Contents & References of The role of cyberspace development in the geopolitical relations between Iran and the Arab countries of the Persian Gulf
List:
1 Farsi abstract
2 English abstract
3 First chapter
4 Introduction 1-1
5 Problem statement 2-1
6 Research question 3-1
6 Research hypothesis 4-1
6 Research objectives 5-1
6 Method Research 6-1
8 Importance and necessity of research 7-1
9 Problems and limitations of research 8-1
9 Background of research 9-1
10 Area of ??study #####
11 Location of the Islamic Republic of Iran in the region 1-10-1
12 Fars Gulf, Heartland of World Energy####
13 Territory Research 01-October
13 Time frame #####
13 Organization of research 1-1-1
14 Definition of concepts and terms 1-12
17 Second chapter
18 Concept of information geopolitics 1-2
19 Information geopolitics factors 1-1-2
19 The geopolitical role of information in the security of countries 2-1-2
24 Geopolitical functions of information 3-1-2
24 Security functions 1-3-1-2
27 Military functions 2-3-1-2
27 Economic functions 3-3-1-2
28 Functions Political 4-3-1-2
30 Convergence function 5-3-1-2
31 Divergence function 6-3-1-2
32 The concept of borders and bordering 2-2
32 Concepts related to borders and bordering 1-2-2
32 Border lines 1-1-2-2
32 Differences Border 2-1-2-2
34 Functions of the border 3-1-2-2
35 Factors affecting political border developments 2-2-2
39 The concept of convergence and divergence 3-2
43 Factors affecting convergence 1-3-2
43 Factors affecting divergence 2-3-2
44 different views about convergence and divergence
44 political-security view 1-4-2
45 social view 2-4-2
45 economic view 3-4-2
46 ideological view 4-4-2
46 geopolitical perspective of convergence and Divergence 5-2
46 Traditional analysis 1-5-2
48 Modern analysis 2-5-2
50 Postmodern analysis 3-5-2
53 Postmodern analysis 4-5-2
54 National security #####
56 Determinants of national security #####
60 Sources of insecurity Iran from the Persian Gulf #######
64 Chapter 3
65 Research materials 1-3
70 Research methods 2-3
70 Research statistical community 3-3
71 Sample and sampling method 4-3
71 Information collection methods and tools 5-3
71 Library method 3-5-1
71 Field method 2-5-3
71 Information analysis methods 7-3
73 Chapter 4
74 Cyberspace in the service of soft war 1-4
74 Brief explanation of the concept of power and cyberspace 2-4
75 The newness of cyberspace and the complexity of understanding the relationships in this space 3-4
77 What is cyber war? 4-4
78 Propaganda about cyber war 5-4
78 The issue of national security 6-4
78 The issue of the virtual world and cyberspace 7-4
79 The spread of information technology (IT) influence 8-4
82 An overview of Iran's rank in high-speed internet and mobile 9-4
107 chapters Fifth
108 Evaluation of hypotheses 1-5
108 Evaluation of the first hypothesis 1-1-5
109 Evaluation of the second hypothesis 2-1-5
110 Conclusion 2-5
112 Statement of limitations 3-5
113 Proposals and Solutions 4-5
114 sources
Source:
- Alberts, David Steven and Pop Daniel, 1389, translated by Aliabadi, Ali, Strategic Studies Workshop
2- Ebrahimi Khosfi, Nad Ali and Murad Ali Sadouqi, 1386, Psychological operations and strategic deception, Abrar Teheran
3- Mohammad Akhbari, Mohammad Hassan Nami, 2008, Border Geography with an emphasis on Iran's borders, Geographical Organization
4- Bozman, Ada. B, Strategic Information and State Management, translated by Strategic Studies Research Center, 1382. 5- Tellis, Ashley and others, measuring national power in the post-industrial era, supervised and translated by Abrar Contemporary International Cultural Institute of Studies and Research, Tehran, 1383. Persian Gulf Issues Review Seminar, Tehran Office of Political and International Studies Publications 7- Hafez Nia, Mohammad Reza and others, [Analysis of the Geographical Basis of the National Power of the Islamic Republic of Iran] Tarbiat Moalem University Geographical Sciences Journal, 13824. 8- Hafez Nia, Mohammad Reza (2010).Political Geography of Virtual Space, Samt Publications. 9- Hafez Nia, Mohammad Reza, Principles and Concepts of Geopolitics, Mashhad, Papli Publications, 1385. 10- Hafez Nia, Mohammad Reza and Murad Kaviani, 1388, New Horizons in Political Geography, Samt. Bomosi. Tehran: Sena Publications
12- Persian Gulf, Corridor of Heartland Jahan, Resalat newspaper quoted from Aftab website, 11 May 1386
13- Zulfiqari, Mehdi (1384), Consequences of America's presence in the region, Resalat newspaper, March 26, 1384.
14- Ranjbar, Maqsood (1378), Security considerations in the foreign policy of the Islamic Republic of Iran, Strategic Studies Research Institute, first edition. 15- Zanganeh, Hamid; national strategy; Andisheh Club website 2/6/1383.
16-Zarkani, Seyyed Hadi, evaluation of factors and variables affecting national power and designing a model for measuring the national power of countries - Doctoral thesis of Political Geography - Tarbiat Modares University 1385.
17- Saree-ul-Qalam, Mahmoud (1374), Understanding the Persian Gulf in the form of theoretical foundations, political-economic information, 10th year, number one and two. 18- Sharifzadeh, Ali; The Persian Gulf is the most important security center of Iran; Capital newspaper quoted by Aftab site. 19- Safavi, Rahim (1378); An introduction to the military geography of Iran - the first volume; Publications of the Geographical Organization of the Armed Forces
20- Taheri, Reza (1390). From Pearls to Oil, Second Edition, First Publications
21- Abdullahkhani, Ali (1383), The Book of International Security-1: Opportunities, Threats and Challenges Facing the National Security of the Islamic Republic of Iran, Tehran: Abrar Contemporary International Studies and Research Institute of Tehran, First Edition.
22- Ajam, Mohammad (1383). Persian Gulf is a name older than history. Tehran: Part Publications
23. Buzan & Little, R. (2000), International Systems in World History: Remaking the Study of International Relations. London: Oxford University Press, pp. 69-70
24. Buzan, B. (1987) An Introduction to Strategic Studies: Military Technology and International Relations. New York: St. Martin Press, pp. 6-7
25. Cavelty, M. D. (2008) Cyber-Security and Threat Politics; US efforts to secure the information age. New York: Routlefge, p. 67
26. Cavelty, M. D. (2008) Cyber-Security and Politics; US efforts to secure the information age New York: Routledge. P.10
27. Casey Robert, Senate Adopts victims of Iranian Censorship Act, available at: http://casey.senate.gov, 24 July 2009
28. Director of National Intelligence. (2010, February) Annual Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence. United States of America.
29. Everard, J. (2000) Virtual states: the international and the boundaries of the nation-state. New York: Routledge, p. 62
30. Factbox: Implications of apparent Stuxnet Iran Cyber ??Attack, available at: http://www.reuters.com. September 27, 2010
31. Gilpin R. (1981) War and Change in World Politics. New York: Cambridge University Press, p. 180
32.Glene R Simpson, Fresh Clues of Iranian Nuclear Intrigue, available at: http://online.wsj.com/article/16jan 2009
33. Hancock, B. (2001) "Cyber-Tracking, Cyber-terrorism". Computers and Security. Vol. 20, No. 7, p. 553
34. information-literacy. Blogspot. Com/2010/05/training-large-groups.html.
35. Jervis, R. (1978) "Cooperation Under the Security Dilemma". World politics. Vol.30, No.2 pp. 167-214
36. James Adame, Virtual Defense, Foreign Affairs, Vol, 80, No. 3. pp. 98-111
37. Laura Rozen, U.S. Moves to Weaken Iran, available at: http://articles. Latimes.com. 19 May 2006
38. Marc A. Smith and Peter Kollock, Communities
39. Mesko, G. (2006) "Perceptions of Security: Local Safety Councils in Slovenia". In: U. Gori, & I. Paparela. Invisible Threats; Financial and Information Technology Crimes Against National Security. Netherlands: IOS Press, p.81
40. NSN Senies Selling DPI to Iran, http://www.lightreading.com, June 22. 2009
41. Obama to create White House cyber security post, http://www.reuters.com, May 29. 2009
42. Peter W.