Preferred Language
Articles
/
6hjKbZYBVTCNdQwCnINw
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and international issues and positions, as well as the collapse of political infrastructure and the emergence of many challenges that threaten Iraqi societal security and civil peace.

View Publication
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Public Policy Education in Iraq / Reality Challenges and Proposed
...Show More Authors

The policy issue in all countries of the world is concerned with government and research because it has the ability to reveal many of the problems facing the state and its organizational and scientific capabilities in the development of solutions and appropriate treatments that go beyond random and improvisational reactions, As a result of this interest, many studies have attempted to conceptualize and academicism it. The concept of public policy has been linked to various aspects of social life such as social, economic, educational, agricultural or other aspects. Public policy, regardless of its meaning or its relation to aspects of life, refers to the systematic thinking that directs the behavior and actions of the state, organization

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2025
Journal Name
Tanmiyat Al-rafidain
Managerial Accounting under Digitalization and Sustainability Challenges: Literature Review
...Show More Authors

The study aims to review the literature on the fundamental changes in Managerial Accounting (MA) in light of accelerating Digital Transformations (DT) and increasing Sustainability Requirements (SR) from 2020 to August 2025, with the purpose of informing researchers and professionals about recent developments. The study relied on a qualitative analysis of the content of a group of studies indexed in the Scopus database. The study included a literature review of topics such as artificial intelligence tools and techniques, cloud computing, linear programming, sustainability reporting, and strategic managerial accounting practices. The study results revealed that accelerated DT improves the efficiency of managerial accounting practices

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (64)
Crossref (58)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Signals And Communication Technology
Survey on Twitter Sentiment Analysis: Architecture, Classifications, and Challenges
...Show More Authors

View Publication
Scopus (14)
Crossref (12)
Scopus Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
THE REALITY OF THE AGRICULTURL SECTOR IN IRAQ AND CHALLENGES FACING THE FUTURE
...Show More Authors

سعي المجتمع العراقي منذ أكثر من نصف قرن مضى لإعادة استثمار عشرات المليارات من الدولارات من الإيرادات النفطية في القطاع الزراعي وهياكله وبنياته التحية، كإنشاء السدود والخزانات المائية واستصلاح الأراضي والمشاريع الإنتاجية الحيوانية والنباتية وبطاقات كادت تقترب او تتجاوز حاجز طلب السكان من الأغذية والمنتوجات الزراعية التي تغذي الصناعة الا ان الزيادة السكانية وتحسن مستوى الدخل النفطي شكلا انتقالا جدي

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Measuring university teachers attitudes towards the security man
...Show More Authors

Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 29 2019
Journal Name
مجلة الدراسات الدولية
الرسالة الاعلامية لتنظيم داعش الارهابي : الخطاب المضمون اليات المواجهة الاعلامية
...Show More Authors

يناقش البحث اهم استراتيجيات الماكنة الاعلامية لتنظيم داعش الارهابي الذي استطاع توظيف ثورة المعلومات والاتصالات وبما مكنه من كسر الحدود في العراق وسوريا وتوظيف التناقض الاثني والقومي وبما يمكنه من تمرير اجندته الارهابية الى المجتع العراقيمما يتطلب توظيف استراتيجيات اعلامية تستتطيع التصدي لهذا لاتنظيم الارهابي

View Publication