Identifying and presenting strategies and (defensive approaches against new threats of social networks)

Document Type : Original Article

Authors

1 Assistant Professor of Imam Ali University (AS), and Responsible Author, Email: farhangsajjad@yahoo.com

2 . Assistant Professor of Imam Ali University (AS)

Abstract

The current research was carried out with a sociological approach and with the aim of identifying new media threats and formulating a national-defense strategy in dealing intelligently with virtual social networks and with the method of quantitative content analysis and grounded theory. In addition to showing the need to change approaches, this research examines the periods of virtual space policymaking in the country and the strategies of other countries in the face of virtual social networks and introduces five strategies and finally has reached an approach based on looking at the sender instead of just paying attention to the sender. The message is its attention and focus on the audience and receiver of the message. Data collection has been done through interviews with 36 media and communication professors. The results show that these strategies should be in the four areas of policy, hardware and software, cultural and awareness and education, so that by empowering the audience against the harms of using this media, they can have the ability to deal with the risks of social networks in a conscious and analytical manner. to create Therefore, lack of attention or lack of attention to the audience of social networks can cause problems for our national security at the micro, medium and macro levels. Finally, it can be concluded that with a cultural and social attitude and with determination to solve existing issues and problems, presence, participation and active confrontation in this area should be replaced by passive observation.

Keywords


  • الف. منابع فارسی

    • آذر، عادل و سلمانی نژاد، رمضانعلی (1396). زنجیره خدمات تأمین مالی مبتنی بر سرمایه: رویکرد مدل­سازی نرم در مدیریت (مورد مطالعه: بورس اوراق بهادار تهران). تحقیقات نوین مدیریت خاتم، دوره 1، شماره 1، ص 141-166.
    • تولایی، روح­الله (1399). آینده‌پژوهی خدمات فضای مجازی ایران در فرآیند فناوریک جهانی‌شدن. فصلنامه مطالعات راهبردی جهانی‌شدن، شماره 14.
    • میرزایی، حاجی ملأ (1398). تدوین الگوی مدیریتی در خط و مشی­گذاری فضای مجازی کشور. فصلنامه راهبرد اجتماعی فرهنگی، شماره 13.
    • رضایان قیه‌باشی، احد (1400). شبکه‌های اجتماعی: پدید فراگیر عصر ارتباطات. سایت تابناک.
    • شکرخواه، یونس (1384). تفاوت سواد رسانه‌ای و آموزش رسانه‌ای. وبلاگ دات، آنلاین.
    • طالب­پور، علیرضا و همکاران (1399). مرور راهبردهای کشورهای جهان در حوزه فضای مجازی. فصلنامه «راهبرد»، شماره 73.
    • قدسی، امیر (1398). راهبرد تأثیر فضای مجازی بر امنیت ملی ج.ا.ایران. فصلنامه راهبرد دفاعی، شماره 44.
    • مهدی­زاده، محمد (1398). مطالعه تطبیقی نظریه کاشت و دریافت در ارتباطات. تهران، نشر سروش.

    ب. منابع انگلیسی

    • China Real Name Rule (2020, December 23). Retrieved from BBC: http://www.bbc.com/news/world-asia-china-16614373
    • Clarke, A. (2021). Open Dialogue and Government of Canada's use of Social Media: Bureaucratic Barriers to Democratic Engagement in the Digital age, Canadian Political Science Association Annual Conference.
    • Ellison, N. B., & Boyd, D. M. (2019). Social Network Sites: Definition. History and scholarship, Journal of Computer-Mediated Communication, 210-230
    • European Commission (2018, February 10). Press Releases Database, Retrieved from European Commission.
    • Fabiano, Nicola (2018, February 10). Safer Social Networking Principles for the EU, Retrieved from ec. Europa.
    • Feinberg, L. (2020, January 1). Social Networking. Retrieved, From Canadian Internet Policy and Public Interest Clinic. https://www.cippic.ca/fr/node/128527
    • Hicks, R. (2019, Nov 22). Singapore Mine Citizen Sentiment Social Media, Retrieved from Futuregov: http://www.futuregov.asia/articles/singapore-to-mine-citizen-sentiment Online
    • Internet Rights in Uganda (2020). Challenges and Prospects, Kampala: International ICT Policy in East and Southern Africa, Retrieved from  http://www.cipesa.org/?wpfb_dl=70
    • Internet censorship in China. (2019). Retrieved from Wikipedia: http://en.wikipedia.org/wiki/Internet_censorship_in_the_People%27s_Republic_of_Chin
    • Jain, S. (2021, October 6). 40 Most Popular Social Networking Sites World, Retrieved from social media today: http://www.socialmediatoday.com/content/40-most-popular-social networking-sites-
    • Kok, A. (2020, Sep 17). Asia Pacific Future Gov, Retrieved from Future gov: http://www.futuregov.asia/articles/2008/sep/17/singapore-experiments-social-media/
    •  Kopstein, J. (2013). UK Police Secretly Monitoring 9,000 Political Campaigners Using Social Media Surveillance, the Guardian Ars Technical.
    • Lumby, C., Green, L., & Hartley, J. (2020). Untangling the Net: The Scope of Content Caught By Mandatory Internet Filtering, Australian Federal Government,
    • Neubauer, M. (2021, March 21). Techpresident. Retrieved from Internet in a Suitcase: Not Really in a Suitcase, But Really On Its Way.

    http://techpresident.com/news/23636/open-technology-institute-announces-developerrelease-wireless-communications-network

    • NITA-U), N. I.-U. (2018), "Government of Uganda Social Media Guide, Government Ministries, Departments and Agencies", National Information Technology Authority

    Uganda (NITA-U),

    • Ribeiro, J. (2011, Aug 8). India Wants Special Monitoring, Access for Twitter, Facebook. Retrieved from Computerworld:

    http://www.computerworld.com/s/article/9218968/India_wants_special_monitoring_acc ess_for_Twitter_Facebook

    • Robotics, C. f. (2012). CAIR. Retrieved from drdo:

    http://drdo.gov.in/drdo/labs/CAIR/English/index.jsp?pg=homebody.jsp

    • Sambuli, N. (2013, November). Monitoring Online Dangerous Speech in Kenya, Retrieved From Ihub.
    • Sanghani, R. (2014, November 12). Police 'spying' on almost 9,000 extremists, Retrieved from the telegraph:http://www.telegraph.co.uk/news/uknews
    • Taylor, D. (2011, July 17). Social Media Targeted by Pentagon for Strategic Communication, Retrieved, From Infowars: http://www.infowars.com/social-media.