CINXE.COM
M. Kubilay Akman | Universidad de Granada - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>M. Kubilay Akman | Universidad de Granada - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="7ivFjT58nZnHKZOp2kncbJ1cB0F2SkVjf1oGY-hnGIwhrI7P4p70N0w8SwLrG9zvooczD-bwDk1a1E6wlCRjHw" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-3d36c19b4875b226bfed0fcba1dcea3f2fe61148383d97c0465c016b8c969290.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-79e78ce59bef0a338eb6540ec3d93b4a7952115b56c57f1760943128f4544d42.css" /><script type="application/ld+json">{"@context":"https://schema.org","@type":"ProfilePage","mainEntity":{"@context":"https://schema.org","@type":"Person","name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman","image":"https://0.academia-photos.com/95615525/20901319/37671456/s200_m._kubilay.akman.jpg","sameAs":[]},"dateCreated":"2018-10-21T10:04:49-07:00","dateModified":"2021-09-06T10:27:44-07:00","name":"M. Kubilay Akman","description":"Sociology...","image":"https://0.academia-photos.com/95615525/20901319/37671456/s200_m._kubilay.akman.jpg","thumbnailUrl":"https://0.academia-photos.com/95615525/20901319/37671456/s65_m._kubilay.akman.jpg","primaryImageOfPage":{"@type":"ImageObject","url":"https://0.academia-photos.com/95615525/20901319/37671456/s200_m._kubilay.akman.jpg","width":200},"sameAs":[],"relatedLink":"https://www.academia.edu/44386024/DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS"}</script><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-95367dc03b794f6737f30123738a886cf53b7a65cdef98a922a98591d60063e3.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-8c9ae4b5c8a2531640c354d92a1f3579c8ff103277ef74913e34c8a76d4e6c00.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-170d1319f0e354621e81ca17054bb147da2856ec0702fe440a99af314a6338c5.css" /><style type="text/css">@media(max-width: 567px){:root{--token-mode: Parity;--dropshadow: 0 2px 4px 0 #22223340;--primary-brand: #0645b1;--error-dark: #b60000;--success-dark: #05b01c;--inactive-fill: #ebebee;--hover: #0c3b8d;--pressed: #082f75;--button-primary-fill-inactive: #ebebee;--button-primary-fill: #0645b1;--button-primary-text: #ffffff;--button-primary-fill-hover: #0c3b8d;--button-primary-fill-press: #082f75;--button-primary-icon: #ffffff;--button-primary-fill-inverse: #ffffff;--button-primary-text-inverse: #082f75;--button-primary-icon-inverse: #0645b1;--button-primary-fill-inverse-hover: #cddaef;--button-primary-stroke-inverse-pressed: #0645b1;--button-secondary-stroke-inactive: #b1b1ba;--button-secondary-fill: #eef2f9;--button-secondary-text: #082f75;--button-secondary-fill-press: #cddaef;--button-secondary-fill-inactive: #ebebee;--button-secondary-stroke: #cddaef;--button-secondary-stroke-hover: #386ac1;--button-secondary-stroke-press: #0645b1;--button-secondary-text-inactive: #b1b1ba;--button-secondary-icon: #082f75;--button-secondary-fill-hover: #e6ecf7;--button-secondary-stroke-inverse: #ffffff;--button-secondary-fill-inverse: rgba(255, 255, 255, 0);--button-secondary-icon-inverse: #ffffff;--button-secondary-icon-hover: #082f75;--button-secondary-icon-press: #082f75;--button-secondary-text-inverse: #ffffff;--button-secondary-text-hover: #082f75;--button-secondary-text-press: #082f75;--button-secondary-fill-inverse-hover: #043059;--button-xs-stroke: #141413;--button-xs-stroke-hover: #0c3b8d;--button-xs-stroke-press: #082f75;--button-xs-stroke-inactive: #ebebee;--button-xs-text: #141413;--button-xs-text-hover: #0c3b8d;--button-xs-text-press: #082f75;--button-xs-text-inactive: #91919e;--button-xs-icon: #141413;--button-xs-icon-hover: #0c3b8d;--button-xs-icon-press: #082f75;--button-xs-icon-inactive: #91919e;--button-xs-fill: #ffffff;--button-xs-fill-hover: #f4f7fc;--button-xs-fill-press: #eef2f9;--buttons-button-text-inactive: #91919e;--buttons-button-focus: #0645b1;--buttons-button-icon-inactive: #91919e;--buttons-small-buttons-corner-radius: 8px;--buttons-small-buttons-l-r-padding: 12px;--buttons-small-buttons-height: 44px;--buttons-small-buttons-gap: 8px;--buttons-small-buttons-icon-only-width: 44px;--buttons-small-buttons-icon-size: 20px;--buttons-small-buttons-stroke-default: 1px;--buttons-small-buttons-stroke-thick: 2px;--buttons-large-buttons-l-r-padding: 20px;--buttons-large-buttons-height: 54px;--buttons-large-buttons-icon-only-width: 54px;--buttons-large-buttons-icon-size: 20px;--buttons-large-buttons-gap: 8px;--buttons-large-buttons-corner-radius: 8px;--buttons-large-buttons-stroke-default: 1px;--buttons-large-buttons-stroke-thick: 2px;--buttons-extra-small-buttons-l-r-padding: 8px;--buttons-extra-small-buttons-height: 32px;--buttons-extra-small-buttons-icon-size: 16px;--buttons-extra-small-buttons-gap: 4px;--buttons-extra-small-buttons-corner-radius: 8px;--buttons-stroke-default: 1px;--buttons-stroke-thick: 2px;--background-beige: #f9f7f4;--error-light: #fff2f2;--text-placeholder: #6d6d7d;--stroke-dark: #141413;--stroke-light: #dddde2;--stroke-medium: #535366;--accent-green: #ccffd4;--accent-turquoise: #ccf7ff;--accent-yellow: #f7ffcc;--accent-peach: #ffd4cc;--accent-violet: #f7ccff;--accent-purple: #f4f7fc;--text-primary: #141413;--secondary-brand: #141413;--text-hover: #0c3b8d;--text-white: #ffffff;--text-link: #0645b1;--text-press: #082f75;--success-light: #f0f8f1;--background-light-blue: #eef2f9;--background-white: #ffffff;--premium-dark: #877440;--premium-light: #f9f6ed;--stroke-white: #ffffff;--inactive-content: #b1b1ba;--annotate-light: #a35dff;--annotate-dark: #824acc;--grid: #eef2f9;--inactive-stroke: #ebebee;--shadow: rgba(34, 34, 51, 0.25);--text-inactive: #6d6d7d;--text-error: #b60000;--stroke-error: #b60000;--background-error: #fff2f2;--background-black: #141413;--icon-default: #141413;--icon-blue: #0645b1;--background-grey: #dddde2;--icon-grey: #b1b1ba;--text-focus: #082f75;--brand-colors-neutral-black: #141413;--brand-colors-neutral-900: #535366;--brand-colors-neutral-800: #6d6d7d;--brand-colors-neutral-700: #91919e;--brand-colors-neutral-600: #b1b1ba;--brand-colors-neutral-500: #c8c8cf;--brand-colors-neutral-400: #dddde2;--brand-colors-neutral-300: #ebebee;--brand-colors-neutral-200: #f8f8fb;--brand-colors-neutral-100: #fafafa;--brand-colors-neutral-white: #ffffff;--brand-colors-blue-900: #043059;--brand-colors-blue-800: #082f75;--brand-colors-blue-700: #0c3b8d;--brand-colors-blue-600: #0645b1;--brand-colors-blue-500: #386ac1;--brand-colors-blue-400: #cddaef;--brand-colors-blue-300: #e6ecf7;--brand-colors-blue-200: #eef2f9;--brand-colors-blue-100: #f4f7fc;--brand-colors-gold-500: #877440;--brand-colors-gold-400: #e9e3d4;--brand-colors-gold-300: #f2efe8;--brand-colors-gold-200: #f9f6ed;--brand-colors-gold-100: #f9f7f4;--brand-colors-error-900: #920000;--brand-colors-error-500: #b60000;--brand-colors-success-900: #035c0f;--brand-colors-green: #ccffd4;--brand-colors-turquoise: #ccf7ff;--brand-colors-yellow: #f7ffcc;--brand-colors-peach: #ffd4cc;--brand-colors-violet: #f7ccff;--brand-colors-error-100: #fff2f2;--brand-colors-success-500: #05b01c;--brand-colors-success-100: #f0f8f1;--text-secondary: #535366;--icon-white: #ffffff;--background-beige-darker: #f2efe8;--icon-dark-grey: #535366;--type-font-family-sans-serif: Roboto;--type-font-family-serif: Georgia;--type-font-family-mono: IBM Plex Mono;--type-weights-300: 300;--type-weights-400: 400;--type-weights-500: 500;--type-weights-700: 700;--type-sizes-12: 12px;--type-sizes-14: 14px;--type-sizes-16: 16px;--type-sizes-18: 18px;--type-sizes-20: 20px;--type-sizes-22: 22px;--type-sizes-24: 24px;--type-sizes-28: 28px;--type-sizes-30: 30px;--type-sizes-32: 32px;--type-sizes-40: 40px;--type-sizes-42: 42px;--type-sizes-48-2: 48px;--type-line-heights-16: 16px;--type-line-heights-20: 20px;--type-line-heights-23: 23px;--type-line-heights-24: 24px;--type-line-heights-25: 25px;--type-line-heights-26: 26px;--type-line-heights-29: 29px;--type-line-heights-30: 30px;--type-line-heights-32: 32px;--type-line-heights-34: 34px;--type-line-heights-35: 35px;--type-line-heights-36: 36px;--type-line-heights-38: 38px;--type-line-heights-40: 40px;--type-line-heights-46: 46px;--type-line-heights-48: 48px;--type-line-heights-52: 52px;--type-line-heights-58: 58px;--type-line-heights-68: 68px;--type-line-heights-74: 74px;--type-line-heights-82: 82px;--type-paragraph-spacings-0: 0px;--type-paragraph-spacings-4: 4px;--type-paragraph-spacings-8: 8px;--type-paragraph-spacings-16: 16px;--type-sans-serif-xl-font-weight: 400;--type-sans-serif-xl-size: 32px;--type-sans-serif-xl-line-height: 46px;--type-sans-serif-xl-paragraph-spacing: 16px;--type-sans-serif-lg-font-weight: 400;--type-sans-serif-lg-size: 30px;--type-sans-serif-lg-line-height: 36px;--type-sans-serif-lg-paragraph-spacing: 16px;--type-sans-serif-md-font-weight: 400;--type-sans-serif-md-line-height: 30px;--type-sans-serif-md-paragraph-spacing: 16px;--type-sans-serif-md-size: 24px;--type-sans-serif-xs-font-weight: 700;--type-sans-serif-xs-line-height: 24px;--type-sans-serif-xs-paragraph-spacing: 0px;--type-sans-serif-xs-size: 18px;--type-sans-serif-sm-font-weight: 400;--type-sans-serif-sm-line-height: 32px;--type-sans-serif-sm-paragraph-spacing: 16px;--type-sans-serif-sm-size: 20px;--type-body-xl-font-weight: 400;--type-body-xl-size: 24px;--type-body-xl-line-height: 36px;--type-body-xl-paragraph-spacing: 0px;--type-body-sm-font-weight: 400;--type-body-sm-size: 14px;--type-body-sm-line-height: 20px;--type-body-sm-paragraph-spacing: 8px;--type-body-xs-font-weight: 400;--type-body-xs-size: 12px;--type-body-xs-line-height: 16px;--type-body-xs-paragraph-spacing: 0px;--type-body-md-font-weight: 400;--type-body-md-size: 16px;--type-body-md-line-height: 20px;--type-body-md-paragraph-spacing: 4px;--type-body-lg-font-weight: 400;--type-body-lg-size: 20px;--type-body-lg-line-height: 26px;--type-body-lg-paragraph-spacing: 16px;--type-body-lg-medium-font-weight: 500;--type-body-lg-medium-size: 20px;--type-body-lg-medium-line-height: 32px;--type-body-lg-medium-paragraph-spacing: 16px;--type-body-md-medium-font-weight: 500;--type-body-md-medium-size: 16px;--type-body-md-medium-line-height: 20px;--type-body-md-medium-paragraph-spacing: 4px;--type-body-sm-bold-font-weight: 700;--type-body-sm-bold-size: 14px;--type-body-sm-bold-line-height: 20px;--type-body-sm-bold-paragraph-spacing: 8px;--type-body-sm-medium-font-weight: 500;--type-body-sm-medium-size: 14px;--type-body-sm-medium-line-height: 20px;--type-body-sm-medium-paragraph-spacing: 8px;--type-serif-md-font-weight: 400;--type-serif-md-size: 32px;--type-serif-md-paragraph-spacing: 0px;--type-serif-md-line-height: 40px;--type-serif-sm-font-weight: 400;--type-serif-sm-size: 24px;--type-serif-sm-paragraph-spacing: 0px;--type-serif-sm-line-height: 26px;--type-serif-lg-font-weight: 400;--type-serif-lg-size: 48px;--type-serif-lg-paragraph-spacing: 0px;--type-serif-lg-line-height: 52px;--type-serif-xs-font-weight: 400;--type-serif-xs-size: 18px;--type-serif-xs-line-height: 24px;--type-serif-xs-paragraph-spacing: 0px;--type-serif-xl-font-weight: 400;--type-serif-xl-size: 48px;--type-serif-xl-paragraph-spacing: 0px;--type-serif-xl-line-height: 58px;--type-mono-md-font-weight: 400;--type-mono-md-size: 22px;--type-mono-md-line-height: 24px;--type-mono-md-paragraph-spacing: 0px;--type-mono-lg-font-weight: 400;--type-mono-lg-size: 40px;--type-mono-lg-line-height: 40px;--type-mono-lg-paragraph-spacing: 0px;--type-mono-sm-font-weight: 400;--type-mono-sm-size: 14px;--type-mono-sm-line-height: 24px;--type-mono-sm-paragraph-spacing: 0px;--spacing-xs-4: 4px;--spacing-xs-8: 8px;--spacing-xs-16: 16px;--spacing-sm-24: 24px;--spacing-sm-32: 32px;--spacing-md-40: 40px;--spacing-md-48: 48px;--spacing-lg-64: 64px;--spacing-lg-80: 80px;--spacing-xlg-104: 104px;--spacing-xlg-152: 152px;--spacing-xs-12: 12px;--spacing-page-section: 80px;--spacing-card-list-spacing: 48px;--spacing-text-section-spacing: 64px;--spacing-md-xs-headings: 40px;--corner-radius-radius-lg: 16px;--corner-radius-radius-sm: 4px;--corner-radius-radius-md: 8px;--corner-radius-radius-round: 104px}}@media(min-width: 568px)and (max-width: 1279px){:root{--token-mode: Parity;--dropshadow: 0 2px 4px 0 #22223340;--primary-brand: #0645b1;--error-dark: #b60000;--success-dark: #05b01c;--inactive-fill: #ebebee;--hover: #0c3b8d;--pressed: #082f75;--button-primary-fill-inactive: #ebebee;--button-primary-fill: #0645b1;--button-primary-text: #ffffff;--button-primary-fill-hover: #0c3b8d;--button-primary-fill-press: #082f75;--button-primary-icon: #ffffff;--button-primary-fill-inverse: #ffffff;--button-primary-text-inverse: #082f75;--button-primary-icon-inverse: #0645b1;--button-primary-fill-inverse-hover: #cddaef;--button-primary-stroke-inverse-pressed: #0645b1;--button-secondary-stroke-inactive: #b1b1ba;--button-secondary-fill: #eef2f9;--button-secondary-text: #082f75;--button-secondary-fill-press: #cddaef;--button-secondary-fill-inactive: #ebebee;--button-secondary-stroke: #cddaef;--button-secondary-stroke-hover: #386ac1;--button-secondary-stroke-press: #0645b1;--button-secondary-text-inactive: #b1b1ba;--button-secondary-icon: #082f75;--button-secondary-fill-hover: #e6ecf7;--button-secondary-stroke-inverse: #ffffff;--button-secondary-fill-inverse: rgba(255, 255, 255, 0);--button-secondary-icon-inverse: #ffffff;--button-secondary-icon-hover: #082f75;--button-secondary-icon-press: #082f75;--button-secondary-text-inverse: #ffffff;--button-secondary-text-hover: #082f75;--button-secondary-text-press: #082f75;--button-secondary-fill-inverse-hover: #043059;--button-xs-stroke: #141413;--button-xs-stroke-hover: #0c3b8d;--button-xs-stroke-press: #082f75;--button-xs-stroke-inactive: #ebebee;--button-xs-text: #141413;--button-xs-text-hover: #0c3b8d;--button-xs-text-press: #082f75;--button-xs-text-inactive: #91919e;--button-xs-icon: #141413;--button-xs-icon-hover: #0c3b8d;--button-xs-icon-press: #082f75;--button-xs-icon-inactive: #91919e;--button-xs-fill: #ffffff;--button-xs-fill-hover: #f4f7fc;--button-xs-fill-press: #eef2f9;--buttons-button-text-inactive: #91919e;--buttons-button-focus: #0645b1;--buttons-button-icon-inactive: #91919e;--buttons-small-buttons-corner-radius: 8px;--buttons-small-buttons-l-r-padding: 12px;--buttons-small-buttons-height: 44px;--buttons-small-buttons-gap: 8px;--buttons-small-buttons-icon-only-width: 44px;--buttons-small-buttons-icon-size: 20px;--buttons-small-buttons-stroke-default: 1px;--buttons-small-buttons-stroke-thick: 2px;--buttons-large-buttons-l-r-padding: 20px;--buttons-large-buttons-height: 54px;--buttons-large-buttons-icon-only-width: 54px;--buttons-large-buttons-icon-size: 20px;--buttons-large-buttons-gap: 8px;--buttons-large-buttons-corner-radius: 8px;--buttons-large-buttons-stroke-default: 1px;--buttons-large-buttons-stroke-thick: 2px;--buttons-extra-small-buttons-l-r-padding: 8px;--buttons-extra-small-buttons-height: 32px;--buttons-extra-small-buttons-icon-size: 16px;--buttons-extra-small-buttons-gap: 4px;--buttons-extra-small-buttons-corner-radius: 8px;--buttons-stroke-default: 1px;--buttons-stroke-thick: 2px;--background-beige: #f9f7f4;--error-light: #fff2f2;--text-placeholder: #6d6d7d;--stroke-dark: #141413;--stroke-light: #dddde2;--stroke-medium: #535366;--accent-green: #ccffd4;--accent-turquoise: #ccf7ff;--accent-yellow: #f7ffcc;--accent-peach: #ffd4cc;--accent-violet: #f7ccff;--accent-purple: #f4f7fc;--text-primary: #141413;--secondary-brand: #141413;--text-hover: #0c3b8d;--text-white: #ffffff;--text-link: #0645b1;--text-press: #082f75;--success-light: #f0f8f1;--background-light-blue: #eef2f9;--background-white: #ffffff;--premium-dark: #877440;--premium-light: #f9f6ed;--stroke-white: #ffffff;--inactive-content: #b1b1ba;--annotate-light: #a35dff;--annotate-dark: #824acc;--grid: #eef2f9;--inactive-stroke: #ebebee;--shadow: rgba(34, 34, 51, 0.25);--text-inactive: #6d6d7d;--text-error: #b60000;--stroke-error: #b60000;--background-error: #fff2f2;--background-black: #141413;--icon-default: #141413;--icon-blue: #0645b1;--background-grey: #dddde2;--icon-grey: #b1b1ba;--text-focus: #082f75;--brand-colors-neutral-black: #141413;--brand-colors-neutral-900: #535366;--brand-colors-neutral-800: #6d6d7d;--brand-colors-neutral-700: #91919e;--brand-colors-neutral-600: #b1b1ba;--brand-colors-neutral-500: #c8c8cf;--brand-colors-neutral-400: #dddde2;--brand-colors-neutral-300: #ebebee;--brand-colors-neutral-200: #f8f8fb;--brand-colors-neutral-100: #fafafa;--brand-colors-neutral-white: #ffffff;--brand-colors-blue-900: #043059;--brand-colors-blue-800: #082f75;--brand-colors-blue-700: #0c3b8d;--brand-colors-blue-600: #0645b1;--brand-colors-blue-500: #386ac1;--brand-colors-blue-400: #cddaef;--brand-colors-blue-300: #e6ecf7;--brand-colors-blue-200: #eef2f9;--brand-colors-blue-100: #f4f7fc;--brand-colors-gold-500: #877440;--brand-colors-gold-400: #e9e3d4;--brand-colors-gold-300: #f2efe8;--brand-colors-gold-200: #f9f6ed;--brand-colors-gold-100: #f9f7f4;--brand-colors-error-900: #920000;--brand-colors-error-500: #b60000;--brand-colors-success-900: #035c0f;--brand-colors-green: #ccffd4;--brand-colors-turquoise: #ccf7ff;--brand-colors-yellow: #f7ffcc;--brand-colors-peach: #ffd4cc;--brand-colors-violet: #f7ccff;--brand-colors-error-100: #fff2f2;--brand-colors-success-500: #05b01c;--brand-colors-success-100: #f0f8f1;--text-secondary: #535366;--icon-white: #ffffff;--background-beige-darker: #f2efe8;--icon-dark-grey: #535366;--type-font-family-sans-serif: Roboto;--type-font-family-serif: Georgia;--type-font-family-mono: IBM Plex Mono;--type-weights-300: 300;--type-weights-400: 400;--type-weights-500: 500;--type-weights-700: 700;--type-sizes-12: 12px;--type-sizes-14: 14px;--type-sizes-16: 16px;--type-sizes-18: 18px;--type-sizes-20: 20px;--type-sizes-22: 22px;--type-sizes-24: 24px;--type-sizes-28: 28px;--type-sizes-30: 30px;--type-sizes-32: 32px;--type-sizes-40: 40px;--type-sizes-42: 42px;--type-sizes-48-2: 48px;--type-line-heights-16: 16px;--type-line-heights-20: 20px;--type-line-heights-23: 23px;--type-line-heights-24: 24px;--type-line-heights-25: 25px;--type-line-heights-26: 26px;--type-line-heights-29: 29px;--type-line-heights-30: 30px;--type-line-heights-32: 32px;--type-line-heights-34: 34px;--type-line-heights-35: 35px;--type-line-heights-36: 36px;--type-line-heights-38: 38px;--type-line-heights-40: 40px;--type-line-heights-46: 46px;--type-line-heights-48: 48px;--type-line-heights-52: 52px;--type-line-heights-58: 58px;--type-line-heights-68: 68px;--type-line-heights-74: 74px;--type-line-heights-82: 82px;--type-paragraph-spacings-0: 0px;--type-paragraph-spacings-4: 4px;--type-paragraph-spacings-8: 8px;--type-paragraph-spacings-16: 16px;--type-sans-serif-xl-font-weight: 400;--type-sans-serif-xl-size: 42px;--type-sans-serif-xl-line-height: 46px;--type-sans-serif-xl-paragraph-spacing: 16px;--type-sans-serif-lg-font-weight: 400;--type-sans-serif-lg-size: 32px;--type-sans-serif-lg-line-height: 36px;--type-sans-serif-lg-paragraph-spacing: 16px;--type-sans-serif-md-font-weight: 400;--type-sans-serif-md-line-height: 34px;--type-sans-serif-md-paragraph-spacing: 16px;--type-sans-serif-md-size: 28px;--type-sans-serif-xs-font-weight: 700;--type-sans-serif-xs-line-height: 25px;--type-sans-serif-xs-paragraph-spacing: 0px;--type-sans-serif-xs-size: 20px;--type-sans-serif-sm-font-weight: 400;--type-sans-serif-sm-line-height: 30px;--type-sans-serif-sm-paragraph-spacing: 16px;--type-sans-serif-sm-size: 24px;--type-body-xl-font-weight: 400;--type-body-xl-size: 24px;--type-body-xl-line-height: 36px;--type-body-xl-paragraph-spacing: 0px;--type-body-sm-font-weight: 400;--type-body-sm-size: 14px;--type-body-sm-line-height: 20px;--type-body-sm-paragraph-spacing: 8px;--type-body-xs-font-weight: 400;--type-body-xs-size: 12px;--type-body-xs-line-height: 16px;--type-body-xs-paragraph-spacing: 0px;--type-body-md-font-weight: 400;--type-body-md-size: 16px;--type-body-md-line-height: 20px;--type-body-md-paragraph-spacing: 4px;--type-body-lg-font-weight: 400;--type-body-lg-size: 20px;--type-body-lg-line-height: 26px;--type-body-lg-paragraph-spacing: 16px;--type-body-lg-medium-font-weight: 500;--type-body-lg-medium-size: 20px;--type-body-lg-medium-line-height: 32px;--type-body-lg-medium-paragraph-spacing: 16px;--type-body-md-medium-font-weight: 500;--type-body-md-medium-size: 16px;--type-body-md-medium-line-height: 20px;--type-body-md-medium-paragraph-spacing: 4px;--type-body-sm-bold-font-weight: 700;--type-body-sm-bold-size: 14px;--type-body-sm-bold-line-height: 20px;--type-body-sm-bold-paragraph-spacing: 8px;--type-body-sm-medium-font-weight: 500;--type-body-sm-medium-size: 14px;--type-body-sm-medium-line-height: 20px;--type-body-sm-medium-paragraph-spacing: 8px;--type-serif-md-font-weight: 400;--type-serif-md-size: 40px;--type-serif-md-paragraph-spacing: 0px;--type-serif-md-line-height: 48px;--type-serif-sm-font-weight: 400;--type-serif-sm-size: 28px;--type-serif-sm-paragraph-spacing: 0px;--type-serif-sm-line-height: 32px;--type-serif-lg-font-weight: 400;--type-serif-lg-size: 58px;--type-serif-lg-paragraph-spacing: 0px;--type-serif-lg-line-height: 68px;--type-serif-xs-font-weight: 400;--type-serif-xs-size: 18px;--type-serif-xs-line-height: 24px;--type-serif-xs-paragraph-spacing: 0px;--type-serif-xl-font-weight: 400;--type-serif-xl-size: 74px;--type-serif-xl-paragraph-spacing: 0px;--type-serif-xl-line-height: 82px;--type-mono-md-font-weight: 400;--type-mono-md-size: 22px;--type-mono-md-line-height: 24px;--type-mono-md-paragraph-spacing: 0px;--type-mono-lg-font-weight: 400;--type-mono-lg-size: 40px;--type-mono-lg-line-height: 40px;--type-mono-lg-paragraph-spacing: 0px;--type-mono-sm-font-weight: 400;--type-mono-sm-size: 14px;--type-mono-sm-line-height: 24px;--type-mono-sm-paragraph-spacing: 0px;--spacing-xs-4: 4px;--spacing-xs-8: 8px;--spacing-xs-16: 16px;--spacing-sm-24: 24px;--spacing-sm-32: 32px;--spacing-md-40: 40px;--spacing-md-48: 48px;--spacing-lg-64: 64px;--spacing-lg-80: 80px;--spacing-xlg-104: 104px;--spacing-xlg-152: 152px;--spacing-xs-12: 12px;--spacing-page-section: 104px;--spacing-card-list-spacing: 48px;--spacing-text-section-spacing: 80px;--spacing-md-xs-headings: 40px;--corner-radius-radius-lg: 16px;--corner-radius-radius-sm: 4px;--corner-radius-radius-md: 8px;--corner-radius-radius-round: 104px}}@media(min-width: 1280px){:root{--token-mode: Parity;--dropshadow: 0 2px 4px 0 #22223340;--primary-brand: #0645b1;--error-dark: #b60000;--success-dark: #05b01c;--inactive-fill: #ebebee;--hover: #0c3b8d;--pressed: #082f75;--button-primary-fill-inactive: #ebebee;--button-primary-fill: #0645b1;--button-primary-text: #ffffff;--button-primary-fill-hover: #0c3b8d;--button-primary-fill-press: #082f75;--button-primary-icon: #ffffff;--button-primary-fill-inverse: #ffffff;--button-primary-text-inverse: #082f75;--button-primary-icon-inverse: #0645b1;--button-primary-fill-inverse-hover: #cddaef;--button-primary-stroke-inverse-pressed: #0645b1;--button-secondary-stroke-inactive: #b1b1ba;--button-secondary-fill: #eef2f9;--button-secondary-text: #082f75;--button-secondary-fill-press: #cddaef;--button-secondary-fill-inactive: #ebebee;--button-secondary-stroke: #cddaef;--button-secondary-stroke-hover: #386ac1;--button-secondary-stroke-press: #0645b1;--button-secondary-text-inactive: #b1b1ba;--button-secondary-icon: #082f75;--button-secondary-fill-hover: #e6ecf7;--button-secondary-stroke-inverse: #ffffff;--button-secondary-fill-inverse: rgba(255, 255, 255, 0);--button-secondary-icon-inverse: #ffffff;--button-secondary-icon-hover: #082f75;--button-secondary-icon-press: #082f75;--button-secondary-text-inverse: #ffffff;--button-secondary-text-hover: #082f75;--button-secondary-text-press: #082f75;--button-secondary-fill-inverse-hover: #043059;--button-xs-stroke: #141413;--button-xs-stroke-hover: #0c3b8d;--button-xs-stroke-press: #082f75;--button-xs-stroke-inactive: #ebebee;--button-xs-text: #141413;--button-xs-text-hover: #0c3b8d;--button-xs-text-press: #082f75;--button-xs-text-inactive: #91919e;--button-xs-icon: #141413;--button-xs-icon-hover: #0c3b8d;--button-xs-icon-press: #082f75;--button-xs-icon-inactive: #91919e;--button-xs-fill: #ffffff;--button-xs-fill-hover: #f4f7fc;--button-xs-fill-press: #eef2f9;--buttons-button-text-inactive: #91919e;--buttons-button-focus: #0645b1;--buttons-button-icon-inactive: #91919e;--buttons-small-buttons-corner-radius: 8px;--buttons-small-buttons-l-r-padding: 12px;--buttons-small-buttons-height: 44px;--buttons-small-buttons-gap: 8px;--buttons-small-buttons-icon-only-width: 44px;--buttons-small-buttons-icon-size: 20px;--buttons-small-buttons-stroke-default: 1px;--buttons-small-buttons-stroke-thick: 2px;--buttons-large-buttons-l-r-padding: 20px;--buttons-large-buttons-height: 54px;--buttons-large-buttons-icon-only-width: 54px;--buttons-large-buttons-icon-size: 20px;--buttons-large-buttons-gap: 8px;--buttons-large-buttons-corner-radius: 8px;--buttons-large-buttons-stroke-default: 1px;--buttons-large-buttons-stroke-thick: 2px;--buttons-extra-small-buttons-l-r-padding: 8px;--buttons-extra-small-buttons-height: 32px;--buttons-extra-small-buttons-icon-size: 16px;--buttons-extra-small-buttons-gap: 4px;--buttons-extra-small-buttons-corner-radius: 8px;--buttons-stroke-default: 1px;--buttons-stroke-thick: 2px;--background-beige: #f9f7f4;--error-light: #fff2f2;--text-placeholder: #6d6d7d;--stroke-dark: #141413;--stroke-light: #dddde2;--stroke-medium: #535366;--accent-green: #ccffd4;--accent-turquoise: #ccf7ff;--accent-yellow: #f7ffcc;--accent-peach: #ffd4cc;--accent-violet: #f7ccff;--accent-purple: #f4f7fc;--text-primary: #141413;--secondary-brand: #141413;--text-hover: #0c3b8d;--text-white: #ffffff;--text-link: #0645b1;--text-press: #082f75;--success-light: #f0f8f1;--background-light-blue: #eef2f9;--background-white: #ffffff;--premium-dark: #877440;--premium-light: #f9f6ed;--stroke-white: #ffffff;--inactive-content: #b1b1ba;--annotate-light: #a35dff;--annotate-dark: #824acc;--grid: #eef2f9;--inactive-stroke: #ebebee;--shadow: rgba(34, 34, 51, 0.25);--text-inactive: #6d6d7d;--text-error: #b60000;--stroke-error: #b60000;--background-error: #fff2f2;--background-black: #141413;--icon-default: #141413;--icon-blue: #0645b1;--background-grey: #dddde2;--icon-grey: #b1b1ba;--text-focus: #082f75;--brand-colors-neutral-black: #141413;--brand-colors-neutral-900: #535366;--brand-colors-neutral-800: #6d6d7d;--brand-colors-neutral-700: #91919e;--brand-colors-neutral-600: #b1b1ba;--brand-colors-neutral-500: #c8c8cf;--brand-colors-neutral-400: #dddde2;--brand-colors-neutral-300: #ebebee;--brand-colors-neutral-200: #f8f8fb;--brand-colors-neutral-100: #fafafa;--brand-colors-neutral-white: #ffffff;--brand-colors-blue-900: #043059;--brand-colors-blue-800: #082f75;--brand-colors-blue-700: #0c3b8d;--brand-colors-blue-600: #0645b1;--brand-colors-blue-500: #386ac1;--brand-colors-blue-400: #cddaef;--brand-colors-blue-300: #e6ecf7;--brand-colors-blue-200: #eef2f9;--brand-colors-blue-100: #f4f7fc;--brand-colors-gold-500: #877440;--brand-colors-gold-400: #e9e3d4;--brand-colors-gold-300: #f2efe8;--brand-colors-gold-200: #f9f6ed;--brand-colors-gold-100: #f9f7f4;--brand-colors-error-900: #920000;--brand-colors-error-500: #b60000;--brand-colors-success-900: #035c0f;--brand-colors-green: #ccffd4;--brand-colors-turquoise: #ccf7ff;--brand-colors-yellow: #f7ffcc;--brand-colors-peach: #ffd4cc;--brand-colors-violet: #f7ccff;--brand-colors-error-100: #fff2f2;--brand-colors-success-500: #05b01c;--brand-colors-success-100: #f0f8f1;--text-secondary: #535366;--icon-white: #ffffff;--background-beige-darker: #f2efe8;--icon-dark-grey: #535366;--type-font-family-sans-serif: Roboto;--type-font-family-serif: Georgia;--type-font-family-mono: IBM Plex Mono;--type-weights-300: 300;--type-weights-400: 400;--type-weights-500: 500;--type-weights-700: 700;--type-sizes-12: 12px;--type-sizes-14: 14px;--type-sizes-16: 16px;--type-sizes-18: 18px;--type-sizes-20: 20px;--type-sizes-22: 22px;--type-sizes-24: 24px;--type-sizes-28: 28px;--type-sizes-30: 30px;--type-sizes-32: 32px;--type-sizes-40: 40px;--type-sizes-42: 42px;--type-sizes-48-2: 48px;--type-line-heights-16: 16px;--type-line-heights-20: 20px;--type-line-heights-23: 23px;--type-line-heights-24: 24px;--type-line-heights-25: 25px;--type-line-heights-26: 26px;--type-line-heights-29: 29px;--type-line-heights-30: 30px;--type-line-heights-32: 32px;--type-line-heights-34: 34px;--type-line-heights-35: 35px;--type-line-heights-36: 36px;--type-line-heights-38: 38px;--type-line-heights-40: 40px;--type-line-heights-46: 46px;--type-line-heights-48: 48px;--type-line-heights-52: 52px;--type-line-heights-58: 58px;--type-line-heights-68: 68px;--type-line-heights-74: 74px;--type-line-heights-82: 82px;--type-paragraph-spacings-0: 0px;--type-paragraph-spacings-4: 4px;--type-paragraph-spacings-8: 8px;--type-paragraph-spacings-16: 16px;--type-sans-serif-xl-font-weight: 400;--type-sans-serif-xl-size: 42px;--type-sans-serif-xl-line-height: 46px;--type-sans-serif-xl-paragraph-spacing: 16px;--type-sans-serif-lg-font-weight: 400;--type-sans-serif-lg-size: 32px;--type-sans-serif-lg-line-height: 38px;--type-sans-serif-lg-paragraph-spacing: 16px;--type-sans-serif-md-font-weight: 400;--type-sans-serif-md-line-height: 34px;--type-sans-serif-md-paragraph-spacing: 16px;--type-sans-serif-md-size: 28px;--type-sans-serif-xs-font-weight: 700;--type-sans-serif-xs-line-height: 25px;--type-sans-serif-xs-paragraph-spacing: 0px;--type-sans-serif-xs-size: 20px;--type-sans-serif-sm-font-weight: 400;--type-sans-serif-sm-line-height: 30px;--type-sans-serif-sm-paragraph-spacing: 16px;--type-sans-serif-sm-size: 24px;--type-body-xl-font-weight: 400;--type-body-xl-size: 24px;--type-body-xl-line-height: 36px;--type-body-xl-paragraph-spacing: 0px;--type-body-sm-font-weight: 400;--type-body-sm-size: 14px;--type-body-sm-line-height: 20px;--type-body-sm-paragraph-spacing: 8px;--type-body-xs-font-weight: 400;--type-body-xs-size: 12px;--type-body-xs-line-height: 16px;--type-body-xs-paragraph-spacing: 0px;--type-body-md-font-weight: 400;--type-body-md-size: 16px;--type-body-md-line-height: 20px;--type-body-md-paragraph-spacing: 4px;--type-body-lg-font-weight: 400;--type-body-lg-size: 20px;--type-body-lg-line-height: 26px;--type-body-lg-paragraph-spacing: 16px;--type-body-lg-medium-font-weight: 500;--type-body-lg-medium-size: 20px;--type-body-lg-medium-line-height: 32px;--type-body-lg-medium-paragraph-spacing: 16px;--type-body-md-medium-font-weight: 500;--type-body-md-medium-size: 16px;--type-body-md-medium-line-height: 20px;--type-body-md-medium-paragraph-spacing: 4px;--type-body-sm-bold-font-weight: 700;--type-body-sm-bold-size: 14px;--type-body-sm-bold-line-height: 20px;--type-body-sm-bold-paragraph-spacing: 8px;--type-body-sm-medium-font-weight: 500;--type-body-sm-medium-size: 14px;--type-body-sm-medium-line-height: 20px;--type-body-sm-medium-paragraph-spacing: 8px;--type-serif-md-font-weight: 400;--type-serif-md-size: 40px;--type-serif-md-paragraph-spacing: 0px;--type-serif-md-line-height: 48px;--type-serif-sm-font-weight: 400;--type-serif-sm-size: 28px;--type-serif-sm-paragraph-spacing: 0px;--type-serif-sm-line-height: 32px;--type-serif-lg-font-weight: 400;--type-serif-lg-size: 58px;--type-serif-lg-paragraph-spacing: 0px;--type-serif-lg-line-height: 68px;--type-serif-xs-font-weight: 400;--type-serif-xs-size: 18px;--type-serif-xs-line-height: 24px;--type-serif-xs-paragraph-spacing: 0px;--type-serif-xl-font-weight: 400;--type-serif-xl-size: 74px;--type-serif-xl-paragraph-spacing: 0px;--type-serif-xl-line-height: 82px;--type-mono-md-font-weight: 400;--type-mono-md-size: 22px;--type-mono-md-line-height: 24px;--type-mono-md-paragraph-spacing: 0px;--type-mono-lg-font-weight: 400;--type-mono-lg-size: 40px;--type-mono-lg-line-height: 40px;--type-mono-lg-paragraph-spacing: 0px;--type-mono-sm-font-weight: 400;--type-mono-sm-size: 14px;--type-mono-sm-line-height: 24px;--type-mono-sm-paragraph-spacing: 0px;--spacing-xs-4: 4px;--spacing-xs-8: 8px;--spacing-xs-16: 16px;--spacing-sm-24: 24px;--spacing-sm-32: 32px;--spacing-md-40: 40px;--spacing-md-48: 48px;--spacing-lg-64: 64px;--spacing-lg-80: 80px;--spacing-xlg-104: 104px;--spacing-xlg-152: 152px;--spacing-xs-12: 12px;--spacing-page-section: 152px;--spacing-card-list-spacing: 48px;--spacing-text-section-spacing: 80px;--spacing-md-xs-headings: 40px;--corner-radius-radius-lg: 16px;--corner-radius-radius-sm: 4px;--corner-radius-radius-md: 8px;--corner-radius-radius-round: 104px}}</style><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-57f9da13cef3fd4e2a8b655342c6488eded3e557e823fe67571f2ac77acd7b6f.css" /> <meta name="author" content="m. kubilay akman" /> <meta name="description" content="M. Kubilay Akman, Universidad de Granada: 537 Followers, 162 Following, 17 Research papers. Research interests: Sociology of Security, International Security,…" /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '6ef822d7e766f9161c56b2e45cc17c9d5b7d9468'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":13945,"monthly_visitors":"136 million","monthly_visitor_count":136579771,"monthly_visitor_count_in_millions":136,"user_count":285135440,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1742190808000); window.Aedu.timeDifference = new Date().getTime() - 1742190808000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link rel="preload" href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" as="style" onload="this.rel='stylesheet'"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-9982828ed1de4777566441c35ccf7157c55ca779141fce69380d727ebdbbb926.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-948be8fa2cdf77e0edc9d37d89e2ceac6298a9cec36b295126fe6066d89fe4f6.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-3f0732fc165186a3e70d3de1b749e1a47b279db87e2188a19da2a0c42b75cab9.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://ugr.academia.edu/MKubilayAkman" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-e1d575982904827f1397a4a8ee10c2382667df3df47448516361b995ce9464bd.js" defer="defer"></script><script>$viewedUser = Aedu.User.set_viewed( {"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman","photo":"https://0.academia-photos.com/95615525/20901319/37671456/s65_m._kubilay.akman.jpg","has_photo":true,"department":{"id":653504,"name":"Escuela Internacional de Posgrado","url":"https://ugr.academia.edu/Departments/Escuela_Internacional_de_Posgrado/Documents","university":{"id":35490,"name":"Universidad de Granada","url":"https://ugr.academia.edu/"}},"position":"Alumnus","position_id":8,"is_analytics_public":false,"interests":[{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":5009,"name":"Strategic Management","url":"https://www.academia.edu/Documents/in/Strategic_Management"},{"id":45,"name":"Business Administration","url":"https://www.academia.edu/Documents/in/Business_Administration"},{"id":799,"name":"Public Administration","url":"https://www.academia.edu/Documents/in/Public_Administration"},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies"},{"id":44426,"name":"Military Studies","url":"https://www.academia.edu/Documents/in/Military_Studies"},{"id":21168,"name":"Strategy (Business)","url":"https://www.academia.edu/Documents/in/Strategy_Business_"},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":11166,"name":"Contemporary Social Theory","url":"https://www.academia.edu/Documents/in/Contemporary_Social_Theory"},{"id":559,"name":"Military Science","url":"https://www.academia.edu/Documents/in/Military_Science"},{"id":41773,"name":"Military Psychology","url":"https://www.academia.edu/Documents/in/Military_Psychology"},{"id":668476,"name":"Operational Psychology","url":"https://www.academia.edu/Documents/in/Operational_Psychology"},{"id":1710242,"name":"Close Quarters Combat","url":"https://www.academia.edu/Documents/in/Close_Quarters_Combat"},{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts"},{"id":521198,"name":"Self Defense","url":"https://www.academia.edu/Documents/in/Self_Defense"},{"id":1555,"name":"Film Studies","url":"https://www.academia.edu/Documents/in/Film_Studies"},{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://ugr.academia.edu/MKubilayAkman","location":"/MKubilayAkman","scheme":"https","host":"ugr.academia.edu","port":null,"pathname":"/MKubilayAkman","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-7df92193-cb73-41f6-80b8-5a4724dae269"></div> <div id="ProfileCheckPaperUpdate-react-component-7df92193-cb73-41f6-80b8-5a4724dae269"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="M. Kubilay Akman" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/95615525/20901319/37671456/s200_m._kubilay.akman.jpg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">M. Kubilay Akman</h1><div class="affiliations-container fake-truncate js-profile-affiliations"><div><a class="u-tcGrayDarker" href="https://ugr.academia.edu/">Universidad de Granada</a>, <a class="u-tcGrayDarker" href="https://ugr.academia.edu/Departments/Escuela_Internacional_de_Posgrado/Documents">Escuela Internacional de Posgrado</a>, <span class="u-tcGrayDarker">Alumnus</span></div></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="M. Kubilay" data-follow-user-id="95615525" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="95615525"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">537</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">162</p></div></a><div class="js-mentions-count-container" style="display: none;"><a href="/MKubilayAkman/mentions"><div class="stat-container"><p class="label">Mentions</p><p class="data"></p></div></a></div><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="user-bio-container"><div class="profile-bio fake-truncate js-profile-about" style="margin: 0px;">Sociology...<br /><div class="js-profile-less-about u-linkUnstyled u-tcGrayDarker u-textDecorationUnderline u-displayNone">less</div></div></div><div class="suggested-academics-container"><div class="suggested-academics--header"><p class="ds2-5-body-md-bold">Related Authors</p></div><ul class="suggested-user-card-list"><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://independent.academia.edu/RChandraThapa"><img class="profile-avatar u-positionAbsolute" alt="Ram Chandra Thapa" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/158934846/46628411/35971002/s200_ram.chandra_thapa.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/RChandraThapa">Ram Chandra Thapa</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://independent.academia.edu/UlfSteindl"><img class="profile-avatar u-positionAbsolute" alt="Ulf Steindl" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/9466912/10395082/30206193/s200_ulf.steindl.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/UlfSteindl">Ulf Steindl</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://independent.academia.edu/TimSweijs"><img class="profile-avatar u-positionAbsolute" border="0" alt="" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/TimSweijs">Tim Sweijs</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://bradleystrawser.academia.edu/WhitneyGrespin"><img class="profile-avatar u-positionAbsolute" alt="Whitney Grespin" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/48381579/12734410/14163815/s200_whitney.grespin.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://bradleystrawser.academia.edu/WhitneyGrespin">Whitney Grespin</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">US Naval Postgraduate School</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://conflictstudies.academia.edu/KeirGiles"><img class="profile-avatar u-positionAbsolute" alt="Keir Giles" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/257331/197752/31563098/s200_keir.giles.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://conflictstudies.academia.edu/KeirGiles">Keir Giles</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Conflict Studies Research Centre</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://norwich.academia.edu/DrRobertGreeneSands"><img class="profile-avatar u-positionAbsolute" border="0" alt="" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://norwich.academia.edu/DrRobertGreeneSands">Dr. Robert Greene Sands</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Norwich University</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://dliflc.academia.edu/PDeVisser"><img class="profile-avatar u-positionAbsolute" alt="Pieter DeVisser" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/9495321/11394636/12710067/s200_pieter.devisser.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://dliflc.academia.edu/PDeVisser">Pieter DeVisser</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Defense Language Institute</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://flacso-mx.academia.edu/MonicaCasalet"><img class="profile-avatar u-positionAbsolute" alt="Monica Casalet" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/255936/19325834/19993912/s200_monica.casalet.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://flacso-mx.academia.edu/MonicaCasalet">Monica Casalet</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Flacso México</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://independent.academia.edu/AndyYoung"><img class="profile-avatar u-positionAbsolute" alt="Andy Young" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/480040/161968/21193809/s200_andy.young.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/AndyYoung">Andy Young</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://anu-au.academia.edu/NickBosio"><img class="profile-avatar u-positionAbsolute" alt="Nick Bosio" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/10244984/3139573/66704692/s200_nick.bosio.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://anu-au.academia.edu/NickBosio">Nick Bosio</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">The Australian National University</p></div></div></ul></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span><a class="ri-more-link js-profile-ri-list-card" data-click-track="profile-user-info-primary-research-interest" data-has-card-for-ri-list="95615525">View All (14)</a></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="95615525" href="https://www.academia.edu/Documents/in/Sociology_of_Security"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://ugr.academia.edu/MKubilayAkman","location":"/MKubilayAkman","scheme":"https","host":"ugr.academia.edu","port":null,"pathname":"/MKubilayAkman","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Sociology of Security"]}" data-trace="false" data-dom-id="Pill-react-component-1d4d995b-9c08-4ce5-963c-04d220df6f06"></div> <div id="Pill-react-component-1d4d995b-9c08-4ce5-963c-04d220df6f06"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="95615525" href="https://www.academia.edu/Documents/in/Business_Administration"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Business Administration"]}" data-trace="false" data-dom-id="Pill-react-component-0679502d-9baf-4faa-8f16-86df3a45fc91"></div> <div id="Pill-react-component-0679502d-9baf-4faa-8f16-86df3a45fc91"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="95615525" href="https://www.academia.edu/Documents/in/Public_Administration"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Public Administration"]}" data-trace="false" data-dom-id="Pill-react-component-316772be-535f-47e7-999e-0647961f3f25"></div> <div id="Pill-react-component-316772be-535f-47e7-999e-0647961f3f25"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="95615525" href="https://www.academia.edu/Documents/in/Strategic_Studies"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Strategic Studies"]}" data-trace="false" data-dom-id="Pill-react-component-415c7e7d-beaa-47e5-869b-ede02271aaf0"></div> <div id="Pill-react-component-415c7e7d-beaa-47e5-869b-ede02271aaf0"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="95615525" href="https://www.academia.edu/Documents/in/Military_Studies"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Military Studies"]}" data-trace="false" data-dom-id="Pill-react-component-2db2d789-c352-4f1f-8375-7b0383762a8c"></div> <div id="Pill-react-component-2db2d789-c352-4f1f-8375-7b0383762a8c"></div> </a></div></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by M. Kubilay Akman</h3></div><div class="js-work-strip profile--work_container" data-work-id="44386024"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/44386024/DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS"><img alt="Research paper thumbnail of DEFENCE MANAGEMENT AND PESTLE ANALYSIS" class="work-thumbnail" src="https://attachments.academia-assets.com/64789979/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/44386024/DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS">DEFENCE MANAGEMENT AND PESTLE ANALYSIS</a></div><div class="wp-workCard_item"><span>Ante Portas – Security Studies</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Militaries are in a changing and evolving environment. Defence management, with references to bot...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Militaries are in a changing and evolving environment. Defence management, with references to both military science and general management field, is seeking possibilities, opportunities and methods for being transformed in this dynamic environment and contexts. Managing, commanding and leading requires to know what is around, how is the surrounding atmosphere of organizations, what are the current socio-political, economic, environmental, scientific and legal situations to be considered? PESTLE analysis is giving a chance to defence managers for answering these questions. In this article we will discuss PESTLE model and try to find a solution how we can enhance it through a strategic approach.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="1bdec8b501c02ba66d05b58167e81eda" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":64789979,"asset_id":44386024,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/64789979/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="44386024"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="44386024"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44386024; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44386024]").text(description); $(".js-view-count[data-work-id=44386024]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44386024; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='44386024']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "1bdec8b501c02ba66d05b58167e81eda" } } $('.js-work-strip[data-work-id=44386024]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":44386024,"title":"DEFENCE MANAGEMENT AND PESTLE ANALYSIS","translated_title":"","metadata":{"doi":"10.33674/3201910","issue":"14","volume":"1","abstract":"Militaries are in a changing and evolving environment. Defence management, with references to both military science and general management field, is seeking possibilities, opportunities and methods for being transformed in this dynamic environment and contexts. Managing, commanding and leading requires to know what is around, how is the surrounding atmosphere of organizations, what are the current socio-political, economic, environmental, scientific and legal situations to be considered? PESTLE analysis is giving a chance to defence managers for answering these questions. In this article we will discuss PESTLE model and try to find a solution how we can enhance it through a strategic approach.","page_numbers":"93-102","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Ante Portas – Security Studies"},"translated_abstract":"Militaries are in a changing and evolving environment. Defence management, with references to both military science and general management field, is seeking possibilities, opportunities and methods for being transformed in this dynamic environment and contexts. Managing, commanding and leading requires to know what is around, how is the surrounding atmosphere of organizations, what are the current socio-political, economic, environmental, scientific and legal situations to be considered? PESTLE analysis is giving a chance to defence managers for answering these questions. In this article we will discuss PESTLE model and try to find a solution how we can enhance it through a strategic approach.","internal_url":"https://www.academia.edu/44386024/DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS","translated_internal_url":"","created_at":"2020-10-28T03:29:34.509-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":64789979,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/64789979/thumbnails/1.jpg","file_name":"AP.XIV_Akman.pdf","download_url":"https://www.academia.edu/attachments/64789979/download_file","bulk_download_file_name":"DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/64789979/AP.XIV_Akman-libre.pdf?1603886121=\u0026response-content-disposition=attachment%3B+filename%3DDEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS.pdf\u0026Expires=1742161270\u0026Signature=DY0hPbHMwa8De0Pz0S3r1kVxwaUS-u86GBWkep1EyYF~E4iFDHl10puaJFWnQ0OIvA1jv2eszzv5CXPbq3WNuoliNI~KEy2d~QqbW5u2QCa7JmDLYSxBtHH9QcYOVLjnwyx7us4Hb1GoT06ggSTRz2izPiSb318xHPEUPfLiq2j~-fFmjbuErooPmAhikz9W5h2MoO3v21887C3qwhJyxIFHOKb3p5Px2uZEoIeDe3Oa5TXU-lqXVX1OZjVvPnUt40QYblfXm1UdJykBaDGxsN9ipZPt2YJSxIHMN7iDzepvalankZoggRi76tgsBfI~Zl-fNIyf1LTbSCQMRkpcdw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS","translated_slug":"","page_count":10,"language":"en","content_type":"Work","summary":"Militaries are in a changing and evolving environment. Defence management, with references to both military science and general management field, is seeking possibilities, opportunities and methods for being transformed in this dynamic environment and contexts. Managing, commanding and leading requires to know what is around, how is the surrounding atmosphere of organizations, what are the current socio-political, economic, environmental, scientific and legal situations to be considered? PESTLE analysis is giving a chance to defence managers for answering these questions. In this article we will discuss PESTLE model and try to find a solution how we can enhance it through a strategic approach.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":64789979,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/64789979/thumbnails/1.jpg","file_name":"AP.XIV_Akman.pdf","download_url":"https://www.academia.edu/attachments/64789979/download_file","bulk_download_file_name":"DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/64789979/AP.XIV_Akman-libre.pdf?1603886121=\u0026response-content-disposition=attachment%3B+filename%3DDEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS.pdf\u0026Expires=1742161270\u0026Signature=DY0hPbHMwa8De0Pz0S3r1kVxwaUS-u86GBWkep1EyYF~E4iFDHl10puaJFWnQ0OIvA1jv2eszzv5CXPbq3WNuoliNI~KEy2d~QqbW5u2QCa7JmDLYSxBtHH9QcYOVLjnwyx7us4Hb1GoT06ggSTRz2izPiSb318xHPEUPfLiq2j~-fFmjbuErooPmAhikz9W5h2MoO3v21887C3qwhJyxIFHOKb3p5Px2uZEoIeDe3Oa5TXU-lqXVX1OZjVvPnUt40QYblfXm1UdJykBaDGxsN9ipZPt2YJSxIHMN7iDzepvalankZoggRi76tgsBfI~Zl-fNIyf1LTbSCQMRkpcdw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management"},{"id":559,"name":"Military Science","url":"https://www.academia.edu/Documents/in/Military_Science"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":44426,"name":"Military Studies","url":"https://www.academia.edu/Documents/in/Military_Studies"},{"id":308258,"name":"Defense Management","url":"https://www.academia.edu/Documents/in/Defense_Management"},{"id":420401,"name":"Pestle","url":"https://www.academia.edu/Documents/in/Pestle"},{"id":458954,"name":"Pestel","url":"https://www.academia.edu/Documents/in/Pestel"},{"id":922619,"name":"PESTEL Analysis","url":"https://www.academia.edu/Documents/in/PESTEL_Analysis"},{"id":1004939,"name":"Defence Management","url":"https://www.academia.edu/Documents/in/Defence_Management"},{"id":1640035,"name":"PESTLE Analysis","url":"https://www.academia.edu/Documents/in/PESTLE_Analysis"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[{"id":9131246,"url":"http://anteportas.pl/1-2020"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40979539"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/40979539/Military_Unarmed_Combat_Training_Its_Methods_and_Socio_cultural_Aspects"><img alt="Research paper thumbnail of Military Unarmed Combat Training, Its Methods and Socio-cultural Aspects" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/40979539/Military_Unarmed_Combat_Training_Its_Methods_and_Socio_cultural_Aspects">Military Unarmed Combat Training, Its Methods and Socio-cultural Aspects</a></div><div class="wp-workCard_item"><span>17th International Sport Sciences Congress</span><span>, 2019</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40979539"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40979539"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40979539; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40979539]").text(description); $(".js-view-count[data-work-id=40979539]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40979539; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40979539']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=40979539]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40979539,"title":"Military Unarmed Combat Training, Its Methods and Socio-cultural Aspects","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"17th International Sport Sciences Congress"},"translated_abstract":null,"internal_url":"https://www.academia.edu/40979539/Military_Unarmed_Combat_Training_Its_Methods_and_Socio_cultural_Aspects","translated_internal_url":"","created_at":"2019-11-18T23:18:05.675-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Military_Unarmed_Combat_Training_Its_Methods_and_Socio_cultural_Aspects","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[],"research_interests":[{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":26642,"name":"Military Sociology","url":"https://www.academia.edu/Documents/in/Military_Sociology"},{"id":44426,"name":"Military Studies","url":"https://www.academia.edu/Documents/in/Military_Studies"},{"id":521198,"name":"Self Defense","url":"https://www.academia.edu/Documents/in/Self_Defense"},{"id":1710242,"name":"Close Quarters Combat","url":"https://www.academia.edu/Documents/in/Close_Quarters_Combat"}],"urls":[{"id":8893362,"url":"http://sbk2019.org/tr/program"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40652271"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40652271/SOSYAL_DEMOKRAS%C4%B0N%C4%B0N_%C4%B0DEOLOJ%C4%B0K_A%C3%87ILIMLARI_%C3%9CZER%C4%B0NE_DE%C4%9EERLEND%C4%B0RMELER"><img alt="Research paper thumbnail of SOSYAL DEMOKRASİNİN İDEOLOJİK AÇILIMLARI ÜZERİNE DEĞERLENDİRMELER" class="work-thumbnail" src="https://attachments.academia-assets.com/60934850/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40652271/SOSYAL_DEMOKRAS%C4%B0N%C4%B0N_%C4%B0DEOLOJ%C4%B0K_A%C3%87ILIMLARI_%C3%9CZER%C4%B0NE_DE%C4%9EERLEND%C4%B0RMELER">SOSYAL DEMOKRASİNİN İDEOLOJİK AÇILIMLARI ÜZERİNE DEĞERLENDİRMELER</a></div><div class="wp-workCard_item"><span>SOCIAL SCIENCES STUDIES JOURNAL</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ÖZET Demokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavr...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ÖZET<br />Demokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavramlardır. Sosyal demokratik düşünce Fransız Devrimi'nin "eşitlik, özgürlük, kardeşlik" ideallerinin nasıl toplumsallaşabileceğine dair sorular sormuştur. 19. Yüzyılda doğan, 20. Yüzyılın şekillenmesinde çok etkin olan demokratik sosyalizm (sosyal demokrasi) günümüzde güncel bir siyasi ideoloji ve akımdır. Sosyalizmin özgürlük ve demokrasi algısı eleştirel, dönüştürücü ve değiştirici bir toplumsal tahayyül sunar. Sosyalist Enternasyonal tüm dünyadaki sosyal demokrat partilerin bir araya geldiği bir uluslararası organizasyondur. Bu makalede SE'nin temsil ettiği özgürlük ve toplumsal adalet anlayışının ana hatları tartışılacaktır. Anahtar Kelimeler: sosyalizm, toplumsal özgürlük, demokratik sosyalizm, sosyal demokrasi, CHP, Sosyalist Enternasyonal.<br /><br />ABSTRACT <br />Democratic socialism and social democracy are political notions which are used often with similar meanings. Social democratic thought has asked questions about how French Revolution's "freedom, equality, fraternity" ideals can be further socialized. Democratic socialism (social democracy) is an actual political ideology and movement today which was born in 19th century, had been very influential in shaping 20th century. The freedom and democracy perception of socialism provides a transforming and reforming social imagination. Socialist International is the international organization where social democratic parties around the World take place. In this article freedom and social justice conception represented by SI will be discussed in its main lines.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="a5918b6c666a4668aaa4f3e984cd07c9" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":60934850,"asset_id":40652271,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/60934850/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40652271"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40652271"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40652271; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40652271]").text(description); $(".js-view-count[data-work-id=40652271]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40652271; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40652271']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "a5918b6c666a4668aaa4f3e984cd07c9" } } $('.js-work-strip[data-work-id=40652271]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40652271,"title":"SOSYAL DEMOKRASİNİN İDEOLOJİK AÇILIMLARI ÜZERİNE DEĞERLENDİRMELER","translated_title":"","metadata":{"doi":"10.26449/sssj.1782","issue":"45","volume":"5","abstract":"ÖZET\nDemokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavramlardır. Sosyal demokratik düşünce Fransız Devrimi'nin \"eşitlik, özgürlük, kardeşlik\" ideallerinin nasıl toplumsallaşabileceğine dair sorular sormuştur. 19. Yüzyılda doğan, 20. Yüzyılın şekillenmesinde çok etkin olan demokratik sosyalizm (sosyal demokrasi) günümüzde güncel bir siyasi ideoloji ve akımdır. Sosyalizmin özgürlük ve demokrasi algısı eleştirel, dönüştürücü ve değiştirici bir toplumsal tahayyül sunar. Sosyalist Enternasyonal tüm dünyadaki sosyal demokrat partilerin bir araya geldiği bir uluslararası organizasyondur. Bu makalede SE'nin temsil ettiği özgürlük ve toplumsal adalet anlayışının ana hatları tartışılacaktır. Anahtar Kelimeler: sosyalizm, toplumsal özgürlük, demokratik sosyalizm, sosyal demokrasi, CHP, Sosyalist Enternasyonal.\n\nABSTRACT \nDemocratic socialism and social democracy are political notions which are used often with similar meanings. Social democratic thought has asked questions about how French Revolution's \"freedom, equality, fraternity\" ideals can be further socialized. Democratic socialism (social democracy) is an actual political ideology and movement today which was born in 19th century, had been very influential in shaping 20th century. The freedom and democracy perception of socialism provides a transforming and reforming social imagination. Socialist International is the international organization where social democratic parties around the World take place. In this article freedom and social justice conception represented by SI will be discussed in its main lines.","page_numbers":"5315-5321","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"SOCIAL SCIENCES STUDIES JOURNAL"},"translated_abstract":"ÖZET\nDemokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavramlardır. Sosyal demokratik düşünce Fransız Devrimi'nin \"eşitlik, özgürlük, kardeşlik\" ideallerinin nasıl toplumsallaşabileceğine dair sorular sormuştur. 19. Yüzyılda doğan, 20. Yüzyılın şekillenmesinde çok etkin olan demokratik sosyalizm (sosyal demokrasi) günümüzde güncel bir siyasi ideoloji ve akımdır. Sosyalizmin özgürlük ve demokrasi algısı eleştirel, dönüştürücü ve değiştirici bir toplumsal tahayyül sunar. Sosyalist Enternasyonal tüm dünyadaki sosyal demokrat partilerin bir araya geldiği bir uluslararası organizasyondur. Bu makalede SE'nin temsil ettiği özgürlük ve toplumsal adalet anlayışının ana hatları tartışılacaktır. Anahtar Kelimeler: sosyalizm, toplumsal özgürlük, demokratik sosyalizm, sosyal demokrasi, CHP, Sosyalist Enternasyonal.\n\nABSTRACT \nDemocratic socialism and social democracy are political notions which are used often with similar meanings. Social democratic thought has asked questions about how French Revolution's \"freedom, equality, fraternity\" ideals can be further socialized. Democratic socialism (social democracy) is an actual political ideology and movement today which was born in 19th century, had been very influential in shaping 20th century. The freedom and democracy perception of socialism provides a transforming and reforming social imagination. Socialist International is the international organization where social democratic parties around the World take place. In this article freedom and social justice conception represented by SI will be discussed in its main lines.","internal_url":"https://www.academia.edu/40652271/SOSYAL_DEMOKRAS%C4%B0N%C4%B0N_%C4%B0DEOLOJ%C4%B0K_A%C3%87ILIMLARI_%C3%9CZER%C4%B0NE_DE%C4%9EERLEND%C4%B0RMELER","translated_internal_url":"","created_at":"2019-10-17T10:05:10.874-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":60934850,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60934850/thumbnails/1.jpg","file_name":"2114998547_08_5-45.ID1782_Akman_5315-532120191017-53410-zywv8p.pdf","download_url":"https://www.academia.edu/attachments/60934850/download_file","bulk_download_file_name":"SOSYAL_DEMOKRASININ_IDEOLOJIK_ACILIMLARI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60934850/2114998547_08_5-45.ID1782_Akman_5315-532120191017-53410-zywv8p-libre.pdf?1571333020=\u0026response-content-disposition=attachment%3B+filename%3DSOSYAL_DEMOKRASININ_IDEOLOJIK_ACILIMLARI.pdf\u0026Expires=1742161270\u0026Signature=TolqIP~BG~5dqR9S5kD-oOhjJsExS42DxHHcneU0cCpNcH2EUF-GNwzLHutlT~G69mVuiUTMQJsZvSCC-4G4RnFOL-wcM2xHYVI4gyZYUMUMDruI~g6V0A7~tsifa81NEgUzmDhl-h3~v8zxHP3Trddj-GcytzXjUXQV-4ND2LFUzSn3bLhh~7AFR~vLyz2Atvvp4wUEpRr35KsuEIKwp~3Fw9h-7ZZCcYki-PIVlKQ~THAXi~YDawfhl4ez5niSg470qiwvD3kzTk0XI1FvmWXHPvhBqGdSuVHO~2RWiyKJ7P77gtdU8SAX2nGP2~peo06T9frBqLqbkloi2ImZyQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"SOSYAL_DEMOKRASİNİN_İDEOLOJİK_AÇILIMLARI_ÜZERİNE_DEĞERLENDİRMELER","translated_slug":"","page_count":7,"language":"tr","content_type":"Work","summary":"ÖZET\nDemokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavramlardır. Sosyal demokratik düşünce Fransız Devrimi'nin \"eşitlik, özgürlük, kardeşlik\" ideallerinin nasıl toplumsallaşabileceğine dair sorular sormuştur. 19. Yüzyılda doğan, 20. Yüzyılın şekillenmesinde çok etkin olan demokratik sosyalizm (sosyal demokrasi) günümüzde güncel bir siyasi ideoloji ve akımdır. Sosyalizmin özgürlük ve demokrasi algısı eleştirel, dönüştürücü ve değiştirici bir toplumsal tahayyül sunar. Sosyalist Enternasyonal tüm dünyadaki sosyal demokrat partilerin bir araya geldiği bir uluslararası organizasyondur. Bu makalede SE'nin temsil ettiği özgürlük ve toplumsal adalet anlayışının ana hatları tartışılacaktır. Anahtar Kelimeler: sosyalizm, toplumsal özgürlük, demokratik sosyalizm, sosyal demokrasi, CHP, Sosyalist Enternasyonal.\n\nABSTRACT \nDemocratic socialism and social democracy are political notions which are used often with similar meanings. Social democratic thought has asked questions about how French Revolution's \"freedom, equality, fraternity\" ideals can be further socialized. Democratic socialism (social democracy) is an actual political ideology and movement today which was born in 19th century, had been very influential in shaping 20th century. The freedom and democracy perception of socialism provides a transforming and reforming social imagination. Socialist International is the international organization where social democratic parties around the World take place. In this article freedom and social justice conception represented by SI will be discussed in its main lines.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":60934850,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60934850/thumbnails/1.jpg","file_name":"2114998547_08_5-45.ID1782_Akman_5315-532120191017-53410-zywv8p.pdf","download_url":"https://www.academia.edu/attachments/60934850/download_file","bulk_download_file_name":"SOSYAL_DEMOKRASININ_IDEOLOJIK_ACILIMLARI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60934850/2114998547_08_5-45.ID1782_Akman_5315-532120191017-53410-zywv8p-libre.pdf?1571333020=\u0026response-content-disposition=attachment%3B+filename%3DSOSYAL_DEMOKRASININ_IDEOLOJIK_ACILIMLARI.pdf\u0026Expires=1742161270\u0026Signature=TolqIP~BG~5dqR9S5kD-oOhjJsExS42DxHHcneU0cCpNcH2EUF-GNwzLHutlT~G69mVuiUTMQJsZvSCC-4G4RnFOL-wcM2xHYVI4gyZYUMUMDruI~g6V0A7~tsifa81NEgUzmDhl-h3~v8zxHP3Trddj-GcytzXjUXQV-4ND2LFUzSn3bLhh~7AFR~vLyz2Atvvp4wUEpRr35KsuEIKwp~3Fw9h-7ZZCcYki-PIVlKQ~THAXi~YDawfhl4ez5niSg470qiwvD3kzTk0XI1FvmWXHPvhBqGdSuVHO~2RWiyKJ7P77gtdU8SAX2nGP2~peo06T9frBqLqbkloi2ImZyQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":21219,"name":"Socialism","url":"https://www.academia.edu/Documents/in/Socialism"},{"id":41599,"name":"Social Democracy","url":"https://www.academia.edu/Documents/in/Social_Democracy"},{"id":57900,"name":"Democratic Socialism","url":"https://www.academia.edu/Documents/in/Democratic_Socialism"},{"id":334511,"name":"Socialismo Democratico","url":"https://www.academia.edu/Documents/in/Socialismo_Democratico"},{"id":353401,"name":"CHP","url":"https://www.academia.edu/Documents/in/CHP"},{"id":377749,"name":"Sosyalizm","url":"https://www.academia.edu/Documents/in/Sosyalizm"},{"id":400393,"name":"Theories of Socialism","url":"https://www.academia.edu/Documents/in/Theories_of_Socialism"},{"id":469139,"name":"Cumhuriyet Halk Partisi","url":"https://www.academia.edu/Documents/in/Cumhuriyet_Halk_Partisi"},{"id":665307,"name":"Sosyal Demokrasi","url":"https://www.academia.edu/Documents/in/Sosyal_Demokrasi"},{"id":700675,"name":"The Socialist International","url":"https://www.academia.edu/Documents/in/The_Socialist_International"}],"urls":[{"id":8872429,"url":"http://sssjournal.com/DergiTamDetay.aspx?ID=1782\u0026Detay=Ozet"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40520733"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40520733/SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT"><img alt="Research paper thumbnail of SWOT ANALYSIS AND SECURITY MANAGEMENT" class="work-thumbnail" src="https://attachments.academia-assets.com/60794610/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40520733/SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT">SWOT ANALYSIS AND SECURITY MANAGEMENT</a></div><div class="wp-workCard_item"><span>European Journal of Management and Marketing Studies</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opp...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT frequently. However, in security management this method is not used sufficiently. In this article we will have an opportunity to discuss details of SWOT and its applicability to security management field as well. Security managers can benefit from SWOT besides other analytical methods and tools. Internal and external aspects of companies and organizations are evolving very fast. SWOT may provide us a chance to see the potential tendencies in internal and external levels.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="12be02adeb12c1b1606b4bd7baf6862a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":60794610,"asset_id":40520733,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/60794610/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40520733"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40520733"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40520733; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40520733]").text(description); $(".js-view-count[data-work-id=40520733]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40520733; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40520733']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "12be02adeb12c1b1606b4bd7baf6862a" } } $('.js-work-strip[data-work-id=40520733]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40520733,"title":"SWOT ANALYSIS AND SECURITY MANAGEMENT","translated_title":"","metadata":{"doi":"10.5281/zenodo.3471920","issue":"2","volume":"4","abstract":"SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT frequently. However, in security management this method is not used sufficiently. In this article we will have an opportunity to discuss details of SWOT and its applicability to security management field as well. Security managers can benefit from SWOT besides other analytical methods and tools. Internal and external aspects of companies and organizations are evolving very fast. SWOT may provide us a chance to see the potential tendencies in internal and external levels.","ai_title_tag":"Applying SWOT Analysis in Security Management","page_numbers":"78-89","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"European Journal of Management and Marketing Studies"},"translated_abstract":"SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT frequently. However, in security management this method is not used sufficiently. In this article we will have an opportunity to discuss details of SWOT and its applicability to security management field as well. Security managers can benefit from SWOT besides other analytical methods and tools. Internal and external aspects of companies and organizations are evolving very fast. SWOT may provide us a chance to see the potential tendencies in internal and external levels.","internal_url":"https://www.academia.edu/40520733/SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT","translated_internal_url":"","created_at":"2019-10-04T02:47:43.805-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":60794610,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60794610/thumbnails/1.jpg","file_name":"06._SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT_-_M._Kubilay_Akman20191004-38877-eqycdx.pdf","download_url":"https://www.academia.edu/attachments/60794610/download_file","bulk_download_file_name":"SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60794610/06._SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT_-_M._Kubilay_Akman20191004-38877-eqycdx-libre.pdf?1570182677=\u0026response-content-disposition=attachment%3B+filename%3DSWOT_ANALYSIS_AND_SECURITY_MANAGEMENT.pdf\u0026Expires=1742161270\u0026Signature=gYmup52-Q9RBy5f2UHd2weXg7OrviARCUy8gKf71w67f7I6vQNL49XJMyoJ1bJFDiKPtOX4RVrR3~TTkN0u47WL2cMEDUVy1Oru-uoJwhe~TnCQsPKXGBEC8xx~gXq1x~GzqmfBAh9bwl86h0MG5ehcPKfevK5eTUV5yNTWLtad4VNgJZdXlVjUlX6x8BJG5kw0ELzGtaQoSEWokm8-11PgARO2DJBNpJvbn2WjRjo1t6PK8naA9B11yLeS4mKSWGCLOHzXUX~wvOBKh~ld~s~AeqobKHmxIJwJvqMXvmeCCQs9DpSZMYsDkRocJhZmkJpeRsOSeyTLjOfe3iRIUPQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT","translated_slug":"","page_count":12,"language":"en","content_type":"Work","summary":"SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT frequently. However, in security management this method is not used sufficiently. In this article we will have an opportunity to discuss details of SWOT and its applicability to security management field as well. Security managers can benefit from SWOT besides other analytical methods and tools. Internal and external aspects of companies and organizations are evolving very fast. SWOT may provide us a chance to see the potential tendencies in internal and external levels.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":60794610,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60794610/thumbnails/1.jpg","file_name":"06._SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT_-_M._Kubilay_Akman20191004-38877-eqycdx.pdf","download_url":"https://www.academia.edu/attachments/60794610/download_file","bulk_download_file_name":"SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60794610/06._SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT_-_M._Kubilay_Akman20191004-38877-eqycdx-libre.pdf?1570182677=\u0026response-content-disposition=attachment%3B+filename%3DSWOT_ANALYSIS_AND_SECURITY_MANAGEMENT.pdf\u0026Expires=1742161270\u0026Signature=gYmup52-Q9RBy5f2UHd2weXg7OrviARCUy8gKf71w67f7I6vQNL49XJMyoJ1bJFDiKPtOX4RVrR3~TTkN0u47WL2cMEDUVy1Oru-uoJwhe~TnCQsPKXGBEC8xx~gXq1x~GzqmfBAh9bwl86h0MG5ehcPKfevK5eTUV5yNTWLtad4VNgJZdXlVjUlX6x8BJG5kw0ELzGtaQoSEWokm8-11PgARO2DJBNpJvbn2WjRjo1t6PK8naA9B11yLeS4mKSWGCLOHzXUX~wvOBKh~ld~s~AeqobKHmxIJwJvqMXvmeCCQs9DpSZMYsDkRocJhZmkJpeRsOSeyTLjOfe3iRIUPQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies"},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":187534,"name":"SWOT analysis","url":"https://www.academia.edu/Documents/in/SWOT_analysis"},{"id":188414,"name":"Information Security Management","url":"https://www.academia.edu/Documents/in/Information_Security_Management"},{"id":726045,"name":"ANALISIS SWOT","url":"https://www.academia.edu/Documents/in/ANALISIS_SWOT"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[{"id":8863706,"url":"https://oapub.org/soc/index.php/EJMMS/issue/view/55"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="39735135"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/39735135/B%C4%B0LG%C4%B0_SOSYOLOJ%C4%B0S%C4%B0_A%C3%87ISINDAN_%C4%B0ST%C4%B0HBARAT_KAYNAKLARININ_TASN%C4%B0F%C4%B0_VE_DE%C4%9EERLEND%C4%B0R%C4%B0LMES%C4%B0_CLASSIFICATION_AND_ANALYSIS_OF_INTELLIGENCE_SOURCES_THROUGH_SOCIOLOGY_OF_KNOWLEDGE"><img alt="Research paper thumbnail of BİLGİ SOSYOLOJİSİ AÇISINDAN İSTİHBARAT KAYNAKLARININ TASNİFİ VE DEĞERLENDİRİLMESİ / CLASSIFICATION AND ANALYSIS OF INTELLIGENCE SOURCES THROUGH SOCIOLOGY OF KNOWLEDGE" class="work-thumbnail" src="https://attachments.academia-assets.com/59913616/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/39735135/B%C4%B0LG%C4%B0_SOSYOLOJ%C4%B0S%C4%B0_A%C3%87ISINDAN_%C4%B0ST%C4%B0HBARAT_KAYNAKLARININ_TASN%C4%B0F%C4%B0_VE_DE%C4%9EERLEND%C4%B0R%C4%B0LMES%C4%B0_CLASSIFICATION_AND_ANALYSIS_OF_INTELLIGENCE_SOURCES_THROUGH_SOCIOLOGY_OF_KNOWLEDGE">BİLGİ SOSYOLOJİSİ AÇISINDAN İSTİHBARAT KAYNAKLARININ TASNİFİ VE DEĞERLENDİRİLMESİ / CLASSIFICATION AND ANALYSIS OF INTELLIGENCE SOURCES THROUGH SOCIOLOGY OF KNOWLEDGE</a></div><div class="wp-workCard_item"><span>Ankara Üniversitesi Sosyal Bilimler Dergisi</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak bilimsel bilginin sosyolojisi (BBS) ise nispeten daha yeni, güncel bir alt-disiplindir. Bilgi sosyolojisi insan bilgisinin en geniş anlamda toplumsal olarak üretilmesi, korunması ve aktarılması üzerine odaklanır. BBS bilimsel araştırmaların, çalışmaların ve bilginin sosyolojik boyutlarını araştırır. Tarihsel ve toplumsal olarak yaşanan dönüşümler, coğrafi ve kültürel etkenler bilimsel faaliyetleri doğrudan veya dolaylı olarak etkiler. İstihbarat bir yönüyle özel, nitelikli bir bilgi türüdür. Öte yandan istihbarat çalışmaları güvenlik çalışmalarının bir alt disiplini olarak bilimsel bir metodolojiye sahiptir ve bilimsel bilgi üretir. Bu açılardan “istihbarat kaynakları” ve “istihbarat edinme yöntemleri” üzerine yapılacak olan bir analiz hem geniş anlamda bilgi sosyolojisinin hem de spesifik olarak BBS’nin konusu olacaktır.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="803f69ebd8760b5741a86d3970f9faf2" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":59913616,"asset_id":39735135,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/59913616/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="39735135"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="39735135"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 39735135; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=39735135]").text(description); $(".js-view-count[data-work-id=39735135]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 39735135; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='39735135']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "803f69ebd8760b5741a86d3970f9faf2" } } $('.js-work-strip[data-work-id=39735135]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":39735135,"title":"BİLGİ SOSYOLOJİSİ AÇISINDAN İSTİHBARAT KAYNAKLARININ TASNİFİ VE DEĞERLENDİRİLMESİ / CLASSIFICATION AND ANALYSIS OF INTELLIGENCE SOURCES THROUGH SOCIOLOGY OF KNOWLEDGE","translated_title":"","metadata":{"doi":"10.33537/sobild.2019.10.1.2","issue":"1","volume":"10","abstract":"Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak bilimsel bilginin sosyolojisi (BBS) ise nispeten daha yeni, güncel bir alt-disiplindir. Bilgi sosyolojisi insan bilgisinin en geniş anlamda toplumsal olarak üretilmesi, korunması ve aktarılması üzerine odaklanır. BBS bilimsel araştırmaların, çalışmaların ve bilginin sosyolojik boyutlarını araştırır. Tarihsel ve toplumsal olarak yaşanan dönüşümler, coğrafi ve kültürel etkenler bilimsel faaliyetleri doğrudan veya dolaylı olarak etkiler. İstihbarat bir yönüyle özel, nitelikli bir bilgi türüdür. Öte yandan istihbarat çalışmaları güvenlik çalışmalarının bir alt disiplini olarak bilimsel bir metodolojiye sahiptir ve bilimsel bilgi üretir. Bu açılardan “istihbarat kaynakları” ve “istihbarat edinme yöntemleri” üzerine yapılacak olan bir analiz hem geniş anlamda bilgi sosyolojisinin hem de spesifik olarak BBS’nin konusu olacaktır.","page_numbers":"24-42","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Ankara Üniversitesi Sosyal Bilimler Dergisi"},"translated_abstract":"Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak bilimsel bilginin sosyolojisi (BBS) ise nispeten daha yeni, güncel bir alt-disiplindir. Bilgi sosyolojisi insan bilgisinin en geniş anlamda toplumsal olarak üretilmesi, korunması ve aktarılması üzerine odaklanır. BBS bilimsel araştırmaların, çalışmaların ve bilginin sosyolojik boyutlarını araştırır. Tarihsel ve toplumsal olarak yaşanan dönüşümler, coğrafi ve kültürel etkenler bilimsel faaliyetleri doğrudan veya dolaylı olarak etkiler. İstihbarat bir yönüyle özel, nitelikli bir bilgi türüdür. Öte yandan istihbarat çalışmaları güvenlik çalışmalarının bir alt disiplini olarak bilimsel bir metodolojiye sahiptir ve bilimsel bilgi üretir. Bu açılardan “istihbarat kaynakları” ve “istihbarat edinme yöntemleri” üzerine yapılacak olan bir analiz hem geniş anlamda bilgi sosyolojisinin hem de spesifik olarak BBS’nin konusu olacaktır.","internal_url":"https://www.academia.edu/39735135/B%C4%B0LG%C4%B0_SOSYOLOJ%C4%B0S%C4%B0_A%C3%87ISINDAN_%C4%B0ST%C4%B0HBARAT_KAYNAKLARININ_TASN%C4%B0F%C4%B0_VE_DE%C4%9EERLEND%C4%B0R%C4%B0LMES%C4%B0_CLASSIFICATION_AND_ANALYSIS_OF_INTELLIGENCE_SOURCES_THROUGH_SOCIOLOGY_OF_KNOWLEDGE","translated_internal_url":"","created_at":"2019-07-02T07:06:12.424-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":59913616,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/59913616/thumbnails/1.jpg","file_name":"bilgisosyolojisi-makale20190702-87323-16glmej.pdf","download_url":"https://www.academia.edu/attachments/59913616/download_file","bulk_download_file_name":"BILGI_SOSYOLOJISI_ACISINDAN_ISTIHBARAT_K.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/59913616/bilgisosyolojisi-makale20190702-87323-16glmej-libre.pdf?1562076815=\u0026response-content-disposition=attachment%3B+filename%3DBILGI_SOSYOLOJISI_ACISINDAN_ISTIHBARAT_K.pdf\u0026Expires=1742161270\u0026Signature=gbU9W71jM4YDX~OvWhz8plwGXn1kNPtnbzMvDUA7E3sGl1fEP4taZPcv8GoHYXTPA4G6CCyHSOuhzm~d9AH3POs1JLP3t9zlWgfBrzxMp8Aj~WqTJpPXckJ~QB9hQailcsPFurcjcOgI3lOozU~zZbTDddyxubSZ3nguVcpn6Dl-WRT2OBE4pc6si~OGngbDRkIXWgNdwOTBjGLIwQYCth24gqU0nZSpheub5FOi6ROpIsr9-opBLzouy-rheA24F9oreV5dUjXMPpKBgi8zvhv6AUXDsoxWNGLLqPNLdu6z0qZED5J0fT-PBY1RqQbF6l2Cp0zVVeUkXzylGZbokQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"BİLGİ_SOSYOLOJİSİ_AÇISINDAN_İSTİHBARAT_KAYNAKLARININ_TASNİFİ_VE_DEĞERLENDİRİLMESİ_CLASSIFICATION_AND_ANALYSIS_OF_INTELLIGENCE_SOURCES_THROUGH_SOCIOLOGY_OF_KNOWLEDGE","translated_slug":"","page_count":19,"language":"tr","content_type":"Work","summary":"Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak bilimsel bilginin sosyolojisi (BBS) ise nispeten daha yeni, güncel bir alt-disiplindir. Bilgi sosyolojisi insan bilgisinin en geniş anlamda toplumsal olarak üretilmesi, korunması ve aktarılması üzerine odaklanır. BBS bilimsel araştırmaların, çalışmaların ve bilginin sosyolojik boyutlarını araştırır. Tarihsel ve toplumsal olarak yaşanan dönüşümler, coğrafi ve kültürel etkenler bilimsel faaliyetleri doğrudan veya dolaylı olarak etkiler. İstihbarat bir yönüyle özel, nitelikli bir bilgi türüdür. Öte yandan istihbarat çalışmaları güvenlik çalışmalarının bir alt disiplini olarak bilimsel bir metodolojiye sahiptir ve bilimsel bilgi üretir. Bu açılardan “istihbarat kaynakları” ve “istihbarat edinme yöntemleri” üzerine yapılacak olan bir analiz hem geniş anlamda bilgi sosyolojisinin hem de spesifik olarak BBS’nin konusu olacaktır.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":59913616,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/59913616/thumbnails/1.jpg","file_name":"bilgisosyolojisi-makale20190702-87323-16glmej.pdf","download_url":"https://www.academia.edu/attachments/59913616/download_file","bulk_download_file_name":"BILGI_SOSYOLOJISI_ACISINDAN_ISTIHBARAT_K.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/59913616/bilgisosyolojisi-makale20190702-87323-16glmej-libre.pdf?1562076815=\u0026response-content-disposition=attachment%3B+filename%3DBILGI_SOSYOLOJISI_ACISINDAN_ISTIHBARAT_K.pdf\u0026Expires=1742161270\u0026Signature=gbU9W71jM4YDX~OvWhz8plwGXn1kNPtnbzMvDUA7E3sGl1fEP4taZPcv8GoHYXTPA4G6CCyHSOuhzm~d9AH3POs1JLP3t9zlWgfBrzxMp8Aj~WqTJpPXckJ~QB9hQailcsPFurcjcOgI3lOozU~zZbTDddyxubSZ3nguVcpn6Dl-WRT2OBE4pc6si~OGngbDRkIXWgNdwOTBjGLIwQYCth24gqU0nZSpheub5FOi6ROpIsr9-opBLzouy-rheA24F9oreV5dUjXMPpKBgi8zvhv6AUXDsoxWNGLLqPNLdu6z0qZED5J0fT-PBY1RqQbF6l2Cp0zVVeUkXzylGZbokQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":980585,"name":"İStihbarat ÇAlışmaları","url":"https://www.academia.edu/Documents/in/IStihbarat_CAlismalari"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"},{"id":3095511,"name":"güvenlik çalışmaları","url":"https://www.academia.edu/Documents/in/g%C3%BCvenlik_%C3%A7al%C4%B1%C5%9Fmalar%C4%B1"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="38714128"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/38714128/CALL_FOR_PAPERS_Ante_Portas_Security_Studies_"><img alt="Research paper thumbnail of CALL FOR PAPERS - „Ante Portas – Security Studies”" class="work-thumbnail" src="https://attachments.academia-assets.com/58797964/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/38714128/CALL_FOR_PAPERS_Ante_Portas_Security_Studies_">CALL FOR PAPERS - „Ante Portas – Security Studies”</a></div><div class="wp-workCard_item"><span>Ante Portas – Security Studies Journal</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 by the Department of National Security of the College of Business and Entrepreneurship in Ostrowiec Świętokrzyski. Ante Portas is an academic, interdisciplinary, peer-reviewed journal, which concern the most crucial aspects of social sciences, with particular emphasis put on:<br /> military and political aspects of security;<br /> economic security;<br /> cybersecurity;<br /> international relations;<br /> geopolitics;<br /> history of the security systems<br /> internal security<br /> Social, cultural and environmental aspects of security<br /> crisis management<br /> and other…</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="171d0854ce8fe411b406afdaeaa7b2ec" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":58797964,"asset_id":38714128,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/58797964/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="38714128"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="38714128"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38714128; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38714128]").text(description); $(".js-view-count[data-work-id=38714128]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38714128; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='38714128']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "171d0854ce8fe411b406afdaeaa7b2ec" } } $('.js-work-strip[data-work-id=38714128]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":38714128,"title":"CALL FOR PAPERS - „Ante Portas – Security Studies”","translated_title":"","metadata":{"abstract":"The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 by the Department of National Security of the College of Business and Entrepreneurship in Ostrowiec Świętokrzyski. Ante Portas is an academic, interdisciplinary, peer-reviewed journal, which concern the most crucial aspects of social sciences, with particular emphasis put on:\n military and political aspects of security;\n economic security;\n cybersecurity;\n international relations;\n geopolitics;\n history of the security systems\n internal security\n Social, cultural and environmental aspects of security\n crisis management\n and other…\n","publication_name":"Ante Portas – Security Studies Journal"},"translated_abstract":"The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 by the Department of National Security of the College of Business and Entrepreneurship in Ostrowiec Świętokrzyski. Ante Portas is an academic, interdisciplinary, peer-reviewed journal, which concern the most crucial aspects of social sciences, with particular emphasis put on:\n military and political aspects of security;\n economic security;\n cybersecurity;\n international relations;\n geopolitics;\n history of the security systems\n internal security\n Social, cultural and environmental aspects of security\n crisis management\n and other…\n","internal_url":"https://www.academia.edu/38714128/CALL_FOR_PAPERS_Ante_Portas_Security_Studies_","translated_internal_url":"","created_at":"2019-04-04T11:42:08.138-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"draft","co_author_tags":[],"downloadable_attachments":[{"id":58797964,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58797964/thumbnails/1.jpg","file_name":"AP_12.-call-for-papers.pdf","download_url":"https://www.academia.edu/attachments/58797964/download_file","bulk_download_file_name":"CALL_FOR_PAPERS_Ante_Portas_Security_Stu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58797964/AP_12.-call-for-papers-libre.pdf?1554407296=\u0026response-content-disposition=attachment%3B+filename%3DCALL_FOR_PAPERS_Ante_Portas_Security_Stu.pdf\u0026Expires=1742161270\u0026Signature=EuVKUlLevF1XSWv35JKe9QCKMpclUHyfU-w6kKOzt138Co5V~APJa68LPEzBsiAcYpYcFRomCakuGzeWp7LTR22bEqhIS~yIyRib7SYs4mt2is6f0VUzZqTO6oVLQwM59n3NirX4MKtZWf0GhMxbC3xyOjwrjvdzeoSJ38yYSHgapJlzd--RZSOg32MU5h6c36C-70XaY60VSB8bDfqMGql2zpTnWiPVFJvzECIlrVJbvAFCqHOu0jUe~XdMVX~AMKvfU4-umQ1SRcUrVhktsXuO3DK2Buzhj7~diLOO~dR9boYwBAojyiRX3a8e4ovBGkY7BlrUwbmjIIpQzT9N8A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"CALL_FOR_PAPERS_Ante_Portas_Security_Studies_","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 by the Department of National Security of the College of Business and Entrepreneurship in Ostrowiec Świętokrzyski. Ante Portas is an academic, interdisciplinary, peer-reviewed journal, which concern the most crucial aspects of social sciences, with particular emphasis put on:\n military and political aspects of security;\n economic security;\n cybersecurity;\n international relations;\n geopolitics;\n history of the security systems\n internal security\n Social, cultural and environmental aspects of security\n crisis management\n and other…\n","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":58797964,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58797964/thumbnails/1.jpg","file_name":"AP_12.-call-for-papers.pdf","download_url":"https://www.academia.edu/attachments/58797964/download_file","bulk_download_file_name":"CALL_FOR_PAPERS_Ante_Portas_Security_Stu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58797964/AP_12.-call-for-papers-libre.pdf?1554407296=\u0026response-content-disposition=attachment%3B+filename%3DCALL_FOR_PAPERS_Ante_Portas_Security_Stu.pdf\u0026Expires=1742161270\u0026Signature=EuVKUlLevF1XSWv35JKe9QCKMpclUHyfU-w6kKOzt138Co5V~APJa68LPEzBsiAcYpYcFRomCakuGzeWp7LTR22bEqhIS~yIyRib7SYs4mt2is6f0VUzZqTO6oVLQwM59n3NirX4MKtZWf0GhMxbC3xyOjwrjvdzeoSJ38yYSHgapJlzd--RZSOg32MU5h6c36C-70XaY60VSB8bDfqMGql2zpTnWiPVFJvzECIlrVJbvAFCqHOu0jUe~XdMVX~AMKvfU4-umQ1SRcUrVhktsXuO3DK2Buzhj7~diLOO~dR9boYwBAojyiRX3a8e4ovBGkY7BlrUwbmjIIpQzT9N8A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies"},{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies"},{"id":538,"name":"Police Science","url":"https://www.academia.edu/Documents/in/Police_Science"},{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_"},{"id":1031,"name":"Southeast Asian Studies","url":"https://www.academia.edu/Documents/in/Southeast_Asian_Studies"},{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies"},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies"},{"id":6748,"name":"Sociology of Risk","url":"https://www.academia.edu/Documents/in/Sociology_of_Risk"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":44426,"name":"Military Studies","url":"https://www.academia.edu/Documents/in/Military_Studies"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security"},{"id":119358,"name":"Defense and National Security","url":"https://www.academia.edu/Documents/in/Defense_and_National_Security"},{"id":294517,"name":"Defense and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defense_and_Strategic_Studies"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="38127625"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/38127625/Call_for_Manuscripts_Special_Issue_on_Martial_Arts_and_Close_Combat_Systems"><img alt="Research paper thumbnail of Call for Manuscripts: Special Issue on Martial Arts and Close Combat Systems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/38127625/Call_for_Manuscripts_Special_Issue_on_Martial_Arts_and_Close_Combat_Systems">Call for Manuscripts: Special Issue on Martial Arts and Close Combat Systems</a></div><div class="wp-workCard_item"><span>World Journal of Sport Sciences (WJSS)</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Deadline: 8 May 2019 As the World Journal of Sport Sciences (WJSS) we would like to cordially in...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Deadline: 8 May 2019<br /><br />As the World Journal of Sport Sciences (WJSS) we would like to cordially invite academics, researchers and specialists around the World for our upcoming special issue titled: "Martial Arts, Combat Sciences and Redefining Limits of Human Performance". This issue will be a comprehensive source of knowledge about martial arts / combat sports and relative areas.<br /><br />In this special issue of the WJSS a wide range of disciplines will be covered in an interdisciplinary way. Academics, researchers and experts of sports psychology, sociology of sports, physical education, Asian and modern martial arts, law enforcement and military training (Close Quarters Combat, Modern Army Combatives, Unarmed Combat, Etc.) besides other related fields are kindly invited to submit their manuscripts by the deadline, 8 May 2019.<br /><br />You can complete submission via our system: <a href="http://www.idosi.org" rel="nofollow">www.idosi.org</a> or E-mail: <a href="mailto:idosi@idosi.org" rel="nofollow">idosi@idosi.org</a> <br /><br />Looking forward your taking place in the discussion,<br /><br />Best regards,<br /><br />Dr. M. Kubilay Akman, FIMAS <br />Editor-in-Chief, WJSS</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="38127625"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="38127625"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38127625; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38127625]").text(description); $(".js-view-count[data-work-id=38127625]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38127625; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='38127625']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=38127625]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":38127625,"title":"Call for Manuscripts: Special Issue on Martial Arts and Close Combat Systems","translated_title":"","metadata":{"doi":"10.5829/idosi.wjss","abstract":"Deadline: 8 May 2019\n\nAs the World Journal of Sport Sciences (WJSS) we would like to cordially invite academics, researchers and specialists around the World for our upcoming special issue titled: \"Martial Arts, Combat Sciences and Redefining Limits of Human Performance\". This issue will be a comprehensive source of knowledge about martial arts / combat sports and relative areas.\n\nIn this special issue of the WJSS a wide range of disciplines will be covered in an interdisciplinary way. Academics, researchers and experts of sports psychology, sociology of sports, physical education, Asian and modern martial arts, law enforcement and military training (Close Quarters Combat, Modern Army Combatives, Unarmed Combat, Etc.) besides other related fields are kindly invited to submit their manuscripts by the deadline, 8 May 2019.\n\nYou can complete submission via our system: www.idosi.org or E-mail: idosi@idosi.org \n\nLooking forward your taking place in the discussion,\n\nBest regards,\n\nDr. M. Kubilay Akman, FIMAS \nEditor-in-Chief, WJSS\n","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"World Journal of Sport Sciences (WJSS)"},"translated_abstract":"Deadline: 8 May 2019\n\nAs the World Journal of Sport Sciences (WJSS) we would like to cordially invite academics, researchers and specialists around the World for our upcoming special issue titled: \"Martial Arts, Combat Sciences and Redefining Limits of Human Performance\". This issue will be a comprehensive source of knowledge about martial arts / combat sports and relative areas.\n\nIn this special issue of the WJSS a wide range of disciplines will be covered in an interdisciplinary way. Academics, researchers and experts of sports psychology, sociology of sports, physical education, Asian and modern martial arts, law enforcement and military training (Close Quarters Combat, Modern Army Combatives, Unarmed Combat, Etc.) besides other related fields are kindly invited to submit their manuscripts by the deadline, 8 May 2019.\n\nYou can complete submission via our system: www.idosi.org or E-mail: idosi@idosi.org \n\nLooking forward your taking place in the discussion,\n\nBest regards,\n\nDr. M. Kubilay Akman, FIMAS \nEditor-in-Chief, WJSS\n","internal_url":"https://www.academia.edu/38127625/Call_for_Manuscripts_Special_Issue_on_Martial_Arts_and_Close_Combat_Systems","translated_internal_url":"","created_at":"2019-01-10T08:51:26.224-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Call_for_Manuscripts_Special_Issue_on_Martial_Arts_and_Close_Combat_Systems","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Deadline: 8 May 2019\n\nAs the World Journal of Sport Sciences (WJSS) we would like to cordially invite academics, researchers and specialists around the World for our upcoming special issue titled: \"Martial Arts, Combat Sciences and Redefining Limits of Human Performance\". This issue will be a comprehensive source of knowledge about martial arts / combat sports and relative areas.\n\nIn this special issue of the WJSS a wide range of disciplines will be covered in an interdisciplinary way. Academics, researchers and experts of sports psychology, sociology of sports, physical education, Asian and modern martial arts, law enforcement and military training (Close Quarters Combat, Modern Army Combatives, Unarmed Combat, Etc.) besides other related fields are kindly invited to submit their manuscripts by the deadline, 8 May 2019.\n\nYou can complete submission via our system: www.idosi.org or E-mail: idosi@idosi.org \n\nLooking forward your taking place in the discussion,\n\nBest regards,\n\nDr. M. Kubilay Akman, FIMAS \nEditor-in-Chief, WJSS\n","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[],"research_interests":[{"id":1518,"name":"Sports \u0026 Exercise Pychology","url":"https://www.academia.edu/Documents/in/Sports_and_Exercise_Pychology"},{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts"},{"id":5503,"name":"Sports Management","url":"https://www.academia.edu/Documents/in/Sports_Management"},{"id":8206,"name":"Police","url":"https://www.academia.edu/Documents/in/Police"},{"id":14788,"name":"Boxing","url":"https://www.academia.edu/Documents/in/Boxing"},{"id":25806,"name":"Physical Education","url":"https://www.academia.edu/Documents/in/Physical_Education"},{"id":30077,"name":"Anthropology of Sports","url":"https://www.academia.edu/Documents/in/Anthropology_of_Sports"},{"id":33261,"name":"Taekwondo","url":"https://www.academia.edu/Documents/in/Taekwondo"},{"id":39946,"name":"Military","url":"https://www.academia.edu/Documents/in/Military"},{"id":55904,"name":"Sports Coaching","url":"https://www.academia.edu/Documents/in/Sports_Coaching"},{"id":119636,"name":"Sports Psychology","url":"https://www.academia.edu/Documents/in/Sports_Psychology"},{"id":150194,"name":"Kung Fu","url":"https://www.academia.edu/Documents/in/Kung_Fu"},{"id":285210,"name":"Karate","url":"https://www.academia.edu/Documents/in/Karate"},{"id":521198,"name":"Self Defense","url":"https://www.academia.edu/Documents/in/Self_Defense"},{"id":547167,"name":"Sociology of Sports","url":"https://www.academia.edu/Documents/in/Sociology_of_Sports"},{"id":1110758,"name":"Krav Maga","url":"https://www.academia.edu/Documents/in/Krav_Maga"},{"id":1211728,"name":"Sports Science","url":"https://www.academia.edu/Documents/in/Sports_Science-1"},{"id":1710242,"name":"Close Quarters Combat","url":"https://www.academia.edu/Documents/in/Close_Quarters_Combat"}],"urls":[{"id":8673010,"url":"http://idosi.org/journal-detail/world-journal-of-sport-sciences--wjss-/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="38064651"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/38064651/Sava%C5%9F%C4%B1n_ve_%C3%87at%C4%B1%C5%9Fman%C4%B1n_Sanatta_Temsili_Sanat_Sosyolojisi_ve_G%C3%BCvenlik_Sosyolojisi_%C3%87%C3%B6z%C3%BCmlemeleri"><img alt="Research paper thumbnail of Savaşın ve Çatışmanın Sanatta Temsili / Sanat Sosyolojisi ve Güvenlik Sosyolojisi Çözümlemeleri" class="work-thumbnail" src="https://attachments.academia-assets.com/58089366/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/38064651/Sava%C5%9F%C4%B1n_ve_%C3%87at%C4%B1%C5%9Fman%C4%B1n_Sanatta_Temsili_Sanat_Sosyolojisi_ve_G%C3%BCvenlik_Sosyolojisi_%C3%87%C3%B6z%C3%BCmlemeleri">Savaşın ve Çatışmanın Sanatta Temsili / Sanat Sosyolojisi ve Güvenlik Sosyolojisi Çözümlemeleri</a></div><div class="wp-workCard_item"><span>Researcher: Social Science Studies</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi kadar eskidir. Tarih boyunca kavimler birbiriyle çarpışmış, toplumlar çatışmayla kaynamış, savaşlar sürekli gündeme gelmiştir. İnsanlık bu gerilim ortamından büyük zarar görmüştür. Sanat ve sanatçılar her daim çağın tanığıdır. Büyük çatışmalar, şiddet olayları yaşanırken sanatın duyarsız kalması elbette beklenemez. Sanat eserlerinin savaşa ve çatışmaya tanıklığı, izdüşümü konusu hem sanat sosyolojisi hem de güvenlik sosyolojisi açısından bu çalışmanın konusu olacaktır. Sanatın mikrokozmosunda insanlığın şiddet hikâyelerinin nasıl temsil edildiği hususu sosyolojik kavramlarla irdelenecektir.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="42440191502727a49e5e5fe06a66142b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":58089366,"asset_id":38064651,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/58089366/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="38064651"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="38064651"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38064651; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38064651]").text(description); $(".js-view-count[data-work-id=38064651]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38064651; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='38064651']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "42440191502727a49e5e5fe06a66142b" } } $('.js-work-strip[data-work-id=38064651]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":38064651,"title":"Savaşın ve Çatışmanın Sanatta Temsili / Sanat Sosyolojisi ve Güvenlik Sosyolojisi Çözümlemeleri","translated_title":"","metadata":{"doi":"10.18301/rss.786 ","issue":"4","volume":"6","abstract":"Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi kadar eskidir. Tarih boyunca kavimler birbiriyle çarpışmış, toplumlar çatışmayla kaynamış, savaşlar sürekli gündeme gelmiştir. İnsanlık bu gerilim ortamından büyük zarar görmüştür. Sanat ve sanatçılar her daim çağın tanığıdır. Büyük çatışmalar, şiddet olayları yaşanırken sanatın duyarsız kalması elbette beklenemez. Sanat eserlerinin savaşa ve çatışmaya tanıklığı, izdüşümü konusu hem sanat sosyolojisi hem de güvenlik sosyolojisi açısından bu çalışmanın konusu olacaktır. Sanatın mikrokozmosunda insanlığın şiddet hikâyelerinin nasıl temsil edildiği hususu sosyolojik kavramlarla irdelenecektir. ","page_numbers":"168-181","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Researcher: Social Science Studies"},"translated_abstract":"Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi kadar eskidir. Tarih boyunca kavimler birbiriyle çarpışmış, toplumlar çatışmayla kaynamış, savaşlar sürekli gündeme gelmiştir. İnsanlık bu gerilim ortamından büyük zarar görmüştür. Sanat ve sanatçılar her daim çağın tanığıdır. Büyük çatışmalar, şiddet olayları yaşanırken sanatın duyarsız kalması elbette beklenemez. Sanat eserlerinin savaşa ve çatışmaya tanıklığı, izdüşümü konusu hem sanat sosyolojisi hem de güvenlik sosyolojisi açısından bu çalışmanın konusu olacaktır. Sanatın mikrokozmosunda insanlığın şiddet hikâyelerinin nasıl temsil edildiği hususu sosyolojik kavramlarla irdelenecektir. ","internal_url":"https://www.academia.edu/38064651/Sava%C5%9F%C4%B1n_ve_%C3%87at%C4%B1%C5%9Fman%C4%B1n_Sanatta_Temsili_Sanat_Sosyolojisi_ve_G%C3%BCvenlik_Sosyolojisi_%C3%87%C3%B6z%C3%BCmlemeleri","translated_internal_url":"","created_at":"2018-12-31T02:41:33.239-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":58089366,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58089366/thumbnails/1.jpg","file_name":"166201270_168-181-m._kubilay_akman.pdf","download_url":"https://www.academia.edu/attachments/58089366/download_file","bulk_download_file_name":"Savasin_ve_Catismanin_Sanatta_Temsili_Sa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58089366/166201270_168-181-m._kubilay_akman-libre.pdf?1546253561=\u0026response-content-disposition=attachment%3B+filename%3DSavasin_ve_Catismanin_Sanatta_Temsili_Sa.pdf\u0026Expires=1742161270\u0026Signature=d26mmRHMs0yGb5KziUhqMoNRjfMhSPETXWfPMtJzI2ZEuHfeJ0ZOzotuzEzqLQg-GXE9SiwxtQB6YVg24mbeI2z6DLzZ7taNEgyOQr~gPjGmFwrCdWASEBOLhHELOytS8~577QzXolc7rZTTLaIpe7VUyd872ShRAO0gyMJyIXPBJiLaOHU1~m1~tCVNwCtgKZANjwigiXmeRSjD1MU2nmrQKfg4jhib2y5xeFqIh5gXF~jwuhF6-oSzBLbDGeaOyY4~ve~wjIw5uaMWhwh4xkw1DO4NRvD4D8hzitD82PsYNUHNO53R4yMeI4ck340DvbBIxRjcSlz9P1o79mp-AA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Savaşın_ve_Çatışmanın_Sanatta_Temsili_Sanat_Sosyolojisi_ve_Güvenlik_Sosyolojisi_Çözümlemeleri","translated_slug":"","page_count":14,"language":"tr","content_type":"Work","summary":"Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi kadar eskidir. Tarih boyunca kavimler birbiriyle çarpışmış, toplumlar çatışmayla kaynamış, savaşlar sürekli gündeme gelmiştir. İnsanlık bu gerilim ortamından büyük zarar görmüştür. Sanat ve sanatçılar her daim çağın tanığıdır. Büyük çatışmalar, şiddet olayları yaşanırken sanatın duyarsız kalması elbette beklenemez. Sanat eserlerinin savaşa ve çatışmaya tanıklığı, izdüşümü konusu hem sanat sosyolojisi hem de güvenlik sosyolojisi açısından bu çalışmanın konusu olacaktır. Sanatın mikrokozmosunda insanlığın şiddet hikâyelerinin nasıl temsil edildiği hususu sosyolojik kavramlarla irdelenecektir. ","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":58089366,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58089366/thumbnails/1.jpg","file_name":"166201270_168-181-m._kubilay_akman.pdf","download_url":"https://www.academia.edu/attachments/58089366/download_file","bulk_download_file_name":"Savasin_ve_Catismanin_Sanatta_Temsili_Sa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58089366/166201270_168-181-m._kubilay_akman-libre.pdf?1546253561=\u0026response-content-disposition=attachment%3B+filename%3DSavasin_ve_Catismanin_Sanatta_Temsili_Sa.pdf\u0026Expires=1742161270\u0026Signature=d26mmRHMs0yGb5KziUhqMoNRjfMhSPETXWfPMtJzI2ZEuHfeJ0ZOzotuzEzqLQg-GXE9SiwxtQB6YVg24mbeI2z6DLzZ7taNEgyOQr~gPjGmFwrCdWASEBOLhHELOytS8~577QzXolc7rZTTLaIpe7VUyd872ShRAO0gyMJyIXPBJiLaOHU1~m1~tCVNwCtgKZANjwigiXmeRSjD1MU2nmrQKfg4jhib2y5xeFqIh5gXF~jwuhF6-oSzBLbDGeaOyY4~ve~wjIw5uaMWhwh4xkw1DO4NRvD4D8hzitD82PsYNUHNO53R4yMeI4ck340DvbBIxRjcSlz9P1o79mp-AA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":720402,"name":"çatışma","url":"https://www.academia.edu/Documents/in/catisma"},{"id":1028566,"name":"Savaş","url":"https://www.academia.edu/Documents/in/Savas"},{"id":1364680,"name":"Sanat Sosyolojisi","url":"https://www.academia.edu/Documents/in/Sanat_Sosyolojisi"},{"id":3095511,"name":"güvenlik çalışmaları","url":"https://www.academia.edu/Documents/in/g%C3%BCvenlik_%C3%A7al%C4%B1%C5%9Fmalar%C4%B1"},{"id":3095513,"name":"görsel sosyoloji","url":"https://www.academia.edu/Documents/in/g%C3%B6rsel_sosyoloji"}],"urls":[{"id":8665280,"url":"http://rssstudies.com/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37910466"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/37910466/SOUTHERN_SHAOLIN_DRAGON_FIST_EVOLVING_FIGHTING_SKILLS_AND_METHODOLOGY_FROM_THE_MYTHICAL_TO_ACTUAL_REALITY"><img alt="Research paper thumbnail of SOUTHERN SHAOLIN DRAGON FIST: EVOLVING FIGHTING SKILLS AND METHODOLOGY FROM THE MYTHICAL TO ACTUAL REALITY" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/37910466/SOUTHERN_SHAOLIN_DRAGON_FIST_EVOLVING_FIGHTING_SKILLS_AND_METHODOLOGY_FROM_THE_MYTHICAL_TO_ACTUAL_REALITY">SOUTHERN SHAOLIN DRAGON FIST: EVOLVING FIGHTING SKILLS AND METHODOLOGY FROM THE MYTHICAL TO ACTUAL REALITY</a></div><div class="wp-workCard_item"><span>European Journal of Physical Education and Sport Science</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin tradition is very connected to Chan Buddhism, its philosophy and way of living. Early ancestors of Shaolin Temple did many observations on nature and developed some Wushu forms imitating animals (leopard, praying mantis, tiger, eagle, snake, Etc.) Although their most animal forms are based on real, physically available animals they did not hesitate to create forms on mythical creatures as well, such as dragon. The dragon form studied in this article is considered as a part of Southern Shaolin Kung Fu. However, there are many dragon forms in the North and South and it is better to realize this plurality while conducting research. This form is a sample of these various forms, even styles are named after the mythical animal of dragon. The form is comprehensively explained with enough visuals and this is an easy to follow instructional narration for each level of martial arts practitioners</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37910466"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37910466"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37910466; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37910466]").text(description); $(".js-view-count[data-work-id=37910466]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37910466; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37910466']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=37910466]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37910466,"title":"SOUTHERN SHAOLIN DRAGON FIST: EVOLVING FIGHTING SKILLS AND METHODOLOGY FROM THE MYTHICAL TO ACTUAL REALITY","translated_title":"","metadata":{"doi":"10.5281/zenodo.1760133","issue":"2","volume":"5","abstract":"Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin tradition is very connected to Chan Buddhism, its philosophy and way of living. Early ancestors of Shaolin Temple did many observations on nature and developed some Wushu forms imitating animals (leopard, praying mantis, tiger, eagle, snake, Etc.) Although their most animal forms are based on real, physically available animals they did not hesitate to create forms on mythical creatures as well, such as dragon. The dragon form studied in this article is considered as a part of Southern Shaolin Kung Fu. However, there are many dragon forms in the North and South and it is better to realize this plurality while conducting research. This form is a sample of these various forms, even styles are named after the mythical animal of dragon. The form is comprehensively explained with enough visuals and this is an easy to follow instructional narration for each level of martial arts practitioners","page_numbers":"44-74","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"European Journal of Physical Education and Sport Science"},"translated_abstract":"Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin tradition is very connected to Chan Buddhism, its philosophy and way of living. Early ancestors of Shaolin Temple did many observations on nature and developed some Wushu forms imitating animals (leopard, praying mantis, tiger, eagle, snake, Etc.) Although their most animal forms are based on real, physically available animals they did not hesitate to create forms on mythical creatures as well, such as dragon. The dragon form studied in this article is considered as a part of Southern Shaolin Kung Fu. However, there are many dragon forms in the North and South and it is better to realize this plurality while conducting research. This form is a sample of these various forms, even styles are named after the mythical animal of dragon. The form is comprehensively explained with enough visuals and this is an easy to follow instructional narration for each level of martial arts practitioners","internal_url":"https://www.academia.edu/37910466/SOUTHERN_SHAOLIN_DRAGON_FIST_EVOLVING_FIGHTING_SKILLS_AND_METHODOLOGY_FROM_THE_MYTHICAL_TO_ACTUAL_REALITY","translated_internal_url":"","created_at":"2018-12-04T05:40:50.628-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"SOUTHERN_SHAOLIN_DRAGON_FIST_EVOLVING_FIGHTING_SKILLS_AND_METHODOLOGY_FROM_THE_MYTHICAL_TO_ACTUAL_REALITY","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin tradition is very connected to Chan Buddhism, its philosophy and way of living. Early ancestors of Shaolin Temple did many observations on nature and developed some Wushu forms imitating animals (leopard, praying mantis, tiger, eagle, snake, Etc.) Although their most animal forms are based on real, physically available animals they did not hesitate to create forms on mythical creatures as well, such as dragon. The dragon form studied in this article is considered as a part of Southern Shaolin Kung Fu. However, there are many dragon forms in the North and South and it is better to realize this plurality while conducting research. This form is a sample of these various forms, even styles are named after the mythical animal of dragon. The form is comprehensively explained with enough visuals and this is an easy to follow instructional narration for each level of martial arts practitioners","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[],"research_interests":[{"id":1020,"name":"Chinese Philosophy","url":"https://www.academia.edu/Documents/in/Chinese_Philosophy"},{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts"},{"id":37006,"name":"South East Asian martial Arts","url":"https://www.academia.edu/Documents/in/South_East_Asian_martial_Arts"},{"id":150194,"name":"Kung Fu","url":"https://www.academia.edu/Documents/in/Kung_Fu"},{"id":499382,"name":"Chan/Zen Buddhism","url":"https://www.academia.edu/Documents/in/Chan_Zen_Buddhism"},{"id":826689,"name":"Traditional Chinese Martial Arts","url":"https://www.academia.edu/Documents/in/Traditional_Chinese_Martial_Arts"},{"id":869339,"name":"Shaolin","url":"https://www.academia.edu/Documents/in/Shaolin"}],"urls":[{"id":8646463,"url":"https://oapub.org/edu/index.php/ejep"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37909379"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37909379/Socio_Cultural_Analysis_on_Baduanjin_Qigong_Form_and_Techniques_of_the_Chinese_Traditional_Exercise_System"><img alt="Research paper thumbnail of Socio-Cultural Analysis on Baduanjin Qigong: Form and Techniques of the Chinese Traditional Exercise System" class="work-thumbnail" src="https://attachments.academia-assets.com/57920846/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37909379/Socio_Cultural_Analysis_on_Baduanjin_Qigong_Form_and_Techniques_of_the_Chinese_Traditional_Exercise_System">Socio-Cultural Analysis on Baduanjin Qigong: Form and Techniques of the Chinese Traditional Exercise System</a></div><div class="wp-workCard_item"><span>Journal of Health and Medical Sciences</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied for health benefits from ancient times to contemporary societies. Globalization and widespread of cultural elements internationally have contributed positively for Qigong practice’s being known more in the West. There are many researches that have been conducted on medical, health aspects of practicing Qigong. In this article the subject is Baduanjin Qigong (Eight Section Brocade) and its socio-cultural dimensions which is going to be discussed from several views. A comprehensive model of Baduanjin will be given and this can be functional to practitioners of Asian martial arts, Traditional Chinese Medicine (TCM) and also academics in social sciences, humanities and cultural studies.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c866afe83477496bec75e068a0a6d942" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57920846,"asset_id":37909379,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57920846/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37909379"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37909379"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37909379; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37909379]").text(description); $(".js-view-count[data-work-id=37909379]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37909379; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37909379']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c866afe83477496bec75e068a0a6d942" } } $('.js-work-strip[data-work-id=37909379]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37909379,"title":"Socio-Cultural Analysis on Baduanjin Qigong: Form and Techniques of the Chinese Traditional Exercise System","translated_title":"","metadata":{"doi":"10.31014/aior.1994.01.01.7","issue":"1","volume":"1","abstract":"Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied for health benefits from ancient times to contemporary societies. Globalization and widespread of cultural elements internationally have contributed positively for Qigong practice’s being known more in the West. There are many researches that have been conducted on medical, health aspects of practicing Qigong. In this article the subject is Baduanjin Qigong (Eight Section Brocade) and its socio-cultural dimensions which is going to be discussed from several views. A comprehensive model of Baduanjin will be given and this can be functional to practitioners of Asian martial arts, Traditional Chinese Medicine (TCM) and also academics in social sciences, humanities and cultural studies.","page_numbers":"50-64","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Journal of Health and Medical Sciences"},"translated_abstract":"Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied for health benefits from ancient times to contemporary societies. Globalization and widespread of cultural elements internationally have contributed positively for Qigong practice’s being known more in the West. There are many researches that have been conducted on medical, health aspects of practicing Qigong. In this article the subject is Baduanjin Qigong (Eight Section Brocade) and its socio-cultural dimensions which is going to be discussed from several views. A comprehensive model of Baduanjin will be given and this can be functional to practitioners of Asian martial arts, Traditional Chinese Medicine (TCM) and also academics in social sciences, humanities and cultural studies.","internal_url":"https://www.academia.edu/37909379/Socio_Cultural_Analysis_on_Baduanjin_Qigong_Form_and_Techniques_of_the_Chinese_Traditional_Exercise_System","translated_internal_url":"","created_at":"2018-12-04T03:08:21.054-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57920846,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57920846/thumbnails/1.jpg","file_name":"Qigong-Article.pdf","download_url":"https://www.academia.edu/attachments/57920846/download_file","bulk_download_file_name":"Socio_Cultural_Analysis_on_Baduanjin_Qig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57920846/Qigong-Article-libre.pdf?1543928096=\u0026response-content-disposition=attachment%3B+filename%3DSocio_Cultural_Analysis_on_Baduanjin_Qig.pdf\u0026Expires=1742161270\u0026Signature=MTTq8wvRx~in1v86kpYdxqk1UuY3NFyIzuEs~fDnd7aBFoXHq2uwbThBZWrAaz0TColC2sFsc3SKJW3TeGk8PdvxOys70PNhX~EMmHnHRsI3W7oL0SRwrJ1p-EOZPmzv~-bzf4zby~KQO99w-nK4Jtck33YqQ2dUByI7SB8rZ9PvgaaCEnDa68wvvJdiZi8CLWibnzYJM~ynLHpdr7pzbaGaU0nhR3Mk017NVQI8TQGkCiEcRchISk7aQRFq6eysGWhT-p4-Hw4blC-SZ~OkJbv-iyDhHzbqrM0ezh6kZero6rfaf-DfvbBL52r0vTRS6aJmHW7W-c-cD1OR5XexPw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Socio_Cultural_Analysis_on_Baduanjin_Qigong_Form_and_Techniques_of_the_Chinese_Traditional_Exercise_System","translated_slug":"","page_count":16,"language":"en","content_type":"Work","summary":"Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied for health benefits from ancient times to contemporary societies. Globalization and widespread of cultural elements internationally have contributed positively for Qigong practice’s being known more in the West. There are many researches that have been conducted on medical, health aspects of practicing Qigong. In this article the subject is Baduanjin Qigong (Eight Section Brocade) and its socio-cultural dimensions which is going to be discussed from several views. A comprehensive model of Baduanjin will be given and this can be functional to practitioners of Asian martial arts, Traditional Chinese Medicine (TCM) and also academics in social sciences, humanities and cultural studies.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57920846,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57920846/thumbnails/1.jpg","file_name":"Qigong-Article.pdf","download_url":"https://www.academia.edu/attachments/57920846/download_file","bulk_download_file_name":"Socio_Cultural_Analysis_on_Baduanjin_Qig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57920846/Qigong-Article-libre.pdf?1543928096=\u0026response-content-disposition=attachment%3B+filename%3DSocio_Cultural_Analysis_on_Baduanjin_Qig.pdf\u0026Expires=1742161270\u0026Signature=MTTq8wvRx~in1v86kpYdxqk1UuY3NFyIzuEs~fDnd7aBFoXHq2uwbThBZWrAaz0TColC2sFsc3SKJW3TeGk8PdvxOys70PNhX~EMmHnHRsI3W7oL0SRwrJ1p-EOZPmzv~-bzf4zby~KQO99w-nK4Jtck33YqQ2dUByI7SB8rZ9PvgaaCEnDa68wvvJdiZi8CLWibnzYJM~ynLHpdr7pzbaGaU0nhR3Mk017NVQI8TQGkCiEcRchISk7aQRFq6eysGWhT-p4-Hw4blC-SZ~OkJbv-iyDhHzbqrM0ezh6kZero6rfaf-DfvbBL52r0vTRS6aJmHW7W-c-cD1OR5XexPw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology"},{"id":1020,"name":"Chinese Philosophy","url":"https://www.academia.edu/Documents/in/Chinese_Philosophy"},{"id":10011,"name":"Sociology of Health","url":"https://www.academia.edu/Documents/in/Sociology_of_Health"},{"id":25806,"name":"Physical Education","url":"https://www.academia.edu/Documents/in/Physical_Education"},{"id":69367,"name":"Exercise and physical activity for health","url":"https://www.academia.edu/Documents/in/Exercise_and_physical_activity_for_health"},{"id":95463,"name":"Health and Physical Education","url":"https://www.academia.edu/Documents/in/Health_and_Physical_Education"},{"id":126635,"name":"Complimentary and Alternative Medicine","url":"https://www.academia.edu/Documents/in/Complimentary_and_Alternative_Medicine"},{"id":150194,"name":"Kung Fu","url":"https://www.academia.edu/Documents/in/Kung_Fu"},{"id":521144,"name":"Qigong","url":"https://www.academia.edu/Documents/in/Qigong"},{"id":547078,"name":"Sports and Exercise Sciences","url":"https://www.academia.edu/Documents/in/Sports_and_Exercise_Sciences"},{"id":839914,"name":"traditional Chinese medicine (TCM)","url":"https://www.academia.edu/Documents/in/traditional_Chinese_medicine_TCM_"}],"urls":[{"id":8646473,"url":"https://www.asianinstituteofresearch.org/jhms"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37773971"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37773971/Social_Media_and_OPSEC_an_analysis_through_sociology_of_security"><img alt="Research paper thumbnail of Social Media and OPSEC / an analysis through sociology of security" class="work-thumbnail" src="https://attachments.academia-assets.com/57769806/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37773971/Social_Media_and_OPSEC_an_analysis_through_sociology_of_security">Social Media and OPSEC / an analysis through sociology of security</a></div><div class="wp-workCard_item"><span>SECURITY DIMENSIONS International & National Studies</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">When virtual social relations and online interactions have increased in our age media also had a ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks , terrorism, identity theft, ransomwares and so on. Even " old types " of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security's prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="b34532a176ac205d733d33267f10b6da" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57769806,"asset_id":37773971,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57769806/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37773971"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37773971"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37773971; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37773971]").text(description); $(".js-view-count[data-work-id=37773971]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37773971; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37773971']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "b34532a176ac205d733d33267f10b6da" } } $('.js-work-strip[data-work-id=37773971]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37773971,"title":"Social Media and OPSEC / an analysis through sociology of security","translated_title":"","metadata":{"doi":"10.5604/01.3001.0012.7248","volume":"26","abstract":"When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks , terrorism, identity theft, ransomwares and so on. Even \" old types \" of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security's prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.","ai_title_tag":"Social Media's Impact on Security and OPSEC","page_numbers":"160-172","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"SECURITY DIMENSIONS International \u0026 National Studies"},"translated_abstract":"When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks , terrorism, identity theft, ransomwares and so on. Even \" old types \" of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security's prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.","internal_url":"https://www.academia.edu/37773971/Social_Media_and_OPSEC_an_analysis_through_sociology_of_security","translated_internal_url":"","created_at":"2018-11-14T12:54:50.379-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57769806,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57769806/thumbnails/1.jpg","file_name":"607586.pdf","download_url":"https://www.academia.edu/attachments/57769806/download_file","bulk_download_file_name":"Social_Media_and_OPSEC_an_analysis_throu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57769806/607586-libre.pdf?1542229187=\u0026response-content-disposition=attachment%3B+filename%3DSocial_Media_and_OPSEC_an_analysis_throu.pdf\u0026Expires=1742161270\u0026Signature=E-qFxdFi1JuLAFZDfXeCc-Q97PzeifK1dPNu~vWNDm3uNk7XA4bLWQmwGrzM6LGepmSlDLN-gdG3uA4I-ueHr5ep41Z6avA4NUea8jP0PGyTE-SJlTIDnY4gWHSM6h4F-8Z3asyzN7MSPlIfcqgEb~7qtwXAmHU0vQhaF5qQYykgkAupZHLWlmL3M~I1PFi0xd7MZ0Nd8FGH0cZNmJ858irfwi7yXf~z1NmeS8lqdYeCwCgCXkQRRvWgiBjqlULHqueNeiVBJ5Vu4NhIWqxC~eGaFv4ezojE26R8gn5vnJUKU9NcCzCVEHBvnVjaUqg4v-kCTj5TO3tB7Cao0XdUDA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Social_Media_and_OPSEC_an_analysis_through_sociology_of_security","translated_slug":"","page_count":13,"language":"en","content_type":"Work","summary":"When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks , terrorism, identity theft, ransomwares and so on. Even \" old types \" of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security's prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57769806,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57769806/thumbnails/1.jpg","file_name":"607586.pdf","download_url":"https://www.academia.edu/attachments/57769806/download_file","bulk_download_file_name":"Social_Media_and_OPSEC_an_analysis_throu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57769806/607586-libre.pdf?1542229187=\u0026response-content-disposition=attachment%3B+filename%3DSocial_Media_and_OPSEC_an_analysis_throu.pdf\u0026Expires=1742161270\u0026Signature=E-qFxdFi1JuLAFZDfXeCc-Q97PzeifK1dPNu~vWNDm3uNk7XA4bLWQmwGrzM6LGepmSlDLN-gdG3uA4I-ueHr5ep41Z6avA4NUea8jP0PGyTE-SJlTIDnY4gWHSM6h4F-8Z3asyzN7MSPlIfcqgEb~7qtwXAmHU0vQhaF5qQYykgkAupZHLWlmL3M~I1PFi0xd7MZ0Nd8FGH0cZNmJ858irfwi7yXf~z1NmeS8lqdYeCwCgCXkQRRvWgiBjqlULHqueNeiVBJ5Vu4NhIWqxC~eGaFv4ezojE26R8gn5vnJUKU9NcCzCVEHBvnVjaUqg4v-kCTj5TO3tB7Cao0XdUDA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media"},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":408724,"name":"OPSEC","url":"https://www.academia.edu/Documents/in/OPSEC"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[{"id":8631957,"url":"http://security-dimensions.pl/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37622154"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37622154/SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATIVE"><img alt="Research paper thumbnail of SOCIOTHERAPY AS A CONTEMPORARY ALTERNATIVE" class="work-thumbnail" src="https://attachments.academia-assets.com/57605943/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37622154/SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATIVE">SOCIOTHERAPY AS A CONTEMPORARY ALTERNATIVE</a></div><div class="wp-workCard_item"><span>CKS 2015 - Challenges of the Knowledge Society, "Nicolae Titulescu" University Publishing House</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoreti...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoretical and historical relations with the discipline of Sociology. Why there was a need to suggest a new way of therapy, while psychotherapy is existing? We have witnessed that there are some social dimensions of psychological problems which require a solution based on "socialization" between therapists and patients. There is a "healing power" in socialization and it has been the basis for all sorts of group therapies, including Sociotherapy as well. In this paper, we will have the opportunity to discuss the theoretical knowledge on Sociotherapy and consider its possibilities for applying contemporary socio-psychological problems in society. Knowledge society gives us a suitable platform to practice various therapeutic disciplines to find out solution for the problems created by the same society. This paper may be seen as a part of this purpose, finding viable and operative solutions to socio-psychological problems that today's individuals experience in their daily lives.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0130dab98880ee2551942cc6f3153eb0" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605943,"asset_id":37622154,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605943/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37622154"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37622154"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37622154; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37622154]").text(description); $(".js-view-count[data-work-id=37622154]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37622154; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37622154']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0130dab98880ee2551942cc6f3153eb0" } } $('.js-work-strip[data-work-id=37622154]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37622154,"title":"SOCIOTHERAPY AS A CONTEMPORARY ALTERNATIVE","translated_title":"","metadata":{"abstract":"Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoretical and historical relations with the discipline of Sociology. Why there was a need to suggest a new way of therapy, while psychotherapy is existing? We have witnessed that there are some social dimensions of psychological problems which require a solution based on \"socialization\" between therapists and patients. There is a \"healing power\" in socialization and it has been the basis for all sorts of group therapies, including Sociotherapy as well. In this paper, we will have the opportunity to discuss the theoretical knowledge on Sociotherapy and consider its possibilities for applying contemporary socio-psychological problems in society. Knowledge society gives us a suitable platform to practice various therapeutic disciplines to find out solution for the problems created by the same society. This paper may be seen as a part of this purpose, finding viable and operative solutions to socio-psychological problems that today's individuals experience in their daily lives.","more_info":"ISSN 2359-9227 ISSN-L 2068-7796","page_numbers":"894-897","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"CKS 2015 - Challenges of the Knowledge Society, \"Nicolae Titulescu\" University Publishing House"},"translated_abstract":"Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoretical and historical relations with the discipline of Sociology. Why there was a need to suggest a new way of therapy, while psychotherapy is existing? We have witnessed that there are some social dimensions of psychological problems which require a solution based on \"socialization\" between therapists and patients. There is a \"healing power\" in socialization and it has been the basis for all sorts of group therapies, including Sociotherapy as well. In this paper, we will have the opportunity to discuss the theoretical knowledge on Sociotherapy and consider its possibilities for applying contemporary socio-psychological problems in society. Knowledge society gives us a suitable platform to practice various therapeutic disciplines to find out solution for the problems created by the same society. This paper may be seen as a part of this purpose, finding viable and operative solutions to socio-psychological problems that today's individuals experience in their daily lives.","internal_url":"https://www.academia.edu/37622154/SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATIVE","translated_internal_url":"","created_at":"2018-10-21T11:24:02.275-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605943,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605943/thumbnails/1.jpg","file_name":"CKS_2015_education_and_sociology_art.128.pdf","download_url":"https://www.academia.edu/attachments/57605943/download_file","bulk_download_file_name":"SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605943/CKS_2015_education_and_sociology_art.128-libre.pdf?1540146847=\u0026response-content-disposition=attachment%3B+filename%3DSOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATI.pdf\u0026Expires=1742161271\u0026Signature=alhYwsBQSYryJ0AKQGgmDfaXwMb1fk~9CzORk77-P8W~QrBnlhlrtrdIOWgoG9j5G-QHVQpK4dxw8UFZIZG030ZmwdsCjv6qwRSJg-rhZvj-cGADE~P6VbX3bPgiIjHwFGzKkvatNPEPVTtjY-dbj3eC8T4Wp~R-RkbrVzQOwIn2IsD8AdsnCcqTYZDthkLfeNTeoIWvFM3z4e3Y9e0dukAuqL5UXH9IOydAareEw4s2L4YuA0J2IA4D98DaYDFKMqfZemrEUtFewb4cjxn5lxECXe4lZJ29QVdXn5jfVXW49fxfBthiIwzY0xMomJLP2aDaf8s1G~gCxRtdt4u-6A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATIVE","translated_slug":"","page_count":4,"language":"en","content_type":"Work","summary":"Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoretical and historical relations with the discipline of Sociology. Why there was a need to suggest a new way of therapy, while psychotherapy is existing? We have witnessed that there are some social dimensions of psychological problems which require a solution based on \"socialization\" between therapists and patients. There is a \"healing power\" in socialization and it has been the basis for all sorts of group therapies, including Sociotherapy as well. In this paper, we will have the opportunity to discuss the theoretical knowledge on Sociotherapy and consider its possibilities for applying contemporary socio-psychological problems in society. Knowledge society gives us a suitable platform to practice various therapeutic disciplines to find out solution for the problems created by the same society. This paper may be seen as a part of this purpose, finding viable and operative solutions to socio-psychological problems that today's individuals experience in their daily lives.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605943,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605943/thumbnails/1.jpg","file_name":"CKS_2015_education_and_sociology_art.128.pdf","download_url":"https://www.academia.edu/attachments/57605943/download_file","bulk_download_file_name":"SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605943/CKS_2015_education_and_sociology_art.128-libre.pdf?1540146847=\u0026response-content-disposition=attachment%3B+filename%3DSOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATI.pdf\u0026Expires=1742161271\u0026Signature=alhYwsBQSYryJ0AKQGgmDfaXwMb1fk~9CzORk77-P8W~QrBnlhlrtrdIOWgoG9j5G-QHVQpK4dxw8UFZIZG030ZmwdsCjv6qwRSJg-rhZvj-cGADE~P6VbX3bPgiIjHwFGzKkvatNPEPVTtjY-dbj3eC8T4Wp~R-RkbrVzQOwIn2IsD8AdsnCcqTYZDthkLfeNTeoIWvFM3z4e3Y9e0dukAuqL5UXH9IOydAareEw4s2L4YuA0J2IA4D98DaYDFKMqfZemrEUtFewb4cjxn5lxECXe4lZJ29QVdXn5jfVXW49fxfBthiIwzY0xMomJLP2aDaf8s1G~gCxRtdt4u-6A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":233,"name":"Group Therapy","url":"https://www.academia.edu/Documents/in/Group_Therapy"},{"id":3279,"name":"Psychotherapy and Counseling","url":"https://www.academia.edu/Documents/in/Psychotherapy_and_Counseling"},{"id":5685,"name":"Clinical Sociology","url":"https://www.academia.edu/Documents/in/Clinical_Sociology"},{"id":275684,"name":"Interpersonal Therapy","url":"https://www.academia.edu/Documents/in/Interpersonal_Therapy"},{"id":906082,"name":"Sociotherapy","url":"https://www.academia.edu/Documents/in/Sociotherapy"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37622047"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37622047/OPSEC_Model_and_Applications"><img alt="Research paper thumbnail of OPSEC Model and Applications" class="work-thumbnail" src="https://attachments.academia-assets.com/57605828/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37622047/OPSEC_Model_and_Applications">OPSEC Model and Applications</a></div><div class="wp-workCard_item"><span>SECURITY DIMENSIONS International & National Studies</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army's operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles , steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0a927139b73580a906117970f790741e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605828,"asset_id":37622047,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605828/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37622047"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37622047"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37622047; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37622047]").text(description); $(".js-view-count[data-work-id=37622047]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37622047; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37622047']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0a927139b73580a906117970f790741e" } } $('.js-work-strip[data-work-id=37622047]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37622047,"title":"OPSEC Model and Applications","translated_title":"","metadata":{"doi":"10.24356/SD/25/3","volume":"25","abstract":"OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army's operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles , steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.","page_numbers":"60-81","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"SECURITY DIMENSIONS International \u0026 National Studies"},"translated_abstract":"OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army's operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles , steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.","internal_url":"https://www.academia.edu/37622047/OPSEC_Model_and_Applications","translated_internal_url":"","created_at":"2018-10-21T11:05:41.056-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605828,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605828/thumbnails/1.jpg","file_name":"SD_25_60-81.pdf","download_url":"https://www.academia.edu/attachments/57605828/download_file","bulk_download_file_name":"OPSEC_Model_and_Applications.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605828/SD_25_60-81-libre.pdf?1540145510=\u0026response-content-disposition=attachment%3B+filename%3DOPSEC_Model_and_Applications.pdf\u0026Expires=1742161271\u0026Signature=ESZLnGgtzYsqrvEoivuuJ4Xf9mWLZ6WQxY4GU5tSISLGqMBC~SFJrsN~wUZTUM122VsoDs6tHolkCKtlQhNpP52AC2DcFusJSG1lw0~9X-f5aSlIfx-H4TCSJO~0XyCtQO1ZySQnTz7l~Lj28gAwG16kF183AT3iZw~w1YZ47rVpxM5aaI1~mttNmjPHw5Z-foZk1W7JSEWIxKk5vMy6KyTLFYb8qf7qbWxoF7-tKVEcI9SyY-f~N1f474webdHer9R2aELRJ6quJGnouRARuYPNnYXIYKGvLA57~uvBFHC2JD7sgkvHdm4Z2yyDKBWE1PPptcQijiHx3CkYI9IO5g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"OPSEC_Model_and_Applications","translated_slug":"","page_count":22,"language":"en","content_type":"Work","summary":"OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army's operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles , steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605828,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605828/thumbnails/1.jpg","file_name":"SD_25_60-81.pdf","download_url":"https://www.academia.edu/attachments/57605828/download_file","bulk_download_file_name":"OPSEC_Model_and_Applications.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605828/SD_25_60-81-libre.pdf?1540145510=\u0026response-content-disposition=attachment%3B+filename%3DOPSEC_Model_and_Applications.pdf\u0026Expires=1742161271\u0026Signature=ESZLnGgtzYsqrvEoivuuJ4Xf9mWLZ6WQxY4GU5tSISLGqMBC~SFJrsN~wUZTUM122VsoDs6tHolkCKtlQhNpP52AC2DcFusJSG1lw0~9X-f5aSlIfx-H4TCSJO~0XyCtQO1ZySQnTz7l~Lj28gAwG16kF183AT3iZw~w1YZ47rVpxM5aaI1~mttNmjPHw5Z-foZk1W7JSEWIxKk5vMy6KyTLFYb8qf7qbWxoF7-tKVEcI9SyY-f~N1f474webdHer9R2aELRJ6quJGnouRARuYPNnYXIYKGvLA57~uvBFHC2JD7sgkvHdm4Z2yyDKBWE1PPptcQijiHx3CkYI9IO5g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":73443,"name":"Risk society","url":"https://www.academia.edu/Documents/in/Risk_society"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":408724,"name":"OPSEC","url":"https://www.academia.edu/Documents/in/OPSEC"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37621987"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37621987/Sociology_of_Security_in_the_Insecure_World"><img alt="Research paper thumbnail of Sociology of Security in the Insecure World" class="work-thumbnail" src="https://attachments.academia-assets.com/57605763/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37621987/Sociology_of_Security_in_the_Insecure_World">Sociology of Security in the Insecure World</a></div><div class="wp-workCard_item"><span>SECURITY DIMENSIONS International & National Studies</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Security and risk related problems have been important challenges always, however become highly c...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Security and risk related problems have been important challenges always, however become highly critical since the beginning of 21st Century. The industry of security has grown in relation with the increasing level of threats. cybercrimes, conflicts, terrorism, organized crimes, etc. are problems both for governments and private companies. in public sector security field has required a professionalized administration, for private sector security management has become a leading and growing field for the future of companies and their investments. the improving mechanisms of security in global, regional and local levels have created important changes as well on societal and individual levels. today , all societies are more or less, in this way or that way, influenced by changing security paradigms and new progresses in this sector. Sociology, as the discipline researching and analyzing societies in general sense, cannot undervalue what is happening with security field in terms of being a " social institution ". this paper will provide the core concepts and methodological approaches towards establishing sociology of security further as a more progressed sub-discipline of sociology. We will have also the opportunity to focus and analyze examples from different parts of the World such as europe, asia and africa.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="3b6ab07fea16c264cc9d80aecc79dd02" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605763,"asset_id":37621987,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605763/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37621987"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37621987"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37621987; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37621987]").text(description); $(".js-view-count[data-work-id=37621987]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37621987; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37621987']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "3b6ab07fea16c264cc9d80aecc79dd02" } } $('.js-work-strip[data-work-id=37621987]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37621987,"title":"Sociology of Security in the Insecure World","translated_title":"","metadata":{"doi":"10.24356/SD/23/8","volume":"23","abstract":"Security and risk related problems have been important challenges always, however become highly critical since the beginning of 21st Century. The industry of security has grown in relation with the increasing level of threats. cybercrimes, conflicts, terrorism, organized crimes, etc. are problems both for governments and private companies. in public sector security field has required a professionalized administration, for private sector security management has become a leading and growing field for the future of companies and their investments. the improving mechanisms of security in global, regional and local levels have created important changes as well on societal and individual levels. today , all societies are more or less, in this way or that way, influenced by changing security paradigms and new progresses in this sector. Sociology, as the discipline researching and analyzing societies in general sense, cannot undervalue what is happening with security field in terms of being a \" social institution \". this paper will provide the core concepts and methodological approaches towards establishing sociology of security further as a more progressed sub-discipline of sociology. We will have also the opportunity to focus and analyze examples from different parts of the World such as europe, asia and africa.","ai_title_tag":"Sociology of Security: Addressing 21st Century Risks","page_numbers":"146-164","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"SECURITY DIMENSIONS International \u0026 National Studies"},"translated_abstract":"Security and risk related problems have been important challenges always, however become highly critical since the beginning of 21st Century. The industry of security has grown in relation with the increasing level of threats. cybercrimes, conflicts, terrorism, organized crimes, etc. are problems both for governments and private companies. in public sector security field has required a professionalized administration, for private sector security management has become a leading and growing field for the future of companies and their investments. the improving mechanisms of security in global, regional and local levels have created important changes as well on societal and individual levels. today , all societies are more or less, in this way or that way, influenced by changing security paradigms and new progresses in this sector. Sociology, as the discipline researching and analyzing societies in general sense, cannot undervalue what is happening with security field in terms of being a \" social institution \". this paper will provide the core concepts and methodological approaches towards establishing sociology of security further as a more progressed sub-discipline of sociology. We will have also the opportunity to focus and analyze examples from different parts of the World such as europe, asia and africa.","internal_url":"https://www.academia.edu/37621987/Sociology_of_Security_in_the_Insecure_World","translated_internal_url":"","created_at":"2018-10-21T10:54:54.939-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605763,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605763/thumbnails/1.jpg","file_name":"SD_23_146-164.pdf","download_url":"https://www.academia.edu/attachments/57605763/download_file","bulk_download_file_name":"Sociology_of_Security_in_the_Insecure_Wo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605763/SD_23_146-164-libre.pdf?1540144881=\u0026response-content-disposition=attachment%3B+filename%3DSociology_of_Security_in_the_Insecure_Wo.pdf\u0026Expires=1742161271\u0026Signature=JmzLhM--aQwlDl-XfoGzNWeaUvQO~SnEWkwxQsRnvGpDc~hqy9a-6xDzgOCQ-cymhTlo5ME-60swsHtLEgMqvhX3nn~jWFbNnTiLur-zKq7S1ScWUFrpsXNXIHEQHObTA1hyEZS3VAF1qJPrPNWe8SKZJPVO2cZkCwIV2cipUcEWCuNDc7Tfzob-uVFCHReQkSiH-Zb132rQH0tcugOEjGPofU5uidLs5uH8H8MOV2Zyj9YOeBroWjbXj~TKvaZln5d9EQf~6ZDxq-RmiJNLKBnjQxPGrESKDKjZwjdwxh6AJPTQesuuK8KiuD15~nLAVvJjj-ARu5Sr7yoLQKD6GQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Sociology_of_Security_in_the_Insecure_World","translated_slug":"","page_count":19,"language":"en","content_type":"Work","summary":"Security and risk related problems have been important challenges always, however become highly critical since the beginning of 21st Century. The industry of security has grown in relation with the increasing level of threats. cybercrimes, conflicts, terrorism, organized crimes, etc. are problems both for governments and private companies. in public sector security field has required a professionalized administration, for private sector security management has become a leading and growing field for the future of companies and their investments. the improving mechanisms of security in global, regional and local levels have created important changes as well on societal and individual levels. today , all societies are more or less, in this way or that way, influenced by changing security paradigms and new progresses in this sector. Sociology, as the discipline researching and analyzing societies in general sense, cannot undervalue what is happening with security field in terms of being a \" social institution \". this paper will provide the core concepts and methodological approaches towards establishing sociology of security further as a more progressed sub-discipline of sociology. We will have also the opportunity to focus and analyze examples from different parts of the World such as europe, asia and africa.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605763,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605763/thumbnails/1.jpg","file_name":"SD_23_146-164.pdf","download_url":"https://www.academia.edu/attachments/57605763/download_file","bulk_download_file_name":"Sociology_of_Security_in_the_Insecure_Wo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605763/SD_23_146-164-libre.pdf?1540144881=\u0026response-content-disposition=attachment%3B+filename%3DSociology_of_Security_in_the_Insecure_Wo.pdf\u0026Expires=1742161271\u0026Signature=JmzLhM--aQwlDl-XfoGzNWeaUvQO~SnEWkwxQsRnvGpDc~hqy9a-6xDzgOCQ-cymhTlo5ME-60swsHtLEgMqvhX3nn~jWFbNnTiLur-zKq7S1ScWUFrpsXNXIHEQHObTA1hyEZS3VAF1qJPrPNWe8SKZJPVO2cZkCwIV2cipUcEWCuNDc7Tfzob-uVFCHReQkSiH-Zb132rQH0tcugOEjGPofU5uidLs5uH8H8MOV2Zyj9YOeBroWjbXj~TKvaZln5d9EQf~6ZDxq-RmiJNLKBnjQxPGrESKDKjZwjdwxh6AJPTQesuuK8KiuD15~nLAVvJjj-ARu5Sr7yoLQKD6GQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology"},{"id":5521,"name":"Crisis Management","url":"https://www.academia.edu/Documents/in/Crisis_Management"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37621949"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37621949/OPSEC_OPEM_Konsepti_ve_G%C3%BCvenlik_Sosyolojisi_Ba%C4%9Flam%C4%B1nda_%C3%96nemi"><img alt="Research paper thumbnail of OPSEC (OPEM) Konsepti ve Güvenlik Sosyolojisi Bağlamında Önemi" class="work-thumbnail" src="https://attachments.academia-assets.com/57605698/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37621949/OPSEC_OPEM_Konsepti_ve_G%C3%BCvenlik_Sosyolojisi_Ba%C4%9Flam%C4%B1nda_%C3%96nemi">OPSEC (OPEM) Konsepti ve Güvenlik Sosyolojisi Bağlamında Önemi</a></div><div class="wp-workCard_item"><span>Journal of Strategic Research in Social Science (JoSReSS)</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketle...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketlerine, spor tesislerinden kültürel faaliyetlere kadar çok geniş bir alana hitap etmektedir. Devletler düzeyinde husumetler olabileceği gibi ticari kuruluşlar arasında da rekabet kesintisiz sürmektedir. Gerçekleştirilen en küçükten en büyüğe kadar her etkinlik-operasyon ile ilgili ketumiyet sağlanamazsa çatışma ya da rekabet söz konusu unsurun aleyhine sonuçlanır. Bu açıdan Operasyon Emniyeti (OPEM) anlamına gelen OPSEC önem arz etmektedir. ABD’de askeri bir terim olarak geliştirilen bu konsept sonraki zaman diliminde askeriye dışındaki güvenlik birimlerinde de kullanılmıştır. Bugün özel güvenlik sektöründe de şirket güvenliği, IT güvenliği, vb. alanlarda OPSEC’in kullanıldığını görüyoruz. Bu çalışmanın temel argümanı OPSEC uygulamalarının askeriye ya da güvenlik sektörüyle sınırlandırılmayıp ekonomi, siyaset, iş dünyası, farklı toplumsal alanlar, vb. de kullanılabilme potansiyeline sahip olduğudur. Konu, ilgili literatüre sosyolojik bir pencereden bakarak tartışılmaktadır.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="686202a92802a2fcd51bfa1e877cd77b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605698,"asset_id":37621949,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605698/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37621949"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37621949"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37621949; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37621949]").text(description); $(".js-view-count[data-work-id=37621949]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37621949; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37621949']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "686202a92802a2fcd51bfa1e877cd77b" } } $('.js-work-strip[data-work-id=37621949]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37621949,"title":"OPSEC (OPEM) Konsepti ve Güvenlik Sosyolojisi Bağlamında Önemi","translated_title":"","metadata":{"issue":"1","volume":"3","abstract":"Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketlerine, spor tesislerinden kültürel faaliyetlere kadar çok geniş bir alana hitap etmektedir. Devletler düzeyinde husumetler olabileceği gibi ticari kuruluşlar arasında da rekabet kesintisiz sürmektedir. Gerçekleştirilen en küçükten en büyüğe kadar her etkinlik-operasyon ile ilgili ketumiyet sağlanamazsa çatışma ya da rekabet söz konusu unsurun aleyhine sonuçlanır. Bu açıdan Operasyon Emniyeti (OPEM) anlamına gelen OPSEC önem arz etmektedir. ABD’de askeri bir terim olarak geliştirilen bu konsept sonraki zaman diliminde askeriye dışındaki güvenlik birimlerinde de kullanılmıştır. Bugün özel güvenlik sektöründe de şirket güvenliği, IT güvenliği, vb. alanlarda OPSEC’in kullanıldığını görüyoruz. Bu çalışmanın temel argümanı OPSEC uygulamalarının askeriye ya da güvenlik sektörüyle sınırlandırılmayıp ekonomi, siyaset, iş dünyası, farklı toplumsal alanlar, vb. de kullanılabilme potansiyeline sahip olduğudur. Konu, ilgili literatüre sosyolojik bir pencereden bakarak tartışılmaktadır.","page_numbers":"43-54","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Journal of Strategic Research in Social Science (JoSReSS)"},"translated_abstract":"Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketlerine, spor tesislerinden kültürel faaliyetlere kadar çok geniş bir alana hitap etmektedir. Devletler düzeyinde husumetler olabileceği gibi ticari kuruluşlar arasında da rekabet kesintisiz sürmektedir. Gerçekleştirilen en küçükten en büyüğe kadar her etkinlik-operasyon ile ilgili ketumiyet sağlanamazsa çatışma ya da rekabet söz konusu unsurun aleyhine sonuçlanır. Bu açıdan Operasyon Emniyeti (OPEM) anlamına gelen OPSEC önem arz etmektedir. ABD’de askeri bir terim olarak geliştirilen bu konsept sonraki zaman diliminde askeriye dışındaki güvenlik birimlerinde de kullanılmıştır. Bugün özel güvenlik sektöründe de şirket güvenliği, IT güvenliği, vb. alanlarda OPSEC’in kullanıldığını görüyoruz. Bu çalışmanın temel argümanı OPSEC uygulamalarının askeriye ya da güvenlik sektörüyle sınırlandırılmayıp ekonomi, siyaset, iş dünyası, farklı toplumsal alanlar, vb. de kullanılabilme potansiyeline sahip olduğudur. Konu, ilgili literatüre sosyolojik bir pencereden bakarak tartışılmaktadır.","internal_url":"https://www.academia.edu/37621949/OPSEC_OPEM_Konsepti_ve_G%C3%BCvenlik_Sosyolojisi_Ba%C4%9Flam%C4%B1nda_%C3%96nemi","translated_internal_url":"","created_at":"2018-10-21T10:44:19.187-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605698,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605698/thumbnails/1.jpg","file_name":"OPSEC_OPEM_Konsepti_ve_G__venlik_Sosyolojisi_Ba__lam__nda___nemi__323153_-317246.pdf","download_url":"https://www.academia.edu/attachments/57605698/download_file","bulk_download_file_name":"OPSEC_OPEM_Konsepti_ve_Guvenlik_Sosyoloj.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605698/OPSEC_OPEM_Konsepti_ve_G__venlik_Sosyolojisi_Ba__lam__nda___nemi__323153_-317246-libre.pdf?1540144208=\u0026response-content-disposition=attachment%3B+filename%3DOPSEC_OPEM_Konsepti_ve_Guvenlik_Sosyoloj.pdf\u0026Expires=1742161271\u0026Signature=XQU0CahCxVY0q~m9wzmOjArzCrjPPhI3O5mhWNKS46duhwiopwWLsH2t3gb2FPdHtqIEipJFHw9NoPUgroa-JNCHWYOTddi0UaXBaQCeRUQ5U-3WpM3YTrH1QOEQC8DN8HIXDips0bLjp8AyzCg1K~l5YT9BWeyr0zolKl8Tl0S8uDTLmWifRSyX7Lmn1sBwDU0UqIqMeQwA0b0OSA0vcyBhYUbQq8AF~Nr0rZi3p01PKz4IA5P7vnMBDYyjeElB6tu-z0IEVwnWSfNa6WhBGQ~8TVKy5JYLu6UcyzMbA0Wq9qk66RpUFn~5RidfaHcd9Yo-YD12I9uP5gugNDejqw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"OPSEC_OPEM_Konsepti_ve_Güvenlik_Sosyolojisi_Bağlamında_Önemi","translated_slug":"","page_count":12,"language":"tr","content_type":"Work","summary":"Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketlerine, spor tesislerinden kültürel faaliyetlere kadar çok geniş bir alana hitap etmektedir. Devletler düzeyinde husumetler olabileceği gibi ticari kuruluşlar arasında da rekabet kesintisiz sürmektedir. Gerçekleştirilen en küçükten en büyüğe kadar her etkinlik-operasyon ile ilgili ketumiyet sağlanamazsa çatışma ya da rekabet söz konusu unsurun aleyhine sonuçlanır. Bu açıdan Operasyon Emniyeti (OPEM) anlamına gelen OPSEC önem arz etmektedir. ABD’de askeri bir terim olarak geliştirilen bu konsept sonraki zaman diliminde askeriye dışındaki güvenlik birimlerinde de kullanılmıştır. Bugün özel güvenlik sektöründe de şirket güvenliği, IT güvenliği, vb. alanlarda OPSEC’in kullanıldığını görüyoruz. Bu çalışmanın temel argümanı OPSEC uygulamalarının askeriye ya da güvenlik sektörüyle sınırlandırılmayıp ekonomi, siyaset, iş dünyası, farklı toplumsal alanlar, vb. de kullanılabilme potansiyeline sahip olduğudur. Konu, ilgili literatüre sosyolojik bir pencereden bakarak tartışılmaktadır.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605698,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605698/thumbnails/1.jpg","file_name":"OPSEC_OPEM_Konsepti_ve_G__venlik_Sosyolojisi_Ba__lam__nda___nemi__323153_-317246.pdf","download_url":"https://www.academia.edu/attachments/57605698/download_file","bulk_download_file_name":"OPSEC_OPEM_Konsepti_ve_Guvenlik_Sosyoloj.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605698/OPSEC_OPEM_Konsepti_ve_G__venlik_Sosyolojisi_Ba__lam__nda___nemi__323153_-317246-libre.pdf?1540144208=\u0026response-content-disposition=attachment%3B+filename%3DOPSEC_OPEM_Konsepti_ve_Guvenlik_Sosyoloj.pdf\u0026Expires=1742161271\u0026Signature=XQU0CahCxVY0q~m9wzmOjArzCrjPPhI3O5mhWNKS46duhwiopwWLsH2t3gb2FPdHtqIEipJFHw9NoPUgroa-JNCHWYOTddi0UaXBaQCeRUQ5U-3WpM3YTrH1QOEQC8DN8HIXDips0bLjp8AyzCg1K~l5YT9BWeyr0zolKl8Tl0S8uDTLmWifRSyX7Lmn1sBwDU0UqIqMeQwA0b0OSA0vcyBhYUbQq8AF~Nr0rZi3p01PKz4IA5P7vnMBDYyjeElB6tu-z0IEVwnWSfNa6WhBGQ~8TVKy5JYLu6UcyzMbA0Wq9qk66RpUFn~5RidfaHcd9Yo-YD12I9uP5gugNDejqw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":63859,"name":"Uluslararası Güvenlik","url":"https://www.academia.edu/Documents/in/Uluslararasi_Guvenlik"},{"id":408724,"name":"OPSEC","url":"https://www.academia.edu/Documents/in/OPSEC"},{"id":1144590,"name":"Siber Güvenlik","url":"https://www.academia.edu/Documents/in/Siber_Guvenlik"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37621877"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37621877/BU%C5%9E%C4%B0DO_JAPON_SAMURAYLARININ_FELSEFES%C4%B0"><img alt="Research paper thumbnail of BUŞİDO: JAPON SAMURAYLARININ FELSEFESİ" class="work-thumbnail" src="https://attachments.academia-assets.com/57605613/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37621877/BU%C5%9E%C4%B0DO_JAPON_SAMURAYLARININ_FELSEFES%C4%B0">BUŞİDO: JAPON SAMURAYLARININ FELSEFESİ</a></div><div class="wp-workCard_item"><span>Yalova Sosyal Bilimler Dergisi</span><span>, 2011</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşa...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşam felsefesidir. Samuraylar yüzyıllarca, Japon toplumu içinde Buşido etik kodlarına göre hareket etmiş ve bu geleneği kuşaktan kuşağa aktarmışlardır. Bu çalışma kapsamında Japon kültür tarihinin anahtar kavramlarından olan Buşido, Japonya'nın tarihinde yer alan önemli samuray ve savaş sanatı ustalarının (Yamamoto Tsunetomo, Miyamoto Musashi, Takuan Soho, Yagyu Munenori) görüşleri ışığında ele alınmıştır. Savaş sanatları tarihinde önemli bir yeri olan Buşido kavramı ve yansımaları kendi sosyal ve kültürel bağlamı içinde analiz edilirken, bu kavramın/olgunun oluşturduğu samuray profilinin oluşumu araştırılmıştır. Samurayların savaşçılık geleneğinin, salt bir fiziki "savaş" stratejileri bütünü olmayıp; esasında kişisel gelişim, ruhsal olgunlaşma ve ilerleme olarak bir anlam taşıdığı felsefi/etik örnekler temelinde ele alınmıştır.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="efd55851991a5e919b410826a8893cec" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605613,"asset_id":37621877,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605613/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37621877"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37621877"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37621877; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37621877]").text(description); $(".js-view-count[data-work-id=37621877]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37621877; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37621877']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "efd55851991a5e919b410826a8893cec" } } $('.js-work-strip[data-work-id=37621877]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37621877,"title":"BUŞİDO: JAPON SAMURAYLARININ FELSEFESİ","translated_title":"","metadata":{"volume":"1","abstract":"Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşam felsefesidir. Samuraylar yüzyıllarca, Japon toplumu içinde Buşido etik kodlarına göre hareket etmiş ve bu geleneği kuşaktan kuşağa aktarmışlardır. Bu çalışma kapsamında Japon kültür tarihinin anahtar kavramlarından olan Buşido, Japonya'nın tarihinde yer alan önemli samuray ve savaş sanatı ustalarının (Yamamoto Tsunetomo, Miyamoto Musashi, Takuan Soho, Yagyu Munenori) görüşleri ışığında ele alınmıştır. Savaş sanatları tarihinde önemli bir yeri olan Buşido kavramı ve yansımaları kendi sosyal ve kültürel bağlamı içinde analiz edilirken, bu kavramın/olgunun oluşturduğu samuray profilinin oluşumu araştırılmıştır. Samurayların savaşçılık geleneğinin, salt bir fiziki \"savaş\" stratejileri bütünü olmayıp; esasında kişisel gelişim, ruhsal olgunlaşma ve ilerleme olarak bir anlam taşıdığı felsefi/etik örnekler temelinde ele alınmıştır.","page_numbers":"132-150","publication_date":{"day":null,"month":null,"year":2011,"errors":{}},"publication_name":"Yalova Sosyal Bilimler Dergisi"},"translated_abstract":"Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşam felsefesidir. Samuraylar yüzyıllarca, Japon toplumu içinde Buşido etik kodlarına göre hareket etmiş ve bu geleneği kuşaktan kuşağa aktarmışlardır. Bu çalışma kapsamında Japon kültür tarihinin anahtar kavramlarından olan Buşido, Japonya'nın tarihinde yer alan önemli samuray ve savaş sanatı ustalarının (Yamamoto Tsunetomo, Miyamoto Musashi, Takuan Soho, Yagyu Munenori) görüşleri ışığında ele alınmıştır. Savaş sanatları tarihinde önemli bir yeri olan Buşido kavramı ve yansımaları kendi sosyal ve kültürel bağlamı içinde analiz edilirken, bu kavramın/olgunun oluşturduğu samuray profilinin oluşumu araştırılmıştır. Samurayların savaşçılık geleneğinin, salt bir fiziki \"savaş\" stratejileri bütünü olmayıp; esasında kişisel gelişim, ruhsal olgunlaşma ve ilerleme olarak bir anlam taşıdığı felsefi/etik örnekler temelinde ele alınmıştır.","internal_url":"https://www.academia.edu/37621877/BU%C5%9E%C4%B0DO_JAPON_SAMURAYLARININ_FELSEFES%C4%B0","translated_internal_url":"","created_at":"2018-10-21T10:27:53.978-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":31974279,"work_id":37621877,"tagging_user_id":95615525,"tagged_user_id":2917816,"co_author_invite_id":null,"email":"k***n@gmail.com","affiliation":"University of Usak","display_order":1,"name":"M. Kubilay Akman","title":"BUŞİDO: JAPON SAMURAYLARININ FELSEFESİ"}],"downloadable_attachments":[{"id":57605613,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605613/thumbnails/1.jpg","file_name":"5000000789-5000001630-1-PB.pdf","download_url":"https://www.academia.edu/attachments/57605613/download_file","bulk_download_file_name":"BUSIDO_JAPON_SAMURAYLARININ_FELSEFESI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605613/5000000789-5000001630-1-PB-libre.pdf?1540143141=\u0026response-content-disposition=attachment%3B+filename%3DBUSIDO_JAPON_SAMURAYLARININ_FELSEFESI.pdf\u0026Expires=1742161271\u0026Signature=F70xe3iPSPwb4FbFTa5VuBt7fkPfuz6o91dE6VoNgP9h2GvZbxiPniSgljUvZ9pkSyAzt1049K~Q71S19~oPmmVplE~H1~FX2Fr35RXHLqVN3dOXjvoac6gb6DG9do-e4esO0iRFMxCvA7lv0fT7hTbUNtIzte9vuCGo2NywItKMZF~GXguWjM6O4yl6xizajJ32a9FQN-plN7gJ49ZTQocpZ031cNeB~4ZMLEaBfg2BcdyMthx5~Q7oVOIonJz66k5y8tNwrxTUOqQ1bpuQJ3eI4T6yTb-Swu7m4BjMeFMjgNC7VbnUGFPR4QX~c1Lvb0aChWeJAgIqsMAGp95EdQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"BUŞİDO_JAPON_SAMURAYLARININ_FELSEFESİ","translated_slug":"","page_count":19,"language":"tr","content_type":"Work","summary":"Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşam felsefesidir. Samuraylar yüzyıllarca, Japon toplumu içinde Buşido etik kodlarına göre hareket etmiş ve bu geleneği kuşaktan kuşağa aktarmışlardır. Bu çalışma kapsamında Japon kültür tarihinin anahtar kavramlarından olan Buşido, Japonya'nın tarihinde yer alan önemli samuray ve savaş sanatı ustalarının (Yamamoto Tsunetomo, Miyamoto Musashi, Takuan Soho, Yagyu Munenori) görüşleri ışığında ele alınmıştır. Savaş sanatları tarihinde önemli bir yeri olan Buşido kavramı ve yansımaları kendi sosyal ve kültürel bağlamı içinde analiz edilirken, bu kavramın/olgunun oluşturduğu samuray profilinin oluşumu araştırılmıştır. Samurayların savaşçılık geleneğinin, salt bir fiziki \"savaş\" stratejileri bütünü olmayıp; esasında kişisel gelişim, ruhsal olgunlaşma ve ilerleme olarak bir anlam taşıdığı felsefi/etik örnekler temelinde ele alınmıştır.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605613,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605613/thumbnails/1.jpg","file_name":"5000000789-5000001630-1-PB.pdf","download_url":"https://www.academia.edu/attachments/57605613/download_file","bulk_download_file_name":"BUSIDO_JAPON_SAMURAYLARININ_FELSEFESI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605613/5000000789-5000001630-1-PB-libre.pdf?1540143141=\u0026response-content-disposition=attachment%3B+filename%3DBUSIDO_JAPON_SAMURAYLARININ_FELSEFESI.pdf\u0026Expires=1742161271\u0026Signature=F70xe3iPSPwb4FbFTa5VuBt7fkPfuz6o91dE6VoNgP9h2GvZbxiPniSgljUvZ9pkSyAzt1049K~Q71S19~oPmmVplE~H1~FX2Fr35RXHLqVN3dOXjvoac6gb6DG9do-e4esO0iRFMxCvA7lv0fT7hTbUNtIzte9vuCGo2NywItKMZF~GXguWjM6O4yl6xizajJ32a9FQN-plN7gJ49ZTQocpZ031cNeB~4ZMLEaBfg2BcdyMthx5~Q7oVOIonJz66k5y8tNwrxTUOqQ1bpuQJ3eI4T6yTb-Swu7m4BjMeFMjgNC7VbnUGFPR4QX~c1Lvb0aChWeJAgIqsMAGp95EdQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1223,"name":"Japanese Philosophy","url":"https://www.academia.edu/Documents/in/Japanese_Philosophy"},{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts"},{"id":49969,"name":"History of the Samurai","url":"https://www.academia.edu/Documents/in/History_of_the_Samurai"},{"id":83930,"name":"Bushido 武士道","url":"https://www.academia.edu/Documents/in/Bushido_Wu_Shi_Dao_"},{"id":284770,"name":"Japonya","url":"https://www.academia.edu/Documents/in/Japonya"},{"id":385475,"name":"Bujutsu","url":"https://www.academia.edu/Documents/in/Bujutsu"},{"id":385476,"name":"Kenjutsu","url":"https://www.academia.edu/Documents/in/Kenjutsu"},{"id":511977,"name":"Stratejik Yönetim","url":"https://www.academia.edu/Documents/in/Stratejik_Yonetim"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37621781"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37621781/G%C3%96%C4%9E%C3%9CS_G%C3%96%C4%9E%C3%9CSE_MUHAREBE_VE_G%C3%9CVENL%C4%B0K_UYGULAMALARINDAK%C4%B0_YER%C4%B0"><img alt="Research paper thumbnail of GÖĞÜS GÖĞÜSE MUHAREBE VE GÜVENLİK UYGULAMALARINDAKİ YERİ" class="work-thumbnail" src="https://attachments.academia-assets.com/57605484/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37621781/G%C3%96%C4%9E%C3%9CS_G%C3%96%C4%9E%C3%9CSE_MUHAREBE_VE_G%C3%9CVENL%C4%B0K_UYGULAMALARINDAK%C4%B0_YER%C4%B0">GÖĞÜS GÖĞÜSE MUHAREBE VE GÜVENLİK UYGULAMALARINDAKİ YERİ</a></div><div class="wp-workCard_item"><span>Eurasian Academy of Sciences Social Science Journal</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tar...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="a26162b550213e46f9ce7fb9d5957395" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605484,"asset_id":37621781,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605484/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37621781"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37621781"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37621781; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37621781]").text(description); $(".js-view-count[data-work-id=37621781]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37621781; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37621781']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "a26162b550213e46f9ce7fb9d5957395" } } $('.js-work-strip[data-work-id=37621781]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37621781,"title":"GÖĞÜS GÖĞÜSE MUHAREBE VE GÜVENLİK UYGULAMALARINDAKİ YERİ","translated_title":"","metadata":{"volume":"19","abstract":"Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.","page_numbers":"41-54","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Eurasian Academy of Sciences Social Science Journal"},"translated_abstract":"Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.","internal_url":"https://www.academia.edu/37621781/G%C3%96%C4%9E%C3%9CS_G%C3%96%C4%9E%C3%9CSE_MUHAREBE_VE_G%C3%9CVENL%C4%B0K_UYGULAMALARINDAK%C4%B0_YER%C4%B0","translated_internal_url":"","created_at":"2018-10-21T10:06:59.115-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605484,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605484/thumbnails/1.jpg","file_name":"gogus-goguse-muharebe-ve-guvenlik-uygulamalarindaki-yeri201807.pdf","download_url":"https://www.academia.edu/attachments/57605484/download_file","bulk_download_file_name":"GOGUS_GOGUSE_MUHAREBE_VE_GUVENLIK_UYGULA.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605484/gogus-goguse-muharebe-ve-guvenlik-uygulamalarindaki-yeri201807-libre.pdf?1540141735=\u0026response-content-disposition=attachment%3B+filename%3DGOGUS_GOGUSE_MUHAREBE_VE_GUVENLIK_UYGULA.pdf\u0026Expires=1742161271\u0026Signature=Tv8nDmVoZ877C~GLz9WR-QKdo-2Fk3nXqQH378tLlsDkdNTHxTUMr0ZcHml5iiffNj-0mLoAxbYa-a0IMEgsWJOarKmpAWJB2gsbJZb7jKlmZvFWGtsFSYPNbF1PaAKWHJCCdeoQ3XX91slx2qZysi3av~p7-WUoceokgXN8k3ERv3XVP8CtcMD4osKYQ9d-xLcFPSZUIVfvxfl9yzDBkb2fA~F3fHbFszC05msElHkjqRXYQsjAo1-Ojbmeny~A28pjk48NY9VEcYMQR3Aslfj8n4S-hKfcZGjTM0J1sZr2KBX1j2LqjDmiMr9KS-0s5Rt5n6nhe-2fKaGtUFo~gQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"GÖĞÜS_GÖĞÜSE_MUHAREBE_VE_GÜVENLİK_UYGULAMALARINDAKİ_YERİ","translated_slug":"","page_count":14,"language":"tr","content_type":"Work","summary":"Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605484,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605484/thumbnails/1.jpg","file_name":"gogus-goguse-muharebe-ve-guvenlik-uygulamalarindaki-yeri201807.pdf","download_url":"https://www.academia.edu/attachments/57605484/download_file","bulk_download_file_name":"GOGUS_GOGUSE_MUHAREBE_VE_GUVENLIK_UYGULA.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605484/gogus-goguse-muharebe-ve-guvenlik-uygulamalarindaki-yeri201807-libre.pdf?1540141735=\u0026response-content-disposition=attachment%3B+filename%3DGOGUS_GOGUSE_MUHAREBE_VE_GUVENLIK_UYGULA.pdf\u0026Expires=1742161271\u0026Signature=Tv8nDmVoZ877C~GLz9WR-QKdo-2Fk3nXqQH378tLlsDkdNTHxTUMr0ZcHml5iiffNj-0mLoAxbYa-a0IMEgsWJOarKmpAWJB2gsbJZb7jKlmZvFWGtsFSYPNbF1PaAKWHJCCdeoQ3XX91slx2qZysi3av~p7-WUoceokgXN8k3ERv3XVP8CtcMD4osKYQ9d-xLcFPSZUIVfvxfl9yzDBkb2fA~F3fHbFszC05msElHkjqRXYQsjAo1-Ojbmeny~A28pjk48NY9VEcYMQR3Aslfj8n4S-hKfcZGjTM0J1sZr2KBX1j2LqjDmiMr9KS-0s5Rt5n6nhe-2fKaGtUFo~gQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":521198,"name":"Self Defense","url":"https://www.academia.edu/Documents/in/Self_Defense"},{"id":1710242,"name":"Close Quarters Combat","url":"https://www.academia.edu/Documents/in/Close_Quarters_Combat"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="8661933" id="papers"><div class="js-work-strip profile--work_container" data-work-id="44386024"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/44386024/DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS"><img alt="Research paper thumbnail of DEFENCE MANAGEMENT AND PESTLE ANALYSIS" class="work-thumbnail" src="https://attachments.academia-assets.com/64789979/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/44386024/DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS">DEFENCE MANAGEMENT AND PESTLE ANALYSIS</a></div><div class="wp-workCard_item"><span>Ante Portas – Security Studies</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Militaries are in a changing and evolving environment. Defence management, with references to bot...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Militaries are in a changing and evolving environment. Defence management, with references to both military science and general management field, is seeking possibilities, opportunities and methods for being transformed in this dynamic environment and contexts. Managing, commanding and leading requires to know what is around, how is the surrounding atmosphere of organizations, what are the current socio-political, economic, environmental, scientific and legal situations to be considered? PESTLE analysis is giving a chance to defence managers for answering these questions. In this article we will discuss PESTLE model and try to find a solution how we can enhance it through a strategic approach.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="1bdec8b501c02ba66d05b58167e81eda" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":64789979,"asset_id":44386024,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/64789979/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="44386024"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="44386024"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44386024; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44386024]").text(description); $(".js-view-count[data-work-id=44386024]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44386024; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='44386024']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "1bdec8b501c02ba66d05b58167e81eda" } } $('.js-work-strip[data-work-id=44386024]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":44386024,"title":"DEFENCE MANAGEMENT AND PESTLE ANALYSIS","translated_title":"","metadata":{"doi":"10.33674/3201910","issue":"14","volume":"1","abstract":"Militaries are in a changing and evolving environment. Defence management, with references to both military science and general management field, is seeking possibilities, opportunities and methods for being transformed in this dynamic environment and contexts. Managing, commanding and leading requires to know what is around, how is the surrounding atmosphere of organizations, what are the current socio-political, economic, environmental, scientific and legal situations to be considered? PESTLE analysis is giving a chance to defence managers for answering these questions. In this article we will discuss PESTLE model and try to find a solution how we can enhance it through a strategic approach.","page_numbers":"93-102","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Ante Portas – Security Studies"},"translated_abstract":"Militaries are in a changing and evolving environment. Defence management, with references to both military science and general management field, is seeking possibilities, opportunities and methods for being transformed in this dynamic environment and contexts. Managing, commanding and leading requires to know what is around, how is the surrounding atmosphere of organizations, what are the current socio-political, economic, environmental, scientific and legal situations to be considered? PESTLE analysis is giving a chance to defence managers for answering these questions. In this article we will discuss PESTLE model and try to find a solution how we can enhance it through a strategic approach.","internal_url":"https://www.academia.edu/44386024/DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS","translated_internal_url":"","created_at":"2020-10-28T03:29:34.509-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":64789979,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/64789979/thumbnails/1.jpg","file_name":"AP.XIV_Akman.pdf","download_url":"https://www.academia.edu/attachments/64789979/download_file","bulk_download_file_name":"DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/64789979/AP.XIV_Akman-libre.pdf?1603886121=\u0026response-content-disposition=attachment%3B+filename%3DDEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS.pdf\u0026Expires=1742161270\u0026Signature=DY0hPbHMwa8De0Pz0S3r1kVxwaUS-u86GBWkep1EyYF~E4iFDHl10puaJFWnQ0OIvA1jv2eszzv5CXPbq3WNuoliNI~KEy2d~QqbW5u2QCa7JmDLYSxBtHH9QcYOVLjnwyx7us4Hb1GoT06ggSTRz2izPiSb318xHPEUPfLiq2j~-fFmjbuErooPmAhikz9W5h2MoO3v21887C3qwhJyxIFHOKb3p5Px2uZEoIeDe3Oa5TXU-lqXVX1OZjVvPnUt40QYblfXm1UdJykBaDGxsN9ipZPt2YJSxIHMN7iDzepvalankZoggRi76tgsBfI~Zl-fNIyf1LTbSCQMRkpcdw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS","translated_slug":"","page_count":10,"language":"en","content_type":"Work","summary":"Militaries are in a changing and evolving environment. Defence management, with references to both military science and general management field, is seeking possibilities, opportunities and methods for being transformed in this dynamic environment and contexts. Managing, commanding and leading requires to know what is around, how is the surrounding atmosphere of organizations, what are the current socio-political, economic, environmental, scientific and legal situations to be considered? PESTLE analysis is giving a chance to defence managers for answering these questions. In this article we will discuss PESTLE model and try to find a solution how we can enhance it through a strategic approach.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":64789979,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/64789979/thumbnails/1.jpg","file_name":"AP.XIV_Akman.pdf","download_url":"https://www.academia.edu/attachments/64789979/download_file","bulk_download_file_name":"DEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/64789979/AP.XIV_Akman-libre.pdf?1603886121=\u0026response-content-disposition=attachment%3B+filename%3DDEFENCE_MANAGEMENT_AND_PESTLE_ANALYSIS.pdf\u0026Expires=1742161270\u0026Signature=DY0hPbHMwa8De0Pz0S3r1kVxwaUS-u86GBWkep1EyYF~E4iFDHl10puaJFWnQ0OIvA1jv2eszzv5CXPbq3WNuoliNI~KEy2d~QqbW5u2QCa7JmDLYSxBtHH9QcYOVLjnwyx7us4Hb1GoT06ggSTRz2izPiSb318xHPEUPfLiq2j~-fFmjbuErooPmAhikz9W5h2MoO3v21887C3qwhJyxIFHOKb3p5Px2uZEoIeDe3Oa5TXU-lqXVX1OZjVvPnUt40QYblfXm1UdJykBaDGxsN9ipZPt2YJSxIHMN7iDzepvalankZoggRi76tgsBfI~Zl-fNIyf1LTbSCQMRkpcdw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management"},{"id":559,"name":"Military Science","url":"https://www.academia.edu/Documents/in/Military_Science"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":44426,"name":"Military Studies","url":"https://www.academia.edu/Documents/in/Military_Studies"},{"id":308258,"name":"Defense Management","url":"https://www.academia.edu/Documents/in/Defense_Management"},{"id":420401,"name":"Pestle","url":"https://www.academia.edu/Documents/in/Pestle"},{"id":458954,"name":"Pestel","url":"https://www.academia.edu/Documents/in/Pestel"},{"id":922619,"name":"PESTEL Analysis","url":"https://www.academia.edu/Documents/in/PESTEL_Analysis"},{"id":1004939,"name":"Defence Management","url":"https://www.academia.edu/Documents/in/Defence_Management"},{"id":1640035,"name":"PESTLE Analysis","url":"https://www.academia.edu/Documents/in/PESTLE_Analysis"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[{"id":9131246,"url":"http://anteportas.pl/1-2020"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40979539"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/40979539/Military_Unarmed_Combat_Training_Its_Methods_and_Socio_cultural_Aspects"><img alt="Research paper thumbnail of Military Unarmed Combat Training, Its Methods and Socio-cultural Aspects" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/40979539/Military_Unarmed_Combat_Training_Its_Methods_and_Socio_cultural_Aspects">Military Unarmed Combat Training, Its Methods and Socio-cultural Aspects</a></div><div class="wp-workCard_item"><span>17th International Sport Sciences Congress</span><span>, 2019</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40979539"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40979539"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40979539; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40979539]").text(description); $(".js-view-count[data-work-id=40979539]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40979539; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40979539']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=40979539]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40979539,"title":"Military Unarmed Combat Training, Its Methods and Socio-cultural Aspects","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"17th International Sport Sciences Congress"},"translated_abstract":null,"internal_url":"https://www.academia.edu/40979539/Military_Unarmed_Combat_Training_Its_Methods_and_Socio_cultural_Aspects","translated_internal_url":"","created_at":"2019-11-18T23:18:05.675-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Military_Unarmed_Combat_Training_Its_Methods_and_Socio_cultural_Aspects","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[],"research_interests":[{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":26642,"name":"Military Sociology","url":"https://www.academia.edu/Documents/in/Military_Sociology"},{"id":44426,"name":"Military Studies","url":"https://www.academia.edu/Documents/in/Military_Studies"},{"id":521198,"name":"Self Defense","url":"https://www.academia.edu/Documents/in/Self_Defense"},{"id":1710242,"name":"Close Quarters Combat","url":"https://www.academia.edu/Documents/in/Close_Quarters_Combat"}],"urls":[{"id":8893362,"url":"http://sbk2019.org/tr/program"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40652271"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40652271/SOSYAL_DEMOKRAS%C4%B0N%C4%B0N_%C4%B0DEOLOJ%C4%B0K_A%C3%87ILIMLARI_%C3%9CZER%C4%B0NE_DE%C4%9EERLEND%C4%B0RMELER"><img alt="Research paper thumbnail of SOSYAL DEMOKRASİNİN İDEOLOJİK AÇILIMLARI ÜZERİNE DEĞERLENDİRMELER" class="work-thumbnail" src="https://attachments.academia-assets.com/60934850/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40652271/SOSYAL_DEMOKRAS%C4%B0N%C4%B0N_%C4%B0DEOLOJ%C4%B0K_A%C3%87ILIMLARI_%C3%9CZER%C4%B0NE_DE%C4%9EERLEND%C4%B0RMELER">SOSYAL DEMOKRASİNİN İDEOLOJİK AÇILIMLARI ÜZERİNE DEĞERLENDİRMELER</a></div><div class="wp-workCard_item"><span>SOCIAL SCIENCES STUDIES JOURNAL</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ÖZET Demokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavr...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ÖZET<br />Demokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavramlardır. Sosyal demokratik düşünce Fransız Devrimi'nin "eşitlik, özgürlük, kardeşlik" ideallerinin nasıl toplumsallaşabileceğine dair sorular sormuştur. 19. Yüzyılda doğan, 20. Yüzyılın şekillenmesinde çok etkin olan demokratik sosyalizm (sosyal demokrasi) günümüzde güncel bir siyasi ideoloji ve akımdır. Sosyalizmin özgürlük ve demokrasi algısı eleştirel, dönüştürücü ve değiştirici bir toplumsal tahayyül sunar. Sosyalist Enternasyonal tüm dünyadaki sosyal demokrat partilerin bir araya geldiği bir uluslararası organizasyondur. Bu makalede SE'nin temsil ettiği özgürlük ve toplumsal adalet anlayışının ana hatları tartışılacaktır. Anahtar Kelimeler: sosyalizm, toplumsal özgürlük, demokratik sosyalizm, sosyal demokrasi, CHP, Sosyalist Enternasyonal.<br /><br />ABSTRACT <br />Democratic socialism and social democracy are political notions which are used often with similar meanings. Social democratic thought has asked questions about how French Revolution's "freedom, equality, fraternity" ideals can be further socialized. Democratic socialism (social democracy) is an actual political ideology and movement today which was born in 19th century, had been very influential in shaping 20th century. The freedom and democracy perception of socialism provides a transforming and reforming social imagination. Socialist International is the international organization where social democratic parties around the World take place. In this article freedom and social justice conception represented by SI will be discussed in its main lines.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="a5918b6c666a4668aaa4f3e984cd07c9" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":60934850,"asset_id":40652271,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/60934850/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40652271"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40652271"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40652271; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40652271]").text(description); $(".js-view-count[data-work-id=40652271]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40652271; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40652271']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "a5918b6c666a4668aaa4f3e984cd07c9" } } $('.js-work-strip[data-work-id=40652271]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40652271,"title":"SOSYAL DEMOKRASİNİN İDEOLOJİK AÇILIMLARI ÜZERİNE DEĞERLENDİRMELER","translated_title":"","metadata":{"doi":"10.26449/sssj.1782","issue":"45","volume":"5","abstract":"ÖZET\nDemokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavramlardır. Sosyal demokratik düşünce Fransız Devrimi'nin \"eşitlik, özgürlük, kardeşlik\" ideallerinin nasıl toplumsallaşabileceğine dair sorular sormuştur. 19. Yüzyılda doğan, 20. Yüzyılın şekillenmesinde çok etkin olan demokratik sosyalizm (sosyal demokrasi) günümüzde güncel bir siyasi ideoloji ve akımdır. Sosyalizmin özgürlük ve demokrasi algısı eleştirel, dönüştürücü ve değiştirici bir toplumsal tahayyül sunar. Sosyalist Enternasyonal tüm dünyadaki sosyal demokrat partilerin bir araya geldiği bir uluslararası organizasyondur. Bu makalede SE'nin temsil ettiği özgürlük ve toplumsal adalet anlayışının ana hatları tartışılacaktır. Anahtar Kelimeler: sosyalizm, toplumsal özgürlük, demokratik sosyalizm, sosyal demokrasi, CHP, Sosyalist Enternasyonal.\n\nABSTRACT \nDemocratic socialism and social democracy are political notions which are used often with similar meanings. Social democratic thought has asked questions about how French Revolution's \"freedom, equality, fraternity\" ideals can be further socialized. Democratic socialism (social democracy) is an actual political ideology and movement today which was born in 19th century, had been very influential in shaping 20th century. The freedom and democracy perception of socialism provides a transforming and reforming social imagination. Socialist International is the international organization where social democratic parties around the World take place. In this article freedom and social justice conception represented by SI will be discussed in its main lines.","page_numbers":"5315-5321","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"SOCIAL SCIENCES STUDIES JOURNAL"},"translated_abstract":"ÖZET\nDemokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavramlardır. Sosyal demokratik düşünce Fransız Devrimi'nin \"eşitlik, özgürlük, kardeşlik\" ideallerinin nasıl toplumsallaşabileceğine dair sorular sormuştur. 19. Yüzyılda doğan, 20. Yüzyılın şekillenmesinde çok etkin olan demokratik sosyalizm (sosyal demokrasi) günümüzde güncel bir siyasi ideoloji ve akımdır. Sosyalizmin özgürlük ve demokrasi algısı eleştirel, dönüştürücü ve değiştirici bir toplumsal tahayyül sunar. Sosyalist Enternasyonal tüm dünyadaki sosyal demokrat partilerin bir araya geldiği bir uluslararası organizasyondur. Bu makalede SE'nin temsil ettiği özgürlük ve toplumsal adalet anlayışının ana hatları tartışılacaktır. Anahtar Kelimeler: sosyalizm, toplumsal özgürlük, demokratik sosyalizm, sosyal demokrasi, CHP, Sosyalist Enternasyonal.\n\nABSTRACT \nDemocratic socialism and social democracy are political notions which are used often with similar meanings. Social democratic thought has asked questions about how French Revolution's \"freedom, equality, fraternity\" ideals can be further socialized. Democratic socialism (social democracy) is an actual political ideology and movement today which was born in 19th century, had been very influential in shaping 20th century. The freedom and democracy perception of socialism provides a transforming and reforming social imagination. Socialist International is the international organization where social democratic parties around the World take place. In this article freedom and social justice conception represented by SI will be discussed in its main lines.","internal_url":"https://www.academia.edu/40652271/SOSYAL_DEMOKRAS%C4%B0N%C4%B0N_%C4%B0DEOLOJ%C4%B0K_A%C3%87ILIMLARI_%C3%9CZER%C4%B0NE_DE%C4%9EERLEND%C4%B0RMELER","translated_internal_url":"","created_at":"2019-10-17T10:05:10.874-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":60934850,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60934850/thumbnails/1.jpg","file_name":"2114998547_08_5-45.ID1782_Akman_5315-532120191017-53410-zywv8p.pdf","download_url":"https://www.academia.edu/attachments/60934850/download_file","bulk_download_file_name":"SOSYAL_DEMOKRASININ_IDEOLOJIK_ACILIMLARI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60934850/2114998547_08_5-45.ID1782_Akman_5315-532120191017-53410-zywv8p-libre.pdf?1571333020=\u0026response-content-disposition=attachment%3B+filename%3DSOSYAL_DEMOKRASININ_IDEOLOJIK_ACILIMLARI.pdf\u0026Expires=1742161270\u0026Signature=TolqIP~BG~5dqR9S5kD-oOhjJsExS42DxHHcneU0cCpNcH2EUF-GNwzLHutlT~G69mVuiUTMQJsZvSCC-4G4RnFOL-wcM2xHYVI4gyZYUMUMDruI~g6V0A7~tsifa81NEgUzmDhl-h3~v8zxHP3Trddj-GcytzXjUXQV-4ND2LFUzSn3bLhh~7AFR~vLyz2Atvvp4wUEpRr35KsuEIKwp~3Fw9h-7ZZCcYki-PIVlKQ~THAXi~YDawfhl4ez5niSg470qiwvD3kzTk0XI1FvmWXHPvhBqGdSuVHO~2RWiyKJ7P77gtdU8SAX2nGP2~peo06T9frBqLqbkloi2ImZyQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"SOSYAL_DEMOKRASİNİN_İDEOLOJİK_AÇILIMLARI_ÜZERİNE_DEĞERLENDİRMELER","translated_slug":"","page_count":7,"language":"tr","content_type":"Work","summary":"ÖZET\nDemokratik sosyalizm ve sosyal demokrasi çoğu zaman benzer anlamlarda kullanılan siyasi kavramlardır. Sosyal demokratik düşünce Fransız Devrimi'nin \"eşitlik, özgürlük, kardeşlik\" ideallerinin nasıl toplumsallaşabileceğine dair sorular sormuştur. 19. Yüzyılda doğan, 20. Yüzyılın şekillenmesinde çok etkin olan demokratik sosyalizm (sosyal demokrasi) günümüzde güncel bir siyasi ideoloji ve akımdır. Sosyalizmin özgürlük ve demokrasi algısı eleştirel, dönüştürücü ve değiştirici bir toplumsal tahayyül sunar. Sosyalist Enternasyonal tüm dünyadaki sosyal demokrat partilerin bir araya geldiği bir uluslararası organizasyondur. Bu makalede SE'nin temsil ettiği özgürlük ve toplumsal adalet anlayışının ana hatları tartışılacaktır. Anahtar Kelimeler: sosyalizm, toplumsal özgürlük, demokratik sosyalizm, sosyal demokrasi, CHP, Sosyalist Enternasyonal.\n\nABSTRACT \nDemocratic socialism and social democracy are political notions which are used often with similar meanings. Social democratic thought has asked questions about how French Revolution's \"freedom, equality, fraternity\" ideals can be further socialized. Democratic socialism (social democracy) is an actual political ideology and movement today which was born in 19th century, had been very influential in shaping 20th century. The freedom and democracy perception of socialism provides a transforming and reforming social imagination. Socialist International is the international organization where social democratic parties around the World take place. In this article freedom and social justice conception represented by SI will be discussed in its main lines.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":60934850,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60934850/thumbnails/1.jpg","file_name":"2114998547_08_5-45.ID1782_Akman_5315-532120191017-53410-zywv8p.pdf","download_url":"https://www.academia.edu/attachments/60934850/download_file","bulk_download_file_name":"SOSYAL_DEMOKRASININ_IDEOLOJIK_ACILIMLARI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60934850/2114998547_08_5-45.ID1782_Akman_5315-532120191017-53410-zywv8p-libre.pdf?1571333020=\u0026response-content-disposition=attachment%3B+filename%3DSOSYAL_DEMOKRASININ_IDEOLOJIK_ACILIMLARI.pdf\u0026Expires=1742161270\u0026Signature=TolqIP~BG~5dqR9S5kD-oOhjJsExS42DxHHcneU0cCpNcH2EUF-GNwzLHutlT~G69mVuiUTMQJsZvSCC-4G4RnFOL-wcM2xHYVI4gyZYUMUMDruI~g6V0A7~tsifa81NEgUzmDhl-h3~v8zxHP3Trddj-GcytzXjUXQV-4ND2LFUzSn3bLhh~7AFR~vLyz2Atvvp4wUEpRr35KsuEIKwp~3Fw9h-7ZZCcYki-PIVlKQ~THAXi~YDawfhl4ez5niSg470qiwvD3kzTk0XI1FvmWXHPvhBqGdSuVHO~2RWiyKJ7P77gtdU8SAX2nGP2~peo06T9frBqLqbkloi2ImZyQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":21219,"name":"Socialism","url":"https://www.academia.edu/Documents/in/Socialism"},{"id":41599,"name":"Social Democracy","url":"https://www.academia.edu/Documents/in/Social_Democracy"},{"id":57900,"name":"Democratic Socialism","url":"https://www.academia.edu/Documents/in/Democratic_Socialism"},{"id":334511,"name":"Socialismo Democratico","url":"https://www.academia.edu/Documents/in/Socialismo_Democratico"},{"id":353401,"name":"CHP","url":"https://www.academia.edu/Documents/in/CHP"},{"id":377749,"name":"Sosyalizm","url":"https://www.academia.edu/Documents/in/Sosyalizm"},{"id":400393,"name":"Theories of Socialism","url":"https://www.academia.edu/Documents/in/Theories_of_Socialism"},{"id":469139,"name":"Cumhuriyet Halk Partisi","url":"https://www.academia.edu/Documents/in/Cumhuriyet_Halk_Partisi"},{"id":665307,"name":"Sosyal Demokrasi","url":"https://www.academia.edu/Documents/in/Sosyal_Demokrasi"},{"id":700675,"name":"The Socialist International","url":"https://www.academia.edu/Documents/in/The_Socialist_International"}],"urls":[{"id":8872429,"url":"http://sssjournal.com/DergiTamDetay.aspx?ID=1782\u0026Detay=Ozet"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40520733"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40520733/SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT"><img alt="Research paper thumbnail of SWOT ANALYSIS AND SECURITY MANAGEMENT" class="work-thumbnail" src="https://attachments.academia-assets.com/60794610/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40520733/SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT">SWOT ANALYSIS AND SECURITY MANAGEMENT</a></div><div class="wp-workCard_item"><span>European Journal of Management and Marketing Studies</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opp...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT frequently. However, in security management this method is not used sufficiently. In this article we will have an opportunity to discuss details of SWOT and its applicability to security management field as well. Security managers can benefit from SWOT besides other analytical methods and tools. Internal and external aspects of companies and organizations are evolving very fast. SWOT may provide us a chance to see the potential tendencies in internal and external levels.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="12be02adeb12c1b1606b4bd7baf6862a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":60794610,"asset_id":40520733,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/60794610/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40520733"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40520733"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40520733; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40520733]").text(description); $(".js-view-count[data-work-id=40520733]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40520733; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40520733']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "12be02adeb12c1b1606b4bd7baf6862a" } } $('.js-work-strip[data-work-id=40520733]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40520733,"title":"SWOT ANALYSIS AND SECURITY MANAGEMENT","translated_title":"","metadata":{"doi":"10.5281/zenodo.3471920","issue":"2","volume":"4","abstract":"SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT frequently. However, in security management this method is not used sufficiently. In this article we will have an opportunity to discuss details of SWOT and its applicability to security management field as well. Security managers can benefit from SWOT besides other analytical methods and tools. Internal and external aspects of companies and organizations are evolving very fast. SWOT may provide us a chance to see the potential tendencies in internal and external levels.","ai_title_tag":"Applying SWOT Analysis in Security Management","page_numbers":"78-89","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"European Journal of Management and Marketing Studies"},"translated_abstract":"SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT frequently. However, in security management this method is not used sufficiently. In this article we will have an opportunity to discuss details of SWOT and its applicability to security management field as well. Security managers can benefit from SWOT besides other analytical methods and tools. Internal and external aspects of companies and organizations are evolving very fast. SWOT may provide us a chance to see the potential tendencies in internal and external levels.","internal_url":"https://www.academia.edu/40520733/SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT","translated_internal_url":"","created_at":"2019-10-04T02:47:43.805-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":60794610,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60794610/thumbnails/1.jpg","file_name":"06._SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT_-_M._Kubilay_Akman20191004-38877-eqycdx.pdf","download_url":"https://www.academia.edu/attachments/60794610/download_file","bulk_download_file_name":"SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60794610/06._SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT_-_M._Kubilay_Akman20191004-38877-eqycdx-libre.pdf?1570182677=\u0026response-content-disposition=attachment%3B+filename%3DSWOT_ANALYSIS_AND_SECURITY_MANAGEMENT.pdf\u0026Expires=1742161270\u0026Signature=gYmup52-Q9RBy5f2UHd2weXg7OrviARCUy8gKf71w67f7I6vQNL49XJMyoJ1bJFDiKPtOX4RVrR3~TTkN0u47WL2cMEDUVy1Oru-uoJwhe~TnCQsPKXGBEC8xx~gXq1x~GzqmfBAh9bwl86h0MG5ehcPKfevK5eTUV5yNTWLtad4VNgJZdXlVjUlX6x8BJG5kw0ELzGtaQoSEWokm8-11PgARO2DJBNpJvbn2WjRjo1t6PK8naA9B11yLeS4mKSWGCLOHzXUX~wvOBKh~ld~s~AeqobKHmxIJwJvqMXvmeCCQs9DpSZMYsDkRocJhZmkJpeRsOSeyTLjOfe3iRIUPQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT","translated_slug":"","page_count":12,"language":"en","content_type":"Work","summary":"SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT frequently. However, in security management this method is not used sufficiently. In this article we will have an opportunity to discuss details of SWOT and its applicability to security management field as well. Security managers can benefit from SWOT besides other analytical methods and tools. Internal and external aspects of companies and organizations are evolving very fast. SWOT may provide us a chance to see the potential tendencies in internal and external levels.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":60794610,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60794610/thumbnails/1.jpg","file_name":"06._SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT_-_M._Kubilay_Akman20191004-38877-eqycdx.pdf","download_url":"https://www.academia.edu/attachments/60794610/download_file","bulk_download_file_name":"SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60794610/06._SWOT_ANALYSIS_AND_SECURITY_MANAGEMENT_-_M._Kubilay_Akman20191004-38877-eqycdx-libre.pdf?1570182677=\u0026response-content-disposition=attachment%3B+filename%3DSWOT_ANALYSIS_AND_SECURITY_MANAGEMENT.pdf\u0026Expires=1742161270\u0026Signature=gYmup52-Q9RBy5f2UHd2weXg7OrviARCUy8gKf71w67f7I6vQNL49XJMyoJ1bJFDiKPtOX4RVrR3~TTkN0u47WL2cMEDUVy1Oru-uoJwhe~TnCQsPKXGBEC8xx~gXq1x~GzqmfBAh9bwl86h0MG5ehcPKfevK5eTUV5yNTWLtad4VNgJZdXlVjUlX6x8BJG5kw0ELzGtaQoSEWokm8-11PgARO2DJBNpJvbn2WjRjo1t6PK8naA9B11yLeS4mKSWGCLOHzXUX~wvOBKh~ld~s~AeqobKHmxIJwJvqMXvmeCCQs9DpSZMYsDkRocJhZmkJpeRsOSeyTLjOfe3iRIUPQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies"},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":187534,"name":"SWOT analysis","url":"https://www.academia.edu/Documents/in/SWOT_analysis"},{"id":188414,"name":"Information Security Management","url":"https://www.academia.edu/Documents/in/Information_Security_Management"},{"id":726045,"name":"ANALISIS SWOT","url":"https://www.academia.edu/Documents/in/ANALISIS_SWOT"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[{"id":8863706,"url":"https://oapub.org/soc/index.php/EJMMS/issue/view/55"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="39735135"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/39735135/B%C4%B0LG%C4%B0_SOSYOLOJ%C4%B0S%C4%B0_A%C3%87ISINDAN_%C4%B0ST%C4%B0HBARAT_KAYNAKLARININ_TASN%C4%B0F%C4%B0_VE_DE%C4%9EERLEND%C4%B0R%C4%B0LMES%C4%B0_CLASSIFICATION_AND_ANALYSIS_OF_INTELLIGENCE_SOURCES_THROUGH_SOCIOLOGY_OF_KNOWLEDGE"><img alt="Research paper thumbnail of BİLGİ SOSYOLOJİSİ AÇISINDAN İSTİHBARAT KAYNAKLARININ TASNİFİ VE DEĞERLENDİRİLMESİ / CLASSIFICATION AND ANALYSIS OF INTELLIGENCE SOURCES THROUGH SOCIOLOGY OF KNOWLEDGE" class="work-thumbnail" src="https://attachments.academia-assets.com/59913616/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/39735135/B%C4%B0LG%C4%B0_SOSYOLOJ%C4%B0S%C4%B0_A%C3%87ISINDAN_%C4%B0ST%C4%B0HBARAT_KAYNAKLARININ_TASN%C4%B0F%C4%B0_VE_DE%C4%9EERLEND%C4%B0R%C4%B0LMES%C4%B0_CLASSIFICATION_AND_ANALYSIS_OF_INTELLIGENCE_SOURCES_THROUGH_SOCIOLOGY_OF_KNOWLEDGE">BİLGİ SOSYOLOJİSİ AÇISINDAN İSTİHBARAT KAYNAKLARININ TASNİFİ VE DEĞERLENDİRİLMESİ / CLASSIFICATION AND ANALYSIS OF INTELLIGENCE SOURCES THROUGH SOCIOLOGY OF KNOWLEDGE</a></div><div class="wp-workCard_item"><span>Ankara Üniversitesi Sosyal Bilimler Dergisi</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak bilimsel bilginin sosyolojisi (BBS) ise nispeten daha yeni, güncel bir alt-disiplindir. Bilgi sosyolojisi insan bilgisinin en geniş anlamda toplumsal olarak üretilmesi, korunması ve aktarılması üzerine odaklanır. BBS bilimsel araştırmaların, çalışmaların ve bilginin sosyolojik boyutlarını araştırır. Tarihsel ve toplumsal olarak yaşanan dönüşümler, coğrafi ve kültürel etkenler bilimsel faaliyetleri doğrudan veya dolaylı olarak etkiler. İstihbarat bir yönüyle özel, nitelikli bir bilgi türüdür. Öte yandan istihbarat çalışmaları güvenlik çalışmalarının bir alt disiplini olarak bilimsel bir metodolojiye sahiptir ve bilimsel bilgi üretir. Bu açılardan “istihbarat kaynakları” ve “istihbarat edinme yöntemleri” üzerine yapılacak olan bir analiz hem geniş anlamda bilgi sosyolojisinin hem de spesifik olarak BBS’nin konusu olacaktır.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="803f69ebd8760b5741a86d3970f9faf2" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":59913616,"asset_id":39735135,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/59913616/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="39735135"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="39735135"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 39735135; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=39735135]").text(description); $(".js-view-count[data-work-id=39735135]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 39735135; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='39735135']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "803f69ebd8760b5741a86d3970f9faf2" } } $('.js-work-strip[data-work-id=39735135]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":39735135,"title":"BİLGİ SOSYOLOJİSİ AÇISINDAN İSTİHBARAT KAYNAKLARININ TASNİFİ VE DEĞERLENDİRİLMESİ / CLASSIFICATION AND ANALYSIS OF INTELLIGENCE SOURCES THROUGH SOCIOLOGY OF KNOWLEDGE","translated_title":"","metadata":{"doi":"10.33537/sobild.2019.10.1.2","issue":"1","volume":"10","abstract":"Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak bilimsel bilginin sosyolojisi (BBS) ise nispeten daha yeni, güncel bir alt-disiplindir. Bilgi sosyolojisi insan bilgisinin en geniş anlamda toplumsal olarak üretilmesi, korunması ve aktarılması üzerine odaklanır. BBS bilimsel araştırmaların, çalışmaların ve bilginin sosyolojik boyutlarını araştırır. Tarihsel ve toplumsal olarak yaşanan dönüşümler, coğrafi ve kültürel etkenler bilimsel faaliyetleri doğrudan veya dolaylı olarak etkiler. İstihbarat bir yönüyle özel, nitelikli bir bilgi türüdür. Öte yandan istihbarat çalışmaları güvenlik çalışmalarının bir alt disiplini olarak bilimsel bir metodolojiye sahiptir ve bilimsel bilgi üretir. Bu açılardan “istihbarat kaynakları” ve “istihbarat edinme yöntemleri” üzerine yapılacak olan bir analiz hem geniş anlamda bilgi sosyolojisinin hem de spesifik olarak BBS’nin konusu olacaktır.","page_numbers":"24-42","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Ankara Üniversitesi Sosyal Bilimler Dergisi"},"translated_abstract":"Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak bilimsel bilginin sosyolojisi (BBS) ise nispeten daha yeni, güncel bir alt-disiplindir. Bilgi sosyolojisi insan bilgisinin en geniş anlamda toplumsal olarak üretilmesi, korunması ve aktarılması üzerine odaklanır. BBS bilimsel araştırmaların, çalışmaların ve bilginin sosyolojik boyutlarını araştırır. Tarihsel ve toplumsal olarak yaşanan dönüşümler, coğrafi ve kültürel etkenler bilimsel faaliyetleri doğrudan veya dolaylı olarak etkiler. İstihbarat bir yönüyle özel, nitelikli bir bilgi türüdür. Öte yandan istihbarat çalışmaları güvenlik çalışmalarının bir alt disiplini olarak bilimsel bir metodolojiye sahiptir ve bilimsel bilgi üretir. Bu açılardan “istihbarat kaynakları” ve “istihbarat edinme yöntemleri” üzerine yapılacak olan bir analiz hem geniş anlamda bilgi sosyolojisinin hem de spesifik olarak BBS’nin konusu olacaktır.","internal_url":"https://www.academia.edu/39735135/B%C4%B0LG%C4%B0_SOSYOLOJ%C4%B0S%C4%B0_A%C3%87ISINDAN_%C4%B0ST%C4%B0HBARAT_KAYNAKLARININ_TASN%C4%B0F%C4%B0_VE_DE%C4%9EERLEND%C4%B0R%C4%B0LMES%C4%B0_CLASSIFICATION_AND_ANALYSIS_OF_INTELLIGENCE_SOURCES_THROUGH_SOCIOLOGY_OF_KNOWLEDGE","translated_internal_url":"","created_at":"2019-07-02T07:06:12.424-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":59913616,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/59913616/thumbnails/1.jpg","file_name":"bilgisosyolojisi-makale20190702-87323-16glmej.pdf","download_url":"https://www.academia.edu/attachments/59913616/download_file","bulk_download_file_name":"BILGI_SOSYOLOJISI_ACISINDAN_ISTIHBARAT_K.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/59913616/bilgisosyolojisi-makale20190702-87323-16glmej-libre.pdf?1562076815=\u0026response-content-disposition=attachment%3B+filename%3DBILGI_SOSYOLOJISI_ACISINDAN_ISTIHBARAT_K.pdf\u0026Expires=1742161270\u0026Signature=gbU9W71jM4YDX~OvWhz8plwGXn1kNPtnbzMvDUA7E3sGl1fEP4taZPcv8GoHYXTPA4G6CCyHSOuhzm~d9AH3POs1JLP3t9zlWgfBrzxMp8Aj~WqTJpPXckJ~QB9hQailcsPFurcjcOgI3lOozU~zZbTDddyxubSZ3nguVcpn6Dl-WRT2OBE4pc6si~OGngbDRkIXWgNdwOTBjGLIwQYCth24gqU0nZSpheub5FOi6ROpIsr9-opBLzouy-rheA24F9oreV5dUjXMPpKBgi8zvhv6AUXDsoxWNGLLqPNLdu6z0qZED5J0fT-PBY1RqQbF6l2Cp0zVVeUkXzylGZbokQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"BİLGİ_SOSYOLOJİSİ_AÇISINDAN_İSTİHBARAT_KAYNAKLARININ_TASNİFİ_VE_DEĞERLENDİRİLMESİ_CLASSIFICATION_AND_ANALYSIS_OF_INTELLIGENCE_SOURCES_THROUGH_SOCIOLOGY_OF_KNOWLEDGE","translated_slug":"","page_count":19,"language":"tr","content_type":"Work","summary":"Genel anlamda bilgi sosyolojisi sosyolojinin doğuşu ve tarihi kadar geriye gider. Spesifik olarak bilimsel bilginin sosyolojisi (BBS) ise nispeten daha yeni, güncel bir alt-disiplindir. Bilgi sosyolojisi insan bilgisinin en geniş anlamda toplumsal olarak üretilmesi, korunması ve aktarılması üzerine odaklanır. BBS bilimsel araştırmaların, çalışmaların ve bilginin sosyolojik boyutlarını araştırır. Tarihsel ve toplumsal olarak yaşanan dönüşümler, coğrafi ve kültürel etkenler bilimsel faaliyetleri doğrudan veya dolaylı olarak etkiler. İstihbarat bir yönüyle özel, nitelikli bir bilgi türüdür. Öte yandan istihbarat çalışmaları güvenlik çalışmalarının bir alt disiplini olarak bilimsel bir metodolojiye sahiptir ve bilimsel bilgi üretir. Bu açılardan “istihbarat kaynakları” ve “istihbarat edinme yöntemleri” üzerine yapılacak olan bir analiz hem geniş anlamda bilgi sosyolojisinin hem de spesifik olarak BBS’nin konusu olacaktır.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":59913616,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/59913616/thumbnails/1.jpg","file_name":"bilgisosyolojisi-makale20190702-87323-16glmej.pdf","download_url":"https://www.academia.edu/attachments/59913616/download_file","bulk_download_file_name":"BILGI_SOSYOLOJISI_ACISINDAN_ISTIHBARAT_K.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/59913616/bilgisosyolojisi-makale20190702-87323-16glmej-libre.pdf?1562076815=\u0026response-content-disposition=attachment%3B+filename%3DBILGI_SOSYOLOJISI_ACISINDAN_ISTIHBARAT_K.pdf\u0026Expires=1742161270\u0026Signature=gbU9W71jM4YDX~OvWhz8plwGXn1kNPtnbzMvDUA7E3sGl1fEP4taZPcv8GoHYXTPA4G6CCyHSOuhzm~d9AH3POs1JLP3t9zlWgfBrzxMp8Aj~WqTJpPXckJ~QB9hQailcsPFurcjcOgI3lOozU~zZbTDddyxubSZ3nguVcpn6Dl-WRT2OBE4pc6si~OGngbDRkIXWgNdwOTBjGLIwQYCth24gqU0nZSpheub5FOi6ROpIsr9-opBLzouy-rheA24F9oreV5dUjXMPpKBgi8zvhv6AUXDsoxWNGLLqPNLdu6z0qZED5J0fT-PBY1RqQbF6l2Cp0zVVeUkXzylGZbokQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":980585,"name":"İStihbarat ÇAlışmaları","url":"https://www.academia.edu/Documents/in/IStihbarat_CAlismalari"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"},{"id":3095511,"name":"güvenlik çalışmaları","url":"https://www.academia.edu/Documents/in/g%C3%BCvenlik_%C3%A7al%C4%B1%C5%9Fmalar%C4%B1"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="38714128"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/38714128/CALL_FOR_PAPERS_Ante_Portas_Security_Studies_"><img alt="Research paper thumbnail of CALL FOR PAPERS - „Ante Portas – Security Studies”" class="work-thumbnail" src="https://attachments.academia-assets.com/58797964/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/38714128/CALL_FOR_PAPERS_Ante_Portas_Security_Studies_">CALL FOR PAPERS - „Ante Portas – Security Studies”</a></div><div class="wp-workCard_item"><span>Ante Portas – Security Studies Journal</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 by the Department of National Security of the College of Business and Entrepreneurship in Ostrowiec Świętokrzyski. Ante Portas is an academic, interdisciplinary, peer-reviewed journal, which concern the most crucial aspects of social sciences, with particular emphasis put on:<br /> military and political aspects of security;<br /> economic security;<br /> cybersecurity;<br /> international relations;<br /> geopolitics;<br /> history of the security systems<br /> internal security<br /> Social, cultural and environmental aspects of security<br /> crisis management<br /> and other…</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="171d0854ce8fe411b406afdaeaa7b2ec" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":58797964,"asset_id":38714128,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/58797964/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="38714128"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="38714128"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38714128; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38714128]").text(description); $(".js-view-count[data-work-id=38714128]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38714128; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='38714128']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "171d0854ce8fe411b406afdaeaa7b2ec" } } $('.js-work-strip[data-work-id=38714128]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":38714128,"title":"CALL FOR PAPERS - „Ante Portas – Security Studies”","translated_title":"","metadata":{"abstract":"The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 by the Department of National Security of the College of Business and Entrepreneurship in Ostrowiec Świętokrzyski. Ante Portas is an academic, interdisciplinary, peer-reviewed journal, which concern the most crucial aspects of social sciences, with particular emphasis put on:\n military and political aspects of security;\n economic security;\n cybersecurity;\n international relations;\n geopolitics;\n history of the security systems\n internal security\n Social, cultural and environmental aspects of security\n crisis management\n and other…\n","publication_name":"Ante Portas – Security Studies Journal"},"translated_abstract":"The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 by the Department of National Security of the College of Business and Entrepreneurship in Ostrowiec Świętokrzyski. Ante Portas is an academic, interdisciplinary, peer-reviewed journal, which concern the most crucial aspects of social sciences, with particular emphasis put on:\n military and political aspects of security;\n economic security;\n cybersecurity;\n international relations;\n geopolitics;\n history of the security systems\n internal security\n Social, cultural and environmental aspects of security\n crisis management\n and other…\n","internal_url":"https://www.academia.edu/38714128/CALL_FOR_PAPERS_Ante_Portas_Security_Studies_","translated_internal_url":"","created_at":"2019-04-04T11:42:08.138-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"draft","co_author_tags":[],"downloadable_attachments":[{"id":58797964,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58797964/thumbnails/1.jpg","file_name":"AP_12.-call-for-papers.pdf","download_url":"https://www.academia.edu/attachments/58797964/download_file","bulk_download_file_name":"CALL_FOR_PAPERS_Ante_Portas_Security_Stu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58797964/AP_12.-call-for-papers-libre.pdf?1554407296=\u0026response-content-disposition=attachment%3B+filename%3DCALL_FOR_PAPERS_Ante_Portas_Security_Stu.pdf\u0026Expires=1742161270\u0026Signature=EuVKUlLevF1XSWv35JKe9QCKMpclUHyfU-w6kKOzt138Co5V~APJa68LPEzBsiAcYpYcFRomCakuGzeWp7LTR22bEqhIS~yIyRib7SYs4mt2is6f0VUzZqTO6oVLQwM59n3NirX4MKtZWf0GhMxbC3xyOjwrjvdzeoSJ38yYSHgapJlzd--RZSOg32MU5h6c36C-70XaY60VSB8bDfqMGql2zpTnWiPVFJvzECIlrVJbvAFCqHOu0jUe~XdMVX~AMKvfU4-umQ1SRcUrVhktsXuO3DK2Buzhj7~diLOO~dR9boYwBAojyiRX3a8e4ovBGkY7BlrUwbmjIIpQzT9N8A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"CALL_FOR_PAPERS_Ante_Portas_Security_Studies_","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"The Ante Portas – Security Studies (ISSN 2353-6306) is a semiannual journal published since 2012 by the Department of National Security of the College of Business and Entrepreneurship in Ostrowiec Świętokrzyski. Ante Portas is an academic, interdisciplinary, peer-reviewed journal, which concern the most crucial aspects of social sciences, with particular emphasis put on:\n military and political aspects of security;\n economic security;\n cybersecurity;\n international relations;\n geopolitics;\n history of the security systems\n internal security\n Social, cultural and environmental aspects of security\n crisis management\n and other…\n","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":58797964,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58797964/thumbnails/1.jpg","file_name":"AP_12.-call-for-papers.pdf","download_url":"https://www.academia.edu/attachments/58797964/download_file","bulk_download_file_name":"CALL_FOR_PAPERS_Ante_Portas_Security_Stu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58797964/AP_12.-call-for-papers-libre.pdf?1554407296=\u0026response-content-disposition=attachment%3B+filename%3DCALL_FOR_PAPERS_Ante_Portas_Security_Stu.pdf\u0026Expires=1742161270\u0026Signature=EuVKUlLevF1XSWv35JKe9QCKMpclUHyfU-w6kKOzt138Co5V~APJa68LPEzBsiAcYpYcFRomCakuGzeWp7LTR22bEqhIS~yIyRib7SYs4mt2is6f0VUzZqTO6oVLQwM59n3NirX4MKtZWf0GhMxbC3xyOjwrjvdzeoSJ38yYSHgapJlzd--RZSOg32MU5h6c36C-70XaY60VSB8bDfqMGql2zpTnWiPVFJvzECIlrVJbvAFCqHOu0jUe~XdMVX~AMKvfU4-umQ1SRcUrVhktsXuO3DK2Buzhj7~diLOO~dR9boYwBAojyiRX3a8e4ovBGkY7BlrUwbmjIIpQzT9N8A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies"},{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies"},{"id":538,"name":"Police Science","url":"https://www.academia.edu/Documents/in/Police_Science"},{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_"},{"id":1031,"name":"Southeast Asian Studies","url":"https://www.academia.edu/Documents/in/Southeast_Asian_Studies"},{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies"},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies"},{"id":6748,"name":"Sociology of Risk","url":"https://www.academia.edu/Documents/in/Sociology_of_Risk"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":44426,"name":"Military Studies","url":"https://www.academia.edu/Documents/in/Military_Studies"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security"},{"id":119358,"name":"Defense and National Security","url":"https://www.academia.edu/Documents/in/Defense_and_National_Security"},{"id":294517,"name":"Defense and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defense_and_Strategic_Studies"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="38127625"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/38127625/Call_for_Manuscripts_Special_Issue_on_Martial_Arts_and_Close_Combat_Systems"><img alt="Research paper thumbnail of Call for Manuscripts: Special Issue on Martial Arts and Close Combat Systems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/38127625/Call_for_Manuscripts_Special_Issue_on_Martial_Arts_and_Close_Combat_Systems">Call for Manuscripts: Special Issue on Martial Arts and Close Combat Systems</a></div><div class="wp-workCard_item"><span>World Journal of Sport Sciences (WJSS)</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Deadline: 8 May 2019 As the World Journal of Sport Sciences (WJSS) we would like to cordially in...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Deadline: 8 May 2019<br /><br />As the World Journal of Sport Sciences (WJSS) we would like to cordially invite academics, researchers and specialists around the World for our upcoming special issue titled: "Martial Arts, Combat Sciences and Redefining Limits of Human Performance". This issue will be a comprehensive source of knowledge about martial arts / combat sports and relative areas.<br /><br />In this special issue of the WJSS a wide range of disciplines will be covered in an interdisciplinary way. Academics, researchers and experts of sports psychology, sociology of sports, physical education, Asian and modern martial arts, law enforcement and military training (Close Quarters Combat, Modern Army Combatives, Unarmed Combat, Etc.) besides other related fields are kindly invited to submit their manuscripts by the deadline, 8 May 2019.<br /><br />You can complete submission via our system: <a href="http://www.idosi.org" rel="nofollow">www.idosi.org</a> or E-mail: <a href="mailto:idosi@idosi.org" rel="nofollow">idosi@idosi.org</a> <br /><br />Looking forward your taking place in the discussion,<br /><br />Best regards,<br /><br />Dr. M. Kubilay Akman, FIMAS <br />Editor-in-Chief, WJSS</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="38127625"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="38127625"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38127625; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38127625]").text(description); $(".js-view-count[data-work-id=38127625]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38127625; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='38127625']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=38127625]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":38127625,"title":"Call for Manuscripts: Special Issue on Martial Arts and Close Combat Systems","translated_title":"","metadata":{"doi":"10.5829/idosi.wjss","abstract":"Deadline: 8 May 2019\n\nAs the World Journal of Sport Sciences (WJSS) we would like to cordially invite academics, researchers and specialists around the World for our upcoming special issue titled: \"Martial Arts, Combat Sciences and Redefining Limits of Human Performance\". This issue will be a comprehensive source of knowledge about martial arts / combat sports and relative areas.\n\nIn this special issue of the WJSS a wide range of disciplines will be covered in an interdisciplinary way. Academics, researchers and experts of sports psychology, sociology of sports, physical education, Asian and modern martial arts, law enforcement and military training (Close Quarters Combat, Modern Army Combatives, Unarmed Combat, Etc.) besides other related fields are kindly invited to submit their manuscripts by the deadline, 8 May 2019.\n\nYou can complete submission via our system: www.idosi.org or E-mail: idosi@idosi.org \n\nLooking forward your taking place in the discussion,\n\nBest regards,\n\nDr. M. Kubilay Akman, FIMAS \nEditor-in-Chief, WJSS\n","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"World Journal of Sport Sciences (WJSS)"},"translated_abstract":"Deadline: 8 May 2019\n\nAs the World Journal of Sport Sciences (WJSS) we would like to cordially invite academics, researchers and specialists around the World for our upcoming special issue titled: \"Martial Arts, Combat Sciences and Redefining Limits of Human Performance\". This issue will be a comprehensive source of knowledge about martial arts / combat sports and relative areas.\n\nIn this special issue of the WJSS a wide range of disciplines will be covered in an interdisciplinary way. Academics, researchers and experts of sports psychology, sociology of sports, physical education, Asian and modern martial arts, law enforcement and military training (Close Quarters Combat, Modern Army Combatives, Unarmed Combat, Etc.) besides other related fields are kindly invited to submit their manuscripts by the deadline, 8 May 2019.\n\nYou can complete submission via our system: www.idosi.org or E-mail: idosi@idosi.org \n\nLooking forward your taking place in the discussion,\n\nBest regards,\n\nDr. M. Kubilay Akman, FIMAS \nEditor-in-Chief, WJSS\n","internal_url":"https://www.academia.edu/38127625/Call_for_Manuscripts_Special_Issue_on_Martial_Arts_and_Close_Combat_Systems","translated_internal_url":"","created_at":"2019-01-10T08:51:26.224-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Call_for_Manuscripts_Special_Issue_on_Martial_Arts_and_Close_Combat_Systems","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Deadline: 8 May 2019\n\nAs the World Journal of Sport Sciences (WJSS) we would like to cordially invite academics, researchers and specialists around the World for our upcoming special issue titled: \"Martial Arts, Combat Sciences and Redefining Limits of Human Performance\". This issue will be a comprehensive source of knowledge about martial arts / combat sports and relative areas.\n\nIn this special issue of the WJSS a wide range of disciplines will be covered in an interdisciplinary way. Academics, researchers and experts of sports psychology, sociology of sports, physical education, Asian and modern martial arts, law enforcement and military training (Close Quarters Combat, Modern Army Combatives, Unarmed Combat, Etc.) besides other related fields are kindly invited to submit their manuscripts by the deadline, 8 May 2019.\n\nYou can complete submission via our system: www.idosi.org or E-mail: idosi@idosi.org \n\nLooking forward your taking place in the discussion,\n\nBest regards,\n\nDr. M. Kubilay Akman, FIMAS \nEditor-in-Chief, WJSS\n","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[],"research_interests":[{"id":1518,"name":"Sports \u0026 Exercise Pychology","url":"https://www.academia.edu/Documents/in/Sports_and_Exercise_Pychology"},{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts"},{"id":5503,"name":"Sports Management","url":"https://www.academia.edu/Documents/in/Sports_Management"},{"id":8206,"name":"Police","url":"https://www.academia.edu/Documents/in/Police"},{"id":14788,"name":"Boxing","url":"https://www.academia.edu/Documents/in/Boxing"},{"id":25806,"name":"Physical Education","url":"https://www.academia.edu/Documents/in/Physical_Education"},{"id":30077,"name":"Anthropology of Sports","url":"https://www.academia.edu/Documents/in/Anthropology_of_Sports"},{"id":33261,"name":"Taekwondo","url":"https://www.academia.edu/Documents/in/Taekwondo"},{"id":39946,"name":"Military","url":"https://www.academia.edu/Documents/in/Military"},{"id":55904,"name":"Sports Coaching","url":"https://www.academia.edu/Documents/in/Sports_Coaching"},{"id":119636,"name":"Sports Psychology","url":"https://www.academia.edu/Documents/in/Sports_Psychology"},{"id":150194,"name":"Kung Fu","url":"https://www.academia.edu/Documents/in/Kung_Fu"},{"id":285210,"name":"Karate","url":"https://www.academia.edu/Documents/in/Karate"},{"id":521198,"name":"Self Defense","url":"https://www.academia.edu/Documents/in/Self_Defense"},{"id":547167,"name":"Sociology of Sports","url":"https://www.academia.edu/Documents/in/Sociology_of_Sports"},{"id":1110758,"name":"Krav Maga","url":"https://www.academia.edu/Documents/in/Krav_Maga"},{"id":1211728,"name":"Sports Science","url":"https://www.academia.edu/Documents/in/Sports_Science-1"},{"id":1710242,"name":"Close Quarters Combat","url":"https://www.academia.edu/Documents/in/Close_Quarters_Combat"}],"urls":[{"id":8673010,"url":"http://idosi.org/journal-detail/world-journal-of-sport-sciences--wjss-/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="38064651"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/38064651/Sava%C5%9F%C4%B1n_ve_%C3%87at%C4%B1%C5%9Fman%C4%B1n_Sanatta_Temsili_Sanat_Sosyolojisi_ve_G%C3%BCvenlik_Sosyolojisi_%C3%87%C3%B6z%C3%BCmlemeleri"><img alt="Research paper thumbnail of Savaşın ve Çatışmanın Sanatta Temsili / Sanat Sosyolojisi ve Güvenlik Sosyolojisi Çözümlemeleri" class="work-thumbnail" src="https://attachments.academia-assets.com/58089366/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/38064651/Sava%C5%9F%C4%B1n_ve_%C3%87at%C4%B1%C5%9Fman%C4%B1n_Sanatta_Temsili_Sanat_Sosyolojisi_ve_G%C3%BCvenlik_Sosyolojisi_%C3%87%C3%B6z%C3%BCmlemeleri">Savaşın ve Çatışmanın Sanatta Temsili / Sanat Sosyolojisi ve Güvenlik Sosyolojisi Çözümlemeleri</a></div><div class="wp-workCard_item"><span>Researcher: Social Science Studies</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi kadar eskidir. Tarih boyunca kavimler birbiriyle çarpışmış, toplumlar çatışmayla kaynamış, savaşlar sürekli gündeme gelmiştir. İnsanlık bu gerilim ortamından büyük zarar görmüştür. Sanat ve sanatçılar her daim çağın tanığıdır. Büyük çatışmalar, şiddet olayları yaşanırken sanatın duyarsız kalması elbette beklenemez. Sanat eserlerinin savaşa ve çatışmaya tanıklığı, izdüşümü konusu hem sanat sosyolojisi hem de güvenlik sosyolojisi açısından bu çalışmanın konusu olacaktır. Sanatın mikrokozmosunda insanlığın şiddet hikâyelerinin nasıl temsil edildiği hususu sosyolojik kavramlarla irdelenecektir.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="42440191502727a49e5e5fe06a66142b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":58089366,"asset_id":38064651,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/58089366/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="38064651"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="38064651"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38064651; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38064651]").text(description); $(".js-view-count[data-work-id=38064651]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38064651; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='38064651']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "42440191502727a49e5e5fe06a66142b" } } $('.js-work-strip[data-work-id=38064651]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":38064651,"title":"Savaşın ve Çatışmanın Sanatta Temsili / Sanat Sosyolojisi ve Güvenlik Sosyolojisi Çözümlemeleri","translated_title":"","metadata":{"doi":"10.18301/rss.786 ","issue":"4","volume":"6","abstract":"Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi kadar eskidir. Tarih boyunca kavimler birbiriyle çarpışmış, toplumlar çatışmayla kaynamış, savaşlar sürekli gündeme gelmiştir. İnsanlık bu gerilim ortamından büyük zarar görmüştür. Sanat ve sanatçılar her daim çağın tanığıdır. Büyük çatışmalar, şiddet olayları yaşanırken sanatın duyarsız kalması elbette beklenemez. Sanat eserlerinin savaşa ve çatışmaya tanıklığı, izdüşümü konusu hem sanat sosyolojisi hem de güvenlik sosyolojisi açısından bu çalışmanın konusu olacaktır. Sanatın mikrokozmosunda insanlığın şiddet hikâyelerinin nasıl temsil edildiği hususu sosyolojik kavramlarla irdelenecektir. ","page_numbers":"168-181","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Researcher: Social Science Studies"},"translated_abstract":"Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi kadar eskidir. Tarih boyunca kavimler birbiriyle çarpışmış, toplumlar çatışmayla kaynamış, savaşlar sürekli gündeme gelmiştir. İnsanlık bu gerilim ortamından büyük zarar görmüştür. Sanat ve sanatçılar her daim çağın tanığıdır. Büyük çatışmalar, şiddet olayları yaşanırken sanatın duyarsız kalması elbette beklenemez. Sanat eserlerinin savaşa ve çatışmaya tanıklığı, izdüşümü konusu hem sanat sosyolojisi hem de güvenlik sosyolojisi açısından bu çalışmanın konusu olacaktır. Sanatın mikrokozmosunda insanlığın şiddet hikâyelerinin nasıl temsil edildiği hususu sosyolojik kavramlarla irdelenecektir. ","internal_url":"https://www.academia.edu/38064651/Sava%C5%9F%C4%B1n_ve_%C3%87at%C4%B1%C5%9Fman%C4%B1n_Sanatta_Temsili_Sanat_Sosyolojisi_ve_G%C3%BCvenlik_Sosyolojisi_%C3%87%C3%B6z%C3%BCmlemeleri","translated_internal_url":"","created_at":"2018-12-31T02:41:33.239-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":58089366,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58089366/thumbnails/1.jpg","file_name":"166201270_168-181-m._kubilay_akman.pdf","download_url":"https://www.academia.edu/attachments/58089366/download_file","bulk_download_file_name":"Savasin_ve_Catismanin_Sanatta_Temsili_Sa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58089366/166201270_168-181-m._kubilay_akman-libre.pdf?1546253561=\u0026response-content-disposition=attachment%3B+filename%3DSavasin_ve_Catismanin_Sanatta_Temsili_Sa.pdf\u0026Expires=1742161270\u0026Signature=d26mmRHMs0yGb5KziUhqMoNRjfMhSPETXWfPMtJzI2ZEuHfeJ0ZOzotuzEzqLQg-GXE9SiwxtQB6YVg24mbeI2z6DLzZ7taNEgyOQr~gPjGmFwrCdWASEBOLhHELOytS8~577QzXolc7rZTTLaIpe7VUyd872ShRAO0gyMJyIXPBJiLaOHU1~m1~tCVNwCtgKZANjwigiXmeRSjD1MU2nmrQKfg4jhib2y5xeFqIh5gXF~jwuhF6-oSzBLbDGeaOyY4~ve~wjIw5uaMWhwh4xkw1DO4NRvD4D8hzitD82PsYNUHNO53R4yMeI4ck340DvbBIxRjcSlz9P1o79mp-AA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Savaşın_ve_Çatışmanın_Sanatta_Temsili_Sanat_Sosyolojisi_ve_Güvenlik_Sosyolojisi_Çözümlemeleri","translated_slug":"","page_count":14,"language":"tr","content_type":"Work","summary":"Savaş ve çatışma, tüm istenmeyen yönlerine ve topluma verdiği zararlara rağmen insanlığın tarihi kadar eskidir. Tarih boyunca kavimler birbiriyle çarpışmış, toplumlar çatışmayla kaynamış, savaşlar sürekli gündeme gelmiştir. İnsanlık bu gerilim ortamından büyük zarar görmüştür. Sanat ve sanatçılar her daim çağın tanığıdır. Büyük çatışmalar, şiddet olayları yaşanırken sanatın duyarsız kalması elbette beklenemez. Sanat eserlerinin savaşa ve çatışmaya tanıklığı, izdüşümü konusu hem sanat sosyolojisi hem de güvenlik sosyolojisi açısından bu çalışmanın konusu olacaktır. Sanatın mikrokozmosunda insanlığın şiddet hikâyelerinin nasıl temsil edildiği hususu sosyolojik kavramlarla irdelenecektir. ","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":58089366,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58089366/thumbnails/1.jpg","file_name":"166201270_168-181-m._kubilay_akman.pdf","download_url":"https://www.academia.edu/attachments/58089366/download_file","bulk_download_file_name":"Savasin_ve_Catismanin_Sanatta_Temsili_Sa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58089366/166201270_168-181-m._kubilay_akman-libre.pdf?1546253561=\u0026response-content-disposition=attachment%3B+filename%3DSavasin_ve_Catismanin_Sanatta_Temsili_Sa.pdf\u0026Expires=1742161270\u0026Signature=d26mmRHMs0yGb5KziUhqMoNRjfMhSPETXWfPMtJzI2ZEuHfeJ0ZOzotuzEzqLQg-GXE9SiwxtQB6YVg24mbeI2z6DLzZ7taNEgyOQr~gPjGmFwrCdWASEBOLhHELOytS8~577QzXolc7rZTTLaIpe7VUyd872ShRAO0gyMJyIXPBJiLaOHU1~m1~tCVNwCtgKZANjwigiXmeRSjD1MU2nmrQKfg4jhib2y5xeFqIh5gXF~jwuhF6-oSzBLbDGeaOyY4~ve~wjIw5uaMWhwh4xkw1DO4NRvD4D8hzitD82PsYNUHNO53R4yMeI4ck340DvbBIxRjcSlz9P1o79mp-AA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":720402,"name":"çatışma","url":"https://www.academia.edu/Documents/in/catisma"},{"id":1028566,"name":"Savaş","url":"https://www.academia.edu/Documents/in/Savas"},{"id":1364680,"name":"Sanat Sosyolojisi","url":"https://www.academia.edu/Documents/in/Sanat_Sosyolojisi"},{"id":3095511,"name":"güvenlik çalışmaları","url":"https://www.academia.edu/Documents/in/g%C3%BCvenlik_%C3%A7al%C4%B1%C5%9Fmalar%C4%B1"},{"id":3095513,"name":"görsel sosyoloji","url":"https://www.academia.edu/Documents/in/g%C3%B6rsel_sosyoloji"}],"urls":[{"id":8665280,"url":"http://rssstudies.com/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37910466"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/37910466/SOUTHERN_SHAOLIN_DRAGON_FIST_EVOLVING_FIGHTING_SKILLS_AND_METHODOLOGY_FROM_THE_MYTHICAL_TO_ACTUAL_REALITY"><img alt="Research paper thumbnail of SOUTHERN SHAOLIN DRAGON FIST: EVOLVING FIGHTING SKILLS AND METHODOLOGY FROM THE MYTHICAL TO ACTUAL REALITY" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/37910466/SOUTHERN_SHAOLIN_DRAGON_FIST_EVOLVING_FIGHTING_SKILLS_AND_METHODOLOGY_FROM_THE_MYTHICAL_TO_ACTUAL_REALITY">SOUTHERN SHAOLIN DRAGON FIST: EVOLVING FIGHTING SKILLS AND METHODOLOGY FROM THE MYTHICAL TO ACTUAL REALITY</a></div><div class="wp-workCard_item"><span>European Journal of Physical Education and Sport Science</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin tradition is very connected to Chan Buddhism, its philosophy and way of living. Early ancestors of Shaolin Temple did many observations on nature and developed some Wushu forms imitating animals (leopard, praying mantis, tiger, eagle, snake, Etc.) Although their most animal forms are based on real, physically available animals they did not hesitate to create forms on mythical creatures as well, such as dragon. The dragon form studied in this article is considered as a part of Southern Shaolin Kung Fu. However, there are many dragon forms in the North and South and it is better to realize this plurality while conducting research. This form is a sample of these various forms, even styles are named after the mythical animal of dragon. The form is comprehensively explained with enough visuals and this is an easy to follow instructional narration for each level of martial arts practitioners</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37910466"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37910466"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37910466; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37910466]").text(description); $(".js-view-count[data-work-id=37910466]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37910466; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37910466']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=37910466]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37910466,"title":"SOUTHERN SHAOLIN DRAGON FIST: EVOLVING FIGHTING SKILLS AND METHODOLOGY FROM THE MYTHICAL TO ACTUAL REALITY","translated_title":"","metadata":{"doi":"10.5281/zenodo.1760133","issue":"2","volume":"5","abstract":"Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin tradition is very connected to Chan Buddhism, its philosophy and way of living. Early ancestors of Shaolin Temple did many observations on nature and developed some Wushu forms imitating animals (leopard, praying mantis, tiger, eagle, snake, Etc.) Although their most animal forms are based on real, physically available animals they did not hesitate to create forms on mythical creatures as well, such as dragon. The dragon form studied in this article is considered as a part of Southern Shaolin Kung Fu. However, there are many dragon forms in the North and South and it is better to realize this plurality while conducting research. This form is a sample of these various forms, even styles are named after the mythical animal of dragon. The form is comprehensively explained with enough visuals and this is an easy to follow instructional narration for each level of martial arts practitioners","page_numbers":"44-74","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"European Journal of Physical Education and Sport Science"},"translated_abstract":"Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin tradition is very connected to Chan Buddhism, its philosophy and way of living. Early ancestors of Shaolin Temple did many observations on nature and developed some Wushu forms imitating animals (leopard, praying mantis, tiger, eagle, snake, Etc.) Although their most animal forms are based on real, physically available animals they did not hesitate to create forms on mythical creatures as well, such as dragon. The dragon form studied in this article is considered as a part of Southern Shaolin Kung Fu. However, there are many dragon forms in the North and South and it is better to realize this plurality while conducting research. This form is a sample of these various forms, even styles are named after the mythical animal of dragon. The form is comprehensively explained with enough visuals and this is an easy to follow instructional narration for each level of martial arts practitioners","internal_url":"https://www.academia.edu/37910466/SOUTHERN_SHAOLIN_DRAGON_FIST_EVOLVING_FIGHTING_SKILLS_AND_METHODOLOGY_FROM_THE_MYTHICAL_TO_ACTUAL_REALITY","translated_internal_url":"","created_at":"2018-12-04T05:40:50.628-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"SOUTHERN_SHAOLIN_DRAGON_FIST_EVOLVING_FIGHTING_SKILLS_AND_METHODOLOGY_FROM_THE_MYTHICAL_TO_ACTUAL_REALITY","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Chinese Kung Fu has a long history, dating back to ancient times of China. Shaolin tradition is very connected to Chan Buddhism, its philosophy and way of living. Early ancestors of Shaolin Temple did many observations on nature and developed some Wushu forms imitating animals (leopard, praying mantis, tiger, eagle, snake, Etc.) Although their most animal forms are based on real, physically available animals they did not hesitate to create forms on mythical creatures as well, such as dragon. The dragon form studied in this article is considered as a part of Southern Shaolin Kung Fu. However, there are many dragon forms in the North and South and it is better to realize this plurality while conducting research. This form is a sample of these various forms, even styles are named after the mythical animal of dragon. The form is comprehensively explained with enough visuals and this is an easy to follow instructional narration for each level of martial arts practitioners","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[],"research_interests":[{"id":1020,"name":"Chinese Philosophy","url":"https://www.academia.edu/Documents/in/Chinese_Philosophy"},{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts"},{"id":37006,"name":"South East Asian martial Arts","url":"https://www.academia.edu/Documents/in/South_East_Asian_martial_Arts"},{"id":150194,"name":"Kung Fu","url":"https://www.academia.edu/Documents/in/Kung_Fu"},{"id":499382,"name":"Chan/Zen Buddhism","url":"https://www.academia.edu/Documents/in/Chan_Zen_Buddhism"},{"id":826689,"name":"Traditional Chinese Martial Arts","url":"https://www.academia.edu/Documents/in/Traditional_Chinese_Martial_Arts"},{"id":869339,"name":"Shaolin","url":"https://www.academia.edu/Documents/in/Shaolin"}],"urls":[{"id":8646463,"url":"https://oapub.org/edu/index.php/ejep"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37909379"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37909379/Socio_Cultural_Analysis_on_Baduanjin_Qigong_Form_and_Techniques_of_the_Chinese_Traditional_Exercise_System"><img alt="Research paper thumbnail of Socio-Cultural Analysis on Baduanjin Qigong: Form and Techniques of the Chinese Traditional Exercise System" class="work-thumbnail" src="https://attachments.academia-assets.com/57920846/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37909379/Socio_Cultural_Analysis_on_Baduanjin_Qigong_Form_and_Techniques_of_the_Chinese_Traditional_Exercise_System">Socio-Cultural Analysis on Baduanjin Qigong: Form and Techniques of the Chinese Traditional Exercise System</a></div><div class="wp-workCard_item"><span>Journal of Health and Medical Sciences</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied for health benefits from ancient times to contemporary societies. Globalization and widespread of cultural elements internationally have contributed positively for Qigong practice’s being known more in the West. There are many researches that have been conducted on medical, health aspects of practicing Qigong. In this article the subject is Baduanjin Qigong (Eight Section Brocade) and its socio-cultural dimensions which is going to be discussed from several views. A comprehensive model of Baduanjin will be given and this can be functional to practitioners of Asian martial arts, Traditional Chinese Medicine (TCM) and also academics in social sciences, humanities and cultural studies.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c866afe83477496bec75e068a0a6d942" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57920846,"asset_id":37909379,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57920846/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37909379"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37909379"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37909379; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37909379]").text(description); $(".js-view-count[data-work-id=37909379]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37909379; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37909379']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c866afe83477496bec75e068a0a6d942" } } $('.js-work-strip[data-work-id=37909379]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37909379,"title":"Socio-Cultural Analysis on Baduanjin Qigong: Form and Techniques of the Chinese Traditional Exercise System","translated_title":"","metadata":{"doi":"10.31014/aior.1994.01.01.7","issue":"1","volume":"1","abstract":"Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied for health benefits from ancient times to contemporary societies. Globalization and widespread of cultural elements internationally have contributed positively for Qigong practice’s being known more in the West. There are many researches that have been conducted on medical, health aspects of practicing Qigong. In this article the subject is Baduanjin Qigong (Eight Section Brocade) and its socio-cultural dimensions which is going to be discussed from several views. A comprehensive model of Baduanjin will be given and this can be functional to practitioners of Asian martial arts, Traditional Chinese Medicine (TCM) and also academics in social sciences, humanities and cultural studies.","page_numbers":"50-64","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Journal of Health and Medical Sciences"},"translated_abstract":"Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied for health benefits from ancient times to contemporary societies. Globalization and widespread of cultural elements internationally have contributed positively for Qigong practice’s being known more in the West. There are many researches that have been conducted on medical, health aspects of practicing Qigong. In this article the subject is Baduanjin Qigong (Eight Section Brocade) and its socio-cultural dimensions which is going to be discussed from several views. A comprehensive model of Baduanjin will be given and this can be functional to practitioners of Asian martial arts, Traditional Chinese Medicine (TCM) and also academics in social sciences, humanities and cultural studies.","internal_url":"https://www.academia.edu/37909379/Socio_Cultural_Analysis_on_Baduanjin_Qigong_Form_and_Techniques_of_the_Chinese_Traditional_Exercise_System","translated_internal_url":"","created_at":"2018-12-04T03:08:21.054-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57920846,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57920846/thumbnails/1.jpg","file_name":"Qigong-Article.pdf","download_url":"https://www.academia.edu/attachments/57920846/download_file","bulk_download_file_name":"Socio_Cultural_Analysis_on_Baduanjin_Qig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57920846/Qigong-Article-libre.pdf?1543928096=\u0026response-content-disposition=attachment%3B+filename%3DSocio_Cultural_Analysis_on_Baduanjin_Qig.pdf\u0026Expires=1742161270\u0026Signature=MTTq8wvRx~in1v86kpYdxqk1UuY3NFyIzuEs~fDnd7aBFoXHq2uwbThBZWrAaz0TColC2sFsc3SKJW3TeGk8PdvxOys70PNhX~EMmHnHRsI3W7oL0SRwrJ1p-EOZPmzv~-bzf4zby~KQO99w-nK4Jtck33YqQ2dUByI7SB8rZ9PvgaaCEnDa68wvvJdiZi8CLWibnzYJM~ynLHpdr7pzbaGaU0nhR3Mk017NVQI8TQGkCiEcRchISk7aQRFq6eysGWhT-p4-Hw4blC-SZ~OkJbv-iyDhHzbqrM0ezh6kZero6rfaf-DfvbBL52r0vTRS6aJmHW7W-c-cD1OR5XexPw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Socio_Cultural_Analysis_on_Baduanjin_Qigong_Form_and_Techniques_of_the_Chinese_Traditional_Exercise_System","translated_slug":"","page_count":16,"language":"en","content_type":"Work","summary":"Qigong is a traditional Chinese exercise system which has many forms and techniques used, applied for health benefits from ancient times to contemporary societies. Globalization and widespread of cultural elements internationally have contributed positively for Qigong practice’s being known more in the West. There are many researches that have been conducted on medical, health aspects of practicing Qigong. In this article the subject is Baduanjin Qigong (Eight Section Brocade) and its socio-cultural dimensions which is going to be discussed from several views. A comprehensive model of Baduanjin will be given and this can be functional to practitioners of Asian martial arts, Traditional Chinese Medicine (TCM) and also academics in social sciences, humanities and cultural studies.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57920846,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57920846/thumbnails/1.jpg","file_name":"Qigong-Article.pdf","download_url":"https://www.academia.edu/attachments/57920846/download_file","bulk_download_file_name":"Socio_Cultural_Analysis_on_Baduanjin_Qig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57920846/Qigong-Article-libre.pdf?1543928096=\u0026response-content-disposition=attachment%3B+filename%3DSocio_Cultural_Analysis_on_Baduanjin_Qig.pdf\u0026Expires=1742161270\u0026Signature=MTTq8wvRx~in1v86kpYdxqk1UuY3NFyIzuEs~fDnd7aBFoXHq2uwbThBZWrAaz0TColC2sFsc3SKJW3TeGk8PdvxOys70PNhX~EMmHnHRsI3W7oL0SRwrJ1p-EOZPmzv~-bzf4zby~KQO99w-nK4Jtck33YqQ2dUByI7SB8rZ9PvgaaCEnDa68wvvJdiZi8CLWibnzYJM~ynLHpdr7pzbaGaU0nhR3Mk017NVQI8TQGkCiEcRchISk7aQRFq6eysGWhT-p4-Hw4blC-SZ~OkJbv-iyDhHzbqrM0ezh6kZero6rfaf-DfvbBL52r0vTRS6aJmHW7W-c-cD1OR5XexPw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology"},{"id":1020,"name":"Chinese Philosophy","url":"https://www.academia.edu/Documents/in/Chinese_Philosophy"},{"id":10011,"name":"Sociology of Health","url":"https://www.academia.edu/Documents/in/Sociology_of_Health"},{"id":25806,"name":"Physical Education","url":"https://www.academia.edu/Documents/in/Physical_Education"},{"id":69367,"name":"Exercise and physical activity for health","url":"https://www.academia.edu/Documents/in/Exercise_and_physical_activity_for_health"},{"id":95463,"name":"Health and Physical Education","url":"https://www.academia.edu/Documents/in/Health_and_Physical_Education"},{"id":126635,"name":"Complimentary and Alternative Medicine","url":"https://www.academia.edu/Documents/in/Complimentary_and_Alternative_Medicine"},{"id":150194,"name":"Kung Fu","url":"https://www.academia.edu/Documents/in/Kung_Fu"},{"id":521144,"name":"Qigong","url":"https://www.academia.edu/Documents/in/Qigong"},{"id":547078,"name":"Sports and Exercise Sciences","url":"https://www.academia.edu/Documents/in/Sports_and_Exercise_Sciences"},{"id":839914,"name":"traditional Chinese medicine (TCM)","url":"https://www.academia.edu/Documents/in/traditional_Chinese_medicine_TCM_"}],"urls":[{"id":8646473,"url":"https://www.asianinstituteofresearch.org/jhms"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37773971"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37773971/Social_Media_and_OPSEC_an_analysis_through_sociology_of_security"><img alt="Research paper thumbnail of Social Media and OPSEC / an analysis through sociology of security" class="work-thumbnail" src="https://attachments.academia-assets.com/57769806/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37773971/Social_Media_and_OPSEC_an_analysis_through_sociology_of_security">Social Media and OPSEC / an analysis through sociology of security</a></div><div class="wp-workCard_item"><span>SECURITY DIMENSIONS International & National Studies</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">When virtual social relations and online interactions have increased in our age media also had a ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks , terrorism, identity theft, ransomwares and so on. Even " old types " of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security's prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="b34532a176ac205d733d33267f10b6da" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57769806,"asset_id":37773971,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57769806/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37773971"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37773971"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37773971; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37773971]").text(description); $(".js-view-count[data-work-id=37773971]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37773971; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37773971']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "b34532a176ac205d733d33267f10b6da" } } $('.js-work-strip[data-work-id=37773971]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37773971,"title":"Social Media and OPSEC / an analysis through sociology of security","translated_title":"","metadata":{"doi":"10.5604/01.3001.0012.7248","volume":"26","abstract":"When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks , terrorism, identity theft, ransomwares and so on. Even \" old types \" of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security's prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.","ai_title_tag":"Social Media's Impact on Security and OPSEC","page_numbers":"160-172","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"SECURITY DIMENSIONS International \u0026 National Studies"},"translated_abstract":"When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks , terrorism, identity theft, ransomwares and so on. Even \" old types \" of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security's prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.","internal_url":"https://www.academia.edu/37773971/Social_Media_and_OPSEC_an_analysis_through_sociology_of_security","translated_internal_url":"","created_at":"2018-11-14T12:54:50.379-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57769806,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57769806/thumbnails/1.jpg","file_name":"607586.pdf","download_url":"https://www.academia.edu/attachments/57769806/download_file","bulk_download_file_name":"Social_Media_and_OPSEC_an_analysis_throu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57769806/607586-libre.pdf?1542229187=\u0026response-content-disposition=attachment%3B+filename%3DSocial_Media_and_OPSEC_an_analysis_throu.pdf\u0026Expires=1742161270\u0026Signature=E-qFxdFi1JuLAFZDfXeCc-Q97PzeifK1dPNu~vWNDm3uNk7XA4bLWQmwGrzM6LGepmSlDLN-gdG3uA4I-ueHr5ep41Z6avA4NUea8jP0PGyTE-SJlTIDnY4gWHSM6h4F-8Z3asyzN7MSPlIfcqgEb~7qtwXAmHU0vQhaF5qQYykgkAupZHLWlmL3M~I1PFi0xd7MZ0Nd8FGH0cZNmJ858irfwi7yXf~z1NmeS8lqdYeCwCgCXkQRRvWgiBjqlULHqueNeiVBJ5Vu4NhIWqxC~eGaFv4ezojE26R8gn5vnJUKU9NcCzCVEHBvnVjaUqg4v-kCTj5TO3tB7Cao0XdUDA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Social_Media_and_OPSEC_an_analysis_through_sociology_of_security","translated_slug":"","page_count":13,"language":"en","content_type":"Work","summary":"When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks , terrorism, identity theft, ransomwares and so on. Even \" old types \" of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security's prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57769806,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57769806/thumbnails/1.jpg","file_name":"607586.pdf","download_url":"https://www.academia.edu/attachments/57769806/download_file","bulk_download_file_name":"Social_Media_and_OPSEC_an_analysis_throu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57769806/607586-libre.pdf?1542229187=\u0026response-content-disposition=attachment%3B+filename%3DSocial_Media_and_OPSEC_an_analysis_throu.pdf\u0026Expires=1742161270\u0026Signature=E-qFxdFi1JuLAFZDfXeCc-Q97PzeifK1dPNu~vWNDm3uNk7XA4bLWQmwGrzM6LGepmSlDLN-gdG3uA4I-ueHr5ep41Z6avA4NUea8jP0PGyTE-SJlTIDnY4gWHSM6h4F-8Z3asyzN7MSPlIfcqgEb~7qtwXAmHU0vQhaF5qQYykgkAupZHLWlmL3M~I1PFi0xd7MZ0Nd8FGH0cZNmJ858irfwi7yXf~z1NmeS8lqdYeCwCgCXkQRRvWgiBjqlULHqueNeiVBJ5Vu4NhIWqxC~eGaFv4ezojE26R8gn5vnJUKU9NcCzCVEHBvnVjaUqg4v-kCTj5TO3tB7Cao0XdUDA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media"},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":408724,"name":"OPSEC","url":"https://www.academia.edu/Documents/in/OPSEC"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[{"id":8631957,"url":"http://security-dimensions.pl/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37622154"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37622154/SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATIVE"><img alt="Research paper thumbnail of SOCIOTHERAPY AS A CONTEMPORARY ALTERNATIVE" class="work-thumbnail" src="https://attachments.academia-assets.com/57605943/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37622154/SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATIVE">SOCIOTHERAPY AS A CONTEMPORARY ALTERNATIVE</a></div><div class="wp-workCard_item"><span>CKS 2015 - Challenges of the Knowledge Society, "Nicolae Titulescu" University Publishing House</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoreti...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoretical and historical relations with the discipline of Sociology. Why there was a need to suggest a new way of therapy, while psychotherapy is existing? We have witnessed that there are some social dimensions of psychological problems which require a solution based on "socialization" between therapists and patients. There is a "healing power" in socialization and it has been the basis for all sorts of group therapies, including Sociotherapy as well. In this paper, we will have the opportunity to discuss the theoretical knowledge on Sociotherapy and consider its possibilities for applying contemporary socio-psychological problems in society. Knowledge society gives us a suitable platform to practice various therapeutic disciplines to find out solution for the problems created by the same society. This paper may be seen as a part of this purpose, finding viable and operative solutions to socio-psychological problems that today's individuals experience in their daily lives.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0130dab98880ee2551942cc6f3153eb0" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605943,"asset_id":37622154,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605943/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37622154"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37622154"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37622154; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37622154]").text(description); $(".js-view-count[data-work-id=37622154]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37622154; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37622154']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0130dab98880ee2551942cc6f3153eb0" } } $('.js-work-strip[data-work-id=37622154]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37622154,"title":"SOCIOTHERAPY AS A CONTEMPORARY ALTERNATIVE","translated_title":"","metadata":{"abstract":"Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoretical and historical relations with the discipline of Sociology. Why there was a need to suggest a new way of therapy, while psychotherapy is existing? We have witnessed that there are some social dimensions of psychological problems which require a solution based on \"socialization\" between therapists and patients. There is a \"healing power\" in socialization and it has been the basis for all sorts of group therapies, including Sociotherapy as well. In this paper, we will have the opportunity to discuss the theoretical knowledge on Sociotherapy and consider its possibilities for applying contemporary socio-psychological problems in society. Knowledge society gives us a suitable platform to practice various therapeutic disciplines to find out solution for the problems created by the same society. This paper may be seen as a part of this purpose, finding viable and operative solutions to socio-psychological problems that today's individuals experience in their daily lives.","more_info":"ISSN 2359-9227 ISSN-L 2068-7796","page_numbers":"894-897","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"CKS 2015 - Challenges of the Knowledge Society, \"Nicolae Titulescu\" University Publishing House"},"translated_abstract":"Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoretical and historical relations with the discipline of Sociology. Why there was a need to suggest a new way of therapy, while psychotherapy is existing? We have witnessed that there are some social dimensions of psychological problems which require a solution based on \"socialization\" between therapists and patients. There is a \"healing power\" in socialization and it has been the basis for all sorts of group therapies, including Sociotherapy as well. In this paper, we will have the opportunity to discuss the theoretical knowledge on Sociotherapy and consider its possibilities for applying contemporary socio-psychological problems in society. Knowledge society gives us a suitable platform to practice various therapeutic disciplines to find out solution for the problems created by the same society. This paper may be seen as a part of this purpose, finding viable and operative solutions to socio-psychological problems that today's individuals experience in their daily lives.","internal_url":"https://www.academia.edu/37622154/SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATIVE","translated_internal_url":"","created_at":"2018-10-21T11:24:02.275-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605943,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605943/thumbnails/1.jpg","file_name":"CKS_2015_education_and_sociology_art.128.pdf","download_url":"https://www.academia.edu/attachments/57605943/download_file","bulk_download_file_name":"SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605943/CKS_2015_education_and_sociology_art.128-libre.pdf?1540146847=\u0026response-content-disposition=attachment%3B+filename%3DSOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATI.pdf\u0026Expires=1742161271\u0026Signature=alhYwsBQSYryJ0AKQGgmDfaXwMb1fk~9CzORk77-P8W~QrBnlhlrtrdIOWgoG9j5G-QHVQpK4dxw8UFZIZG030ZmwdsCjv6qwRSJg-rhZvj-cGADE~P6VbX3bPgiIjHwFGzKkvatNPEPVTtjY-dbj3eC8T4Wp~R-RkbrVzQOwIn2IsD8AdsnCcqTYZDthkLfeNTeoIWvFM3z4e3Y9e0dukAuqL5UXH9IOydAareEw4s2L4YuA0J2IA4D98DaYDFKMqfZemrEUtFewb4cjxn5lxECXe4lZJ29QVdXn5jfVXW49fxfBthiIwzY0xMomJLP2aDaf8s1G~gCxRtdt4u-6A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATIVE","translated_slug":"","page_count":4,"language":"en","content_type":"Work","summary":"Sociotherapy was launched as a therapeutic system in 20th Century, which has very strong theoretical and historical relations with the discipline of Sociology. Why there was a need to suggest a new way of therapy, while psychotherapy is existing? We have witnessed that there are some social dimensions of psychological problems which require a solution based on \"socialization\" between therapists and patients. There is a \"healing power\" in socialization and it has been the basis for all sorts of group therapies, including Sociotherapy as well. In this paper, we will have the opportunity to discuss the theoretical knowledge on Sociotherapy and consider its possibilities for applying contemporary socio-psychological problems in society. Knowledge society gives us a suitable platform to practice various therapeutic disciplines to find out solution for the problems created by the same society. This paper may be seen as a part of this purpose, finding viable and operative solutions to socio-psychological problems that today's individuals experience in their daily lives.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605943,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605943/thumbnails/1.jpg","file_name":"CKS_2015_education_and_sociology_art.128.pdf","download_url":"https://www.academia.edu/attachments/57605943/download_file","bulk_download_file_name":"SOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605943/CKS_2015_education_and_sociology_art.128-libre.pdf?1540146847=\u0026response-content-disposition=attachment%3B+filename%3DSOCIOTHERAPY_AS_A_CONTEMPORARY_ALTERNATI.pdf\u0026Expires=1742161271\u0026Signature=alhYwsBQSYryJ0AKQGgmDfaXwMb1fk~9CzORk77-P8W~QrBnlhlrtrdIOWgoG9j5G-QHVQpK4dxw8UFZIZG030ZmwdsCjv6qwRSJg-rhZvj-cGADE~P6VbX3bPgiIjHwFGzKkvatNPEPVTtjY-dbj3eC8T4Wp~R-RkbrVzQOwIn2IsD8AdsnCcqTYZDthkLfeNTeoIWvFM3z4e3Y9e0dukAuqL5UXH9IOydAareEw4s2L4YuA0J2IA4D98DaYDFKMqfZemrEUtFewb4cjxn5lxECXe4lZJ29QVdXn5jfVXW49fxfBthiIwzY0xMomJLP2aDaf8s1G~gCxRtdt4u-6A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":233,"name":"Group Therapy","url":"https://www.academia.edu/Documents/in/Group_Therapy"},{"id":3279,"name":"Psychotherapy and Counseling","url":"https://www.academia.edu/Documents/in/Psychotherapy_and_Counseling"},{"id":5685,"name":"Clinical Sociology","url":"https://www.academia.edu/Documents/in/Clinical_Sociology"},{"id":275684,"name":"Interpersonal Therapy","url":"https://www.academia.edu/Documents/in/Interpersonal_Therapy"},{"id":906082,"name":"Sociotherapy","url":"https://www.academia.edu/Documents/in/Sociotherapy"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37622047"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37622047/OPSEC_Model_and_Applications"><img alt="Research paper thumbnail of OPSEC Model and Applications" class="work-thumbnail" src="https://attachments.academia-assets.com/57605828/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37622047/OPSEC_Model_and_Applications">OPSEC Model and Applications</a></div><div class="wp-workCard_item"><span>SECURITY DIMENSIONS International & National Studies</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army's operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles , steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0a927139b73580a906117970f790741e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605828,"asset_id":37622047,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605828/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37622047"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37622047"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37622047; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37622047]").text(description); $(".js-view-count[data-work-id=37622047]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37622047; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37622047']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0a927139b73580a906117970f790741e" } } $('.js-work-strip[data-work-id=37622047]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37622047,"title":"OPSEC Model and Applications","translated_title":"","metadata":{"doi":"10.24356/SD/25/3","volume":"25","abstract":"OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army's operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles , steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.","page_numbers":"60-81","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"SECURITY DIMENSIONS International \u0026 National Studies"},"translated_abstract":"OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army's operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles , steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.","internal_url":"https://www.academia.edu/37622047/OPSEC_Model_and_Applications","translated_internal_url":"","created_at":"2018-10-21T11:05:41.056-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605828,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605828/thumbnails/1.jpg","file_name":"SD_25_60-81.pdf","download_url":"https://www.academia.edu/attachments/57605828/download_file","bulk_download_file_name":"OPSEC_Model_and_Applications.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605828/SD_25_60-81-libre.pdf?1540145510=\u0026response-content-disposition=attachment%3B+filename%3DOPSEC_Model_and_Applications.pdf\u0026Expires=1742161271\u0026Signature=ESZLnGgtzYsqrvEoivuuJ4Xf9mWLZ6WQxY4GU5tSISLGqMBC~SFJrsN~wUZTUM122VsoDs6tHolkCKtlQhNpP52AC2DcFusJSG1lw0~9X-f5aSlIfx-H4TCSJO~0XyCtQO1ZySQnTz7l~Lj28gAwG16kF183AT3iZw~w1YZ47rVpxM5aaI1~mttNmjPHw5Z-foZk1W7JSEWIxKk5vMy6KyTLFYb8qf7qbWxoF7-tKVEcI9SyY-f~N1f474webdHer9R2aELRJ6quJGnouRARuYPNnYXIYKGvLA57~uvBFHC2JD7sgkvHdm4Z2yyDKBWE1PPptcQijiHx3CkYI9IO5g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"OPSEC_Model_and_Applications","translated_slug":"","page_count":22,"language":"en","content_type":"Work","summary":"OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army's operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles , steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605828,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605828/thumbnails/1.jpg","file_name":"SD_25_60-81.pdf","download_url":"https://www.academia.edu/attachments/57605828/download_file","bulk_download_file_name":"OPSEC_Model_and_Applications.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605828/SD_25_60-81-libre.pdf?1540145510=\u0026response-content-disposition=attachment%3B+filename%3DOPSEC_Model_and_Applications.pdf\u0026Expires=1742161271\u0026Signature=ESZLnGgtzYsqrvEoivuuJ4Xf9mWLZ6WQxY4GU5tSISLGqMBC~SFJrsN~wUZTUM122VsoDs6tHolkCKtlQhNpP52AC2DcFusJSG1lw0~9X-f5aSlIfx-H4TCSJO~0XyCtQO1ZySQnTz7l~Lj28gAwG16kF183AT3iZw~w1YZ47rVpxM5aaI1~mttNmjPHw5Z-foZk1W7JSEWIxKk5vMy6KyTLFYb8qf7qbWxoF7-tKVEcI9SyY-f~N1f474webdHer9R2aELRJ6quJGnouRARuYPNnYXIYKGvLA57~uvBFHC2JD7sgkvHdm4Z2yyDKBWE1PPptcQijiHx3CkYI9IO5g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":73443,"name":"Risk society","url":"https://www.academia.edu/Documents/in/Risk_society"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":408724,"name":"OPSEC","url":"https://www.academia.edu/Documents/in/OPSEC"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37621987"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37621987/Sociology_of_Security_in_the_Insecure_World"><img alt="Research paper thumbnail of Sociology of Security in the Insecure World" class="work-thumbnail" src="https://attachments.academia-assets.com/57605763/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37621987/Sociology_of_Security_in_the_Insecure_World">Sociology of Security in the Insecure World</a></div><div class="wp-workCard_item"><span>SECURITY DIMENSIONS International & National Studies</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Security and risk related problems have been important challenges always, however become highly c...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Security and risk related problems have been important challenges always, however become highly critical since the beginning of 21st Century. The industry of security has grown in relation with the increasing level of threats. cybercrimes, conflicts, terrorism, organized crimes, etc. are problems both for governments and private companies. in public sector security field has required a professionalized administration, for private sector security management has become a leading and growing field for the future of companies and their investments. the improving mechanisms of security in global, regional and local levels have created important changes as well on societal and individual levels. today , all societies are more or less, in this way or that way, influenced by changing security paradigms and new progresses in this sector. Sociology, as the discipline researching and analyzing societies in general sense, cannot undervalue what is happening with security field in terms of being a " social institution ". this paper will provide the core concepts and methodological approaches towards establishing sociology of security further as a more progressed sub-discipline of sociology. We will have also the opportunity to focus and analyze examples from different parts of the World such as europe, asia and africa.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="3b6ab07fea16c264cc9d80aecc79dd02" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605763,"asset_id":37621987,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605763/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37621987"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37621987"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37621987; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37621987]").text(description); $(".js-view-count[data-work-id=37621987]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37621987; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37621987']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "3b6ab07fea16c264cc9d80aecc79dd02" } } $('.js-work-strip[data-work-id=37621987]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37621987,"title":"Sociology of Security in the Insecure World","translated_title":"","metadata":{"doi":"10.24356/SD/23/8","volume":"23","abstract":"Security and risk related problems have been important challenges always, however become highly critical since the beginning of 21st Century. The industry of security has grown in relation with the increasing level of threats. cybercrimes, conflicts, terrorism, organized crimes, etc. are problems both for governments and private companies. in public sector security field has required a professionalized administration, for private sector security management has become a leading and growing field for the future of companies and their investments. the improving mechanisms of security in global, regional and local levels have created important changes as well on societal and individual levels. today , all societies are more or less, in this way or that way, influenced by changing security paradigms and new progresses in this sector. Sociology, as the discipline researching and analyzing societies in general sense, cannot undervalue what is happening with security field in terms of being a \" social institution \". this paper will provide the core concepts and methodological approaches towards establishing sociology of security further as a more progressed sub-discipline of sociology. We will have also the opportunity to focus and analyze examples from different parts of the World such as europe, asia and africa.","ai_title_tag":"Sociology of Security: Addressing 21st Century Risks","page_numbers":"146-164","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"SECURITY DIMENSIONS International \u0026 National Studies"},"translated_abstract":"Security and risk related problems have been important challenges always, however become highly critical since the beginning of 21st Century. The industry of security has grown in relation with the increasing level of threats. cybercrimes, conflicts, terrorism, organized crimes, etc. are problems both for governments and private companies. in public sector security field has required a professionalized administration, for private sector security management has become a leading and growing field for the future of companies and their investments. the improving mechanisms of security in global, regional and local levels have created important changes as well on societal and individual levels. today , all societies are more or less, in this way or that way, influenced by changing security paradigms and new progresses in this sector. Sociology, as the discipline researching and analyzing societies in general sense, cannot undervalue what is happening with security field in terms of being a \" social institution \". this paper will provide the core concepts and methodological approaches towards establishing sociology of security further as a more progressed sub-discipline of sociology. We will have also the opportunity to focus and analyze examples from different parts of the World such as europe, asia and africa.","internal_url":"https://www.academia.edu/37621987/Sociology_of_Security_in_the_Insecure_World","translated_internal_url":"","created_at":"2018-10-21T10:54:54.939-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605763,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605763/thumbnails/1.jpg","file_name":"SD_23_146-164.pdf","download_url":"https://www.academia.edu/attachments/57605763/download_file","bulk_download_file_name":"Sociology_of_Security_in_the_Insecure_Wo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605763/SD_23_146-164-libre.pdf?1540144881=\u0026response-content-disposition=attachment%3B+filename%3DSociology_of_Security_in_the_Insecure_Wo.pdf\u0026Expires=1742161271\u0026Signature=JmzLhM--aQwlDl-XfoGzNWeaUvQO~SnEWkwxQsRnvGpDc~hqy9a-6xDzgOCQ-cymhTlo5ME-60swsHtLEgMqvhX3nn~jWFbNnTiLur-zKq7S1ScWUFrpsXNXIHEQHObTA1hyEZS3VAF1qJPrPNWe8SKZJPVO2cZkCwIV2cipUcEWCuNDc7Tfzob-uVFCHReQkSiH-Zb132rQH0tcugOEjGPofU5uidLs5uH8H8MOV2Zyj9YOeBroWjbXj~TKvaZln5d9EQf~6ZDxq-RmiJNLKBnjQxPGrESKDKjZwjdwxh6AJPTQesuuK8KiuD15~nLAVvJjj-ARu5Sr7yoLQKD6GQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Sociology_of_Security_in_the_Insecure_World","translated_slug":"","page_count":19,"language":"en","content_type":"Work","summary":"Security and risk related problems have been important challenges always, however become highly critical since the beginning of 21st Century. The industry of security has grown in relation with the increasing level of threats. cybercrimes, conflicts, terrorism, organized crimes, etc. are problems both for governments and private companies. in public sector security field has required a professionalized administration, for private sector security management has become a leading and growing field for the future of companies and their investments. the improving mechanisms of security in global, regional and local levels have created important changes as well on societal and individual levels. today , all societies are more or less, in this way or that way, influenced by changing security paradigms and new progresses in this sector. Sociology, as the discipline researching and analyzing societies in general sense, cannot undervalue what is happening with security field in terms of being a \" social institution \". this paper will provide the core concepts and methodological approaches towards establishing sociology of security further as a more progressed sub-discipline of sociology. We will have also the opportunity to focus and analyze examples from different parts of the World such as europe, asia and africa.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605763,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605763/thumbnails/1.jpg","file_name":"SD_23_146-164.pdf","download_url":"https://www.academia.edu/attachments/57605763/download_file","bulk_download_file_name":"Sociology_of_Security_in_the_Insecure_Wo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605763/SD_23_146-164-libre.pdf?1540144881=\u0026response-content-disposition=attachment%3B+filename%3DSociology_of_Security_in_the_Insecure_Wo.pdf\u0026Expires=1742161271\u0026Signature=JmzLhM--aQwlDl-XfoGzNWeaUvQO~SnEWkwxQsRnvGpDc~hqy9a-6xDzgOCQ-cymhTlo5ME-60swsHtLEgMqvhX3nn~jWFbNnTiLur-zKq7S1ScWUFrpsXNXIHEQHObTA1hyEZS3VAF1qJPrPNWe8SKZJPVO2cZkCwIV2cipUcEWCuNDc7Tfzob-uVFCHReQkSiH-Zb132rQH0tcugOEjGPofU5uidLs5uH8H8MOV2Zyj9YOeBroWjbXj~TKvaZln5d9EQf~6ZDxq-RmiJNLKBnjQxPGrESKDKjZwjdwxh6AJPTQesuuK8KiuD15~nLAVvJjj-ARu5Sr7yoLQKD6GQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology"},{"id":5521,"name":"Crisis Management","url":"https://www.academia.edu/Documents/in/Crisis_Management"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":32844,"name":"Security Management","url":"https://www.academia.edu/Documents/in/Security_Management"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37621949"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37621949/OPSEC_OPEM_Konsepti_ve_G%C3%BCvenlik_Sosyolojisi_Ba%C4%9Flam%C4%B1nda_%C3%96nemi"><img alt="Research paper thumbnail of OPSEC (OPEM) Konsepti ve Güvenlik Sosyolojisi Bağlamında Önemi" class="work-thumbnail" src="https://attachments.academia-assets.com/57605698/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37621949/OPSEC_OPEM_Konsepti_ve_G%C3%BCvenlik_Sosyolojisi_Ba%C4%9Flam%C4%B1nda_%C3%96nemi">OPSEC (OPEM) Konsepti ve Güvenlik Sosyolojisi Bağlamında Önemi</a></div><div class="wp-workCard_item"><span>Journal of Strategic Research in Social Science (JoSReSS)</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketle...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketlerine, spor tesislerinden kültürel faaliyetlere kadar çok geniş bir alana hitap etmektedir. Devletler düzeyinde husumetler olabileceği gibi ticari kuruluşlar arasında da rekabet kesintisiz sürmektedir. Gerçekleştirilen en küçükten en büyüğe kadar her etkinlik-operasyon ile ilgili ketumiyet sağlanamazsa çatışma ya da rekabet söz konusu unsurun aleyhine sonuçlanır. Bu açıdan Operasyon Emniyeti (OPEM) anlamına gelen OPSEC önem arz etmektedir. ABD’de askeri bir terim olarak geliştirilen bu konsept sonraki zaman diliminde askeriye dışındaki güvenlik birimlerinde de kullanılmıştır. Bugün özel güvenlik sektöründe de şirket güvenliği, IT güvenliği, vb. alanlarda OPSEC’in kullanıldığını görüyoruz. Bu çalışmanın temel argümanı OPSEC uygulamalarının askeriye ya da güvenlik sektörüyle sınırlandırılmayıp ekonomi, siyaset, iş dünyası, farklı toplumsal alanlar, vb. de kullanılabilme potansiyeline sahip olduğudur. Konu, ilgili literatüre sosyolojik bir pencereden bakarak tartışılmaktadır.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="686202a92802a2fcd51bfa1e877cd77b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605698,"asset_id":37621949,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605698/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37621949"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37621949"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37621949; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37621949]").text(description); $(".js-view-count[data-work-id=37621949]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37621949; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37621949']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "686202a92802a2fcd51bfa1e877cd77b" } } $('.js-work-strip[data-work-id=37621949]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37621949,"title":"OPSEC (OPEM) Konsepti ve Güvenlik Sosyolojisi Bağlamında Önemi","translated_title":"","metadata":{"issue":"1","volume":"3","abstract":"Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketlerine, spor tesislerinden kültürel faaliyetlere kadar çok geniş bir alana hitap etmektedir. Devletler düzeyinde husumetler olabileceği gibi ticari kuruluşlar arasında da rekabet kesintisiz sürmektedir. Gerçekleştirilen en küçükten en büyüğe kadar her etkinlik-operasyon ile ilgili ketumiyet sağlanamazsa çatışma ya da rekabet söz konusu unsurun aleyhine sonuçlanır. Bu açıdan Operasyon Emniyeti (OPEM) anlamına gelen OPSEC önem arz etmektedir. ABD’de askeri bir terim olarak geliştirilen bu konsept sonraki zaman diliminde askeriye dışındaki güvenlik birimlerinde de kullanılmıştır. Bugün özel güvenlik sektöründe de şirket güvenliği, IT güvenliği, vb. alanlarda OPSEC’in kullanıldığını görüyoruz. Bu çalışmanın temel argümanı OPSEC uygulamalarının askeriye ya da güvenlik sektörüyle sınırlandırılmayıp ekonomi, siyaset, iş dünyası, farklı toplumsal alanlar, vb. de kullanılabilme potansiyeline sahip olduğudur. Konu, ilgili literatüre sosyolojik bir pencereden bakarak tartışılmaktadır.","page_numbers":"43-54","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Journal of Strategic Research in Social Science (JoSReSS)"},"translated_abstract":"Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketlerine, spor tesislerinden kültürel faaliyetlere kadar çok geniş bir alana hitap etmektedir. Devletler düzeyinde husumetler olabileceği gibi ticari kuruluşlar arasında da rekabet kesintisiz sürmektedir. Gerçekleştirilen en küçükten en büyüğe kadar her etkinlik-operasyon ile ilgili ketumiyet sağlanamazsa çatışma ya da rekabet söz konusu unsurun aleyhine sonuçlanır. Bu açıdan Operasyon Emniyeti (OPEM) anlamına gelen OPSEC önem arz etmektedir. ABD’de askeri bir terim olarak geliştirilen bu konsept sonraki zaman diliminde askeriye dışındaki güvenlik birimlerinde de kullanılmıştır. Bugün özel güvenlik sektöründe de şirket güvenliği, IT güvenliği, vb. alanlarda OPSEC’in kullanıldığını görüyoruz. Bu çalışmanın temel argümanı OPSEC uygulamalarının askeriye ya da güvenlik sektörüyle sınırlandırılmayıp ekonomi, siyaset, iş dünyası, farklı toplumsal alanlar, vb. de kullanılabilme potansiyeline sahip olduğudur. Konu, ilgili literatüre sosyolojik bir pencereden bakarak tartışılmaktadır.","internal_url":"https://www.academia.edu/37621949/OPSEC_OPEM_Konsepti_ve_G%C3%BCvenlik_Sosyolojisi_Ba%C4%9Flam%C4%B1nda_%C3%96nemi","translated_internal_url":"","created_at":"2018-10-21T10:44:19.187-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605698,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605698/thumbnails/1.jpg","file_name":"OPSEC_OPEM_Konsepti_ve_G__venlik_Sosyolojisi_Ba__lam__nda___nemi__323153_-317246.pdf","download_url":"https://www.academia.edu/attachments/57605698/download_file","bulk_download_file_name":"OPSEC_OPEM_Konsepti_ve_Guvenlik_Sosyoloj.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605698/OPSEC_OPEM_Konsepti_ve_G__venlik_Sosyolojisi_Ba__lam__nda___nemi__323153_-317246-libre.pdf?1540144208=\u0026response-content-disposition=attachment%3B+filename%3DOPSEC_OPEM_Konsepti_ve_Guvenlik_Sosyoloj.pdf\u0026Expires=1742161271\u0026Signature=XQU0CahCxVY0q~m9wzmOjArzCrjPPhI3O5mhWNKS46duhwiopwWLsH2t3gb2FPdHtqIEipJFHw9NoPUgroa-JNCHWYOTddi0UaXBaQCeRUQ5U-3WpM3YTrH1QOEQC8DN8HIXDips0bLjp8AyzCg1K~l5YT9BWeyr0zolKl8Tl0S8uDTLmWifRSyX7Lmn1sBwDU0UqIqMeQwA0b0OSA0vcyBhYUbQq8AF~Nr0rZi3p01PKz4IA5P7vnMBDYyjeElB6tu-z0IEVwnWSfNa6WhBGQ~8TVKy5JYLu6UcyzMbA0Wq9qk66RpUFn~5RidfaHcd9Yo-YD12I9uP5gugNDejqw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"OPSEC_OPEM_Konsepti_ve_Güvenlik_Sosyolojisi_Bağlamında_Önemi","translated_slug":"","page_count":12,"language":"tr","content_type":"Work","summary":"Operasyon kavramı devlet kurumlarından ticari işletmelere, eğitim kurumlarından lojistik şirketlerine, spor tesislerinden kültürel faaliyetlere kadar çok geniş bir alana hitap etmektedir. Devletler düzeyinde husumetler olabileceği gibi ticari kuruluşlar arasında da rekabet kesintisiz sürmektedir. Gerçekleştirilen en küçükten en büyüğe kadar her etkinlik-operasyon ile ilgili ketumiyet sağlanamazsa çatışma ya da rekabet söz konusu unsurun aleyhine sonuçlanır. Bu açıdan Operasyon Emniyeti (OPEM) anlamına gelen OPSEC önem arz etmektedir. ABD’de askeri bir terim olarak geliştirilen bu konsept sonraki zaman diliminde askeriye dışındaki güvenlik birimlerinde de kullanılmıştır. Bugün özel güvenlik sektöründe de şirket güvenliği, IT güvenliği, vb. alanlarda OPSEC’in kullanıldığını görüyoruz. Bu çalışmanın temel argümanı OPSEC uygulamalarının askeriye ya da güvenlik sektörüyle sınırlandırılmayıp ekonomi, siyaset, iş dünyası, farklı toplumsal alanlar, vb. de kullanılabilme potansiyeline sahip olduğudur. Konu, ilgili literatüre sosyolojik bir pencereden bakarak tartışılmaktadır.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605698,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605698/thumbnails/1.jpg","file_name":"OPSEC_OPEM_Konsepti_ve_G__venlik_Sosyolojisi_Ba__lam__nda___nemi__323153_-317246.pdf","download_url":"https://www.academia.edu/attachments/57605698/download_file","bulk_download_file_name":"OPSEC_OPEM_Konsepti_ve_Guvenlik_Sosyoloj.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605698/OPSEC_OPEM_Konsepti_ve_G__venlik_Sosyolojisi_Ba__lam__nda___nemi__323153_-317246-libre.pdf?1540144208=\u0026response-content-disposition=attachment%3B+filename%3DOPSEC_OPEM_Konsepti_ve_Guvenlik_Sosyoloj.pdf\u0026Expires=1742161271\u0026Signature=XQU0CahCxVY0q~m9wzmOjArzCrjPPhI3O5mhWNKS46duhwiopwWLsH2t3gb2FPdHtqIEipJFHw9NoPUgroa-JNCHWYOTddi0UaXBaQCeRUQ5U-3WpM3YTrH1QOEQC8DN8HIXDips0bLjp8AyzCg1K~l5YT9BWeyr0zolKl8Tl0S8uDTLmWifRSyX7Lmn1sBwDU0UqIqMeQwA0b0OSA0vcyBhYUbQq8AF~Nr0rZi3p01PKz4IA5P7vnMBDYyjeElB6tu-z0IEVwnWSfNa6WhBGQ~8TVKy5JYLu6UcyzMbA0Wq9qk66RpUFn~5RidfaHcd9Yo-YD12I9uP5gugNDejqw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":63859,"name":"Uluslararası Güvenlik","url":"https://www.academia.edu/Documents/in/Uluslararasi_Guvenlik"},{"id":408724,"name":"OPSEC","url":"https://www.academia.edu/Documents/in/OPSEC"},{"id":1144590,"name":"Siber Güvenlik","url":"https://www.academia.edu/Documents/in/Siber_Guvenlik"},{"id":1698255,"name":"Sociology of Security","url":"https://www.academia.edu/Documents/in/Sociology_of_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37621877"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37621877/BU%C5%9E%C4%B0DO_JAPON_SAMURAYLARININ_FELSEFES%C4%B0"><img alt="Research paper thumbnail of BUŞİDO: JAPON SAMURAYLARININ FELSEFESİ" class="work-thumbnail" src="https://attachments.academia-assets.com/57605613/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37621877/BU%C5%9E%C4%B0DO_JAPON_SAMURAYLARININ_FELSEFES%C4%B0">BUŞİDO: JAPON SAMURAYLARININ FELSEFESİ</a></div><div class="wp-workCard_item"><span>Yalova Sosyal Bilimler Dergisi</span><span>, 2011</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşa...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşam felsefesidir. Samuraylar yüzyıllarca, Japon toplumu içinde Buşido etik kodlarına göre hareket etmiş ve bu geleneği kuşaktan kuşağa aktarmışlardır. Bu çalışma kapsamında Japon kültür tarihinin anahtar kavramlarından olan Buşido, Japonya'nın tarihinde yer alan önemli samuray ve savaş sanatı ustalarının (Yamamoto Tsunetomo, Miyamoto Musashi, Takuan Soho, Yagyu Munenori) görüşleri ışığında ele alınmıştır. Savaş sanatları tarihinde önemli bir yeri olan Buşido kavramı ve yansımaları kendi sosyal ve kültürel bağlamı içinde analiz edilirken, bu kavramın/olgunun oluşturduğu samuray profilinin oluşumu araştırılmıştır. Samurayların savaşçılık geleneğinin, salt bir fiziki "savaş" stratejileri bütünü olmayıp; esasında kişisel gelişim, ruhsal olgunlaşma ve ilerleme olarak bir anlam taşıdığı felsefi/etik örnekler temelinde ele alınmıştır.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="efd55851991a5e919b410826a8893cec" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605613,"asset_id":37621877,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605613/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37621877"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37621877"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37621877; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37621877]").text(description); $(".js-view-count[data-work-id=37621877]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37621877; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37621877']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "efd55851991a5e919b410826a8893cec" } } $('.js-work-strip[data-work-id=37621877]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37621877,"title":"BUŞİDO: JAPON SAMURAYLARININ FELSEFESİ","translated_title":"","metadata":{"volume":"1","abstract":"Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşam felsefesidir. Samuraylar yüzyıllarca, Japon toplumu içinde Buşido etik kodlarına göre hareket etmiş ve bu geleneği kuşaktan kuşağa aktarmışlardır. Bu çalışma kapsamında Japon kültür tarihinin anahtar kavramlarından olan Buşido, Japonya'nın tarihinde yer alan önemli samuray ve savaş sanatı ustalarının (Yamamoto Tsunetomo, Miyamoto Musashi, Takuan Soho, Yagyu Munenori) görüşleri ışığında ele alınmıştır. Savaş sanatları tarihinde önemli bir yeri olan Buşido kavramı ve yansımaları kendi sosyal ve kültürel bağlamı içinde analiz edilirken, bu kavramın/olgunun oluşturduğu samuray profilinin oluşumu araştırılmıştır. Samurayların savaşçılık geleneğinin, salt bir fiziki \"savaş\" stratejileri bütünü olmayıp; esasında kişisel gelişim, ruhsal olgunlaşma ve ilerleme olarak bir anlam taşıdığı felsefi/etik örnekler temelinde ele alınmıştır.","page_numbers":"132-150","publication_date":{"day":null,"month":null,"year":2011,"errors":{}},"publication_name":"Yalova Sosyal Bilimler Dergisi"},"translated_abstract":"Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşam felsefesidir. Samuraylar yüzyıllarca, Japon toplumu içinde Buşido etik kodlarına göre hareket etmiş ve bu geleneği kuşaktan kuşağa aktarmışlardır. Bu çalışma kapsamında Japon kültür tarihinin anahtar kavramlarından olan Buşido, Japonya'nın tarihinde yer alan önemli samuray ve savaş sanatı ustalarının (Yamamoto Tsunetomo, Miyamoto Musashi, Takuan Soho, Yagyu Munenori) görüşleri ışığında ele alınmıştır. Savaş sanatları tarihinde önemli bir yeri olan Buşido kavramı ve yansımaları kendi sosyal ve kültürel bağlamı içinde analiz edilirken, bu kavramın/olgunun oluşturduğu samuray profilinin oluşumu araştırılmıştır. Samurayların savaşçılık geleneğinin, salt bir fiziki \"savaş\" stratejileri bütünü olmayıp; esasında kişisel gelişim, ruhsal olgunlaşma ve ilerleme olarak bir anlam taşıdığı felsefi/etik örnekler temelinde ele alınmıştır.","internal_url":"https://www.academia.edu/37621877/BU%C5%9E%C4%B0DO_JAPON_SAMURAYLARININ_FELSEFES%C4%B0","translated_internal_url":"","created_at":"2018-10-21T10:27:53.978-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":31974279,"work_id":37621877,"tagging_user_id":95615525,"tagged_user_id":2917816,"co_author_invite_id":null,"email":"k***n@gmail.com","affiliation":"University of Usak","display_order":1,"name":"M. Kubilay Akman","title":"BUŞİDO: JAPON SAMURAYLARININ FELSEFESİ"}],"downloadable_attachments":[{"id":57605613,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605613/thumbnails/1.jpg","file_name":"5000000789-5000001630-1-PB.pdf","download_url":"https://www.academia.edu/attachments/57605613/download_file","bulk_download_file_name":"BUSIDO_JAPON_SAMURAYLARININ_FELSEFESI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605613/5000000789-5000001630-1-PB-libre.pdf?1540143141=\u0026response-content-disposition=attachment%3B+filename%3DBUSIDO_JAPON_SAMURAYLARININ_FELSEFESI.pdf\u0026Expires=1742161271\u0026Signature=F70xe3iPSPwb4FbFTa5VuBt7fkPfuz6o91dE6VoNgP9h2GvZbxiPniSgljUvZ9pkSyAzt1049K~Q71S19~oPmmVplE~H1~FX2Fr35RXHLqVN3dOXjvoac6gb6DG9do-e4esO0iRFMxCvA7lv0fT7hTbUNtIzte9vuCGo2NywItKMZF~GXguWjM6O4yl6xizajJ32a9FQN-plN7gJ49ZTQocpZ031cNeB~4ZMLEaBfg2BcdyMthx5~Q7oVOIonJz66k5y8tNwrxTUOqQ1bpuQJ3eI4T6yTb-Swu7m4BjMeFMjgNC7VbnUGFPR4QX~c1Lvb0aChWeJAgIqsMAGp95EdQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"BUŞİDO_JAPON_SAMURAYLARININ_FELSEFESİ","translated_slug":"","page_count":19,"language":"tr","content_type":"Work","summary":"Buşido, Japon samuraylarının, savaşçılık geleneğinin ötesinde; sosyal ve etik boyutları olan yaşam felsefesidir. Samuraylar yüzyıllarca, Japon toplumu içinde Buşido etik kodlarına göre hareket etmiş ve bu geleneği kuşaktan kuşağa aktarmışlardır. Bu çalışma kapsamında Japon kültür tarihinin anahtar kavramlarından olan Buşido, Japonya'nın tarihinde yer alan önemli samuray ve savaş sanatı ustalarının (Yamamoto Tsunetomo, Miyamoto Musashi, Takuan Soho, Yagyu Munenori) görüşleri ışığında ele alınmıştır. Savaş sanatları tarihinde önemli bir yeri olan Buşido kavramı ve yansımaları kendi sosyal ve kültürel bağlamı içinde analiz edilirken, bu kavramın/olgunun oluşturduğu samuray profilinin oluşumu araştırılmıştır. Samurayların savaşçılık geleneğinin, salt bir fiziki \"savaş\" stratejileri bütünü olmayıp; esasında kişisel gelişim, ruhsal olgunlaşma ve ilerleme olarak bir anlam taşıdığı felsefi/etik örnekler temelinde ele alınmıştır.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605613,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605613/thumbnails/1.jpg","file_name":"5000000789-5000001630-1-PB.pdf","download_url":"https://www.academia.edu/attachments/57605613/download_file","bulk_download_file_name":"BUSIDO_JAPON_SAMURAYLARININ_FELSEFESI.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605613/5000000789-5000001630-1-PB-libre.pdf?1540143141=\u0026response-content-disposition=attachment%3B+filename%3DBUSIDO_JAPON_SAMURAYLARININ_FELSEFESI.pdf\u0026Expires=1742161271\u0026Signature=F70xe3iPSPwb4FbFTa5VuBt7fkPfuz6o91dE6VoNgP9h2GvZbxiPniSgljUvZ9pkSyAzt1049K~Q71S19~oPmmVplE~H1~FX2Fr35RXHLqVN3dOXjvoac6gb6DG9do-e4esO0iRFMxCvA7lv0fT7hTbUNtIzte9vuCGo2NywItKMZF~GXguWjM6O4yl6xizajJ32a9FQN-plN7gJ49ZTQocpZ031cNeB~4ZMLEaBfg2BcdyMthx5~Q7oVOIonJz66k5y8tNwrxTUOqQ1bpuQJ3eI4T6yTb-Swu7m4BjMeFMjgNC7VbnUGFPR4QX~c1Lvb0aChWeJAgIqsMAGp95EdQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1223,"name":"Japanese Philosophy","url":"https://www.academia.edu/Documents/in/Japanese_Philosophy"},{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts"},{"id":49969,"name":"History of the Samurai","url":"https://www.academia.edu/Documents/in/History_of_the_Samurai"},{"id":83930,"name":"Bushido 武士道","url":"https://www.academia.edu/Documents/in/Bushido_Wu_Shi_Dao_"},{"id":284770,"name":"Japonya","url":"https://www.academia.edu/Documents/in/Japonya"},{"id":385475,"name":"Bujutsu","url":"https://www.academia.edu/Documents/in/Bujutsu"},{"id":385476,"name":"Kenjutsu","url":"https://www.academia.edu/Documents/in/Kenjutsu"},{"id":511977,"name":"Stratejik Yönetim","url":"https://www.academia.edu/Documents/in/Stratejik_Yonetim"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="37621781"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/37621781/G%C3%96%C4%9E%C3%9CS_G%C3%96%C4%9E%C3%9CSE_MUHAREBE_VE_G%C3%9CVENL%C4%B0K_UYGULAMALARINDAK%C4%B0_YER%C4%B0"><img alt="Research paper thumbnail of GÖĞÜS GÖĞÜSE MUHAREBE VE GÜVENLİK UYGULAMALARINDAKİ YERİ" class="work-thumbnail" src="https://attachments.academia-assets.com/57605484/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/37621781/G%C3%96%C4%9E%C3%9CS_G%C3%96%C4%9E%C3%9CSE_MUHAREBE_VE_G%C3%9CVENL%C4%B0K_UYGULAMALARINDAK%C4%B0_YER%C4%B0">GÖĞÜS GÖĞÜSE MUHAREBE VE GÜVENLİK UYGULAMALARINDAKİ YERİ</a></div><div class="wp-workCard_item"><span>Eurasian Academy of Sciences Social Science Journal</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tar...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="a26162b550213e46f9ce7fb9d5957395" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":57605484,"asset_id":37621781,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/57605484/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="37621781"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="37621781"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37621781; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37621781]").text(description); $(".js-view-count[data-work-id=37621781]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37621781; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='37621781']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "a26162b550213e46f9ce7fb9d5957395" } } $('.js-work-strip[data-work-id=37621781]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":37621781,"title":"GÖĞÜS GÖĞÜSE MUHAREBE VE GÜVENLİK UYGULAMALARINDAKİ YERİ","translated_title":"","metadata":{"volume":"19","abstract":"Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.","page_numbers":"41-54","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Eurasian Academy of Sciences Social Science Journal"},"translated_abstract":"Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.","internal_url":"https://www.academia.edu/37621781/G%C3%96%C4%9E%C3%9CS_G%C3%96%C4%9E%C3%9CSE_MUHAREBE_VE_G%C3%9CVENL%C4%B0K_UYGULAMALARINDAK%C4%B0_YER%C4%B0","translated_internal_url":"","created_at":"2018-10-21T10:06:59.115-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":95615525,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":57605484,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605484/thumbnails/1.jpg","file_name":"gogus-goguse-muharebe-ve-guvenlik-uygulamalarindaki-yeri201807.pdf","download_url":"https://www.academia.edu/attachments/57605484/download_file","bulk_download_file_name":"GOGUS_GOGUSE_MUHAREBE_VE_GUVENLIK_UYGULA.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605484/gogus-goguse-muharebe-ve-guvenlik-uygulamalarindaki-yeri201807-libre.pdf?1540141735=\u0026response-content-disposition=attachment%3B+filename%3DGOGUS_GOGUSE_MUHAREBE_VE_GUVENLIK_UYGULA.pdf\u0026Expires=1742161271\u0026Signature=Tv8nDmVoZ877C~GLz9WR-QKdo-2Fk3nXqQH378tLlsDkdNTHxTUMr0ZcHml5iiffNj-0mLoAxbYa-a0IMEgsWJOarKmpAWJB2gsbJZb7jKlmZvFWGtsFSYPNbF1PaAKWHJCCdeoQ3XX91slx2qZysi3av~p7-WUoceokgXN8k3ERv3XVP8CtcMD4osKYQ9d-xLcFPSZUIVfvxfl9yzDBkb2fA~F3fHbFszC05msElHkjqRXYQsjAo1-Ojbmeny~A28pjk48NY9VEcYMQR3Aslfj8n4S-hKfcZGjTM0J1sZr2KBX1j2LqjDmiMr9KS-0s5Rt5n6nhe-2fKaGtUFo~gQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"GÖĞÜS_GÖĞÜSE_MUHAREBE_VE_GÜVENLİK_UYGULAMALARINDAKİ_YERİ","translated_slug":"","page_count":14,"language":"tr","content_type":"Work","summary":"Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.","owner":{"id":95615525,"first_name":"M. Kubilay","middle_initials":null,"last_name":"Akman","page_name":"MKubilayAkman","domain_name":"ugr","created_at":"2018-10-21T10:04:49.925-07:00","display_name":"M. Kubilay Akman","url":"https://ugr.academia.edu/MKubilayAkman"},"attachments":[{"id":57605484,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/57605484/thumbnails/1.jpg","file_name":"gogus-goguse-muharebe-ve-guvenlik-uygulamalarindaki-yeri201807.pdf","download_url":"https://www.academia.edu/attachments/57605484/download_file","bulk_download_file_name":"GOGUS_GOGUSE_MUHAREBE_VE_GUVENLIK_UYGULA.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/57605484/gogus-goguse-muharebe-ve-guvenlik-uygulamalarindaki-yeri201807-libre.pdf?1540141735=\u0026response-content-disposition=attachment%3B+filename%3DGOGUS_GOGUSE_MUHAREBE_VE_GUVENLIK_UYGULA.pdf\u0026Expires=1742161271\u0026Signature=Tv8nDmVoZ877C~GLz9WR-QKdo-2Fk3nXqQH378tLlsDkdNTHxTUMr0ZcHml5iiffNj-0mLoAxbYa-a0IMEgsWJOarKmpAWJB2gsbJZb7jKlmZvFWGtsFSYPNbF1PaAKWHJCCdeoQ3XX91slx2qZysi3av~p7-WUoceokgXN8k3ERv3XVP8CtcMD4osKYQ9d-xLcFPSZUIVfvxfl9yzDBkb2fA~F3fHbFszC05msElHkjqRXYQsjAo1-Ojbmeny~A28pjk48NY9VEcYMQR3Aslfj8n4S-hKfcZGjTM0J1sZr2KBX1j2LqjDmiMr9KS-0s5Rt5n6nhe-2fKaGtUFo~gQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":521198,"name":"Self Defense","url":"https://www.academia.edu/Documents/in/Self_Defense"},{"id":1710242,"name":"Close Quarters Combat","url":"https://www.academia.edu/Documents/in/Close_Quarters_Combat"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; } .sign-in-with-apple-button > div { margin: 0 auto; / This centers the Apple-rendered button horizontally }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "08953c77d4b8e51501b12a3a391888938a4041ba054edf3418493c2a7115dcb7", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="a4_gxdaDhyWmED2X7A0TTnr_hFRendX6yZC0CURmAhGkCKuHCmHuiy0F5TzdXxPNRSSwGs4nntTsHvzaOCV5gg" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://ugr.academia.edu/MKubilayAkman" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="Sx7l8AoJoBtqHjFgjg8HgBIV3W4irdZlHaAnTiMozEOEma6y1uvJteEL6cu_XQcDLc7pILIXnUs4Lm-dX2u30A" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2025</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>