The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Mechanical degradation hampers the practical usage of polymers for turbulent drag reduction
application. Mechanical degradation refers to the chemical process in which the activation energy of
polymer chain scission is exceeded by mechanical action on the polymer chain, and bond rupture
occurs. When a water-soluble polymer and surfactant are mixed in water solution, the specific structures
(aggregates) are formed, in which polymer film is formed around micelle. In this work, Xanthan gum (XG) –
Sodium lauryl ether sulfate (SELS) complex formation and its effect on percentage viscosity reduction
(%VR) was studied. It was found that SELS surfactant reduced the mechanical degradation of XG much
more efficiently than th
This study included collecting of 150 specimens of the Iraqi Bird Bulbule Pycnonotus lecuotis mesoptamiae (Pycnotidae , Passeriformes), from the 1st of November 2004 to 30th of October 2005 in the city of Baghdad and its suburbs, in concern of identifying the internal parasite of the digestive tract of these birds and studying the diseases resulted from the infection. The study showed that the bird Bulbule is Parasitized by Four types of Cestodes ,two of them are recorded in this kind of bird in Iraq for the first time ,Paradicranotinae anormalis and Haploparaxis sp. , and the other two are Raillietina tetragona and Allohymenolepsis sp. ,and by two types of Pin Worm(Trematode) that are identified for the first time in the Bird Bulb
... Show MoreThe aim of the study is to examine the challenges of financing small and medium enterprises in Iraq and subsequently to proffer solutions to mitigate problems. These solutions are achieved by focusing on the role of accounting information on the financial projects in for example, hotel construction, and by providing the necessary accounting information for the concerned parties to finance these projects. In order to highlight the challenges associated with the funding of small and medium enterprises and the role of accounting information in reducing those challenges, a questionnaire was prepared. As the government authorities are the ones responsible for the accomplishment of these projects, a questionnaire form was distributed in the proje
... Show MoreBackground: Joubert syndrome (JS) is a very rare autosomal recessive disorder characterized by agenesis of cerebellar vermis, abnormal eye movements, respiratory irregularities, and delayed generalized motor development. Retinal dystrophy and cystic kidneys may also be associated with this clinical syndrome. The importance of recognizing JS is related to the outcome and its potential complications. This syndrome is difficult to diagnose clinically because of its variable phenotype. Its neuroimaging hallmarks include the characteristic molar tooth sign and bat wing-shaped fourth ventricle
Applications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.
This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidit
... Show MoreThis study addressed the work stress sources and level of the communicator in public relations in governmental institutions in the United Arab Emirates. The importance of this study is the lack of studies on work stress of the communicator in public relations. The study aimed to investigate the work stress source Physical, individual, groups, organizational and Professional source which effect on the performance of communicator in public relations. The researcher used the descriptive approach and questionnaire as an essential tool for collecting information. Some of the important results of the study are The communicator in public relations facing stress in work by 42% which affect on his performance by average level. The organizational
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More