city that we call dangerous neighborhoods, and in these areas, crimes are simply happening, and when we have to pass through these streets or neighborhoods, we just want to pass quickly and always the reasons for the emergence of such p More
        Usually there is a place in every city that we call dangerous neighborhoods, and in these areas, crimes are simply happening, and when we have to pass through these streets or neighborhoods, we just want to pass quickly and always the reasons for the emergence of such places. In cities, it's a question for everyone. Indeed, if people choose a place for life, the first thing that carries their minds is the existence of security, because security is an important indicator for raising the quality of social life, and one of the factors that it creates is its security. The purpose of this article is to investigate the environmental factors affecting the crime of theft. The study area is located in Qom, and areas 1 and 7 of this city have been investigated as a case. The research method is descriptive-analytic based on the scroll and is used by the questionnaire. The results of the research indicate that, from the viewpoint of residents in the Qom area, the indicator of the guardian of the neighborhood with an average of 4.21 could have the greatest impact on the reduction of theft crime and the population density has the least effect, on the other hand residents of the seven area increase the quality The door and windows with an average of 4.46 main factors in reducing the crime and providing the facilities and facilities for the better performance of the neighborhood by the municipality have the least impact. Also, there is a direct relationship between municipalities with a correlation coefficient of 0.48, such as physical protection of the neighborhood with a coefficient of 0.29 and a reduction in the crime of crime in areas 1 and 7, so the greater the physical protection and provision of facilities, facilities and urban infrastructure, the amount of theft in These areas will be reduced. Manuscript profile
      • Open Access Article

        20 - Investigating the Impact of Defenseless Spaces on Citizen Safety sense (Case Study: Tehran Bazar Neighborhood)
        Hossein Farhadikhah Ahmad Pourahmad   Seyed Khalil Seyed Alipour
        Including the consequences of defenseless spaces in cities, less safe and more importantly reduce the sense of security among citizens, so evaluation these spaces and their effects on the sense of security of the citizens is essential. The purpose of this study is also More
        Including the consequences of defenseless spaces in cities, less safe and more importantly reduce the sense of security among citizens, so evaluation these spaces and their effects on the sense of security of the citizens is essential. The purpose of this study is also evaluating the effects of defenseless spaces on the sense of security of citizens in the Bazar neighborhood of Tehran. This research has an applied aim and its methodology Library - survey (questionnaire) is. To study for defenseless space of three indicators (physical, social and social - physical) and three indicators sense of security (sense of security of language, physical and visual) are used. The sample size using Cochran's formula, according to statistical population (23,696 people), 384 is obtained. To analyze the data, two software SPSS and SMART - PLS is used. The research results show that the between physical and social indicator’s sense of security of citizens there is a significant relationship, but between the social - physical indicators by sense of security, there is no significant relationship. As well as social indicators (crowding, privacy, etc.), the greatest impact on sense of security of citizens. Manuscript profile
      • Open Access Article

        21 - Passive defense, the secret of security in the range of of urbans and rurals country (With emphasis on rural and urban architecture)
        Nasr Allah Fallah tabar  
        In all circumstances, man should be able to protect his life and his property against the natural and unnatural threats. The purpose of this research is to show the possibility of involving a country in unintended conflicts such as hard, semi-hard or soft war. Therefore More
        In all circumstances, man should be able to protect his life and his property against the natural and unnatural threats. The purpose of this research is to show the possibility of involving a country in unintended conflicts such as hard, semi-hard or soft war. Therefore, we must be prepared for each of them and defense of our Islamic homeland. Because there were more than 220 wars in the twentieth century with more than 200 million casualties for people. Then, this is a warning to us to be prepared. The research uses a descriptive-analytic approach to take advantage of the practical results. Because the subject is tied to the past, the historical method is employed. The research hypothesis raises that; our Islamic homeland has been faced with several important wars. On the other hand, facing with Islamic Revolution is one of the strategic objectives of the global arrogance. Iran is capable of as eight years of sacred defense to give the necessary training to all sections of society in the field of passive defense to defend the nation and the country. The result is that Imam Khomeini (God's mercy be upon him) in a part of his thoughts says: " In all circumstances, the vigor of the defense must be in the best condition. Over the years of war and conflict, people have touched the hatred and cruelty of the enemies of the God and themselves... ". Therefore, by considering this remark and the necessity of securing and preparation, the principles of passive defense will be reviewed and analyzed for urban and rural architecture respect to building strength and the public safety. Manuscript profile
      • Open Access Article

        22 - Caspian Sea geopolitical crises emphasizing the geo-economics’ competition between coastal countries and its impact on Iran's national security
           
        Geo-economic competition of Caspian coastal states in some cases such as the legal regime of the sea, energy transfer plans and exploitation of sea bed resources are considered including the geopolitical crises affecting Iran's national security in this region. The purp More
        Geo-economic competition of Caspian coastal states in some cases such as the legal regime of the sea, energy transfer plans and exploitation of sea bed resources are considered including the geopolitical crises affecting Iran's national security in this region. The purpose of this article is analysis of Caspian Sea Geopolitical Crises emphasizing the geo-economics competition between coastal countries and its impact on Iran's national security. The main question of the paper is that the geopolitical crises of the Caspian Sea Focused on geo-economics’ competition between coastal countries how will affect Iran's national security? The findings of this article show that these rivalries also trigger Iran's economic insecurity in the field of energy equations and also deprives Iran of the markets and the permanent and stable economic partners of the region it also provides for cultural and ethnic insecurity in the cultural geography of Iran. Given this introduction, this paper will attempt by using library resources as well as scientific and research articles to be paid analyzing and explaining the geopolitical crises of the Caspian Sea, with emphasis on geo-economic competition between coastal countries and its impact on Iran's national security. Manuscript profile
      • Open Access Article

        23 - Shanghai Organization and the Security of Central Asia
        الهه  كولايي
        Iran became an observer member of the Shanghai Organization on 2005. Considering the reasons behind the formation of this organization and the transformation process it went through, this event has led to serious debates on how Iran can cooperate with this Organization. More
        Iran became an observer member of the Shanghai Organization on 2005. Considering the reasons behind the formation of this organization and the transformation process it went through, this event has led to serious debates on how Iran can cooperate with this Organization. "Shanghai Five" group was first established to resolve security and border related problems between China, Russia and CIS countries (except Uzbekistan and Turkmenistan). Later, when Uzbekistan joined Shanghai Five, the group was promoted to organization level. Although many changes have taken place during the transformation process of this regional security cooperation and some economic problems have also been taken into consideration, but basically this Organization has paid more attention to security and military problems in general. The main question brought forth in this article is: "What is Shanghai Organization's role in providing the secrutiy of Central Asia?" The article studies the transformation process taken place in this Organization , so that its role as the provider of secrutiy in Central Asia is illustrated. Manuscript profile
      • Open Access Article

        24 - The Elements and the Processes Influencing International System
        Reza سیمبر ارسلان  قربانی شیخ‌نشین
        Portraying different approaches towards contemporary international relations which attempt to study the structures of its present order and depict the future horizon, this paper poses the main questions of what the current structure of international system and its domin More
        Portraying different approaches towards contemporary international relations which attempt to study the structures of its present order and depict the future horizon, this paper poses the main questions of what the current structure of international system and its dominant order is, and what approaches best explain the prospect of the future: liberalism, unipolar system, clash of civilizations, jihad against new colonialism, or anarchism. Can any of these systems explain future scenarios by itself or they are just parts of the paradigm of current world system when put together may provide answers to the question? The main idea of the article is that any discourse about world order has to cover four aspects: political and military balance of power, strengthening international institutions and global sovereignty, emphasis on shared human values, and explaining the structure of world political economy and finance production and distribution. Manuscript profile
      • Open Access Article

        25 - Studying the Relationship between Racial Integration (Kurds &Turks) and Stable Security; Recognition of Effective Factors on Integrating the Races in West Azarbayejan
        شفیع  بهرامیان امید  بهرامیان
        Regarding geo-political situation of west Azrabayejan and various racial trends in this province, the study of effective factors on integrating the races and the relationship between racial integration and feeling of stable security in west Azarbayejan is the core of th More
        Regarding geo-political situation of west Azrabayejan and various racial trends in this province, the study of effective factors on integrating the races and the relationship between racial integration and feeling of stable security in west Azarbayejan is the core of this paper; so, the research was done by using survey method and by filling questionnaires in all biracial cities of this province and also in Mahabad city, as our statistical population in a sample of 500 persons. The results show that: a) racial integration has meaningful effect on stable security and more than 20% of changes can be analyzed by this factor. This factor has the most impact on national security, human security and global security; b) among the impact factors, age and the foreign intervene have reverse impact on racial integration, regarding scale of use and scale of trust to foreign mass media; c) other impact factors on racial integration, ranging from the most to the least impact, are: political elite, cultural capital, education, nationalism (pan Iranism), religion, the attitude toward political and administrative sphere, and marriage status; d) the study could not approved the meaningful relationship between racial integration and the following factors: gender, job, relative deprivation feeling, and tendency to universalism. Manuscript profile
      • Open Access Article

        26 - Discourse Analysis of Iran and Iraq War
        Heidar Shahriari
        Islamic revolution that provided a new discourse in Iran socio-political area carrying a new discourse in foreign policy too that it contained concepts like against-arrogance (Istekbarsetizi), Jihad, poor government and … . but it did not take long from beginning that I More
        Islamic revolution that provided a new discourse in Iran socio-political area carrying a new discourse in foreign policy too that it contained concepts like against-arrogance (Istekbarsetizi), Jihad, poor government and … . but it did not take long from beginning that Iran encountered a destructive war from Iraq’s Baath’s regime that analyzing, explaining and interpreting it in different theories and approaches, can indicates its different aspects. In line with it, the main question is that what is the reason of occurring Iran-Iraq war? The forward hypothesis is that the area and context of conflict among Islamism discourse in Iran’s foreign policy and geopolitics discourse in Iraq’s foreign policy, on the one hand, and the conception and interpreting of Iraq’s commanders about Islamism discourse and its existing situation, on the other hand, caused the occurrence. The findings of this essay that is in form of library and documental method indicate that antagonism of Iraq’s geopolitics discourse (with revolution exportation contrast, Pan-Arabism and security signifiers) toward Islamism discourse of Islamic revolution (with revolution exportation, fighting against arrogance and national interestssignifiers) is clearly observable and what made Iraq as the war beginner, was Iraq’s officials conception aboutIran’s political instability situations at that time and the opposite discourse conflict with Iraq’s discourse. Manuscript profile
      • Open Access Article

        27 - Arabic Revolutions and Shaping New Security Orders In Middle East
        فاطمه  قیاسوندی نبی‌الله  ابراهیمی Ahmad سلطانی‌نژاد
        The main argument of this article is to analyze the Islamic Awakening developments and the way new security disciplines development in Middle East is affected by this event. Since the revolution of people in Arab states is known as uprising against dictator governments More
        The main argument of this article is to analyze the Islamic Awakening developments and the way new security disciplines development in Middle East is affected by this event. Since the revolution of people in Arab states is known as uprising against dictator governments and Colonial, it can be an important factor for redefining the novel disciplines in the region which considering Saidism or after- colonial elements and the correspondence among these revolutions and this study, we testify the formation of the type of order focused on reviewing Saidism studies in Middle East. So in this article first of all, we analyze disciplines from the perspective of realism, liberalism, Copenhagen school and post colonial and then the Genealogy of disciplines in Middle East. Islamist role has been also discussed and article is finished by a discussion about the security disciplines governing on the region after the Arabic revolutions, so we can conclude how Arabic revolutions have effects on the formation of new security discipline of Middle East. Manuscript profile
      • Open Access Article

        28 - Relation of Bio-Politics to Global Discourses; Liberalism, Totalitarianism, and Security
        Fateh  Moradi Abasali  Rahbar
        The main aim of this paper is to investigate Liberalism, Totalitarianism, and security as discourses that related to Bio-Politics. The goal of discourse is making subject that is identified by his/her norms and controls in daily life. In this current text we want to rev More
        The main aim of this paper is to investigate Liberalism, Totalitarianism, and security as discourses that related to Bio-Politics. The goal of discourse is making subject that is identified by his/her norms and controls in daily life. In this current text we want to reveal relation of mentioned discourses to bio-politics and body-politics. Relation of discourses to body- politics have been developing in twenty century in theories and multiple texts. On the considering this texts, legislations and actions that tending to classification of bodies and population is one of main preoccupation of discourses in recent century. Norms of economical body or body which should be a productive body of capital, other body and security comes of mentioned discourses. Part of often researches have used to Michael Foucault though, therefore in recent text we used genealogy. So, our hypothesis is the Liberalism, Totalitarianism, and security are strongly to bio-politics, and originally they comes of elements of bio-politics. Consequently, current systems has been founded as bio-political discourses, due to accruing global/ local subjects. Manuscript profile
      • Open Access Article

        29 - An access control model for online social networks using user-to-user relationships
        Mohamad Javad Piran mahmud deypir
        With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the manag More
        With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the management and privatization of access to their shared information by other users. In this article, using the concept of social graph, a new model of user access control was proposed to the user, which allows the expression of privacy policies and more accurate and professional access control in terms of pattern and depth of relationships between users in social networks. In this article, by using the regular index method, indirect relationships among users are examined and analyzed, and more precise policies than previous models are presented. The evaluation of the results showed that for 10 neighbors for each user, the probability accumulation of a qualified path for the first three counter loops is 1, 10.5 and 67.3%, respectively, and finally for the fourth counter it reaches 100%. As the defined counting characteristic increases, the average execution time of the proposed algorithm and previously proposed algorithms increases. However, for the higher limits of the counting characteristic, the proposed algorithm performs better than the previous ones. Manuscript profile
      • Open Access Article

        30 - A New Finite Field Multiplication Algorithm to Improve Elliptic Curve Cryptosystem Implementations
        Abdalhossein Rezai Parviz Keshavarzi
        This paper presents a new and efficient implementation approach for the elliptic curve cryptosystem (ECC) based on a novel finite field multiplication in GF(2m) and an efficient scalar multiplication algorithm. This new finite field multiplication algorithm performs zer More
        This paper presents a new and efficient implementation approach for the elliptic curve cryptosystem (ECC) based on a novel finite field multiplication in GF(2m) and an efficient scalar multiplication algorithm. This new finite field multiplication algorithm performs zero chain multiplication and required additions in only one clock cycle instead of several clock cycles. Using modified (limited number of shifts) Barrel shifter; the partial result is also shifted in one clock cycle instead of several clock cycles. Both the canonical recoding technique and the sliding window method are applied to the multiplier to reduce the average number of required clock cycles. In the scalar multiplication algorithm of the proposed implementation approach, the point addition and point doubling operations are computed in parallel. The sliding window method and the signed-digit representation are also used to reduce the average number of point operations. Based on our analysis, the computation cost (the average number of required clock cycles) is effectively reduced in both the proposed finite field multiplication algorithm and the proposed implementation approach of ECC in comparison with other ECC finite field multiplication algorithms and implementation approaches. Manuscript profile
      • Open Access Article

        31 - Node to Node Watermarking in Wireless Sensor Networks for Authentication of Self Nodes
        Hassan Farsi Seyed Morteza Nourian
        In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method, some algorithms with low computational for gener More
        In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method, some algorithms with low computational for generation, embedding and detection of security ID are designed. The collected data packets by the nodes are marked using security ID. In the proposed method, header is used to mark the packets. Since the nature of the sensor networks is cooperative, using the head of the packets is proposed for authentication. Also using the marked head can prevent from sending and receiving fake data in the other nodes. Simulations have been performed in environments with imposing unrealistic data and having a probability from 1% to 10%. Comparing the proposed method with other methods shows that the proposed method in term of security, reducing traffic and increasing network lifetime is more effective. Manuscript profile
      • Open Access Article

        32 - Promote Mobile Banking Services by using National Smart Card Capabilities and NFC Technology
        Reza Vahedi Sayed Esmaeail Najafi Farhad Hosseinzadeh Lotfi
        By the mobile banking system and install an application on the mobile phone can be done without visiting the bank and at any hour of the day, get some banking operations such as account balance, transfer funds and pay bills did limited. The second password bank account More
        By the mobile banking system and install an application on the mobile phone can be done without visiting the bank and at any hour of the day, get some banking operations such as account balance, transfer funds and pay bills did limited. The second password bank account card, the only security facility predicted for use mobile banking systems and financial transactions. That this alone cannot create reasonable security and the reason for greater protection and prevent the theft and misuse of citizens’ bank accounts is provide banking services by the service limits. That by using NFC (Near Field Communication) technology can identity and biometric information and Key pair stored on the smart card chip be exchanged with mobile phone and mobile banking system. And possibility of identification and authentication and also a digital signature created documents. And thus to enhance the security and promote mobile banking services. This research, the application and tool library studies and the opinion of seminary experts of information technology and electronic banking and analysis method Dematel is examined. And aim to investigate possibility Promote mobile banking services by using national smart card capabilities and NFC technology to overcome obstacles and risks that are mentioned above. Obtained Results, confirmed the hypothesis of the research and show that by implementing the so-called solutions in the banking system of Iran. Manuscript profile
      • Open Access Article

        33 - An Effective Risk Computation Metric for Android Malware Detection
        Mahmood Deypir Ehsan Sharifi
        Android has been targeted by malware developers since it has emerged as widest used operating system for smartphones and mobile devices. Android security mainly relies on user decisions regarding to installing applications (apps) by approving their requested permissions More
        Android has been targeted by malware developers since it has emerged as widest used operating system for smartphones and mobile devices. Android security mainly relies on user decisions regarding to installing applications (apps) by approving their requested permissions. Therefore, a systematic user assistance mechanism for making appropriate decisions can significantly improve the security of Android based devices by preventing malicious apps installation. However, the criticality of permissions and the security risk values of apps are not well determined for users in order to make correct decisions. In this study, a new metric is introduced for effective risk computation of untrusted apps based on their required permissions. The metric leverages both frequency of permission usage in malwares and rarity of them in normal apps. Based on the proposed metric, an algorithm is developed and implemented for identifying critical permissions and effective risk computation. The proposed solution can be directly used by the mobile owners to make better decisions or by Android markets to filter out suspicious apps for further examination. Empirical evaluations on real malicious and normal app samples show that the proposed metric has high malware detection rate and is superior to recently proposed risk score measurements. Moreover, it has good performance on unseen apps in term of security risk computation. Manuscript profile
      • Open Access Article

        34 - Secured Access Control in Security Information and Event Management Systems
        Leila Rikhtechi Vahid Rafeh Afshin Rezakhani
        Nowadays, Security Information and Event Management (SIEM) is very important in software. SIEM stores and monitors events in software and unauthorized access to logs can prompt different security threats such as information leakage and violation of confidentiality. In t More
        Nowadays, Security Information and Event Management (SIEM) is very important in software. SIEM stores and monitors events in software and unauthorized access to logs can prompt different security threats such as information leakage and violation of confidentiality. In this paper, a novel method is suggested for secured and integrated access control in the SIEM. First, the key points where the SIEM accesses the information within the software is specified and integrated policies for access control are developed in them. Accordingly, the threats entered into the access control module embedded in this system are carefully detected. By applying the proposed method, it is possible to provide the secured and integrated access control module for SIEM as well as the security of the access control module significantly increases in these systems. The method is implemented in the three stages of the requirements analysis for the establishment of a secure SIEM system, secure architectural design, and secure coding. The access control module is designed to create a secured SIEM and the test tool module is designed for evaluating the access control module vulnerabilities. Also, to evaluate the proposed method, the dataset is considered with ten thousand records, and the accuracy is calculated. The outcomes show the accuracy of the proposed method is significantly improved. The results of this paper can be used for designing an integrated and secured access control system in SIEM systems. Manuscript profile
      • Open Access Article

        35 - AI based Computational Trust Model for Intelligent Virtual Assistant
        Babu Kumar Ajay Vikram Singh Parul  Agarwal
        The Intelligent virtual assistant (IVA) also called AI assistant or digital assistant is software developed as a product by organizations like Google, Apple, Microsoft and Amazon. Virtual assistant based on Artificial Intelligence which works and processes on natural la More
        The Intelligent virtual assistant (IVA) also called AI assistant or digital assistant is software developed as a product by organizations like Google, Apple, Microsoft and Amazon. Virtual assistant based on Artificial Intelligence which works and processes on natural language commands given by humans. It helps the user to work more efficiently and also saves time. It is human friendly as it works on natural language commands given by humans. Voice-controlled Intelligent Virtual Assistants (IVAs) have seen gigantic development as of late on cell phones and as independent gadgets in individuals’ homes. The intelligent virtual assistant is very useful for illiterate and visually impaired people around the world. While research has analyzed the expected advantages and downsides of these gadgets for IVA clients, barely any investigations have exactly assessed the need of security and trust as a singular choice to use IVAs. In this proposed work, different IPA users and non-users (N=1000) are surveyed to understand and analyze the barriers and motivations to adopting IPAs and how users are concerned about data privacy and trust with respect to organizational compliances and social contract related to IPA data and how these concerns have affected the acceptance and use of IPAs. We have used Naïve Byes Classifier to compute trust in IVA devices and further evaluate probability of using different trusted IVA devices. Manuscript profile
      • Open Access Article

        36 - Providing a New Smart Camera Architecture for Intrusion Detection in Wireless Visual Sensor Network
        Meisam Sharifi Sani Amid Khatibi
        The wireless Visual sensor network is a highly functional domain of high-potential network generations in unpredictable and dynamic environments that have been deployed from a large number of uniform or non-uniform groups within the desired area, cause the realization o More
        The wireless Visual sensor network is a highly functional domain of high-potential network generations in unpredictable and dynamic environments that have been deployed from a large number of uniform or non-uniform groups within the desired area, cause the realization of large regulatory applications from the military and industrial domain to hospital and environment. Therefore, security is one of the most important challenges in these networks. In this research, a new method of routing smart cameras with the help of cloud computing technology has been provided. The framework in the cloud computing management layer increases security, routing, inter interaction, and other features required by wireless sensor networks. Systematic attacks are simulated by a series of standard data collected at the CTU University related to the Czech Republic with RapidMiner software. Finally, the accuracy of detection of attacks and error rates with the suggested NN-SVM algorithm, which is a combination of vector machines and neural networks, is provided in the smart cameras based on the visual wireless sensor networks in MATLAB software. The results show that different components of the proposed architecture meet the quality characteristics of visual wireless sensor networks. Detection of attacks in this method is in the range of 99.24% and 99.35% in the worst and best conditions, respectively. Manuscript profile
      • Open Access Article

        37 - A survey on NFC Payment: Applications, Research Challenges, and Future Directions
        Mehdi Sattarivand Shahram Babaie Amir Masoud  Rahmani
        Near Field Communication (NFC), as a short-range wireless connectivity technology, makes it easier for electronic devices to stay in touch. This technology, due to its advantages such as secure access, compatibility, and ease of use, can be utilized in multiple applicat More
        Near Field Communication (NFC), as a short-range wireless connectivity technology, makes it easier for electronic devices to stay in touch. This technology, due to its advantages such as secure access, compatibility, and ease of use, can be utilized in multiple applications in various domains such as banking, file transferring reservations, booking tickets, redeeming, entry/exit passes, and payment. In this survey paper, various aspects of this technology, including operating modes, their protocol stacks, and standard message format are investigated. Moreover, future direction of NFC in terms of design, improvement, and user-friendliness is presented for further research. In addition, due to the disadvantages of banknote-based payment methods such as the high temptation to steal and the need for a safe, mobile payments, which include mobile wallets and mobile money transfers, are explored as a new alternative to these methods. In addition, the traditional payment methods and their limitations are surveyed along with NFC payment as a prominent application of this technology. Furthermore, security threats of NFC payment along with future research directions for NFC payment and its challenges, including protocols and standards, and NFC payment security requirements are addressed in this paper. It is hoped that effective policies for NFC payment development will be provided by addressing the important challenges and formulating appropriate standards. Manuscript profile
      • Open Access Article

        38 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
        Mohammad Taghi Shaykhan kianoosh azadi
        As the Internet of Things (IoT) expands and becomes more widespread, we will soon see the dependence of human life on its services. At that time, it would be difficult to imagine the survival without the IoT, and disruption of its services would cause great loss of life More
        As the Internet of Things (IoT) expands and becomes more widespread, we will soon see the dependence of human life on its services. At that time, it would be difficult to imagine the survival without the IoT, and disruption of its services would cause great loss of life and property. Disruption of IoT services can occur for two reasons: network errors due to congestion, collision, interruption and noise, and disruption due to the malicious activities of infiltrator. Also, the destructive activities of infiltrators can lead to various cyber attacks and violation of the privacy of individuals. Therefore, before the interdependence between human life and IoT, it is necessary to consider measures to ensure the quality and security of service and privacy. In this study, a solution to reduce service delay (improve quality) and ensure security and privacy of things by relying on the computing power of nodes available in the Fog Layer has been proposed. The proposed solution simultaneously improves service quality and maintains security and privacy. Other features of presented algorithm in proposed solution of fairness between objects are in terms of the quality of service received and minimizing overhead processing and transfer of expired packages (packages that will certainly experience a consumedly threshold delay). Adherence to fairness ensures that the quality of service of any of the things does not be a subject of the reduction of the delay of the service of the entire network; These aforementioned objects may be subjects of critical applications, such as health. Manuscript profile
      • Open Access Article

        39 - The honorable security of human; a preeminent basis in citizenship rights
        علیرضا انتظاری  
        From the viewpoint of The Glorious Quran, noting people and government to the natural and acquired dignity of the whole individuals of a society and observing its necessities cause to decamp all kinds of oppression, discrimination, despotism and suffocation from an Isla More
        From the viewpoint of The Glorious Quran, noting people and government to the natural and acquired dignity of the whole individuals of a society and observing its necessities cause to decamp all kinds of oppression, discrimination, despotism and suffocation from an Islamic society and one of the main components of the human civilization and bliss that is "mundane and heavenly security" be set up as a main characteristic in the citizenship rights by social training. The importance of the security is considered from the point of view of the human dignity in Islam and, moreover, mechanisms hereby have considered to incarnate it in this research Manuscript profile
      • Open Access Article

        40 - Moderation and it's role in security’s Soul in Plato
         
        This study, in order to solve the problem of unrest and anxiety of modern man, leaning on Plato's views, shows that Including ways to gain the Psychological security is man’s persist on virtues that moderation is headed. Plato after drawing of human dignity in being as More
        This study, in order to solve the problem of unrest and anxiety of modern man, leaning on Plato's views, shows that Including ways to gain the Psychological security is man’s persist on virtues that moderation is headed. Plato after drawing of human dignity in being as rational’s being and based in network of Ideas kinship, analysis understanding’s folk of moderation and rethinking it. According to him, the public perception of the concept of moderation in the sense of self- control, in addition to inherent contradiction of its own and function only personal,lead to camouflage the real reason, because moderation is the result of the systematic and harmonious soul of the rule of the reason over force condemned achieved and thereby directed a person to stability in soul and immunity and resistance against all kinds of emotional and provides in this way comfort her.So according to Plato, inner peace is based on internal issue and always manifestation on order of soul. Accordingly, it can be said, the most important factor of unrest contemporary human is epistemological crisis of himself and his inner power. Therefore, to solve the crisis, should be reminds him divine nature of the soul and the ruling order of it, which is, formulated in the philosophy of Plato the virtue of moderation Manuscript profile
      • Open Access Article

        41 - Analyzing the Capacity of Islamic Ethics in the Protest Movement of the Palestinian Jihadists on the Israeli National Security Doctrine
             
        Zionists know well that in Islamic ethics jihad is a defensive but not aggressive war; Muslims do not fight for the purpose of securing and violating the rights of non-Muslims; it is the struggle of Muslims to preserve the existence of the Islamic society and defend Isl More
        Zionists know well that in Islamic ethics jihad is a defensive but not aggressive war; Muslims do not fight for the purpose of securing and violating the rights of non-Muslims; it is the struggle of Muslims to preserve the existence of the Islamic society and defend Islam. This article, based on the SWOT model, will show that the Muslim-Palestinian struggle against Islamic racism against rapes of the Zionist regime does not mean war, violence, and morality common in today's wars, but Palestinians, in any case, value moral values in accordance with religion. Islam is respected and the battlefield is considered as the stage of defending the legitimacy of the religion of Islam and its homeland; this paper seeks to analyze the matrices of the Arab Spring and the security of Muslim Palestinians in a comprehensive view of the efforts of the resistance movement and the Hamas movement based on Islamic morality To protect the security of the Palestinian people against the Zionist regime's national security doctrine T offer Manuscript profile
      • Open Access Article

        42 - Security Policy Analysis in the Light of Human Rights
        Eslam Mondani Mohammad Ashouri
        Security orientation is a strategy the admissible and successful influence of which on the dominant area of criminal policy in the society implicates consistency and agreement with restrictive human rights criteria as well as adherence to privacy and inherent dignity of More
        Security orientation is a strategy the admissible and successful influence of which on the dominant area of criminal policy in the society implicates consistency and agreement with restrictive human rights criteria as well as adherence to privacy and inherent dignity of human beings. Thus, in case the security orientation discourse fails to ensure the human rights principles underlined by the international law for any reason, then it may not be considered a justified policy as it would face failure and defeat in the battle in the long run. Taking into account the various temporal and spatial cirumstances and adhering to the contents of international documents and conventions are propositions considered as the main provision for positive consequence of the quality of interaction between security-oriented criminal policy and human rights principles and criteria which may contribute significantly to obviation of many obstacles blocking such interaction. This article seeks to address the question on the status of interaction between human rights principles and the security-oriented system of thought and to discover, in general, the human rights restriction on this pattern. Manuscript profile
      • Open Access Article

        43 - The Importance and Position of Principal Organs of United Nations Organization in the Framework of United Nations Charter
        Saeedeh  Golkar Seyyed Mohammad Hashemi
        The end of Word War II and in 1945, the United Nations Organization has formally established by50 countries as signatories of the Charter. Having 192 member states in 2006 of almost all countries of the world, the Organization is considered as the largest international More
        The end of Word War II and in 1945, the United Nations Organization has formally established by50 countries as signatories of the Charter. Having 192 member states in 2006 of almost all countries of the world, the Organization is considered as the largest international organization. Many organizations and bodies are active under the supervision of the United Nations. Among the principal organs, the strongest one is the Security Council that includes five permanent members who enjoy veto power in the Council’s making decisions. Enlargement of member states and activities of the United Nations and the plurality of its subsidiary international institutions and organizations, which include most parts and activities of the countries in vast fields, make it necessary to review the framework and performance of this Organization more than ever. The author of the present article tries to study the status of the principal organs in the framework of the United Nations Charter. Manuscript profile
      • Open Access Article

        44 - Equality and Non-Discrimination in Social Security in Islamic State
        Ramin  Movahedi Seyyed Hossein  Malekuti Hashtjin Abulfazl  Ranjbari
        Social Security is one of the most important mechanisms for the realization of social justice. Iran's legal system, especially after the victory of the Islamic Revolution and the spread of slogans of justice and equality, and the elimination of all forms of discriminati More
        Social Security is one of the most important mechanisms for the realization of social justice. Iran's legal system, especially after the victory of the Islamic Revolution and the spread of slogans of justice and equality, and the elimination of all forms of discrimination and inequality, at least is in the pursuit of policies and programs to spread social justice through the social security mechanism in many constitutions and laws. The Islamic state of early Islam (Prophet's and Amir al-Momenin (pbuh) governments) views was based on establishing the principle of equality and non-discrimination in the welfare of Muslims. The Islamic State of Iran, whose constitution is regulated by the application of Islamic laws and principles, has also sought to establish the rules governing social security on the basis of principles such as the principle of equality and non-discrimination, and the legislator requires the Islamic state to interfere in its implementation and supervision. Therefore, social security laws in Iran, although as set out in its original objectives, have not been able to comply with the principles of Islamic laws, due to lack of resources and increased population, the efforts made represent the will of the Islamic State along the path to justice and equality in this category. Manuscript profile
      • Open Access Article

        45 - Provide a successful evaluation model of public policy based on professional ethic
        Sara  Hajatpour karamolah daneshfard Mohammad Taban ghanbar amirnejad
        Throughout the world, a variety of strategies are used to evaluate policies and reduce the intangible and intangible consequences of defective policies, in line with international approaches that propose policies and tools to improve the assessment of organizational pol More
        Throughout the world, a variety of strategies are used to evaluate policies and reduce the intangible and intangible consequences of defective policies, in line with international approaches that propose policies and tools to improve the assessment of organizational policies for those organizations. In this study, several evaluation approaches have been presented by various scholars who try to improve the quality of implementation of policies and reduce dissatisfaction and tensions caused by their inaccurate evaluation. This study seeks to provide a desirable model for evaluating the .The research community was composed of two groups composed of experts in the field of non-random sampling method of selective type and for managers and stakeholders community, a multi-stage sampling method was used. It seems that the findings of the research and the proposed model have the potential to be proposed as a strategy for an appropriate and effective evaluation of policy makers in this field, as well as suggestions for effective ethical evaluation in the organization and subsequently improving the quality of policy implementation Public in that organization.implementation of public policies in the social welfare organization as a public non-governmental organization. Manuscript profile
      • Open Access Article

        46 - Ethical Conflict of Decisions of the International Court of Justice and the Security Council on the Peaceful Settlement of International Disputes
        Saeedeh  Golkar Seyed Mohammad  Hashemi Ali  Zare
        In the present study the structure, some considerations on the respective rolls of the security council and the internationalcourt of justice with respect to the “The revention of aggravation of disputes” in the domain of the pacific settlementof international disputes More
        In the present study the structure, some considerations on the respective rolls of the security council and the internationalcourt of justice with respect to the “The revention of aggravation of disputes” in the domain of the pacific settlementof international disputes or situations, according to the United Nations charter through comparing their functions and functionalities. Special focus is on the International Court of Justice (ICJ) as the sole United Nations judicial institution that carries not only the responsibility of peaceful resolution of international disputes between states and other subjects of international law but also has contributed to the expansion of international law. ICJ has a responsibility to supervise other organs of the United Nations but has failed to observe the resolutions of the Security Council despite the freedoms it enjoys to do so. The authority of the Security Council is still derived from the will of powers, not the international law which has resulted in silence and inaction of the ICJ with regard to the decisions of the Security Council in the cases of Lockerbie, Namibia, Bosnia and Herzegovinian and Montenegro; all out of political considerations. The study ends with a conclusion and a set of recommendations to minimize the adverse effects of the discussed contradictions including legal observations supported by some international principles and procedures as well as acceptance of the superiority of the decisions of the ICJ over decisions of other main UN bodies particularly the Security Council. Manuscript profile
      • Open Access Article

        47 - The right and duty in the social security system are the law and moral duty of the state
        mohammadreza najafabadipour Abolfazl Jafargholikhani tayebe balvardi
        (Premium Unification of the employer's contribution rate guild in the social security organization to support Iranian production) There is a link between the right and the duty in the social security system, that is to say, every one has the right to be in charge of it More
        (Premium Unification of the employer's contribution rate guild in the social security organization to support Iranian production) There is a link between the right and the duty in the social security system, that is to say, every one has the right to be in charge of it.. The right to social security has been recognized as a fundamental right in order to safeguard the interests of individuals in the individual and social spheres against governments, they are also responsible for implementing this right Islamic Republic of Iran has been formulated in three layers the the social security system in of Of insurance, support, and assistance The social security organization is one of the organizations that plays a fundamental role in the insurance strategy and in the part of the participatory system by paying the premium to the share of employers, workers, and the share of contributions by the government in implementing Article Principle 29 of the Constitution has a fundamental role. The Law on Employee Benefit Exemption has been approved by the employer for 5 people in 1362to support manufacturing, technical and industrial workshops in order to support domestic production, although the number of workshops is reduced every day The purpose of this paper is to express the right and duty for eliminating discrimination, protecting the domestic economy and Premium Unification the premium rate in all workshops. Manuscript profile
      • Open Access Article

        48 - Indicators of Mahdavi's rule of peace and security
        Ehsan  Samani
        from a long time ago, one of the basic concerns of mankind has been the creation of a safe environment and free of conflict, and in that regard, he has taken measures and efforts, including the establishment of institutions such as the Community of Nations, the United More
        from a long time ago, one of the basic concerns of mankind has been the creation of a safe environment and free of conflict, and in that regard, he has taken measures and efforts, including the establishment of institutions such as the Community of Nations, the United Nations, the Security Council... but he has not only failed to provide world peace that we saw more and more terrible wars. The roots of insecurity and war should be sought in the kind of political systems. Poverty, ignorance and despotism are the roots of insecurity, oppression and and international conflict. Liberal democracy has also failed to eliminate these factors. It seems that the supreme goal can be approached with the pattern of Mahdavi's universal government and its special features. Of course, these attributes Completely are dedicated to the Mahdavi's universal government, but Islamic governments, before they emerge, by pattern of that government, can -According to their efforts- achieve a certain degree of this attributes , and equally bring peace and security to their communities. Manuscript profile
      • Open Access Article

        49 - The aim of the present study is surveying the relationship between doing religious belief with sense of social security among the students of Arak university in 1394-95
        Abbas Ali  Shahidi
        The impact of the religious in the security of society, emphasis on the theoretical functions on this subject, inability of the police to create sense of security and control , especially on the young people and student are topics which have always been considered. Th More
        The impact of the religious in the security of society, emphasis on the theoretical functions on this subject, inability of the police to create sense of security and control , especially on the young people and student are topics which have always been considered. The aim of the present study is surveying the relationship between doing religious belief with sense of social security among the students of Arak university in 1394-95. Our method was descriptive-correlative. Our population was all of the bachelor student of arak university. Samples were estimated with the randomized random sampling , according to the Morgan and Kerjsi table. They are 366. The collecting tools was questionnaire about doing religious beliefs, sense of social security. Data analysis was performed on 366 subject, with use of multivariate correlation method and regression ( 85 students of arak university, 111 students from payame noor university, 50 students from faculty of medical sciences , 117 people from arak azad university). Our finding show that, there is positive relation between doing religious belief and sense of social security among students. Considering the subject that doing religious beliefs is a good predicator for sense of security, so; we can reinforce the belief among the students with offering the best solution. Doing the religious orders is one of the best way for sense of security among students. Manuscript profile
      • Open Access Article

        50 - Membership in social network son the level of identification and social security adolescents
        Abbas Ali  Shahidi
        Social networks are consequence of Internet and ICT applications. The study aimed to investigate the effect of membership in a social network virtual on the level of Identification and sense of security adolescents. The research was descriptive and causal- comparative. More
        Social networks are consequence of Internet and ICT applications. The study aimed to investigate the effect of membership in a social network virtual on the level of Identification and sense of security adolescents. The research was descriptive and causal- comparative. The population was consist of all boys and girls in the city of Arak that selected 200 people with using purposive sampling. To collect data was used Question naira sordid gentrification (ISI)and social security questionnaire .The data were analyzed with T- test and analysis of variance and using SPSS software. Result showed that between levels of identification and social security in the member sandman- members adolescents،there was no significant difference. Based on the findings of this study seem that membership in social networks alone do not explain the levels ofidenti ficationor social security Ado lessens and other factors such as family, school environment and educational environment and other condition straining and develop end processing the adolescents can influence the form at ion fid entity and sense of security of them. Manuscript profile
      • Open Access Article

        51 - Tawhid in the view points of Salafi Jihadi and studying it's consequences
        abbasali farzandi
        Although the Tawhid is the common belief among all the denominations and Islamic movements but Jihadi interpretation that is one of the active movements in the Islamic world, suggested especial interpretation from Tawhid and showed a different face of Islam. The ideolog More
        Although the Tawhid is the common belief among all the denominations and Islamic movements but Jihadi interpretation that is one of the active movements in the Islamic world, suggested especial interpretation from Tawhid and showed a different face of Islam. The ideology of Tawhid centered of this group is changing the unity and coexistence between Islamic society. This research by using the explanatory and analetical methods will study the definition of the Salafi leaders from the notion of Tawhid and evaluate it's consequences and results. The results of this research will show that Takfiri ideology of this group will start war and unsafety in the Islamic world and as a result in the world. It's security consequences will be enternal and external. The enternal consequences of Salafi Jihadi understanding of Tawhid are expansion of meaning and example of Shirk, Pure activitism and extremism, not following the rules of war and dictatorial faith. The external consequences are preaching suiciding, considering believers and disbelievers equal and not building Islamic civilization. Manuscript profile
      • Open Access Article

        52 - Information Security Maturity Assessment Model in the IT Departments of the Oil Industry Subsidiaries in Iran
        Reza Radfar Fatemeh akhavan
        The business approach and risk management framework of the company through the establishment and maintenance of the information security management system (ISMS) is a framework for identifying, assessing, controlling and managing the risks associated with information se More
        The business approach and risk management framework of the company through the establishment and maintenance of the information security management system (ISMS) is a framework for identifying, assessing, controlling and managing the risks associated with information security in the company. It is based on privacy standards, integrity and availability of information assets. In the present report, not only a model for evaluating the information security maturity in the headquarters of one of the oil industry companies is developed, but also the defect analysis and implementation of the existing organization are initially carried out in accordance with the requirements of ISO 27000. By defining the indicators of evaluation and measurement of these indicators in the organization, its maturity is estimated in this security standard. Different models are presented to identify the weaknesses and security powers of a particular organization. The goal is to identify a gap between theory and practice that can be approximated by the process-oriented approach. The puberty model introduced and used in this project, provides a starting point for implementing security, a public view of security, and a framework for prioritizing operations. This model of information security maturity has 5 phases. (The maturity model is information security as a tool for assessing the ability of organizations to meet security goals, that is, confidentiality, integrity and availability, and prevent attacks and access to the mission of the organization in spite of attacks and accidents)??. This model defines a process that has all aspects of security management, measurement, and control. The results of the evaluation show that the organizations which have security investments ahead of time have to understand the needs for high-level management of information security in the organization, and in addition to the actions taken in the field of physical environment, network and personal computers, controls access and encryption have been made to identify the necessary training and culture. Manuscript profile
      • Open Access Article

        53 - Dynamic Model for Evaluating Information Systems Security by System Dynamics Modeling
        Mohsen Shafiei Nikabadi Amir Hakaki Sara Gholamshahi
        In recent decades, information security has been a great importance for all organizations. However, to enhance information security in an organization, many projects have been failed due to lack of knowledge of risks and effective factors on information security. This p More
        In recent decades, information security has been a great importance for all organizations. However, to enhance information security in an organization, many projects have been failed due to lack of knowledge of risks and effective factors on information security. This paper aims to study effective factors on security of information systems. Data is collected through extensive literature review and open interview by 12 experts, which is chosen as the judgment of researchers purposefully. Causal model of studied risks was designed based on experts’ opinions, after identifying dimensions and risk factors. Subsequently, Dynamic model was plotted by VENSIM software using system dynamics approach. System dynamics modelling creates a better understanding of the system behavior and allows for the development of new structures and policies. In order to test the validation of research dynamic model, boundary condition was used. results indicate that presented model is validated. Moreover, to simulate by studied model, the data is collected from OFOGH consulting engineering company and run for a period of 12 months. As a result, among identified risks, the most important one relates to technical risk. Data risk, human risk and physical risk are in the next ranks respectively. In addition, environmental risk has the lowest importance. At the end, using security software, determining staff access levels, using uninterrupted Power Supply systems, Closed Camera Television (CCTV), and staff training courses are identified as four solutions to improve information systems security behavior. Manuscript profile
      • Open Access Article

        54 - Criteria of human ethical decision making of managers in conditions of environmental complexity (Case study, Social Security Organization)
        Mahnaz Sarafraz Kakhki Mohammadreza Zabihi Seyed Mahdi Alvani Mahmood Alborzi
        Undoubtedly, the most sensitive activity that managers do in any organization is decision making. But today's world is so complex and chaotic that decision-making struggles with so many problems. In complex environments, information changes rapidly and covers a wide ran More
        Undoubtedly, the most sensitive activity that managers do in any organization is decision making. But today's world is so complex and chaotic that decision-making struggles with so many problems. In complex environments, information changes rapidly and covers a wide range. The point to consider in decision making is that it is not always successful, that is, there is always the possibility of success or failure, many factors affect the ability to make decisions. In today's complex world, decision-making has become a challenge for managers. The number of decision criteria, the variety of criteria and types of quantitative and qualitative decision-making methods and the need to consider them simultaneously, the importance of the effects and consequences of the decision and factors such as it add to the complexity of decisions. Regarding the criteria of human moral decision-making, it should be mentioned that the method of decision-making in the Islamic system is contingent and participatory, and the basis in this system is the important principle of "passion". The mentioned cases are more prominent among the managers of service organizations who are faced with a large volume of clients and as a result of immediate and instantaneous decisions, because the decision-making time is very short for them and it is possible to examine a variety of options. It fades in the traditional way. One of these very sensitive and concerned organizations is the Social Security Organization. Therefore, in order to analyze the factors affecting decision making, the present study examines the decision and its characteristics, decision models. Then, with the help of content analysis, the indicators and characteristics of each decision model are extracted. Finally, with the help of a panel of experts consisting of thinkers and managers of the Social Security Organization, and then identify the various factors affecting decision-making in this organization and factors affecting decision-making in various decision-making models according to the environmental complexity of the organization. have became. Manuscript profile
      • Open Access Article

        55 - Iran's penal policy towards providing security for children in cyberspace
        Seyed Abbas Khalilpour Chalkiasari
        The astonishing advancement of information technology in the early years of the twenty-first century has brought about countless changes in the various fields and opened another door to the new world so that all human economic, social, political, cultural and scientific More
        The astonishing advancement of information technology in the early years of the twenty-first century has brought about countless changes in the various fields and opened another door to the new world so that all human economic, social, political, cultural and scientific activities are fundamentally changed. Law is also a branch of the humanities that regulates human relations in the context of collective life. It has developed laws to prevent children from unsecured entering the virtual world and legal measures to protect them. Adopting a distinct approach to the substantive criminal law of cybercrime can minimize harm to children and adolescents by prevention. In the meantime, questions and doubts have been raised about the limits of freedom of use of the Internet for children, the limits of free flow of information against child users, protection of child privacy in cyberspace and finally the role of legal regulations to protect this vulnerable group that easily can be exploited in this boundless world. In this research, through data collection tools and using library and internet resources with rational analysis of the content to study the legislative policy of criminal law on criminal security for children in cyberspace, in comparison with the iranian legal system and international documents, in order to better confront and prevent these crimes, the issues and problems and the strengths and weaknesses of the enacted laws are presented and suggestions and solutions for solving these problems are discussed. Manuscript profile
      • Open Access Article

        56 - The Relationship between mental Security, Social support and Resiliency With Post Traumatic Stress Disorder (PTSD) in the earthquake-affected adolescents In Sarapol-eZahab city
        پروانه شجاعی مهر khodamorad momeni جهانگیر کرمی
        The aim of the current study was to study the relationship between mental security, social support and resiliency with post tramatc stress disor. in the earthquake-affected adolescents In Sarapol-eZahab city. the population was the earthquake-affected adolescents in Sar More
        The aim of the current study was to study the relationship between mental security, social support and resiliency with post tramatc stress disor. in the earthquake-affected adolescents In Sarapol-eZahab city. the population was the earthquake-affected adolescents in Sarapol-eZahab city. Thus, 130 student at sarpol-e zahab city girls and boys high schools were chosen by available sampling and Targeted with research topice as a sample. The research method, was Descriptive of the type correlation and the study tools included mental security logbook (Aminpour (2007) Retrieved from Maslow (1973), social support scale Sherborne and Stewart (1991), Conor & Davidson resiliency Scale (2003) and revised scale The events impact of the Weiss and Marmer (1997). The Data Was analyzed by using pearson correlation coefficient And stepwise regression analysis. Results revealed that, between mental Security Whit post-traumatic stress disorder, between social support and ptsd and between resiliency with ptsd there was a negative relationship. Manuscript profile
      • Open Access Article

        57 - Structural Modeling Relationship between Social Security and Happiness with the Mediating Role of Psychological Capital: Case Study of Ahvaz City
        yaser garavand ali anbari asgar Atashafrooz
        The purpose of this article was to structural Modeling relationship between social security and happiness with the mediating role of psychological capital. The present research was applied in terms of its purpose and in terms of method was descriptive-correlational. The More
        The purpose of this article was to structural Modeling relationship between social security and happiness with the mediating role of psychological capital. The present research was applied in terms of its purpose and in terms of method was descriptive-correlational. The statistical population consisted of all people aged 15-65 years old in Ahwaz 4th district. Using Kerjesi and Morgan table, 404 people were selected by random cluster sampling. Research data were collected using Social Security, Psychological Capital and Happiness Questionnaires. Data analysis in this study was performed using structural equation modeling path analysis method. The results of the model's compilation phase show that fitting indicators of the model are appropriate. According to this model, the indirect relation of social security to social happiness was significant by means of psychological capital (β = 0.25) at the significance level of p <0.05.The results also showed that social security on social happiness (β = 0.46, p <0.01), psychological capital on social happiness (β = 0.32, p <0.05) and social security on psychological capital (P = 0.27, p <0.05) had a direct effect. In sum, social security through the influence of psychological capital as an influential mediator can affect social happiness, so the central role of social security and psychological capital must be at the center of attention of interventions and planning Related to increasing social happiness. Manuscript profile
      • Open Access Article

        58 - The Relationship between Mental Security, Social Support and Resiliency with Post Traumatic Stress Disorder (PTSD)
        Parvane Shojaeimehr Khodamorad Momeni Jahangir Karami
        The aim of the current study was to study the the relationship between mental security, social support and resiliency with post traumatic stress disorder. Thus, 130 students in Sarpol-e Zahab city who were at high schools were chosen using convenient sampling method More
        The aim of the current study was to study the the relationship between mental security, social support and resiliency with post traumatic stress disorder. Thus, 130 students in Sarpol-e Zahab city who were at high schools were chosen using convenient sampling method the sample was proportional to demographic share of each region. The research method, was descriptive and correlation, and the scales included were Mental Security Logbook (Aminpour-retrieved from Maslow, Social Support Scale Sherborne and Stewart, Conor & Davidson Resiliency Scale and revised scale The Events Impact of the Weiss and Marmer. The data was analyzed using pearson correlation coefficient and multiple regression analysis. Results revealed that, there was a negative relationship between mental security with post-traumatic stress disorder, between social support and ptsd, and between resiliency with ptsd. Manuscript profile
      • Open Access Article

        59 - Structural Modeling Relationship between Social Security and Happiness with the Mediating Role of Psychological Capital: Case Study of Ahvaz City
        yaser garavand Askar Atashafrooz Ali Anbari
        The purpose of this article was using structural equation modeling to explore the relationship between social security and happiness with the mediating role of psychological capital. The method of the present research was descriptive-correlational. The statistical popu More
        The purpose of this article was using structural equation modeling to explore the relationship between social security and happiness with the mediating role of psychological capital. The method of the present research was descriptive-correlational. The statistical population consisted of all 15-65 year-old people in Ahwaz, 4th district. Using Kerjesi and Morgan table, 404 people were selected by random cluster sampling. Research data were collected using Social Security, Psychological Capital and Oxford Happiness Questionnaires. Data analysis in this study was performed using structural equation modeling path analysis method. The results of the model’s compilation phase showed that fitting indicators of the model are appropriate. According to this model, the indirect effect of social security on social happiness was significant by means of psychological capital (β = 0.25) at the significance level of p <0.05.The results also showed that social security on social happiness (β = 0.46, p <0.01), psychological capital on social happiness (β = 0.32, p <0.05) and social security on psychological capital (p = 0.27, p <0.05) had a direct effect. In sum, the results showed that social security through the influence of psychological capital, as an influential mediator, can affect social happiness. Manuscript profile
      • Open Access Article

        60 - Anthropological Principles of Hobbes and Spinoza on Government (A Historical Overview)
        Bayan Karimy Seyyed Mustafa  Shahraeini
        Hobbes and Spinoza are among the philosophers who believe in the necessity of dealing with political philosophy. They maintain that their political philosophies are systematically related to metaphysics and the anthropology that originates in it. In this regard, their v More
        Hobbes and Spinoza are among the philosophers who believe in the necessity of dealing with political philosophy. They maintain that their political philosophies are systematically related to metaphysics and the anthropology that originates in it. In this regard, their views are clearly different from those of their predecessors and even from those of Descartes, who is almost contemporary with them. Spinoza has been influenced by Hobbes in some respects; however, because of the differences between the logic and general philosophy of each of them, there are some noteworthy differences between these two philosophers’ anthropological interpretations and the functions of their political philosophy. The main purpose of the present paper is to highlight the historical background of political philosophy in ancient Greece, particularly during the Middle Ages. While challenging this historical background, it also aims to discover the explicit and implicit metaphysical and anthropological principles and assumptions underlying the views of Hobbes and Spinoza regarding a desirable government and report the differences and similarities between them. The authors intend to demonstrate that Spinoza’s political philosophy is based on ethics and reason. The distinctive feature of his philosophy is its love of human beings and reason. On the other hand, Hobbes’ political philosophy is based on the senses, and its distinctive feature is having a pessimistic view of human beings and presenting a material interpretation of their nature. Accordingly, the principle of preserving the essence in Hobbes’ view is limited to preserving the body, and a superior government means absolute monarchy, the sole purpose of which is protecting the lives of its citizens and establishing security in society. Nevertheless, in Spinoza’s view, protecting the essence is beyond the protection of the body and extends to reason, perhaps even more than the body, because human essence mainly depends on their reason rather than their body. Hence a superior government in Spinoza’s view is of a democratic nature. He also emphasizes the role of government in promoting the human culture and the necessity of educational and ethical policy-making. Manuscript profile
      • Open Access Article

        61 - Model Designing of Total Softpower Policy the Islamic Republic of Iran
        Mohammad Taqi  Amini Mohammad MahmoodiMeymand MohamadMehdi Parhizgar محمد رضا  مشایخ
        Policy making is a word which usually accompanies by government content. Government strategy in defending area and government plan for security is named security policy making. The goal of policy making is to accelerate or decelerate a changing movement in a part, ther More
        Policy making is a word which usually accompanies by government content. Government strategy in defending area and government plan for security is named security policy making. The goal of policy making is to accelerate or decelerate a changing movement in a part, therefore; policy makings make changes inevitably which should be managed. The mission of the present research is to design a major policy making for soft power (soft warfare) to reach national soft security. According to Joseph Nai, to face soft warfare holding soft power to obtain national soft security should consist of three main criteria; 1. Cultural attraction, 2. Internal political ideals, 3. Foreign policies of a state to own the capability of gaining “ideality” of internal system and foreign societies through attraction and not force or bribing. Vikers (2008) classifies the main elements of a soft power into; 1. Psychological, 2. Social, 3. Political, 4. Cultural, and 5. Scientific elements. According to Imam Khomeini, as he mentioned in his spiritual -political last will, fundamental criteria of soft power are as follows: 1. Cultural, spiritual, social, 2. Science and industry, 3. Economic, 4. Political and military. These criteria in soft power frame, based on the opinions of Imam Khameneyee, are also determined in four groups: 1. Cultural, 2. Scientific-Technologic, 3. Unity and National Identity, political steadiness, 4. Economic and defending. Islamic Republic of Iran Constitution stresses on four powers of; 1. Cultural, 2. Social, 3. Political (domestic& foreign), 4. Economic, to create a soft power and deems them as the main principle for the state development. In the proposed four-dimensional model of this paper, the main criteria for structure of resource of soft power regarding to providing soft security and preventing soft war, includes: Cultural- Social, 2. Scientific-Technological, 3. Political (domestic & foreign), 4. Economic. The following actions have been performed to examine the proposed model: Considering the four resources of soft power and their priority comparing with each other through Delphi and AHP methods Considering the parameters of four resources of soft power and national soft security as well as their priority and abbreviating them through Delphi and AHP methods Measuring the relation of evaluated parameters with indices of national soft security through AHP The relation of permanence and validity and accuracy of answers by Pierson impetus indices Findings of the study reveal that: 1. The main priority of soft power resources is cultural-social soft power, which gained the most marks. 2. The second priority of soft power resources is scientific-technological soft power, which is deemed as the second resource to provide soft power. 3. The third resource in the measurements is political (domestic & foreign) resource. 4. The weakest resource in soft power resources is economic resource. Ideal Model: 3. One-dimensional model “Cultural-Social” 4. The cultural-social resource is the one-dimensional producer of soft power for national soft security which can provide a short-term effect solely. 5. Two-Dimensional model “Cultural-Social” & “Scientific-Technologic” 6. This model enjoys a more strength and effect on production of national soft security. 7. Three-Dimensional model “Cultural-Social” & “Scientific-Technologic”& “Political (domestic & foreign)” 1. Four-Dimensional model “Cultural-Social” & “Scientific-Technologic”& “Political (domestic & foreign)” & “Economic” 2. This model is complete and comprehensive for policy making of effective resources to remove threats and soft war and develops national soft power and makes use of the highest capacities of existing state soft power. Finally, after conclusion, some proposals have been offered to organization, researchers, thinkers and scientists to continue the way. Manuscript profile
      • Open Access Article

        62 - Design Evaluation System of Human Resources in the Social Security Fund of Semnan by using Fuzzy Data Envelopment Analysis
        Abolfazi Danaei Seyedeh Nazereh Seif Hashemi
        According to strategic importance of performance assessment, today a few limited numbers of organizations are going to guarantee the improvements of their personnel’s performance through an appropriate evaluation of their staff. For this purpose, the current research wa More
        According to strategic importance of performance assessment, today a few limited numbers of organizations are going to guarantee the improvements of their personnel’s performance through an appropriate evaluation of their staff. For this purpose, the current research was done in social security fund of Semnan province. This research has followed a descriptive goal (based on a case study) with a comparative logic through a limited applicable process which is considered to be as the most crucial selected method in order to extract the information of documents and the organization. Receipt, tables and diagrams are referred to as the most important tools applied in this paper. The fuzzy data envelopment analysis was selected as the most appropriate method for analyzing the data based on the studies done. The results in this research indicate that the current traditional systems of assessment in the social security fund of Semnan province does not have enough efficiency and it does not have any effect on the increase of willingness and tendency of the staff. Therefore, a new system of assessment which was compiled on the basis of the fuzzy data envelopment analysis was represented to substitute the traditional system. This model had some strong points such as the personnel assessment without the manager`s verdict, having the ability to perform under the circumstance of uncertainly, the probable presence of an ideal virtual unit, and the evaluation of personnel based on the predetermined objects. There is a hope to see this part of the health services management to become more represented in the future by the conduction of the suggested assessment system in the research society. Manuscript profile
      • Open Access Article

        63 - Developing Indicators for assessing The Status of Iran’s Natural Gas Export Using Energy Demand Security Approach
        Hadi Sahebi pourya souri
        Iran is the second-largest proved natural gas reserve holder in the world, behind Russia and holds 17% of the world's proved natural gas reserves and more than one-third of OPEC's reserves. Iran is also among the five major producers of natural gas in the world. Accordi More
        Iran is the second-largest proved natural gas reserve holder in the world, behind Russia and holds 17% of the world's proved natural gas reserves and more than one-third of OPEC's reserves. Iran is also among the five major producers of natural gas in the world. According to rich reserves of natural gas, high success rate of natural gas exploration, and increasing growth of fossil fuel demand in highly import dependent countries like China, India, European Union, and Turkey all of which are potential markets for Iran natural gas export, there is a promising outlook for natural gas export of Iran and growth of resultant revenue in upcoming years. but due to Iran special geopolitical position, being enclosed by two strategic resources of natural gas and crude oil, i.e. Caspian Sea and Persian Gulf, and terrorist attacks and other unrests in Middle East, Central Asia, and Caucasus, securing energy demand and increasing the volume of Iran natural gas export has turned into a critical issue. In this research, after investigating Iran’s natural gas production, reserves, and export markets, seven quantitative indicators have developed according to political, economic, and infrastructural dimensions to assess Iran’s natural gas export whether in the form of LNG or via the pipeline. Policymakers of the energy economics field can analyze Iran’s current and potential gas export markets in recent years or in the upcoming years under different scenarios by using indicators introduced in this research and collecting the required data so that they can adopt appropriate policies for enhancing the energy export demand security of Iran particularly natural gas. Manuscript profile
      • Open Access Article

        64 - Examining solutions to deal with the shortage of cyberspace security experts in the country
        Mohammad fathian Mehdi Abolhamid mohammadreza rafeei
        Expert workforce is one of the most important IT security assets that private and public sectors around the world are currently competing for. According to specialists, Iran is also facing the shortage of cyber security experts, which can lead to potentially serious pro More
        Expert workforce is one of the most important IT security assets that private and public sectors around the world are currently competing for. According to specialists, Iran is also facing the shortage of cyber security experts, which can lead to potentially serious problem. This study presents some solutions for this problem in Iran. In order to identify the solutions, literature was reviewed and semi-structured interviews were conducted through related various experts and specialists. Finally, strategies were prioritized by fuzzy analytic hierarchy process and solutions are investigated by importance-performance analysis. According to the results, specialists believe that workforce maintaining and training improvement are more important than other strategies. Training-recruitment plans, aptitude assessment plans, cyber security events and challenges, schools student targeted plans and improving policies and rules have been considered as more important solutions. Manuscript profile
      • Open Access Article

        65 - Compilation of structural model, dimensions of organizational performance, opportunities, threats, weakness and strength, social security organization
        ommolbanin gilan bagher sarokhani seyedmohamad seyedmirzaei
        The Social Security Administration, as the largest provider of social security in the country, is constantly interacting with the internal and external environment. Therefore, understanding this process leads to a kind of programming based on a realistic view of the dim More
        The Social Security Administration, as the largest provider of social security in the country, is constantly interacting with the internal and external environment. Therefore, understanding this process leads to a kind of programming based on a realistic view of the dimensions of organizational performance. The purpose of the present study is to provide a structural model of organizational performance dimensions based on environmental changes and opportunities, threats and weaknesses in the organization. This research is based on data type, quantitative and purpose, applied research and method, descriptive correlation and specifically structural equation model. The statistical population of the present study are experts of the Social Security Organization with 13 people and the employees were selected according to the 9 variables observed in the model. Allocation of coefficient 30 with more than 300 estimates in a simple random method was done with equal chance. SPSS software analysis methods and statistical tools have been used to analyze the research data. The results show that the paths of opportunities, strengths, weaknesses and threats have a significant and direct effect on organizational performance and also the values obtained from the coefficient of determination indicate a significant level of effect, which has the greatest effect on strengths and the least effect. Manuscript profile
      • Open Access Article

        66 - Investigating the Factors Affecting the Performance Evaluation of Social Security Brokers in Isfahan Province
        seyedhamid Ghoreishi seyedalireza ebrahimi
        Abstract Background: Any organization needs to be evaluated for awareness of the desirability and quality of its activities, especially in complex and dynamic environments. On the other hand, the lack of a system of evaluation and control in a system means that it isn' More
        Abstract Background: Any organization needs to be evaluated for awareness of the desirability and quality of its activities, especially in complex and dynamic environments. On the other hand, the lack of a system of evaluation and control in a system means that it isn't communicating with the inner and outer environment, which implies that is aged and ultimately the death of the organization. In this regard, the present study was conducted with the aim of designing a performance evaluation model for social security agencies in Isfahan province. The purpose of this research is application and developmental type. Methodology: The population of the present study consisted of all experts and experts in the field of social security, managers, staff and clients of social security agencies of Isfahan province, which reported about 10,300 people in 1398. The research sample was determined using the Morgan table of 373 individuals. Data were gathered by field method and a researcher-made questionnaire was used for data collection. SmartPLS software was used for data analysis and analysis. Results:The findings showed that customers'viewpoint had a significant effect on the evaluation of the overall performance of the brokerage (t=2.291,p<0.01). Also, the effect of headline managers'view on evaluating the overall performance of the brokerage firm (t=1.988,p<0.05) is significant. However, the effect of employee's view on performance evaluation (t=0.242) wasn't significant. Conclusion: According to the results of the research, it can be said that in evaluating the performance of the organization, in addition to employees and management, customers have a significant role. Manuscript profile
      • Open Access Article

        67 - Investigation the role of personality and individual differences on password security breaches: An Empirical Study
        زهرا کریمی manije kaveh rezvan salehi milad moltaji
        The individual differences of Information Technology users influence on the selection and maintenance of passwords. To fill this gap, this paper, studies the relationships between gender, personality, education level and field of study in one direction and password secu More
        The individual differences of Information Technology users influence on the selection and maintenance of passwords. To fill this gap, this paper, studies the relationships between gender, personality, education level and field of study in one direction and password security in another direction. The method was descriptive and correlational. A sample selected by Convenience sampling, answered the NEO Five-Factor Model, biographical and password security behavior questionnaires. The data of 529 accepted questionnaires were analyzed using Pearson, T-Test, anova and regression the results showed that male users select stronger passwords compared to female users. The users in mathematical science, computer science, and also accounting, breached password security more often in comparison with users in other majors. Neuroticism has positive relationship, Openness-to-Experience and Agreeableness has negative relationships and Conscientiousness has a dual relationship with password security breach. These findings contribute to cybersecurity, especially in Iran, by considering individual differences in security behaviors and perceptions. Manuscript profile
      • Open Access Article

        68 - Nastaliq CAPTCHA
        M. H. Shirali-Shahreza Mohammad Shirali-Shahreza
        Nowadays, many daily human activities such as education, trade, talks, etc are done by using the Internet. In such things as registration on Internet web sites, hackers write programs to make automatic false registration that waste the resources of the web sites while i More
        Nowadays, many daily human activities such as education, trade, talks, etc are done by using the Internet. In such things as registration on Internet web sites, hackers write programs to make automatic false registration that waste the resources of the web sites while it may also stop it from functioning. Therefore, human users should be distinguished from computer programs. To this end, this paper presents a method for distinction of Persian and Arabic-language users from computer programs based on Persian and Arabic texts using Nastaliq font. In this method, the image of a Persian or Arabic word written in Nastaliq font is chosen from a dictionary, and it is shown to the user, then he is asked to type it. Considering that the presently available Persian and Arabic OCR programs cannot identify these words, the word can be identified only by a Persian or Arabic-language user. The proposed method has been implemented by the Java language. Manuscript profile
      • Open Access Article

        69 - Risk-based Static and Dynamics Security Assessment and Its Enhancement with Particle Swarm Optimization Generation Realloca
        M.  Saeedi H. Seifi
        Security assessment is traditionally checked using a deterministic criterion. Based on that, the system may be considered as secured or unsecured. If an unsecured condition is detected, preventive actions are foreseen to make it secure. Recently, risk based security as More
        Security assessment is traditionally checked using a deterministic criterion. Based on that, the system may be considered as secured or unsecured. If an unsecured condition is detected, preventive actions are foreseen to make it secure. Recently, risk based security assessment is used in power systems. In this paper, risk-based static and dynamic security assessment is proposed and a new transient stability index is defined. In this paper, the risk index is used as an objective function in the generation reallocation algorithm. In this algorithm, the security is maintained using the generation reallocation. The algorithm is tested on IEEE 24-bus test system and its capabilities are assessed in comparison with a traditional OPF, in which the security is maintained based on a deterministic criterion. Particle Swarm Optimization (PSO) algorithm is used as the optimization tool. Manuscript profile
      • Open Access Article

        70 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance
        S. R. Chogan M. Fathy M. Ramezani
        Voice communications through internet uses VOIP which includes several protocols while its secrecy is very important issue. SIP is the most important signaling protocol whose attack detection may help system immunization. This paper is dedicated to the issue of SIP regi More
        Voice communications through internet uses VOIP which includes several protocols while its secrecy is very important issue. SIP is the most important signaling protocol whose attack detection may help system immunization. This paper is dedicated to the issue of SIP registration flood attacks. Attackers can send registration signals which have several dangers for registration server. In this paper, SIP register flood attacks is investigated by details and the effects of attack over registration server is illustrated. Finally, the effects of attack, regarding the ratios compared with a regular situation of the network, are evaluated in experiments done in a real network. Moreover, instead of Hellinger distance, Kullback–Leibler distance is used for register flood attacks detection and corresponding ROC curves show this approach has better performance. Manuscript profile
      • Open Access Article

        71 - Throughput Optimization in a Broadcast Network Using Adaptive Modulation, Coding and Transmit Power Provisioning Security Constraint
        M. Taki
        A new transmission scheme is presented to improve utilization of resource in a broadcast network provisioning physical layer security. In the designed scheme, data of each user is only detectable at its corresponding receiver with a proper bit error rate (BER), while de More
        A new transmission scheme is presented to improve utilization of resource in a broadcast network provisioning physical layer security. In the designed scheme, data of each user is only detectable at its corresponding receiver with a proper bit error rate (BER), while detection BER at other unintended receivers is high enough for improper detection. Adaptive modulation, coding and transmit power is utilized based on the SNRs. Exact and approximate solutions for the formulated problem are presented where approximate solution has acceptable complexity and leads to the comparable results with the exact solution. Numerical evaluations show that a performance degradation is seen at the cost of providing security. Manuscript profile
      • Open Access Article

        72 - Economic Load Dispatch in Power Plants, Taking into Account Environmental Pollutants and System Security Indices Using Multi-Objective Harmony Search Algorithm
        H. Sharifi محمود اوکاتی صادق
        Public sensitivity to environmental issues in the economic dispatch is also impressive. In this case it is necessary to consider the costs of pollution in the economic dispatch. Before the introduction of the concept of power system security, the subject of economic loa More
        Public sensitivity to environmental issues in the economic dispatch is also impressive. In this case it is necessary to consider the costs of pollution in the economic dispatch. Before the introduction of the concept of power system security, the subject of economic load dispatch normally focused on economic aspects rather than security of the system. Today, with the expansion of the power grid and system load, combination of stability and economic load dispatch indices has become a critical necessity. This article will consider the issue of solving the economic dispatch of power plants considering the emissions and security indices of the network. Using penalty functions, system security indices are added to the objective function of economic load dispatch problem. Since fuel costs and emission reduction targets are relatively contrasting, problem solving of economic load dispatch and emission reduction leads to a multi-objective optimization problem. Given the complexity of objective functions and necessity of the considering the practical constrains of power plants operation and security indices reveal more than ever the need to use efficient methods to optimize. In this article Multi Objective Harmony Search algorithm (MOHS) has been used to solve the problem. The results show that MOHS algorithm is excellent for convergence and accuracy compared to other employed methods. The proposed testing system used to solve the problem is IEEE test system with 10 power generation units, 39 bus and 46 transmission line. Manuscript profile
      • Open Access Article

        73 - An On-Chip Detection Mechanism to Detect Scan-Based Attack in Crypto-Chips
        F. Jamali Zavareh H. Beitollahi
        Since the advent of cryptographic chips, the side channel attacks have become a serious threat to cryptographic algorithms and security systems. The side channel attacks use weaknesses in the chip implementation instead of using the computational weaknesses of the algor More
        Since the advent of cryptographic chips, the side channel attacks have become a serious threat to cryptographic algorithms and security systems. The side channel attacks use weaknesses in the chip implementation instead of using the computational weaknesses of the algorithms. The scan chain that is widely used in the chip test is one of these side channels. To avoid an attack using a scan chain, one can remove the scan chain after the construction test, but this method makes it impossible to test the post-construction and updating the circuit. Therefore, in addition to preserving the testability of the scan chain, it is necessary to look for a method to prevent the side channel attacks. In this article, a method is proposed to identify the attacker and prevent his scan-based attacks. In this way, by the user authorization, the corresponding output will be generated and the attacker's access to sensitive information is prevented. The proposed method, with an area overhead of less than 1%, power overhead around 1% and a negligible delay overhead retains testability and can prevent differential and signature-based scan attacks better than previous state-of-the-art techniques. Manuscript profile
      • Open Access Article

        74 - Energy Efficiency in Secrecy Multi-Antenna Two-Way Relay Networks
        F. B. soroush akhlaghi
        paper investigates the energy-efficiency in secrecy two-way relay networks. It is assumed that in the presence of several multi-antenna amplify-and-forward relays and a single eavesdropper, two single-antenna users exchange their confidential messages during two hops. I More
        paper investigates the energy-efficiency in secrecy two-way relay networks. It is assumed that in the presence of several multi-antenna amplify-and-forward relays and a single eavesdropper, two single-antenna users exchange their confidential messages during two hops. In the first hop, both users send their messages to the relay nodes and during the second hop, the relays send the received signal to the users by using the beamforming matrix, to minimize the received information by the eavesdropper .In this way, using two beamforming strategies, named as Null-Space Beamforming (NSBF) and Information Leakage Alignment Beamforming (ILABF), the secrecy energy efficiency that is the ratio of total secrecy sum-rate to the total power consumption of the network is calculated. It is shown that the aforementioned problem is non-convex so it will be converted to the convex form, using the Semi-Definite Relaxation (SDR). This problem has not closed-form and is solved using the interior point method.In numerical results, it is observed that by using the information leakage alignment beamforming (ILABF) method, energy efficiency is allocated more value than the null-space beamforming (NSBF) approach that was used in previous studies. Manuscript profile
      • Open Access Article

        75 - A Patient Identification and Authentication Protocol to Increase Security
        Afsaneh Sharafi Sepideh Adabi Ali Movaghar Salah Al-Majed
        Today, with the ever-expanding IoT, information technology has led the physical world to interact more with stimuli, sensors, and devices. The result of this interaction is communication "anytime, anywhere" in the real world. A research gap that can be felt in addition More
        Today, with the ever-expanding IoT, information technology has led the physical world to interact more with stimuli, sensors, and devices. The result of this interaction is communication "anytime, anywhere" in the real world. A research gap that can be felt in addition to providing a multi-layered and highly secure protocol (a protocol that simultaneously performs authentication) and at the same time has a low computational burden. Therefore, in the field of health and treatment and for the purpose of remote monitoring of patients with physical and mental disabilities (such as patients with cerebral palsy and spinal cord amputation) there is an urgent need for a very safe protocol. The protocol we propose in this study is a two-layer protocol called "Identification-Authentication" which is based on EEG and fingerprint. Also, our authentication step is the modified Diffie-Hellman algorithm. This algorithm needs to be modified due to a security problem (the presence of a third person) that the proposed method is able to authenticate the patient with very high accuracy and high speed by receiving the patient's fingerprint and EEG signal. The proposed protocol was evaluated using data from 40 patients with spinal cord injury. The implementation results show more security of this protocol, Validity of the proposed protocol is checked and the processing time of authentication stage is decrease to 0.0215 seconds. Manuscript profile
      • Open Access Article

        76 - Designing an Individual Human Resources Development Plan and Elaboration of its Role in the Organizational Performance (Case Study: Social Security Organization, Tehran Branch)
        Naeimeh Tazakori Mohammad  Feizi Mohammad Rouhi Eisalou Eshagh  Rasouli
        The study is of the basic-applied research type that uses a combined exploratory research method. The study population is comprised of 16 human resources development experts and social security organization’s managers in the qualitative section and 351 staff members wor More
        The study is of the basic-applied research type that uses a combined exploratory research method. The study population is comprised of 16 human resources development experts and social security organization’s managers in the qualitative section and 351 staff members working in social security organization as the study sample volume in the quantitative section. Purposive sampling was the method of choice in the qualitative section and simple randomized sampling was utilized in the quantitative part. The data collection instrument was semi-structured interviews in the qualitative section and Heresy and Goldsmith’s organizational performance questionnaire and a researcher-constructed human resources development questionnaire in the quantitative section. To analyze the data in the qualitative section, use was made of NVivo11 in the qualitative section and SPSS19 was employed in the quantitative section. The data analysis method included a qualitative grounded theory method (open, pivotal and selective coding) and Pearson correlation and simultaneous regression in the quantitative section. The study results resulted in the formation of an individual HR development pattern in the qualitative section for Tehran’s social security organization; in the quantitative section, the effect of the pattern on the organizational performance was investigated and the results signified the positive effect of the individual HR development on the organizational performance. The present study’s findings can offer applied and operational implications in line with individual HR development and organizational performance improvement in social security organization. Manuscript profile
      • Open Access Article

        77 - Identifying the Dimensions and Components of Training Based on Lean Thinking in Social Security Organization
        Fatemeh Manoochehri Parivash Jaafari Nadergholi Ghorchian Amir Hosein Mohammad Davoudi
        The purpose of this study was to identify the dimensions and components of training based on lean thinking in social security organization. This research is applied in terms of purpose and in terms of collecting data, descriptive-survey method. The statistical populatio More
        The purpose of this study was to identify the dimensions and components of training based on lean thinking in social security organization. This research is applied in terms of purpose and in terms of collecting data, descriptive-survey method. The statistical population of the study consisted of managers, deputies, heads and educational experts in the headquarters and executive staff, and educational supervisors of the hospitals affiliated to the Social Security Organization (420 people). The sample size was 200 people according to Cochran formula and were selected by simple random sampling method. In order to collect information, a researcher-made questionnaire was used including 17 components and 126 items. The face validity of the questionnaire was verified through pilot implementation, content validity through comprehensive review of literature and expert judgment, and construct validity was confirmed by factor analysis and its reliability was estimated by calculating the Cronbach's alpha coefficient of 0.97. In order to analyze the data, descriptive statistics (frequency tables, mean, variance, standard deviation) and inferential statistics (Kolmogorov-Smirnov test and exploratory and confirmatory factor analysis) were used. The results of data analysis at the level of 0.01, 17 dimensions, and 117 components as dimensions and components of pure education in the social security organization showed that the overall effect of these dimensions was 63.73% and dimension of value stream (identification of waste and value-creating activities) had the highest share (84.52) and dimension of human resources management had the lowest share (0.48). Therefore, in order to eliminate education in the social security organization, it is necessary to identify the losses and create valuable activities. Manuscript profile
      • Open Access Article

        78 - Validation of the Cultural Security Model in Knowledge-Based Sustainable Development
        Saeide Zare ramezan jahanian mahtab salimi
        This research validates the model of cultural security in sustainable knowledge-based development. The research method is applied in terms of purpose and descriptive-survey in terms of data collection method and mixed (quantitative-qualitative) in terms of the type of d More
        This research validates the model of cultural security in sustainable knowledge-based development. The research method is applied in terms of purpose and descriptive-survey in terms of data collection method and mixed (quantitative-qualitative) in terms of the type of data. The statistical population in the qualitative section (interview section) comprised 15 experts and specialists familiar with cultural and scientific issues in the Ministry of Science, Research and Technology, who were selected by purposive sampling. The statistical population in the quantitative part included 551 experts and managers of the Ministry of Science, Research and Technology in 2019-20, from among whom, some 226 persons were selected by stratified random sampling. Both library research and field observation methods were employed for data collection. In the field observation method, in order to collect the qualitative part, interviews were conducted with a number of mangers enaged in cultural affairs, and in the quantitative part, the data was collected through a researcher-made questionnaire. The reliability of this questionnaire was estimated based on 0.86 Cronbach's alpha coefficient. Confirmatory factor analysis was used in relation to the validity of the obtained indices and also a questionnaire was designed to assess the validity of the model, which measured the dimensions of the final model using a single sample t-test. The results showed that the model was valid and the model of cultural security in the knowledge-based sustainable development gained the required validity with cultural, economic, social, environmental, political as well as national and religious factors. Manuscript profile
      • Open Access Article

        79 - Designing a Model for Empowering the Social Security Organization Employees based on the Teachings of Nahjul Balagha
        Ali Akbar  Esmaeilzadeh Seyed Ali Akbar  Ahmadi Hamed  FazliKebria
        The aim of this study was to present a model of empowerment of employees of the Social Security Organization based on the teachings of Nahj al-Balagheh. On this basis, first, using the documentary analysis approach of Nahj al-Balaghah, Dashti translation, which includes More
        The aim of this study was to present a model of empowerment of employees of the Social Security Organization based on the teachings of Nahj al-Balagheh. On this basis, first, using the documentary analysis approach of Nahj al-Balaghah, Dashti translation, which includes 625 pages, 241 sermons, 79 letters ,and 480 wisdoms, was analyzed and the items that were in line with the intended themes were extracted. Then, the indices were selected from the extracted themes and the components were selected from the indices. The analysis performed in this study was inductive qualitative content analysis. The extracted themes were then presented to the experts using the Delphi technique. After Delphi approval, the model was designed. To validate the designed model, the model was developed in the form of a suitable questionnaire and the questionnaire was provided to 281 employees of the Social Security Organization of Chaharmahal and Bakhtiari province. The results were analyzed based on the structural equation model. Therefore, according to factor analysis, 8 factors and 45 items were extracted, which include: factor 1: independence (including 4 items); factor 2: responsibility (including 6 articles); factor 3: self-control (including 8 items); factor 4: self-esteem (including 6 items); factor 5: building trust (including 4 articles); factor 6: Modeling (including 5 items); factor 7: knowledge enhancement (including 6 items) ,and factor 8: work discipline (includes 6 items). Finally the results of path analysis using PLS Smart software indicate the structural fit of the model. Manuscript profile
      • Open Access Article

        80 - Identification of Organizational Capital and Its Evaluation in Covid-19 Conditions
        hajieh rajabi farjad
        The aim of the study was to identify organizational capital in the General Department of Documents and Property Registration in Khuzestan province and to evaluate it during the COVID-19 pandemic. The approach of this research is mixed (qualitative-quantitative) and appl More
        The aim of the study was to identify organizational capital in the General Department of Documents and Property Registration in Khuzestan province and to evaluate it during the COVID-19 pandemic. The approach of this research is mixed (qualitative-quantitative) and applied. The statistical universe of the research in the qualitative part included 15 experts from the General Department of Documents and Property Registration in Khuzestan province, who were selected in a non-random and purposeful way. The statistical universe in the quantitative section consisted of 153 employees of this department, who were selected based on the Cochran formula and a relative stratified random method according to the table. The instrument for data collection in the qualitative part was interviews, and in the quantitative part, a questionnaire, whose validity and reliability were checked and confirmed. The information obtained in the qualitative section was analyzed using thematic analysis, and in the quantitative section using structural equation modeling with Max Kuda and Smart PLS software. The results showed that organizational culture, knowledge management, systems and processes of management, organizational structure, financial management, research and development, intra-organizational interactions, perceived job security, and physical capital were identified as organizational capitals. On the other hand, the results of the T-test showed that the categories of job security, physical capital, internal interactions, and management processes have not been properly considered. Although the averages of other components were somewhat better, the overall situation is not suitable for the General Department of Documents and Property Registration in Khuzestan province. Manuscript profile
      • Open Access Article

        81 - Social justice and its role in social security from the perspective of the Qur'an and Islamic traditions
        Mohsen Ghafoury pour seed hamid shamerizi Kamal  Khajehpour
        One of the sublime goals that human beings have always sought to achieve for centuries; Social justice and benefiting from the results of its realization. According to the Qur'an, the establishment and implementation of justice in society is one of the most important du More
        One of the sublime goals that human beings have always sought to achieve for centuries; Social justice and benefiting from the results of its realization. According to the Qur'an, the establishment and implementation of justice in society is one of the most important duties of the divine prophets; Therefore, Islam as the most perfect divine religion and at the top of it, the holy existence of the Holy Prophet (PBUH) and the Imams of the Infallibles (PBUH) as divine reformers have paid special attention to this natural principle and have explained it. Security, with all its dimensions and contexts, is one of the necessities of human individual and social life, and its absence is a great vacuum and a common chapter of many human problems in life; Therefore, it is necessary to study and explain these two categories and the relationship between them. In the present article, which has been done in a library method and in a descriptive-analytical method, while explaining the nature of social justice, its role in the security of Islamic society and in both social and economic dimensions from the perspective of the Qur'an and hadiths has been studied. Manuscript profile
      • Open Access Article

        82 - Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images
        Mohammad Soltani Hassan Shakeri Mahboobeh Houshmand
        With the development of telecommunication and communication technologies, especially wireless communications, information cryptography is one of the communication necessities. Today, cryptographic algorithms are used to increase security and prevent DICOM medical images More
        With the development of telecommunication and communication technologies, especially wireless communications, information cryptography is one of the communication necessities. Today, cryptographic algorithms are used to increase security and prevent DICOM medical images from unauthorized access. It should be noted that changes in DICOM medical images will cause the doctor to misdiagnose the patient's treatment process. In this paper, a type of hybrid cryptographic algorithms is designed. In the proposed algorithm, DNA encryption algorithm is used to encrypt DICOM images and patient biometric information such as fingerprint or iris image is used to make digital signature and validate DICOM medical images. The designed encryption algorithm is resistant to brute force attacks and the entropy of the encrypted DICOM images is above 7.99. Manuscript profile
      • Open Access Article

        83 - Designing a model based on blockchain technology to strengthen cyber security in the banking industry
        hossein amoozadkhalili neda haghi Reza Tavakkoli-Moghaddam
        Designing a model based on blockchain technology to strengthen cyber security in the banking industry is one of the new methods studied in the banking industry to strengthen cyber security. Accordingly, this study seeks to achieve the goal of evaluating a model based on More
        Designing a model based on blockchain technology to strengthen cyber security in the banking industry is one of the new methods studied in the banking industry to strengthen cyber security. Accordingly, this study seeks to achieve the goal of evaluating a model based on blockchain technology to strengthen cyber security in the banking industry based on artificial neural networks. This model is based on a conceptual model used in an MLP neural network simulation that simulates a blockchain-like process. Also, the neural networks created in the block chain have a strong connection and the possibility of breaking them is low. The data became closer to normal distribution after learning, indicating that blockchain technology will be able to provide cyber security. The level of correlation and efficiency presented was also reported and the findings of the study showed that the efficiency related to blockchain technologies after learning reached the level of 770.57 units, which shows that using the MLP method to learn the process of blockchain technology can be Lead to greater efficiency for cyber security. Also, the value of variance is equal to 27.77 and the mean value of computational values is equal to 0.35 and the value of correlation is equal to 0.99. Manuscript profile
      • Open Access Article

        84 - A dairy Products Green Supply Chain model with Emphasis on Customer Satisfaction: Combining Interpretive Structural Modeling Approach and Analytical Network Process
        heydar Safari rashid Zolfaghari Zafarani Mohsen  Mohammadian Saravi
        Changing the energy-based economy to a knowledge-based economy, increasing the level of education of the society, raising the standard of living standards, increasing the international complexities have led to many changes in the management of the organization. To overc More
        Changing the energy-based economy to a knowledge-based economy, increasing the level of education of the society, raising the standard of living standards, increasing the international complexities have led to many changes in the management of the organization. To overcome these challenges, future organizations must be able to harness and develop the potential of their talents. Talents are the rarest resource in the current knowledge-based market. In the wake of the globalization of the economy, the downsizing of most public and private organizations, rapid environmental developments and global challenges, the need for organizations to have capable and experienced leaders. Despite the global need and attention to talent, the principles of talent management in all organizations follow the same rules. Talent management includes a set of plans that, in general, make effective use of these individuals to achieve the goals of business and achievement. In this research, with the aim of identifying the variables affecting talent management with the approach of managers' capabilities, Delphi method has been performed by 50 experts. After collecting data and conducting interviews and Delphi method in 2 replications and confirmation of validity and reliability tests using CVR, reflectivity and Cronbach's alpha, the final model is calculated in 3 main components, 14 dimensions and 59 indicators. Among these, management support, engaging talented people, increasing learning capacity, self-centered learning, continuing education, setting criteria for promotion, appreciation and creating internal motivation with an average of 4.9 have been identified as the most effective factors. Finally, the structural model with the partial least squares method was approved by PLS software with a GOF fit coefficient of 0.58. Manuscript profile
      • Open Access Article

        85 - Secure Computing on the Internet of Everything
        Seyed Omid Azarkasb Seyed Hossein Khasteh
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, More
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, including systems, smart devices, industrial systems, and many others. With the immense number of connected objects, information security, and privacy have become significant challenges in IoT computing. This article explores the concept of secure computing in the Internet of Everything. It investigates the impact of the Internet of Things on the concept of security and its related needs. Furthermore, the methods and technologies used to establish secure computing in the Internet of Everything are discussed, including topics such as data encryption, identification and authentication, access management, privacy protection, and threat detection. Additionally, the challenges and drawbacks of secure computing in the Internet of Everything are examined, addressing issues such as the complexity of the connected environment, dynamic security threats, the need for standards and security-related concerns, and the influence of technological changes on secure computing. Finally, solutions and recommendations are provided to enhance secure computing in the Internet of Everything, including the use of strong encryption, centralized access management, user education and awareness, and advanced threat detection and monitoring systems. This article aims to provide a better understanding of secure computing in the Internet of Everything and to develop suitable security solutions for this domain. Manuscript profile
      • Open Access Article

        86 - SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack
        Abolfazl Sajadi Bijan Alizadeh
        Physically unclonable functions (PUFs) provide hardware to generate a unique challenge-response pattern for authentication and encryption purposes. An essential feature of these circuits is their unpredictability, meaning that an adversary cannot sufficiently predict fu More
        Physically unclonable functions (PUFs) provide hardware to generate a unique challenge-response pattern for authentication and encryption purposes. An essential feature of these circuits is their unpredictability, meaning that an adversary cannot sufficiently predict future responses from previous observations. However, machine learning algorithms have been demonstrated to be a severe threat to PUFs since they are capable of accurately modeling their behavior. In this work, we analyze PUF security threats and propose a PUF-based authentication mechanism called SQ-PUF, which can provide good resistance to machine learning attacks. In order to make it harder to simulate or predict, we obfuscated the correlation between challenge-response pairs. Experimental results show that, unlike existing PUFs, even with a large data set, the SQ-PUF model cannot be successfully attacked with a maximum prediction accuracy of 53%, indicating that this model is unpredictable. In addition, the uniformity in this model remains almost the same as the ideal value in A-PUF. Manuscript profile
      • Open Access Article

        87 - Improve security in cloud computing infrastructure using block chain protocol
        Mohsen Gerami Vahid Yazdanian Siavash Naebasl
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloadi More
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloading will be This virtual machine will not be able to distinguish the normal mobile user from attackers, thus violating the privacy and security of the transmitted data, so after determining the unloading strategy, the China block can be used in information security. And the information of each server is encapsulated and unloaded in the form of a block. In this research, a proposed solution is presented, which is the combination of China blockchain and cloud computing to increase security and efficiency. The proposed solution is implemented and evaluated in order to evaluate its efficiency increase compared to other existing solutions. Manuscript profile
      • Open Access Article

        88 - A Cyber Security Maturity Model for Critical Infrastructures with a Comparative Study Approach
        Mohamad Akhtari mohammadali keramati seyed abdolah amin mousavi
        With the advancement of mankind in the information age and the advent of the digital information age, dependence on national infrastructure has become more important than ever. Lack of cyber security in infrastructure, disrupts the functioning of various sectors such as More
        With the advancement of mankind in the information age and the advent of the digital information age, dependence on national infrastructure has become more important than ever. Lack of cyber security in infrastructure, disrupts the functioning of various sectors such as government, economy and services. By disrupting critical infrastructure, irreparable damage may occur in areas such as human casualties, economic damage, and loss of public confidence. Thus, information technology and cyber security have a special place in the digital arena. Accordingly, one of the most important challenges of different countries today, which can also harm national security, is cyber-attacks. This study explores to provide a cyber security maturity model for critical infrastructure. This study examines and analyzes five crucial models of cyber security maturity.The research shows that the cybersecurity maturity models are significantly similar to each other. By comparative study and comparison between the analyzed models, 48 indicators were obtained. Examination of these indicators shows that some of them overlap with other indicators. Therefore overlapping indices were classified into 16 groups based on frequency. Then, these groups by clustering analysis method and according to the obtained data, using SPSS software were organized in five levels, based on which the cyber security maturity model for critical infrastructure was presented. Manuscript profile
      • Open Access Article

        89 - Designing a food security management model in Iran
        Reza Eskandari Mehraban Hadi Peykani akbar etebarian
        In the discussion of human-centered development, food security plays a decisive role and the nutritional health of community-based individuals is the main focus of human-centered movement, and in contrast to malnutrition, it is a deterrent to the national development pr More
        In the discussion of human-centered development, food security plays a decisive role and the nutritional health of community-based individuals is the main focus of human-centered movement, and in contrast to malnutrition, it is a deterrent to the national development process. The purpose of this study is to present a model of food security management in Iran with emphasis on the experiences of successful countries in this field. This research was exploratory in terms of purpose, in terms of method, a combination of qualitative and quantitative methods. In the first stage, qualitative method and categorical content analysis (Inductive) was used and written and electronic sources in the field of food security were used purposefully to collect information. Findings of content analysis based on the opinion of the Center of Experts (consisting of five professors of public administration) in a system Induction presented the initial model of food security management (consisting of 211 concepts, 61 categories and 12 dimensions) and then through Delphi technique and questionnaire, the obtained model was exposed to the judgment of Delphi members. At this stage of the research, 12 scientific and practical experts (faculty members and officials of the Ministry of Health) were selected as a statistical sample using purposive sampling method for Delphi Center. In the next stage, the model derived from Delphi center was tested in a larger community. The statistical population at this stage included 2600 food industry experts based in Isfahan food industry towns. Using Morgan table, 335 samples were calculated and 310 questionnaires were collected by available sampling method. The model was evaluated through confirmatory factor analysis as well as reliability and validity calculations. Finally, the food security management model in Iran with emphasis on The experiences of successful countries in this field have been obtained with170concepts,58 categories and12dimensions. Manuscript profile
      • Open Access Article

        90 - Internal Migration and Social Security: A Study On Relationship Between Internal Migration Patterns and Social Insecurity in Iran
        mahmoud moshfegh
        The aim of this paper is to study the relationship between internal migration patterns and environment-oriented social security factors by pathological approach. The research method is the secondary analysis of census data; universe of study contains 31 provinces of the More
        The aim of this paper is to study the relationship between internal migration patterns and environment-oriented social security factors by pathological approach. The research method is the secondary analysis of census data; universe of study contains 31 provinces of the country in year 2011.Based on the two percent census file, the sample contain 95093 migrated people. The theoretical framework of present article is social disorganization theory which extensively analysis the impacts of newly immigrants on the efficiency and ability of society for social controls. The results show that about 16 percent of the total internal migration, potentially pathological migrations (PMs). The destination of most PMs is Tehran, Hamadan, Razavi Khorasan and Alborz Provinces. Nearly 80 percent of PMs are between the 15 – 35 years old. Also, there was a significant positive correlation between PMs and the social environment insecurity index (r: 576, sig: 99. 9), But there was not a significant correlation between total net migration and PMs. According to the results, migration, by itself, not lead to the occurrence of social problems, but the quality of migrants and the mechanism of adaptation to the destination are contexts of social security. Manuscript profile
      • Open Access Article

        91 - A New Parallel Method to Verify the Packets Forwarding in SDN Networks
        Rozbeh Beglari Hakem Beitollahi
        The rise of Software-Defined Networking (SDN) has revolutionized network management, offering greater flexibility and programmability. However, ensuring the accuracy of packet forwarding remains paramount for maintaining network reliability and security in SDN environme More
        The rise of Software-Defined Networking (SDN) has revolutionized network management, offering greater flexibility and programmability. However, ensuring the accuracy of packet forwarding remains paramount for maintaining network reliability and security in SDN environments. Unlike traditional IP networks, SDN separates the control plane from the data plane, creating new challenges for securing data transmission. Existing verification methods designed for IP networks often cannot be directly applied to SDN due to this architectural difference. To address the limitations of existing verification methods in SDN networks, new approaches are necessary. This research proposes a novel parallel method for verifying packet forwarding, building upon concepts from DYNAPFV. The proposed approach aims to overcome specific limitations of existing methods (including DYNAPFV), such as scalability issues, slow verification times. Simulations demonstrate significant improvements compared to DYNAPFV. The proposed parallel method achieves a 92% reduction in time required to identify malicious nodes within the network. The results also reveal a trade-off between security and verification time. As the probability of packet integrity confirmation increases from 0.8 to 0.99, system security strengthens, but the time to detect malicious switches also increases. Manuscript profile
      • Open Access Article

        92 - Legal-Ethical Critique of the Stockholm School Theory in the Treatment of COVID-19 pandemic
        Naser  Ghasemi amir abbas rokni
        Providing theoretical resources for the emergency policies of governments in the face of unexpected crises is one of the most important tasks of the scientific community of any country. Fighting the COVID-19 epidemic crisis as a comprehensive threat to the international More
        Providing theoretical resources for the emergency policies of governments in the face of unexpected crises is one of the most important tasks of the scientific community of any country. Fighting the COVID-19 epidemic crisis as a comprehensive threat to the international community has led many governments to change their health care policies by being surprised by the severity of the disease. In this regard, the philosophers of the Stockholm School of Ethics have tried to help the Swedish healthcare system control and manage the epidemic of COVID-19. How to interpret and determine the biological age of patients according to the epidemic emergency is one of the most notable parts of this theory. Accordingly, by determining the actual age difference from the biological of each patient, it is possible to determine the probability of survival after treatment and his life expectancy. The Stockholm School of Philosophy suggests that if you have to decide between helping patients with the same probability of survival who have different life expectancies, the priority should be to help a patient who is younger biologically. The present study, in a descriptive-analytical manner, examines and critiques this legal-ethical theory and will explain the consequences and effects of adopting such policies on the social system. Manuscript profile
      • Open Access Article

        93 - Multilateral Export Control Regimes: a Legal Mechanism or Tool of Political Pressure?
        غلامحسین   دهقانی فاطمه  هاشمی
        Multilateral export control regimes are among major tools used by developed Western countries during the past six decades to maintain their technological supremacy under the pretext of preventing proliferation of weapons of mass destruction. These regimes have grown and More
        Multilateral export control regimes are among major tools used by developed Western countries during the past six decades to maintain their technological supremacy under the pretext of preventing proliferation of weapons of mass destruction. These regimes have grown and developed unprecedentedly in both quantitative and qualitative terms especially in the past decade following 9/11 terrorist attacks. Opponents and proponents have offered various viewpoints on the legality or illegality of these regimes on the basis of the international law. This research first presents a theoretical framework for the assessment of those viewpoints. Since both opponents and proponents have emphasized on the relationship between these regimes and international nonproliferation regimes, their implications for availability of equipment and material related to weapons of mass destruction, conventional weapons, missiles, and dual-use goods and material are briefly discussed. Finally, developments of these regimes in addition to viewpoints of proponents and opponents about legality and illegality of export control regimes are explained using a comparative study of commitments of states members of these regimes and their commitments under international nonproliferation treaties. The conclusion is that such export control regimes, which have been developed by their members to create monopoly on technical know-how and technology, are incompatible with commitments of member states under international law Manuscript profile
      • Open Access Article

        94 - G4, an Effort for Permanent Membership in the UN Security Council: Background and Future Trends
        آرمین امینی شمس عظیمی
        During the past two decades, many states and groups of states have offered proposals for structural reforms in the UN Security Council. Some proposals seek to increase the number of permanent members of the Council. The G4 –Germany, Japan, India and Brazil – seems to st More
        During the past two decades, many states and groups of states have offered proposals for structural reforms in the UN Security Council. Some proposals seek to increase the number of permanent members of the Council. The G4 –Germany, Japan, India and Brazil – seems to stand a better chance in this regard. This paper discusses special opportunities for permanent membership of this group in the Security Council while considering challenges facing it. All four countries enjoy comparative advantages in their own geographical regions which give them the chance to seek a permanent seat in the Security Council. On the other hand, they face two kinds of obstacles: regional and international obstacles. For some of these states, overcoming regional obstacles is more difficult than international ones and the opposite is true for others. This research aims to answer this question: What are the opportunities and challenges facing member states of this group in their effort to gain permanent seats in the Security Council? First, the necessity of structural reforms in the Security Council is discussed before analyzing the situation of these states and future outlook of the Council’s structure in the light of the existing situation of the international system Manuscript profile
      • Open Access Article

        95 - The Role of International Organizations in the Realization of the Right to Food
        Farhad Talaie علی رزمخواه
        The right to food, a basic right of every person, is the right to be free from hunger and have sustained access to food with acceptable quantity and quality which would meet their food and cultural needs. Although States are the main parties responsible for the realiz More
        The right to food, a basic right of every person, is the right to be free from hunger and have sustained access to food with acceptable quantity and quality which would meet their food and cultural needs. Although States are the main parties responsible for the realization of human rights, both at domestic and international levels, increased activities of international organizations on an international scale, especially in the field of human rights, have raised questions as to the role of these organizations in realizing the human right to food and how they discharge that role. As argued in this paper, international organizations play an effective and unique role in the realization of the right to food at the international level. It is also noted that such international bodies address different aspects of the various issues related to the right to food. The paper concludes that the main goal of such activities is to realize the human right to food, especially for the poor people suffering the worst from unfavorable food security in the world. Manuscript profile
      • Open Access Article

        96 - Iran's Energy Geopolitics and EU’s Approach
        سیدشمس‌الدین  صادقی
        Since the common denominator among EU members is increasing dependence on imported oil and gas, security of energy supply is a major concern for the European Union. When assured about security and effectiveness of energy market, those countries will be able to continue More
        Since the common denominator among EU members is increasing dependence on imported oil and gas, security of energy supply is a major concern for the European Union. When assured about security and effectiveness of energy market, those countries will be able to continue increasing consumption of energy. However, the rising energy price, especially with regard to natural gas, has led to questions about future situation of energy supply security for the EU members. Therefore, this paper first focuses on the rising demand for gas and the risks of overdependence of the EU members on gas supply from Russian Gazprom Company, which may lead to repetition of Ukraine experience and the international gas crisis in 2006 and 2009. It then analyzes geopolitical and international aspects of future energy supply security for the EU and strategic plans developed by its members to handle these challenges. In conclusion, the paper introduces Iran as a good alternative source for ensuring energy security of the EU due to its geoeconomic conditions. Manuscript profile
      • Open Access Article

        97 - Iran's Energy Geopolitics and EU’s Approach
        آرمین امینی الهام  حسین‌خانی
        Since the common denominator among EU members is increasing dependence on imported oil and gas, security of energy supply is a major concern for the European Union. When assured about security and effectiveness of energy market, those countries will be able to continue More
        Since the common denominator among EU members is increasing dependence on imported oil and gas, security of energy supply is a major concern for the European Union. When assured about security and effectiveness of energy market, those countries will be able to continue increasing consumption of energy. However, the rising energy price, especially with regard to natural gas, has led to questions about future situation of energy supply security for the EU members. Therefore, this paper first focuses on the rising demand for gas and the risks of overdependence of the EU members on gas supply from Russian Gazprom Company, which may lead to repetition of Ukraine experience and the international gas crisis in 2006 and 2009. It then analyzes geopolitical and international aspects of future energy supply security for the EU and strategic plans developed by its members to handle these challenges. In conclusion, the paper introduces Iran as a good alternative source for ensuring energy security of the EU due to its geoeconomic conditions. Manuscript profile
      • Open Access Article

        98 - Necessity and Possibility of Judicial Supervision over Security Council’s Performance in UN Legal System
        حسین شریفی طرازکوهی ساسان  مدرس سبزواری
        The issue of judicial supervision over the Security Council has two different, but interrelated aspects. First of all, the “necessity” of such supervision should be discussed. The present article assumes that the Security Council should be committed to the principles of More
        The issue of judicial supervision over the Security Council has two different, but interrelated aspects. First of all, the “necessity” of such supervision should be discussed. The present article assumes that the Security Council should be committed to the principles of international law, the goals of the United Nations, sovereign rights of member states, fundamental human rights guarantees, as well as the basic structure for the division of powers among various organs of the UN. Then it studies the Security Council’s procedure to show that this institution has been frequently found in violation of the aforesaid legal bounds. Security Council’s inattention to the limits of its powers can cast doubts on credibility of the entire UN system. It has been also shown that the “necessity” of judicial supervision can be proven on the basis of the requirements of the “rule of law.” Another aspect of this issue is the “possibility” of judicial supervision in view of the current state of international law. The present paper has shown that although the Charter of the United Nations has remained silent on this issue, it can be confirmed if final goals of this document are taken as basis for its interpretation. Manuscript profile
      • Open Access Article

        99 - Challenges Facing Security and Defense Policies of EU and US
        سعید  خالوزاده
        The Common Security and Defence Policy of the European Union is one of the challenges facing the NATO and the leading role played by the U.S. The post-Cold War Europe attempted to be less dependent on U.S. and NATO, and to counter American influence on the security arra More
        The Common Security and Defence Policy of the European Union is one of the challenges facing the NATO and the leading role played by the U.S. The post-Cold War Europe attempted to be less dependent on U.S. and NATO, and to counter American influence on the security arrangements of the Old Continent. In a post-Cold War world, Europeans have been seeking a multipolar international order with increasing power and balanced strengthening of the role played by influential countries within the international system while supporting the liberal hegemony bestowed on the Americans. The United States believed in a hegemonic order through unipolar order based on multilateralism. The main question of this article is what are the common challenges facing the US and EU policies with regard to security and defense structure in Europe as well as regional issues? What is their approach in dealing with those issues? After discussing the theoretical framework of the topic, the paper would focus on challenges facing the U.S. and the E.U. defines and security policies from a hegemonic liberalism perspective and rejection of U.S. unilateral hegemony. Manuscript profile
      • Open Access Article

        100 - Contending Theories and the Analysis of International Organizations and Institutions, Peace, Security and Justice
        Seyed Abdolali ghavam Samira Mohseni
        The analysis of international organizations and institutions, peace, security and justice based on contending theories, in different ontological, epistemological and methodological frameworks, can help us to achieve a better understanding of the concept of international More
        The analysis of international organizations and institutions, peace, security and justice based on contending theories, in different ontological, epistemological and methodological frameworks, can help us to achieve a better understanding of the concept of international relations and demonstrates a more realistic picture of international institutions, processes and events. Obviously, the precise analysis of phenomena and events largely depends on the above strengths and weaknesses of mainstream and critical theories in explaining the above mentioned concepts Manuscript profile
      • Open Access Article

        101 - ANZUS Treaty: Past and Future
        Nasrin Mosaffa Ahmad Heidarbeigi
        The Security treaty concluded by Australia, New Zealand and the United States (ANZUS) in September 1951 in San Francisco with the aim of ensurity securing in the Pacific. Issues such as the expansion of communism in Southeast Asia, potential threat by Japan's military p More
        The Security treaty concluded by Australia, New Zealand and the United States (ANZUS) in September 1951 in San Francisco with the aim of ensurity securing in the Pacific. Issues such as the expansion of communism in Southeast Asia, potential threat by Japan's military power, and constitutional crises prevalent in the new independent countries were posing a threat for regional security following the World War II. The main question discussed by this article is about the survival of this treaty even after the end of the Cold War, Generally, this treaty has based its strategy on confronting hegemonic policies pursued by China, Russia and facing potential threats posed by them or increasing influence exerted by them in the Pacific region Manuscript profile
      • Open Access Article

        102 - The Necessity of Power Sharing in the Security Council: A Pluralistic Model
        Enayatollah Yazadani Enayatollah Yazadani
        During the early years fllowing the Second World War, power sharing in the Security Council, the main responsible for maintaining international peace and security was to some extent equitable, given the Political, economic, military and demographic power of its five per More
        During the early years fllowing the Second World War, power sharing in the Security Council, the main responsible for maintaining international peace and security was to some extent equitable, given the Political, economic, military and demographic power of its five permanent members and their efforts to from the UN system. With the passage of time and given fundamental changes in the form and straucture of international system, and trasfor mation in the relative power of countries including the permanent members of Security Council, it seems that the present order governing the structure of the Council is unfair and undemocratic which necessitates a reform in the structure of the Security Council by incorporating influential global and regional powers. This article aims to present a pluralistic model to reform the structure of the Security Council, given the emergence of new global and regional powers Manuscript profile
      • Open Access Article

        103 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
        Malihe  Behfar Hassan   Savari
        In UNs history, the Legality of Security Council Resolutions, in many cases, is challenged. Generally these challenges take by states that affected Security Councils decisions. With notice that states are the representative for implementation of SCR's, they intervene th More
        In UNs history, the Legality of Security Council Resolutions, in many cases, is challenged. Generally these challenges take by states that affected Security Councils decisions. With notice that states are the representative for implementation of SCR's, they intervene their determination and interpretation in the way that implement SC decisions. In some cases domestic and regional courts evaluate the state's action in implementation SCRs. Although these cases couldn’t provide direct review on Resolutions but affected in the way of implementation. Evaluation by states is probable and arises some concerns about decrease effectiveness of SC in maintenance of international peace and security Manuscript profile
      • Open Access Article

        104 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
        Yasser Nooralivand Mohammad Reza Majidi
        By investigating the security-political divide within the European Union despite the economic integration, the article suggests structural, internal and external challenges are preventing the EU to echo one voice in international level. The most important challenge in a More
        By investigating the security-political divide within the European Union despite the economic integration, the article suggests structural, internal and external challenges are preventing the EU to echo one voice in international level. The most important challenge in achieving the Common Foreign and Security Policy is Member States’ insistence on national structures such as national sovereignty and nation interests. In maintaining national structures on supra-national level, European Union is suspended between two different structure: confederate and federal. The indeterminate and fluid structure manifests itself in process of decision-making across different policy-making arenas. Achieving EU’s Common Foreign and Security Policy is prevented by contradiction between the national approach (encompassing national sovereignty and national sovereignty) and the supra-national approach (limiting national sovereignty and compromising national interest for sake of common interest).This article tries to analyze the issue that why EU notwithstanding in the field political and security convergence in the international arena? Manuscript profile
      • Open Access Article

        105 - An Analysis of the Political-Security Integration of the European Union within the Framework of Realist Approaches
        Seyed Davood Aghaee Yasser Nooralivand Ebrahim Bagheri
        The entrance of the European Union as a supranational actor into the field of political-security issues is a rare occurrence that has challenged realism as the most important state-centered theory in the international arena. Therefore, since the theory of realism as the More
        The entrance of the European Union as a supranational actor into the field of political-security issues is a rare occurrence that has challenged realism as the most important state-centered theory in the international arena. Therefore, since the theory of realism as the main theory in the field of security issues does not recognize any role for non-state actors in this field, the question is brought forward that how do this theory and its various branches analyze and evaluate the actions and role of the European Union regarding political-security issues? In response, it can be said that this theory, at first, did not pay enough attention to the EU's security developments, due to the fact that it did not consider the EU a non-state actor, but as the EU began to formulate a common foreign and security policy and European security and defense policy and to establish European rapid reaction forces, it was forced to present some views in this regard. Although all branches of realism, due to their belief in the monopoly of state actors in the international arena, and their emphasis on elements such as national interests and national sovereignty, do not provide a clear-cut view on the political and security integration of the European Union, defensive neo-realists have a clearer and more optimistic view on the evolution of political and security integration at the EU level, due to the importance attached by them to the role of institutions in establishing security cooperation between states. Manuscript profile
      • Open Access Article

        106 - Prerequisites for the Introduction of Regional Arrangements to Maintain International Peace and Security
        علی احدی کرنق Mehdi Hadadi
        Regional arrangements which are covering a wide range of international institutions, despite some criticisms, were foreseen both in the League of Nations and the United Nations system in order that their capacity to be used to maintain international peace and security. More
        Regional arrangements which are covering a wide range of international institutions, despite some criticisms, were foreseen both in the League of Nations and the United Nations system in order that their capacity to be used to maintain international peace and security. Accordingly, Chapter 8 of the United Nations Charter, while emphasizing the involvement of regional arrangements for the maintenance of regional peace and security, has laid down conditions and limits for their involvement. This article while paying attention to the role of regional arrangements in international peace and security, addresses the most important conditions and limits of these arrangements stipulated in the 8th chapter of the Charter. These conditions include: 1. Observance of the principles and objectives of the Charter: this is a condition for the coordination of the United Nations and regional arrangements for maintaining peace and security. 2. Enjoying the mechanism of the resolution of disputes: this condition suggests correspondence between the 6th and 7th chapters of the Charter of the United Nations, on the one hand, and the 8th chapter of the Charter. 3. Obtaining permission from the Security Council to take coercive measures: this condition is based on the primary responsibility of the Security Council for the maintenance of international peace and security. 4. Informing the Security Council: this condition is a complement to the previous condition. Manuscript profile
      • Open Access Article

        107 - Change in Environmental Security in the Post-Cold War International Law
        Seyed Abdolali ghavam Seyedeh Massoumeh  Mostafavi
        Today, environment as a bedrock for human prosperity, is considered one of the most important concerns for the international society and gradually has gained importance in the framework of security issues. Environmental international law is one of the emerging branche More
        Today, environment as a bedrock for human prosperity, is considered one of the most important concerns for the international society and gradually has gained importance in the framework of security issues. Environmental international law is one of the emerging branches of international law system which has been built upon soft law, that is a kind of law created based on declarations, manifestations, executive principles, etc, which lacks any firm legal sanctions. This article studies the commitments of contracting states sharing in light of changer in agricultural and environmental international law system along these lines, the most important agreements and international conferences regarding environmental security in the post-cold war era, including convention on Biological Diversity (Rio 1992), Protocol on Biological Security (Nairobi 2000s), the United Nations Framework Convention on Climate Change (New York 1992) and Stockholm Convention on Persistent Organic Pollutants (Stockholm 2001) have been examined. The findings show that in spite of the spectacular development of international law regarding the protection of environment in recent decades, the environmental damage’s compensation international law Manuscript profile
      • Open Access Article

        108 - A Comparative Study of Iran's Social Security Law in the Field of Women's Rights with the Documents of International Labour Organization
        Fatemeh Sarreshteh Izadmouoa
        Governments have always paid attention to international rules and documents and try to incorporate them as much as possible in their domestic laws and policies. Along these lines, this article tries to study working women's rights from the viewpoint of the Iran's Social More
        Governments have always paid attention to international rules and documents and try to incorporate them as much as possible in their domestic laws and policies. Along these lines, this article tries to study working women's rights from the viewpoint of the Iran's Social Security Law in comparison with the International Labor Organization's documents. The key question of this article is that "to what extent Iranian laws, especially its social security law regarding women, are compatible with International Labor Organization's documents?" To answer this question, the authors indicate that "in article 20 of the I.R. Iran's Constitution, women enjoy all human rights, specifically the right to social security on equal terms with men in compliance with Islamic criteria. In public law as well as in social security law, gender has no place and its subject is every individual as a human being. The findings of this research show that social security law being influenced by the constitutional and civil laws in some social security services is consistent with International Labor Organization's documents and in some other, is incompatible with them. Manuscript profile
      • Open Access Article

        109 - Advance on the European Common Foreign and Security Policy, from Kosovo to Ukraine
        Yousef Molaei Issa  Adeli
        The article seeks to evaluate the progress in the EU common foreign and security policy after the Lisbon treaty in comparison with Maastricht Treaty. Two crises in Eastern Europe have been studied by reviewing the EU’s official documents and ratifications. Ukraine crisi More
        The article seeks to evaluate the progress in the EU common foreign and security policy after the Lisbon treaty in comparison with Maastricht Treaty. Two crises in Eastern Europe have been studied by reviewing the EU’s official documents and ratifications. Ukraine crisis occurred five years after the Lisbon treaty, likewise the Kosovo crisis happened five years after the Maastricht treaty. By comparing the EU reaction to these two crises, the achievements can be evaluated. The focus is mainly on restrictive measures like economic and diplomatic sanctions. The study shows that considering all differences, the Ukrainian crisis was a success story and the EU drew a more cohesive and more efficient response. This conclusion was reached by the number of reactions and their efficacy. However, there are some qualifications, especially when positive peace is explored, the outcome did not satisfy the expectations. Manuscript profile
      • Open Access Article

        110 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
        Mohammad Reza Majidi Yasser Nooralivand
        By investigating the security-political divide within the European Union despite the economic integration, the article suggests structural, internal and external challenges are preventing the EU to echo one voice in international level. The most important challenge in a More
        By investigating the security-political divide within the European Union despite the economic integration, the article suggests structural, internal and external challenges are preventing the EU to echo one voice in international level. The most important challenge in achieving the Common Foreign and Security Policy is Member States’ insistence on national structures such as national sovereignty and nation interests. In maintaining national structures on supra-national level, European Union is suspended between two different structure: confederate and federal. The indeterminate and fluid structure manifests itself in process of decision-making across different policy-making arenas. Achieving EU’s Common Foreign and Security Policy is prevented by contradiction between the national approach (encompassing national sovereignty and national sovereignty) and the supra-national approach (limiting national sovereignty and compromising national interest for sake of common interest).This article tries to analyze the issue that why EU notwithstanding in the field political and security convergence in the international arena? Manuscript profile
      • Open Access Article

        111 - The Role of the UN Security Council in Adopting Resolutions Against ISIS
        ehsan jafari far Reza nasirihamed
        Today, terrorism is one of the most important issues for nations and governments in the world. Although certain parts of the world are more affected by this phenomenon than the others, its prevalence has almost become a security concern in most contemporary societies. W More
        Today, terrorism is one of the most important issues for nations and governments in the world. Although certain parts of the world are more affected by this phenomenon than the others, its prevalence has almost become a security concern in most contemporary societies. We are witnessing efforts by the United Nations to counter the growth and activities of terrorist groups, especially as the crisis of terrorism became more of a threat to global security with the rise of ISIS and its transnational actions. This article through analytical and descriptive methods and by using library and website resources seeks to answer the question of what resolutions the United Nations has adopted against the terrorist group ISIL. The novelty of this study is that, unlike previous studies that have dealt with the Iraq-Syria crisis and the role of the United Nations during it, it intends to address only the issue of UN resolutions on ISIL in a coherent manner. The research findings show that since 2014 up until 2021, resolutions 2169, 2170, 2178, 2199, 2347, 2249 and 2462 are the most important UN resolutions adopted against ISIL. Resolution 2169 on the identification of ISIL as a terrorist group, Resolution 2170 on the dissolution of ISIL, Resolution 2178 on the recruitment of foreign fighters to ISIL, Resolution 2199 on the prohibition of buying and trading in oil and gas, antiques and historical objects with terrorists, Resolution 2347 on the Security Council Regarding the protection of the common heritage of humanity and cultural heritage, Resolution 2249 to destroy ISIL sanctuaries in Iraq and Syria, and finally Resolution 2462 on the fight against terrorism and the financing of terrorism; all were adopted to contain the activities of this terrorist organization Manuscript profile
      • Open Access Article

        112 - Human Security and Human Rights; Distinctions and Overlapping Areas
        Naser khorshidi sarem shiravand
        The purpose of this article is to study of distinctions and overlapping areas between "Human Security" and "Human Rights". Both concepts put the preserving and promoting "Human Dignity" on the agenda, And for this reason, they cover many of each other's shortcomings. On More
        The purpose of this article is to study of distinctions and overlapping areas between "Human Security" and "Human Rights". Both concepts put the preserving and promoting "Human Dignity" on the agenda, And for this reason, they cover many of each other's shortcomings. On the other hand, there are differences areas between "Human Security" and "Human Rights", especially in the level of analysis, operational aspects, and scope of inclusion. In this regard, the question arises: "How can human rights and human security, despite some differences and distinctions, be able to complement and reinforce each other?"Human rights and human security have the ability to overlap and reinforce each other, because they focus on a single issue, namely "human dignity" and the development of various aspects of human life, including individual, social and international. In order to realizing the Human security strategies (protection and empowerment), Human rights provide the necessary legal framework to support the two principles of "Protection" and "Empowerment". And conversely, human security, with its emphasis on the operational aspects of the Universal Declaration of Human Rights, in particular economic, social and cultural rights, as well as the Securitization of some common human rights concerns, can provide the necessary political support for achieving human rights goals. Findings indicate that there is a significant relationship between human rights and human security. The research method is descriptive-analytical and in some cases a comparative method has been used to prove the hypothesis. Manuscript profile
      • Open Access Article

        113 - Assessing the Role of South and Southeast Asian Regional Organizations in Confronting Maritime Terrorism: Case Study of SAARC, BIMSTEC & ASEAN
        Farhad Talaie Maral Javidbakht
        Waters of the South and Southeast Asia have long been some of the most important hotspots for various sea-based organized crimes. As a result of the continuously rising threat of terrorism and its spread all around the world, along with the access of terrorist groups to More
        Waters of the South and Southeast Asia have long been some of the most important hotspots for various sea-based organized crimes. As a result of the continuously rising threat of terrorism and its spread all around the world, along with the access of terrorist groups to more efficient and modern military equipments, the danger of terrorism has become more imminent and widespread, taking many forms and finding its way to the seas. Maritime terrorism, especially within regions where other maritime crimes are prevalent, is considered, because of the probable links between the offenders, as one of the most serious threats against peace and security at seas. Considering the organized nature of these crimes, effective suppression of them is only possible through collective and cooprative initiatives. Thus, regional organizations have an undeniably important role in combating maritime terrorism. This article, using the descriptive-analytical method, aims to assess the performance and function of a selected number of regional organizations active within South and Southeast Asia and to examine their achievements and shortcomings, as well as their challenges, in combating maritime terrorism. This article concludes that the activities of these organizations have been essential but insufficient, and the most important challenge ahead is lack of collective strategies at the regional level. Manuscript profile
      • Open Access Article

        114 - Iran's criminal policy in criminal security agreements in the Criminal Procedure Code of 1392
        roya ghasemi
        Judicial authorities of the prosecutor's office play an important role in the formation and formation of criminal cases, and failure to comply with the requirements of a fair trial at various stages of the criminal process, especially the preliminary investigation stage More
        Judicial authorities of the prosecutor's office play an important role in the formation and formation of criminal cases, and failure to comply with the requirements of a fair trial at various stages of the criminal process, especially the preliminary investigation stage, can lead the trial to an unfair decision. Accordingly, the old position of the prosecutor's office has changed from two hundred years ago to the present day, and a great change has taken place in the new criminal policy in this regard. Thinkers' views on criminal policy are consistent, and without a rational criminal policy, there can be no answer. Iran's criminal policy is often repressive and coercive against criminals, and Iran's legislative policy is dichotomous, and sometimes legislative and judicial criminal policy are in conflict. The necessity of criminologies cannot be denied, but the anticipation of temporary punishments such as long-term detention and even non-departure from the judiciary, etc., is partly due to ignoring the teachings of criminology and criminal sociology. Judges are often hesitant to apply such punishments to avoid the consequences of criminal misconduct. Crime prevention is the most effective part of criminal policy, but prevention is not considered very important in Iranian law, and coercive politics is currently facing a serious challenge. Manuscript profile
      • Open Access Article

        115 - Social welfare and its relationship with social capital and sense of security
        milad abdi
        Social welfare is an expression that is more focused on a multifaceted economic, social and political situation, and preserving the dignity of human beings and society's responsibility towards it and promoting the ability of the whole society is a definition for the wel More
        Social welfare is an expression that is more focused on a multifaceted economic, social and political situation, and preserving the dignity of human beings and society's responsibility towards it and promoting the ability of the whole society is a definition for the welfare and comfort of the whole society. In this sense, in the concept of social well-being, it is assumed that it is possible to measure personal well-being, and compare the well-being of people with each other, and create a balance between this individual well-being and the overall well-being of society. Security has penetrated in all environmental, economic, political, social and cultural dimensions. Also, the feeling of security and the high security factor are indicators of development and the state of Basaman, which, as one of the most important indicators of social welfare, overshadows other indicators of this category. The feeling of security is subjective in this category and it can be said that it has all aspects of security in it. This concept is one of the important and influential concepts in social welfare issues. The purpose of this article is to describe social welfare and its relation to the feeling of security and social capital in society. By examining the concepts and perspectives, we come to the conclusion that there is a direct relationship between social welfare and social capital, and there is also a significant relationship between social welfare and a sense of security. The article is the result of documentary and library study. Manuscript profile
      • Open Access Article

        116 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
        In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in More
        In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives include the view of secure models, the view of security models, and the view of the framework and system to security models. The first and third perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research is presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. In this idea, it is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, in addition, include agile patterns as well. . Manuscript profile
      • Open Access Article

        117 - Designing an Entrepreneurial Marketing Model with an Approach to Improve Organizational Performance
        javad motevali taher mohammadreza eghbal مجید فتاحی
        The purpose of this research was to design an entrepreneurial marketing model aimed at improving performance. This study was conducted in a descriptive and exploratory manner. In the qualitative part, to identify the components, interviews were conducted with 10 academi More
        The purpose of this research was to design an entrepreneurial marketing model aimed at improving performance. This study was conducted in a descriptive and exploratory manner. In the qualitative part, to identify the components, interviews were conducted with 10 academic experts in the fields of marketing and entrepreneurship, selected through a purposeful judgment method. The statistical sample in the quantitative section included 174 managers (high, middle, and operational) of the Social Security Organization, selected through simple random sampling. The findings of the qualitative section indicate that this model includes causal factors (entrepreneurial orientation, entrepreneurial mindset, entrepreneurial attitudes, opportunistic thinking), intervening factors (political, social, economic, cultural, nature of government organizations), contextual factors (personal values of entrepreneurial managers, entrepreneurial capabilities of managers, innovative marketing, ability to penetrate the structure, organizational structure, entrepreneurial cultural platform), strategies (re-engineering organizational processes, flexible organizational structure, dynamic marketing capacity building, creating a socially responsible organization, using social network marketing, creating new services), and consequences (optimization of decision-making, willingness to take risks, increasing the market value of the organization, improving organizational reputation, strategic dynamics, growth and excellence of the organization). Furthermore, entrepreneurial marketing has dimensions such as value orientation, customer orientation, innovation orientation, and entrepreneurship orientation. The findings of the quantitative section show that value orientation, customer orientation, innovation orientation, entrepreneurship orientation, and causal factors affect entrepreneurial marketing by 0.631, 0.741, 0.582, 0.489, and 0.551, respectively. Additionally, intervening and contextual factors and entrepreneurial marketing influence strategies by 0.350, 0.363, and 0.328, respectively, and strategies influence results by 0.719. Manuscript profile
      • Open Access Article

        118 - Investigating the effect of employees' perceptions of corporate social responsibilities on organizational pride and customer service commitment
        elahe Maneshdavi seyed mehdi mirmehdi فتانه یاراحمدی
        In organizations today, lack of sense of responsibility towards customers prevents effective service to them.The purpose of this study was to investigate the effect of employees' perceptions of corporate social responsibilities on organizational pride and customer servi More
        In organizations today, lack of sense of responsibility towards customers prevents effective service to them.The purpose of this study was to investigate the effect of employees' perceptions of corporate social responsibilities on organizational pride and customer service commitment in Ahvaz Social Security Organization. This research is applied and descriptive. The statistical population of this research is 210 employees of the Social Security Organization of Khuzestan province. Cochran's formula was used to determine the sample size and the number of samples was estimated to be 126. Sampling in this study was simple random. The data collection tool in this study is a questionnaire. The validity of the questionnaires was confirmed by using the content validity method and their reliability was confirmed by calculating Cronbach's alpha. In this study, to investigate and test the hypotheses and conceptual model, the structural equation approach and Smart Pls2 and Spss 19 software were used. The results of examining the hypotheses showed that social responsibility has a positive and significant effect on organizational pride. It also showed that among the dimensions of social responsibility, legal responsibility and humanitarian responsibility are of the highest importance. The results also show that social responsibility and customer service commitment have a positive and significant effect and finally organizational pride has a positive and significant effect on customer service commitment. Manuscript profile
      • Open Access Article

        119 - Machine Learning-Based Security Resource Allocation for Defending against Attacks in the Internet of Things
        Nasim Navaei Vesal Hakami
        Nowadays, the Internet of Things (IoT) has become the focus of security attacks due to the limitation of processing resources, heterogeneity, energy limitation in objects, and the lack of a single standard for implementing security mechanisms. In this article, a solutio More
        Nowadays, the Internet of Things (IoT) has become the focus of security attacks due to the limitation of processing resources, heterogeneity, energy limitation in objects, and the lack of a single standard for implementing security mechanisms. In this article, a solution will be presented for the problem of security resources allocating to deal with attacks in the Internet of Things. Security Resource Allocation (SRA) problem in the IoT networks refers to the placement of the security resources in the IoT infrastructure. To solve this problem, it is mandatory to consider the dynamic nature of the communication environments and the uncertainty of the attackers' actions. In the traditional approaches for solving the SRA, the attacker works over based on his assumptions about the system conditions. Meanwhile, the defender collects the system's information with prior knowledge of the attacker's behavior and the targeted nodes. Unlike the mentioned traditional approaches, this research has adopted a realistic approach for the Dynamic Security Resources Allocation in the IoT to battle attackers with unknown behavior. In the stated problem, since there is a need to decide on deploying several security resources during the learning periods, the state space of the strategies is expressed in the combinatorial form. Also, the SRAIoT problem is defined as a combinatorial-adversarial multi-armed bandit problem. Since switching in the security resources has a high cost, in real scenarios, this cost is included in the utility function of the problem. Thus, the proposed framework considers the switching cost and the earned reward. The simulation results show a faster convergence of the weak regret criterion of the proposed algorithms than the basic combinatorial algorithm. In addition, in order to simulate the IoT network in a realistic context, the attack scenario has been simulated using the Cooja simulator. Manuscript profile
      • Open Access Article

        120 - Designing a Secure Consensus Algorithm for Use in Blockchain
        Hosein Badri Masumeh Safkhani
        Blockchain technology eliminates the need for a central authority. This system consists of a distributed ledger with a chain of blocks that records every network transaction. This ledger is replicated by every node in the network. We require a mechanism that provides co More
        Blockchain technology eliminates the need for a central authority. This system consists of a distributed ledger with a chain of blocks that records every network transaction. This ledger is replicated by every node in the network. We require a mechanism that provides consensus for the entire network, known as "consensus algorithm," in order for the state of this ledger to be the same for all nodes of the network at any given time. In this work, we will suggest a novel consensus algorithm that protects the blockchain platform from four common attacks. These attacks include the Sybil, Denial of Service, 51%, and Eclipse attacks. Due to its multiple control parameters, generic and all-purpose character, immunity to different attacks, and acceptable execution speed, our suggested algorithm can be used to build secure blockchain-based systems in a variety of applications. Manuscript profile
      • Open Access Article

        121 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
        iThe purpose of this article is to identify and analyze the key drivers of digital signature implementation in Iran with a fuzzy Delphi approach. In terms of practical purpose and in terms of information gathering, the research has benefited from a hybrid approach. The More
        iThe purpose of this article is to identify and analyze the key drivers of digital signature implementation in Iran with a fuzzy Delphi approach. In terms of practical purpose and in terms of information gathering, the research has benefited from a hybrid approach. The statistical community consists of all experts and specialists in the field of information technology and digital signature and articles in this field. The sample size of the statistical community of experts is 13 people who were selected by the purposeful sampling method. 30 articles were selected based on their availability and downloadable, non-technical nature, and relevance to the topic. The method of data analysis was done according to the fuzzy Delphi approach. Validity and reliability were calculated and confirmed using the CVR index and Cohen's kappa test with coefficients of 0.83 and 0.93, respectively. The results prove that the key drivers of digital signature implementation in Iran include 5 main dimensions and 30 concepts, which are 1) security (information confidentiality, information security, sender authentication, document authentication, privacy protection, trust between parties), 2) business (digital business models, communication needs, staff management, organization size, organizational structure, organization resources, organizational culture, top managers, competition ecosystem, e-governance), 3) user (perceived convenience, perceived benefit, consumer behavior, consumer literacy, consumer lifestyle), 4) technical (development of technical infrastructure, systems integration, system complexity, system tanks, design quality, technical speed of certificate production and verification, impermeability of hackers) and 5) Legal (legal licenses, penal laws, legislative body, e-commerce laws). Manuscript profile
      • Open Access Article

        122 - Designing Model of Food Security Management in Iran
        Reza Eskandari Mehraban Hadi Peykani akbar etebarian
        Reza eskandari Mehraban Hadipeykani Akbar Etebarian Khorasgani Abstract The purpose of the present study was to design a model of food security management in Iran, emphasizing the experiences of successful countries in this field.This research was explorat More
        Reza eskandari Mehraban Hadipeykani Akbar Etebarian Khorasgani Abstract The purpose of the present study was to design a model of food security management in Iran, emphasizing the experiences of successful countries in this field.This research was exploratory in terms of purpose, in terms of method, a combination of qualitative and quantitative methods. In the first stage, qualitative method and categorical content analysis (Inductive) was used and written and electronic sources in the field of food security were used purposefully to collect information. Findings of content analysis based on the opinion of the Center of Experts (consisting of five professors of public administration) in a system Induction presented the initial model of food security management (consisting of 211 concepts, 61 categories and 12 dimensions) and then through Delphi technique and questionnaire, the obtained model was exposed to the judgment of Delphi members. At this stage of the research, 12 scientific and practical experts (faculty members and officials of the Ministry of Health) were selected as a statistical sample using purposive sampling method for Delphi Center. In the next stage, the model derived from Delphi center was tested in a larger community. The statistical population at this stage included 2600 food industry experts based in Isfahan food industry towns. Using Morgan table, 335 samples were calculated and 310 questionnaires were collected by available sampling method. The model was evaluated through confirmatory factor analysis as well as reliability and validity calculations. Finally, the food security management model in Iran with emphasis on The experiences of successful countries in this field have been obtained with 170 concepts, 58 categories and 12 dimensions. Manuscript profile
      • Open Access Article

        123 - Investigating the impact of climate change on the environment and agriculture
        Bahareh Rafiei Hamed Kioumarsi Reza Naseri Harsini Seyed Mohammad Reza Mahdavian
        During the last century, science and technology have grown and developed significantly, however, this development, along with all the advantages and added values for the quality of human life, has brought inappropriate effects on the environment. Unfortunately, the huma More
        During the last century, science and technology have grown and developed significantly, however, this development, along with all the advantages and added values for the quality of human life, has brought inappropriate effects on the environment. Unfortunately, the human conflict with the problems which has created for the planet, including wars and new diseases, has caused less attention to the impact of climate change on environment and especially the related agriculture activities. If the agricultural sector exposed by climate change and will not be able to meet human food needs, life will be near to its end point. Agricultural activities are not only exposed to these changes, but also by leaving possible negative effects on environment lead to these changes. Threatening food security, the reduction of biological diversity, the loss of soil, the reduction of water resources, and the conversion of forests into farms and their gradual destruction, turn the earth into an unlivable area with the unpredictable occurrence of storms, floods and temperature changes. Therefore, investigating the impact of climate change and its components on different ecosystems and species that affect agriculture can be a step towards achieving new management mechanisms to reduce and adapt to these changes and achieving sustainable environment and agriculture. Manuscript profile
      • Open Access Article

        124 - Analysis of Ethical Principles of Disciplinary and Educational Responses to Juvenile Delinquency from the Perspective of Islamic Criminal Law
        roh allah ebrahimi mohamad ali haji deh abadi ALIREZA HOSSINI
        Ethical principles Disciplinary and educational responses to juvenile delinquency reflect the facts and rules that have a moral character and are used as a response to the crimes and violations of children and adolescents in order to maintain and promote their moral cha More
        Ethical principles Disciplinary and educational responses to juvenile delinquency reflect the facts and rules that have a moral character and are used as a response to the crimes and violations of children and adolescents in order to maintain and promote their moral characteristics and legitimacy. The answers are in the light of observing these principles. The present article has examined the nature of these principles by descriptive-analytical method and based on reference to authoritative Islamic sources. The findings of the study indicate that in Islamic law, the ethical foundations of disciplinary and educational responses to juvenile delinquency are diverse in addition to persuasion. Engaging in the development of the child, correcting and rehabilitating, promoting and exalting the moral virtues of love-loving and justice-oriented are among the principles that are used to change the way of thinking and beliefs of children and adolescents and to reconstruct or create moral feelings and virtues. ¬ Restraint on moral behaviors based on religious and Islamic teachings are used and from this perspective help to restore public order and security. Manuscript profile
      • Open Access Article

        125 - The effects of the emergence of security-oriented criminalization in crimes against security in Iranian criminal law
        Hossein  Rezaei Todeshki Seyyed Mahmoud Majidi mohammad javad baghi zadeh
        Securityism is one of the unjust constructions that is imposed on the body of criminal policy and it means a deviant process in the formation of a response process to the criminal phenomenon. The security orientation of criminal policy can be a criterion to distinguish More
        Securityism is one of the unjust constructions that is imposed on the body of criminal policy and it means a deviant process in the formation of a response process to the criminal phenomenon. The security orientation of criminal policy can be a criterion to distinguish an efficient and desirable criminal policy from an ineffective and undesirable criminal policy; As a result, the criminal policy of every society should provide a suitable justification for criminalizing and illegalizing the actions of people that were considered permissible before. This article is written in a descriptive-analytical way. In this article, an attempt has been made to answer this question: What are the most important coordinates of security-oriented criminalization in Iran's criminal law? Give an appropriate answer. It seems that the most important coordinates of security-oriented criminalization in Iran's criminal law include criminalization of criminal thoughts, criminalization of preliminary acts, legislative obfuscation and new criminalizations. The purpose of this article is to explain the manifestations of the tendency to aggressive criminalization in Iranian criminal law. Manuscript profile
      • Open Access Article

        126 - Government’s role in human’s security and its impact on people’s happiness
        Behnaz  Yousefi Hossein  Rahmatollahi
        Human’s security means to be free from fear and need. It’s impact on all branches of human’s life and development has given it a fundamental role in a way which it’s guarantee and provision by government will result in people’s happiness and their satisfaction leads to More
        Human’s security means to be free from fear and need. It’s impact on all branches of human’s life and development has given it a fundamental role in a way which it’s guarantee and provision by government will result in people’s happiness and their satisfaction leads to increase of public trust and social wealth Purpose: The purpose of this paper is the government’s role in human’s security and its effect on people’s happiness Method: The research method for this paper is descriptive and analytical Findings: In recent decade’s discussions has been considered about the importance of happiness due to its abundance effects in quality and satisfactions in individual’s life and government role. Happiness has been used in concepts like wellbeing, enjoyment, prosperity, fortunate in which by definition differ but in conversations they are used as synonyms. Results: With an advancement of science and technology, development of human civilization and emerge of globalization phenomena, a great transition has been done in government and its duties definition. Human’s needs levelled up and government’s duties did not summarized in securing public interest and providing public services any more since provision of social welfare was also added to government tasks. Manuscript profile
      • Open Access Article

        127 - Designing a knowledge management system deployment model in the social security organization of Hormozgan province
        Reza Baranimashahrani Mehdi Bagheri payam paslari
        The purpose of the present research is to design a knowledge management system deployment model in the social security organization of Hormozgan province. The current research method is a qualitative type of foundation data. The study community consists of experts in th More
        The purpose of the present research is to design a knowledge management system deployment model in the social security organization of Hormozgan province. The current research method is a qualitative type of foundation data. The study community consists of experts in the field of knowledge management, employees with 10 years of experience and above, heads of departments and deputies of the social security organization of Hormozgan province. Theoretical sampling of the targeted type was used to select people. Data coding was done using Max Kyuda software. The findings of the research using the coding process showed that 177 primary codes in the form of the model of effective factors (causal and contextual, intervention, strategy and consequence) are effective on the establishment of the knowledge management system in the social security organization of Hormozgan province, and 147 primary codes as Model evaluation indicators were selected. These codes were included in the concepts and key categories according to the findings of the research, the categories of "participatory management, professional competence of employees, the organization's mission and government support" as causal conditions, the categories of "information and management systems, strategy and leadership, education and training, design of courses Training and empowerment of employees" as a strategy and 6 categories (strengthening self-regulation skills, strengthening job motivation, increasing organizational commitment, flexibility in communication, entrepreneurship and innovation, improving organizational performance) have been calculated as the consequences of establishing a knowledge management system in the social security organization. . Manuscript profile
      • Open Access Article

        128 - Compilation of the green human resources management development system in Iran's social security organization
        korosh Shafei saeid bagher salimi Hossein Ganji Nia
        Context: The green management approach is based on attention to sustainable development and, as a result, sustainability with social approaches and economic incentives, the health and safety of the employee community, as well as the publication of the desired public ima More
        Context: The green management approach is based on attention to sustainable development and, as a result, sustainability with social approaches and economic incentives, the health and safety of the employee community, as well as the publication of the desired public image of the organization in a long-term time horizon. Purpose: This thesis is to develop the green human resource management development system in the country's social security organization, with an analytical approach and categorize the components and identify the factors, which in terms of purpose, is a type of applied and survey research. Methodology: The present research, after analyzing the records, using the qualitative method and in-depth interviews on 10 managers of the country's social security organization, using the purposeful sampling method and theoretical sampling, reached theoretical saturation, and then the information obtained It has been made using the method of analysis of the examined theme and the paradigm model. Findings: The findings of the research showed that the identification of development factors in the management of green resources among the country's social security workers. Conclusion: The studies conducted based on the development system of green human resources management show the existence of development factors in the system, and these factors show the efficiency of the correct development of the green management development system in the country's organizational system. Manuscript profile
      • Open Access Article

        129 - Explaining the discourse of thoughts, opinions and statements of Imam Khamenei regarding the role of food security in the resistance economy
        Mohammad Bidgoli asghar Rajabi Deh Borzoei
        Agriculture in the world has played a major role in ensuring food security throughout history and has led to the emergence and flourishing of great civilizations. In the current situation when the country is faced with simultaneous sanctions from the enemy and the solut More
        Agriculture in the world has played a major role in ensuring food security throughout history and has led to the emergence and flourishing of great civilizations. In the current situation when the country is faced with simultaneous sanctions from the enemy and the solution presented by Imam Khamenei is the theory of resistance economy which It should be investigated in all fields with minimum social, cultural, political damage and according to the existing conditions of the country. In Iran, paying attention to the category of food security has always been one of the main goals of macro policies. One of the measures of the Iranian Islamic Model of Progress document directly mentions the issue of providing food security, as well as its footprint from the constitution to the five-year development plan and Even the approaches and policies of the resistance economy have also been seen. Therefore, in the present research, an attempt has been made to answer this question, what is the role of food security in the resistance economy in the discourse of thoughts, opinions and statements of Imam Khamenei? The current research is an e-applied development and documentary methods and qualitative content analysis have been used as necessary. The findings indicate that the important and effective principles of the role of food security in the resistance economy from the perspective of the Supreme Leader include self-sufficiency in the production of basic and strategic products, improvement of product quality, consumption management, increasing the level and efficiency of production in the country and company development. are knowledge-based in the agricultural sector. Manuscript profile
      • Open Access Article

        130 - Explaining the principles of "social security" in Nahj al-Balaghah and its realization in society with a neglect approach
        alinaghi lezgi alireza akbar zadeh Mohammad karaminia reza ojagh
        Security is one of the most important human needs and motivations. For a country, ensuring the security of society and its individuals has a fundamental and important role. In today's advanced societies, governments are responsible for pursuing and securing it. Today, g More
        Security is one of the most important human needs and motivations. For a country, ensuring the security of society and its individuals has a fundamental and important role. In today's advanced societies, governments are responsible for pursuing and securing it. Today, governments have become the most important political unit in the field of domestic and foreign relations, and their most important goal is to try to provide comprehensive security and expand its scope. On the other hand, people expect the most from the political institutions of society in terms of providing physical security along with economic well-being and social identity. Social security in the present age is one of the necessities of social life according to Islamic teachings and based on moral concepts in Islamic society. The present article examines the principles of social security in Nahj al-Balaghah and then proposes solutions to achieve this in society with a "neglect" approach. This article has been done in a library method with a descriptive-analytical method. Manuscript profile
      • Open Access Article

        131 - Optimal Power Allocation for Maximizing Secrecy Rate in Physical Layer Security Using Frequency Diverse Array Directional Modulation and Artificial Noise
        Mahdi Tayyeb Massoud Hossein Khaleghi
        The directional modulation is a prominent and practical technique for enhancing the physical layer security in modern communication systems. In this method, the message signal is modulated by an array of antennas and transmitted in a specific direction to the legitimate More
        The directional modulation is a prominent and practical technique for enhancing the physical layer security in modern communication systems. In this method, the message signal is modulated by an array of antennas and transmitted in a specific direction to the legitimate receiver, such that in other directions, the signal is destroyed and not receivable by eavesdroppers. By incorporating random frequency diverse array directional modulation, secure communication can be achieved in both angular and distance dimensions for the legitimate receiver. However, when the eavesdropper is located near the legitimate receiver, the confidentiality performance of this solution significantly deteriorates. To address this issue, this paper proposes a novel approach that combines artificial noise with random frequency diverse array directional modulation and optimizes power allocation to attain the maximum secrecy rate. Simulation results demonstrate that our proposed approach improves the secrecy rate of the physical layer security by at least one bit per second per hertz compared to the method without artificial noise, and by at least two bits per second per hertz compared to the phased array directional modulation. Manuscript profile
      • Open Access Article

        132 - Human dignity and weapons of mass destruction
        Mohosen Reza  Mosaddegh,khah Morteza  Bayat Hasan Soleimani
        Human dignity is one of the most key concepts that have received the attention of heavenly religions, legal systems, international and regional human rights documents and the constitutions of countries in the protection of human beings and human status; So that today it More
        Human dignity is one of the most key concepts that have received the attention of heavenly religions, legal systems, international and regional human rights documents and the constitutions of countries in the protection of human beings and human status; So that today its reputation has gained global fame and has become an adornment of human rights discourses at the world level. More than all legal systems and before them, the holy school of Islam, respect for the dignity of human beings is emphasized as a fundamental principle. He has given and refrained from insulting and humiliating people and even massacre without accounting. Islam, if not more than all the schools, at least among the other schools, considers the right to dignity and social respect of the human being valid and necessary, so that even the persons themselves are prohibited from attacking their human dignity, which is a gift of God. It is because the scene of war can become the scene of the manifestation and fall of human dignity, ignoring human dignity and fighting has the most ugly and abominable face, because this is the heavenly call of the Holy Qur'an, which says: "And peace is good", peace is the best and the ideal of the Prophet. The seal, may God bless him and grant him peace, for humanity; The realization of world peace is, therefore, the Islamic government and the rulers of the Islamic society who care about the affairs of Muslims are worthy of secondary rulings and also according to the provisions of international law sources such as the Treaty (NPT), the United Nations Charter and the consultation of the International Court of Justice in 1996, which is an explicit reason for prohibiting There has been no use of weapons of mass destruction, and the use of this type of weapon for the legitimate defense of the country has been considered permissible. In order to preserve human dignity and advance military and defense goals, such as preventing the military attack of the enemy or defending against attacks against Islam, the Islamic government and Muslims, and especially to protect Human dignity, by forming full preparedness mechanisms, by all-round military preparation or acquisition of strength and jihadi preparation, has put fear and terror in the hearts of unbelievers and enemies, which prevents them from any military action against Islam and Muslims, and even insulting the human dignity of the people of this planet. Manuscript profile
      • Open Access Article

        133 - A novel security usability method for e-learning platforms
        Golbarg Nasiri Negin Hajiahmadi
        Traditionally, security and usability has acted against each other. Specially, for inexpert people, usability means ignoring security and secure systems are not usable. Researchers and developers recognized that current security problems would be solved only throug More
        Traditionally, security and usability has acted against each other. Specially, for inexpert people, usability means ignoring security and secure systems are not usable. Researchers and developers recognized that current security problems would be solved only through addressing issues raised through usability and human factor. In fact, future of cyber security relies on deployment of security technologies which widely could be used by inexpert users. Interpretative Key Management (IKM) is a cryptographic key management system under category of master key which empowers users to generate the cryptographic keys within the end-user systems. This article proposes a novel method which specifically helps beginners to achieve both safety and usability of communications and network-based software by utilizing IKM. In this method processes of user authentication and encryption of transmitted and stored data will be fully automated and does not require the users to do any security configuration. The main targeted application of proposed method is to enhance security and usability of e-learning systems when the trainees do not have enough computer knowledge. Manuscript profile
      • Open Access Article

        134 - Investigating weapons of mass destruction with a focus on moral values in jurisprudence and international law
        Mohsen Reza  Mosaddegh khah Morteza  Barati Hasan Soleimani
        Along the roaring waves of the development of contemporary modern technology, we witness the emergence of weapons of mass destruction such as nuclear weapons, biological weapons, etc., with a special index of destructive power and inseparability in the targets. And, amo More
        Along the roaring waves of the development of contemporary modern technology, we witness the emergence of weapons of mass destruction such as nuclear weapons, biological weapons, etc., with a special index of destructive power and inseparability in the targets. And, among the secondary headings that will change the verdict is the rule of necessity, the prohibition of prohibitions, with its occurrence, the obligation is removed from the duty of the obligee, and the result of that is the permission to commit a forbidden act. Among other secondary headings is the rule of countering with like in legitimate defense. According to the results of the research, the use of weapons of mass destruction under secondary headings is also not allowed. However, in the sources of international law, such as the NPT, the United Nations Charter, and the consultation of the International Court of Justice in 1996, there was no clear reason to prohibit the use of weapons of mass destruction, and the use of this type of weapon for the legitimate defense of the country was allowed. Therefore, based on the arguments of Arbaah and the general provisions of international law treaties and for the purpose of legitimate defense and neutralization of modern weapons of war, with research and development and the acquisition of modern technology in order to create a suitable platform for the prevention of treatment, preservation and protection from the Islamic government, ensuring national security, human dignity, for example "Wa'adolham Mastatetam Potential" has taken action so that the Islamic homeland is mastered and equipped with modern weapons of war and relevant antidotes in special circumstances, especially in the form of legitimate and obligatory defense. Also, what can be inferred from Islamic ethics is that based on the teachings of Islam, from the Holy Book to the traditions, there are documents in the field of weapons of mass destruction, all of which emphasize the prohibition of the use of weapons of mass destruction and the use of such weapons in any The face is inhuman and immoral. Manuscript profile
      • Open Access Article

        135 - The role of food security in a resistance economy with emphasis on the thoughts, opinions and statements of the Supreme Leader Mohammad Bidgoli
        Mohammad Bidgoli asghar Rajabi Deh Borzoei
        The role of food security in a resistance economy with emphasis on the thoughts, opinions and statements of the Supreme Leader Mohammad Bidgoli Asghar Rajabi Deh Borzoei Abstract The purpose of the current research is to analyze the role of food security in th More
        The role of food security in a resistance economy with emphasis on the thoughts, opinions and statements of the Supreme Leader Mohammad Bidgoli Asghar Rajabi Deh Borzoei Abstract The purpose of the current research is to analyze the role of food security in the resistance economy with emphasis on the thoughts, opinions and statements of the Supreme Leader. The current research is an e-applied development and documentary methods and qualitative content analysis have been used as necessary. Agriculture in the world has played a major role in ensuring food security throughout history and has led to the emergence and flourishing of great civilizations. In the current situation when the country is faced with sanctions from the enemy and the solution presented by the Supreme Leader is the theory of resistance economy which It should be investigated in all fields with minimum social, cultural, political damage and according to the existing conditions of the country. In Iran, paying attention to the category of food security has always been one of the main goals of macro policies. One of the measures of the Iranian Islamic Model of Progress document directly mentions the issue of providing food security, as well as its footprint from the constitution to the five-year development plan and Even approaches and policies of resistance economy have been seen. The current research answers this question, what is the role of food security in a resistance economy by emphasizing the thoughts of the Supreme Leader? The findings indicate that the influential principles of the role of food security in a resistance economy from the perspective of the Supreme Leader include self-sufficiency in the production of basic and strategic products, improvement of product quality, consumption management, increasing the level and efficiency of production in the country and the development of knowledge companies. The foundation is in the agricultural sector. Keywords: Resistance Economy, Imam Khamenei, Food Security, Qualitative Content Analysis, Knowledge Base. Manuscript profile
      • Open Access Article

        136 - Compilation of green human resource management development system in Iran's social security organization
        Koroush Shafeie Degesara saeed baghersalimi Hossein Ganji Nia
        Kourosh Shafei Degesara Saeid Baghersalimi Hossein Ganjinia Abstract Background: The approach of green management comes from paying attention to sustainable development and, as a result, sustainability with social approaches and economic motivations, the he More
        Kourosh Shafei Degesara Saeid Baghersalimi Hossein Ganjinia Abstract Background: The approach of green management comes from paying attention to sustainable development and, as a result, sustainability with social approaches and economic motivations, the health and safety of the employee community, as well as the publication of the desired public image of the organization in the long-term time horizon. Purpose: This research was to compile the development system of green human resource management in the country's social security organization, with an analytical approach and classification of components and recognition of factors, which in terms of methodology is the type of applied and survey research. Methodology: After analyzing the records, the present study reached theoretical saturation from the qualitative method and in-depth interviews on 10 managers of the country's social security organization using the targeted sampling method and theoretical sampling, and then the information obtained using the method The analysis of the investigated theme and the paradigm model have been made. Findings: The findings of the research showed that the identification of development factors in the management of green resources in the country's social security staff includes green training and development, green recruitment and recruitment, green maintenance and green employment. Conclusion: The investigations carried out based on the green human resources management development system show the existence of development factors in the system, which shows the effectiveness of the correct formulation of the green management development system in the country's organizational system. Manuscript profile
      • Open Access Article

        137 - A Survey on Computer Security Patterns and Proposing a New Perspective
        Hadi sadjadi Reza Kalantari
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this fie More
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives are secure models, security models, and the framework and system to security models. The first and last perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research are presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. It is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, include agile patterns as well. Based on this idea and related analyzes, the atmosphere of future research activities will be revealed to the audience. Manuscript profile
      • Open Access Article

        138 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
        Despite the emphasis of researchers and experts on the need to implement digital signatures and the progress of technology towards the digitization of all affairs and electronic governance, Iran is still facing the challenge of implementing digital signatures. The purpo More
        Despite the emphasis of researchers and experts on the need to implement digital signatures and the progress of technology towards the digitization of all affairs and electronic governance, Iran is still facing the challenge of implementing digital signatures. The purpose of this article is to identify and analyze the key drivers of digital signature implementation in Iran with a fuzzy Delphi approach. In terms of practical purpose and in terms of information gathering, the research has benefited from a hybrid approach. The statistical community consists of all experts and specialists in the field of information technology and digital signature and articles in this field. The sample size of the statistical community of experts is 13 people who were selected by the purposeful sampling method. 31 articles were selected based on their availability and downloadable, non-technical nature, and relevance to the topic. The method of data analysis was done according to the fuzzy Delphi approach. Validity and reliability were calculated and confirmed using the CVR index and Cohen's kappa test with coefficients of 0.83 and 0.93, respectively. The results prove that the key drivers of digital signature implementation in Iran include 5 main dimensions and 30 concepts, which are 1) security (information confidentiality, information security, sender authentication, document authentication, privacy protection, trust between parties), 2) business (digital business models, communication needs, staff management, organization size, organizational structure, organization resources, organizational culture, top managers, competition ecosystem, e-governance), 3) user (perceived convenience, perceived benefit, consumer behavior, consumer literacy, consumer lifestyle), 4) technical (development of technical infrastructure, systems integration, system complexity, system tanks, design quality, technical speed of certificate production and verification, impermeability of hackers) and 5) Legal (legal licenses, penal laws, legislative body, e-commerce laws). It is suggested that in the field of digital signature implementation, special attention should be paid to rewriting rules, training users, creating a security culture, and digital signature policymakers should invite knowledge-based companies to cooperate in developing infrastructure and making relevant software competitive. Manuscript profile
      • Open Access Article

        139 - Investigation and effects of regional developments on the security of Iran and Turkey borders
        Mahdi Najafi Jalil nayebian Parviz Ahadei  
        In the past twenty-five years, stability in the security environment of Central Asia has always faced increasing complications and challenges. Nationalist tendencies have been experienced with intensity and weakness in Central Asian republics. As regional powers, Iran a More
        In the past twenty-five years, stability in the security environment of Central Asia has always faced increasing complications and challenges. Nationalist tendencies have been experienced with intensity and weakness in Central Asian republics. As regional powers, Iran and Turkey are located next to each other and in the most sensitive regions of the world, including the Middle East, Central Asia, and the Caucasus. These two countries have their own semantic system and interests, and they have a series of common interests and some conflicts. On the other hand, the importance of the border in diplomatic relations is the recognized boundaries based on international covenants and international law, which are considered a factor for stability and peace between countries or differences and conflicts and territorial claims of countries against each other. An important part of the foreign and domestic policies of the countries are formed and defined according to how they share their borders with each other and enjoy the geopolitical position affected by the borders. Borders can create obstacles against plans and threats that endanger their economy. Therefore, one of the most tense borders of Iran is the northwestern border strip, which has long been the focus of Iran's security and law enforcement authorities, and the issue of security in this region is of the highest importance. It has been special. The main goal of this research is to examine the effects of regional developments on the security of the borders of Iran and Turkey. This research has been done using analytical-explanatory method and using library sources and articles and macro documents. The method of data collection is library and using scientific-research articles. The tool for collecting information is the use of charts and graphs. The results of the research show that recognizing the impact of border markets, the issue of ethnicity, the role of the media, Turkey's membership in NATO, and the presence of terrorist groups in the border strip are among the regional developments that have an impact on the security of Iran and Turkey's borders. Manuscript profile