نویسندگان: مصطفی اسماعیلی

کلید واژه ها: Security strategy Content Analysis Syrah Shiite Infallible Imams

حوزه های تخصصی:
شماره صفحات: ۶۹ - ۸۸
دریافت مقاله   تعداد دانلود  :  ۳۹

چکیده

This paper seeks to study the security strategies in the Syrah (The life conduct) of the Shiite Infallible Imams. Since one of the most important Shiite sources in understanding the life of the Infallibles Imams are the four books of hadith regarded as reliable by the Shi'as (Al-Kutub al-Arbaʿa), so this study have been analyzed these books in terms of case study. The research question is as follows: What security strategies did the Infallibles Imams use during their Imamate and what are the features of these security strategies? The research method used in this study is content analysis. The results of this research show: According to their historical circumstances, the Infallibles Imams have used these four security strategies: Alavi, Expediency, Order Good and Forbid Evil and Taqiyya.

تبلیغات