Developing AJA cultural defense strategies against cultural aggression

Document Type : Original Article

Authors

1 PhD in Information Technology Management, Department of Management, Faculty of Management and Economics, Islamic Azad University, Science and Research Branch, Tehran, Iran

2 PhD Student in Cyber Strategic Management, Higher National Defense University, Tehran, Iran

3 Assistant Prof. of Management Group,, Imam Khomeini University, Nedaja, Nowshahr, Iran

4 PhD in Strategic Management, Higher National Defense University, Tehran, Iran

Abstract

In the face of cultural invasion, lack of sufficient knowledge of the nature and dimensions of cultural invasion It has been a major challenge in various sectors, especially the military And lack of insight and deep knowledge of this issue in such sensitive and important organizations, causes To the organization in adopting countermeasures as well as formulating programs to counter the cultural invasion of the enemy Do not have a proper approach. The purpose of this study is to develop AJA cultural defense strategies against cultural aggression.The type of research is applied and its approach is mixed (quantitative-qualitative) because in addition to qualitative analysis of theoretical foundations, a researcher-made questionnaire has also been used. The method of conducting research is contextual-case. In order to formulate strategies, the destination-goal-strategy (GOS) method has been used. Participants in the qualitative part of the research included 18 experts in the field of AJA culture and the statistical community. In a small part, it includes cultural activists at the AJA level Using Cochran's sample formula, there are 135 people. In order to collect information, library and field methods including semi-structured interviews and questionnaires were used. To analyze data from fuzzy Delphi method. The fuzzy Delphi method has been exploited using MATLAB software. Finally, 16 cultural defense strategies were counted along with the implementation requirements of each strategy.

Keywords


  •  

    • Biggs, S. (2000, January). Global village or urban jungle: Culture, self-construal, and the Internet. In Proceedings of the Media Ecology Association(Vol. 1, No. 1, pp. 28-36).
    • Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of computer‐mediated Communication13(1), 210-230.
    • Brenner, S. (2004). Toward A Criminal Law for Cyberspace: Product .University of Pittsburgh School of Law Journal of Technology Law and Policy.
    • Dodge, M. & Kitchin, R. (2001). Mapping Cyberspace, London: Routledge.
    • Ouchi, W. (1981). Theory Z: how American business can meet the Japanese challenge. Reading, Mass: Addison Wesley.

    Prusty, S. K., Mohapatra, P. K., & Mukherjee, C. K. (2010). GOS tree (Goal–Objective–Strategy tree) approach to strategic planning using a fuzzy-Delphi process: An application to the Indian Shrimp Industry. Technological Forecasting and Social Change77(3), 442-456.