-

Document Type : Research Paper

Authors

1 International Relations Department, Faculty of Law and Political Science, Kharazmi University, Tehran, Iran

2 Assistant Professor, Political Science Department, Faculty of Humanities, Yasuj University, Yasuj, Iran


  • Bigo, D. (2008). International Political Sociology. In Paul D. Williams. Security Studies: an introduction. London & New York: Routledge.
  • Booth, K. (1991). “Security and emancipation”. Review of International Studies, Vol. 17, No. 4: 313–326.
  • Burchill, S. & Linklater, A. (2005). Introduction. In Scott Burchill, Andrew Linklater, Richard Devetak, Jack Donnelly, Matthew Paterson, Christian Reus-Smit and Jacqui True. Theories of International Relations. Third Edition. Hampshire & New York: Palgrave Macmillan.
  • Buzan, B. (1983). People, States & Fear: The National Security Problem in International Relations. Second Edition. Brighton: Harvester Books.
  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: a new framework for analysis. Boulder, Colo.: Lynne Rienner Publishers.
  • Checkel, J. T. (2013). Theoretical pluralism in IR: Possibilities and limits. In Walter Carlsnaes, Thomas Risse and Beth A. Simmons. Handbook of International Relations. Washington DC, Los Angles, London, New Delhi and Singapore: SAGE.
  • Clark, R. M. (2013). Intelligence Analysis: A Target-centric Approach. Fourth Edition. Washington, DC: SAGE Publications Ltd.
  • Cohen, R. (1978). “Threat Perception in International Crisis”. Political Science Quarterly, Vol. 93, No. 1: 93-107.
  • Dillon, G. M. (1990). “The Alliance of Security and Subjectivity”. Current Research on Peace and Violence, Vol. 13, No. 3: 101-124.
  • Federal Register (1979). Executive Order 12170 of Nov. 14, 1979: Blocking Iranian Government property. Retrieved from National Archives website: www.archives.gov/federal-register/codification/executive -order/12170. html
  • Federal Register (1980 a). Executive Order 12205 of Apr. 7, 1980: Prohibiting certain transactions with Iran. Retrieved from National Archives website: archives.gov/federal-register/codification/executive -order/12205. html
  • Federal Register (1980 b). Executive Order 12211 of Apr. 17, 1980: Further prohibitions on transactions with Iran. Retrieved from National Archives website: www.archives.gov/federal-register/codification/executive-order/12211. html
  • Federal Register (1981). Executive Order 12282 of Jan. 19, 1981: Revocation of prohibitions against transactions involving Iran. Retrieved from National Archives website: www.archives.gov/federal-register/codification/executive-order/12282.html
  • Ferris, J. (2003). Intelligence. In Robert Boyce & Joseph A. Maiolo. The Origins of World War Two: The Debate Continues. Basingstoke: Palgrave.
  • Godson, R. (1987). Intelligence: An American View. In K. G. Robertson. British and American Approaches to Intelligence. London: Palgrave Macmillan.
  • Grieco, J. M. (1988). “Anarchy and the Limits of Cooperation: A Realist Critique of the Newest Liberal Institutionalism”. International Organization. Vol. 42, No. 3: 485-507.
  • Jackson, p., & Siegel, J. (2005). Introduction. In Peter Jackson & Jennifer Siegel. Intelligence and Statecraft: The Use and Limits of Intelligence in International Society. Westport, Connecticut & London: Praeger.
  • Khomeini, R. (2010). Sahifa Imam: Collection of works of Imam Khomeini (statements, messages, interviews, rulings, religious permissions and letters) (September 1979 - November 1979). Volume 10. Fifth Edition. Tehran: Imam Khomeini Publishing House. (In Persian)
  • Lowenthal, M. M. (2009). Intelligence: From Secrets to Policy. 4nd edition. New York: CQ Press.
  • Moslehi, H., & Rezaei, N. (2020). An Introduction to Theories, Schools, and Approaches to "Security": Islam and the West. Tehran: Daa. (In Persian)
  • Scott, L., & Jackson, P. (2004). Journeys in Shadows. In Len Scott & Peter Jackson. Understanding Intelligence in the Twenty-First Century: Journeys in Shadows. London & New York: Routledge.
  • Shulsky, A. N., & Schmitt, G. J. (2002). Silent Warfare: Understanding the World of Intelligence. Third Edition. Washigton D.C. Potomac Books, Inc.
  • Wæver, O. (1995). Securitization and Desecuritization. In Ronnie D. Lipschutz. On Security. New York: Columbia University Press.
  • Wæver, O. (2004). “Aberystwyth, Paris, Copenhagen New ’Schools’ in Security Theory and their Origins between Core and Periphery”. Paper presented at the annual meeting of the International Studies Association, Montreal, March 17-20, 2004.
  • Website of the Supreme Leader (December 10, 2020). The dimensions of the model of overcoming sanctions and solving economic problems have been explained by the Supreme Leader of the Revolution: How are sanctions neutralized? Retrieved August 20, 2021, from: https://farsi.khamenei.ir/others-note?id=46964. (In Persian)
  • Website of the Supreme Leader (October 29, 2019). What structural problems have hindered the "prosperity of national production"? Retrieved on August 20, 2021, from: https://farsi.khamenei.ir/others-note?id=44090. (In Persian)