Search or add a thesis

Advanced Search (Beta)
Home > Iran’S Nuclear Programme: its Regional and Global Implications

Iran’S Nuclear Programme: its Regional and Global Implications

Thesis Info

Access Option

External Link

Author

Muhammad Ismail, Muhammad Ismail

Program

PhD

Institute

Qurtuba University of Science and Information Technology

City

Dera Ismail Khan

Province

KPK

Country

Pakistan

Thesis Completing Year

2013

Thesis Completion Status

Completed

Subject

Political science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/2332/1/2812S.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676724819033

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Iran’s nuclear programme has created controversy at the regional and global levels. This issue has created diplomatic tension between Iran and the West. There is a need to assess Iran’s nuclear programme and the role of the regional and global community associated with this issue. The objective assessment of such type has to take into account the broader view of the prevailing geopolitical and security structure in the Southwest Asia, as well as the strategic interests of the US and her closest allies in the region, including the interests of Israel. There are two perspectives about Iran’s nuclear programme. First, Iranian leadership claims that its nuclear programme is in complete conformity with Non-Proliferation Treaty (NPT) statute and laws. Second, the US and her Western and regional allies in the Southwest Asia, blame the Iranian leadership in pursuing weapon-oriented nuclear programme. The current crisis of Iran’s nuclear programme is the product of several domestic, regional and international factors. The pattern of interaction between Iran and the regional states is rooted in history, which also determines the exigencies of their relationship. In fact, history does not grow in vacuüm. The geostrategic factors have influenced historical forces nurturing the military and economic environment. No doubt, Iran’s nuclear programme is of serious nature and it could change or destabilize the regional strategic environment seriously. In the post-Cold War era, Iran’s nuclear enrichment programme is perhaps one of the most hot button issues in the world. It is one of those issues, which have polarized the opinion at almost all levels: Domestic, Regional and Global. The regional and global community perceives Iran’s nuclear programme serious threat to regional and global non-proliferation efforts. The general thrust of the study is to assess the interests of Iran, in the light of their great historical character, which does not influence by the pressure tactics and always stand against the global powers for their rights and independence.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

مراتب اختر کی شاعری کا پس منظر اور معاصر منظر نامہ

مراتب اختر کی شاعری کا پس منظر اور معاصر منظر نامہ

 

مراتب علی اختر کی شاعری کا پس منظر

 

                تغیر و تبدل انسانی زندگی کا خاصہ ہے اور تخلیقِ آدم سے ہی شاید یہ سلسلہ شروع ہو گیا تھا۔اگر مختلف تہذیبوں کی تاریخ کا مطالعہ کیاجائے تو یہ ثابت ہوتا ہے کہ تہذیبوں کی تبدیلی کے ساتھ ساتھ زبان وادب بھی متاثر ہوتا رہا اور اس میں بتدریج تبدیلیاں ہوتی رہیں۔یہ ایک مسلمہ حقیقت ہے کہ ادب معاشرے کو متاثر کرتا ہے اور معاشرہ ادب پر اثر انداز ہوتا ہے۔ اُردو زبان بھی ابتدائی دور میں فارسی ادب سے زیادہ متاثر ہوئی۔ اُردو کی ابتدائی شاعری کے مطالعہ سے پتا چلتا ہے کہ ہمارے شعراء نے بھی وہی گل وبلبل کے قصے اور محبوب کی بے وفائی کو شاعری کا موضوع بنایا۔ اگرچہ مرزا مظہر علی خاں کو بعض ناقدین اُردو شاعری کی کثافت کو کم کرنے کا معمارِ اوّل سمجھتے ہیں اور میرتقی میرؔ نے بھی یہ دعویٰ کیا تھا۔

                اِس بات پر تمام ناقدین متفق ہیں کہ اُردو شاعری میں جدت کی بنیاد مولانا الطاف حسین حالیؔ نے رکھی۔ اگرچہ اِس سے پہلے نظیر اکبرآبادیؔ بھی شاعری کو اُمرا کی محفلوں سے نکال کر غرباء کے مساکن اور گلی محلوں تک لے آئے تھے۔ مگر حالی وہ شخصیت ہیں جنہوںنے اس بنیاد پر بہت بڑی عمارت کھڑی کردی۔ مولانا الطاف حسین حالیؔ اس حوالے سے ’’مجموعہ نظم حالی‘‘ میں جدید اردو شاعری میں فطرت نگاری، مقصدیت اور سادگی کو شاعری کا لازمہ قرار دیتے ہیں۔(۱)

                مولانا الطاف حسین حالیؔ سرسید کے رفقائے کار میں سے تھے اور سرسید احمد خان کے نظریات، فلسفہ اور اصلاحِ قوم کے...

بینک اکاؤنٹس کی فقہی حیثیت اور کٹوتی زکوۃ [ایک تحقیقی جائزہ]

Zakat is one of the most important elements of Islam, which is obligatory upon every able-bodied Muslim after fulfilling the conditions of Zakat. In this regard, zakat payers either pay their zakat themselves or the government collects zakat from them through financial institutions, in which a large part is obtained through bank accounts, so four points need to be researched in this article. 1. The accounts of the people in the bank will be counted according to which type of assets? The preferable opinion in this is that the bank accounts will be counted among the internal assets.2. Does the government have the right to withdraw zakat from people's deposits in the bank or the owner of the property? The opinion of the majority of scholars is that it is obligatory to give Zakat to the government of the external assets, and the government has the authority to ask for Zakat regarding the internal assets 3. Are bank accounts like loans? In summary, the status of a bank account is similar to a debt, but a new type of debt. 4. Are all the conditions of Zakat observed in Pakistani banks regarding the deduction of Zakat or not? From the evidences, it has been concluded that there are six flaws in the method of zakat collection through banks. In this paper, Analytical research methodology is adopted. In this paper, the researcher has preferred to derive concepts from the primary sources related to the subject and later has used secondary sources and contemporary references so that the subject is embellished by the combination of ancient and modern views.

Behavior Driven Host Based Insider Threats Detection of Misuse of Information for Windows Environment.

With the evolution of information technology in the corporate sector, the working paradigm shifted from manual to automated. On one side, it has leveraged human efforts of managing and maintaining the document files efficiently while on the other hand, it demands more security efforts for confidential documents because of the availability of large number of access channels. So the horizon of information security has also expanded from physical to electronic. This laid the foundation of developing more security mechanisms for protecting valuable information. The need and use of internet inside the organizations made this security problem quite nontrivial. Organizations not only have to protect those documents from external (outside the organization) attackers but also have to do the same for insiders (their legitimate users). Time has proven that majority of the attacks to tamper the confidentiality of information of an organization comes from external attackers but most of the attacks that get successful are from insiders. This is due to an obvious fact that insiders already possess the information external attackers would need to find out to penetrate into a system. It has always been an intricate job to protect your critical assets from those who not only have your trust but are also privileged to access those assets. This also holds good for insiders who (normally) are the rightful users of confidential information in the organization. Their privileged access to secret resources, knowledge about critical information and security mechanisms implemented inside the organization and their ability to bypass the existing security arrangements make the insider threats detection problem quite a significant one. The criticality of the problem can be vindicated by the fact that even a little misuse of the confidential informational assets of the organization may bring the reputation of the organization down from first-rate standing to below-par and can adversely affect the its financial position. To cope up with the aforementioned challenges, a host based framework for insider threats detection of information misuse has been presented in this dissertation. This research work has broad applicability with reference to the organizations of Pakistan especially those which work on missioncritical projects and products like Khan Research Laboratories, National Development Complex, Atomic Energy Commission, National Engineering and Scientific Commission. Private sector organizations can also benefit if the confidentiality of their secret information is critically significant for them. This framework will enable these organizations to cope up with the security threats posed by the insiders even if they already use a third party tool for detection. Such organizations can get advantage from the framework in their efforts to avoid/reduce possible insider attacks. Tunable parameters of the framework make it flexible and organizations can use it according to their need and security requirements. The framework in its nature is a comprehensive one. It not only comprehends technical measures but also covers psychological indicators to handle the misuse of information by insiders. Compared with the available methodologies, it incorporates a more practical approach. It provides a novel methodology of risk assessment which practically quantifies the risks and assigns threats level to each user depending upon his/her behavior, a problem which has not been handled in detail in the current literature of insiders. It also denies the famous assumption of no covert channel’s presence in the mechanisms used for detection. It proves the aforementioned assumption as unrealistic and a great threat to the organization. It discusses a deployment methodology to avoid this assumption. In this deployment, the source code of the developed application is accessible only to the higher management of the organization in order to detect any illegal changes in the source files through different techniques like code reviews etc. Besides describing efficient behavioral classification mechanism through fuzzy classifier, development of information sensors to capture necessary information, reduction in overall processing overheads by deploying non uniform security policies and the way to minimize false alarms by filtering insiders in different stages, it also provides an exhaustive blue print of scenario building and testing methodology in order to validate the framework. This validation methodology is quite closer to the real world environment of the organizations by simulating the real attack scenarios on the framework instead of theoretically providing a validation methodology. In epitome, the framework provides sufficient contributions to the knowledge of the insider threats detection domain. We, here in Pakistan would have remained unaware of the latest research in the field of networks and information security had HEC (Higher Education Commission of Pakistan) not taken revolutionary steps like providing free access to many digital resources and libraries, facilitating students with laptops, providing research grants and scholarships. The vision of HEC has enabled researchers to reveal the positive value that their research can bring into this country. Its technical and financial support has been a beacon for individuals who want to pursue their research work in the area of their interest. It is also due to the support of HEC that we have been able to conduct this research. HEC facilitated us in all ways during the course of this research work. From providing the supervision of knowledgeable academic professionals to the facilitation of modern literature, tools, accommodation and arrangements, HEC’s role has been very sublime and encouraging.