Strategies for continuity and development of effective values and norms in strengthening the internal security of J.A.A

Document Type : Original Article

Author

Abstract

Sustainable balance and civilizing society in the context of the statement of the second step requires a model to act on and produce software that can be used to optimally manage external challenges and internal crises in the process of civilizing.
Most  experienced experts  specialized in administration consider strategic thinking to be the solution to this and it is obvious that achieving strategic thinking requires strategic planning;  With this statement, the lack of appropriate strategies for the continuation and development of effective values and norms in strengthening the internal security of J.A.A. In line with the Islamic revolution, which should be achieved based on the speech of the Imam (may God have mercy on him) and leadership, the constitution of the Islamic Republic and successful human experiences, the main issue of this research is to achieve "strategies of continuity and development of value" in this research. Effective norms in strengthening the internal security of J.A.A. Based on the speech of the Imam (may God have mercy on him) and his leadership, the constitution, the experiences of the Islamic Republic of Iran and the successful experiences of mankind" is the main goal. To achieve the aforementioned goal, the following questions must be answered:  what are the strategic reference points affecting the normalization processes ? What are the Islamic values based on? And what is the desired and current state of the basic values of the Islamic Revolution? So that from the answers to these questions, he can formulate appropriate strategies to fill the gaps while analyzing the gaps. It is superficial; of course, the researcher has used Dimtel ISM software in a combination in order to discover causal relationships, as well as Mic-Mac software to determine the nature of variables, as well as components and strategic reference points. Also, at the end, in order to obtain validity  and the reliability of the final model has been used by Smart PLS software. In the relevant software, Cronbach's alpha showed all components above 0.7 and other parameters such as AVE and ho with appropriate numbers above 0.4 and 0.7. Thus, all hypotheses were confirmed with a high accuracy of 99%; Also, in order to develop appropriate strategies for improving internal security based on the development of values and norms, which is considered as the last stage of research; It used a two-pronged approach and in the end, 25 effective strategies for improving internal security were presented while presenting three macro strategies at three operational, tactical and strategic levels. It should be noted that the final model resulting from the research is called "Etiquette" which is equivalent to the beginning of the words of the phrase (value-based internal security model)

Keywords