Paper Information

Journal:   IRANIAN JOURNAL OF PUBLIC POLICY IN MANAGEMENT   spring 2018 , Volume 9 , Number 29 #l00546; Page(s) 101 To 118.
 
Paper: 

Optimum Implementation and Evaluation Model in Policy Making of Internal Security of Islamic Republic of Iran

 
 
Author(s):  RAZAVI NEJAD SEYED AMIN, razagh javad
 
* 
 
Abstract: 
Background: Security, which is one of the main tasks of governments, necessitates the policy making in this field. In this regard, modeling is one of the techniques being utilized to facilitate the understanding and implementation of the security policy making which comes to help the statesmen. According to the definition of internal security, people play a pivotal role in security issues, and people's intrigue and satisfaction is an important indicator of internal security. Purpose: This study aims to design an optimum model in policy making of internal security of Islamic republic of Iran. Method: This is a qualitative research based on the analysis and description of the contents of some literature related to security events in the Islamic Republic of Iran. Data collection was carried out via literature review by means of reviewing written and unpublished sources and referring to libraries and electronic databases. A synthesis model from theories by Etzioi (L. R. F) and Hirshman (E. V. Lwas designed and presented as an optimum model. In this model, the implementation of internal security policies is largely in line with the values and norms of the people, and the use of force, coercion and fear is limited to a small extent, and a moderate level of remuneration is also considered. If the implementation of policies results in loyal people or makes protesters loyal to them (L. L and R. L), implementation would be optimum and it would lead to the end of policy. Otherwise, if the people are opposed to the system (exit option) or the protesters are turned into opponents of the system, implementation is undesirable and leads to the adoption of one of the correction options (minor variations including FL, LV and RV states), or discontinue (major changes including FV, LE, RE, and F. E) the policy. Conclusion: External combination of two triangles allows policy makers to achieve different combinations compared to internal combinations which provides an optimum implementation of the policies; they can expect favorable and similar behavior because of such implementations.
 
Keyword(s): Policy making,Internal Security,Model,satisfaction
 
References: 
  • ندارد
 
  Persian Abstract Yearly Visit 39
 
Latest on Blog
Enter SID Blog