The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
The selective information broadcasting service is one of the important services in libraries and information centers, as it is the link between the source and the beneficiary and between related sources, as it links similar sources through keywords and then sends them to beneficiaries, which contributes to reducing the time and effort spent by beneficiaries in obtaining sources or information. Therefore, the application of this service is an important matter and gives a positive indicator in the progress of the library towards the integration of its services. From this standpoint, this research came to answer some questions, including: 1. What are the outlets for beneficiaries (the research community) in obtaining information sources? 2. Wh
... Show MoreThe research has been based on two main variables (information and communication technology) and the quality of blended education (physical and electronic), aiming to reveal the relationship between four dimensions (physical devices, software, databases, communication networks) and the elements of education represented by (the teacher, the student, the teaching process, curriculum). The methodology and post-analysis-based research were conducted at the Technical College of Management / Baghdad through polling the opinions of a random sample that included (80) teachers out of (86) and the number of students (276) representing a random sample from all departments of the college (for the morning study) out of (3500) stud
... Show MoreThe aim of the research is to know the level of time management application and its impact on the performance of the job, a survey search in the general company for communication and information technology and provide recommendations that help employees to optimize the use of time and improve performance, which is an important element in controlling the various functions of the company. In order to achieve the objectives of the research, the questionnaire was based on two main variables and distributed to a random sample of (44) employees in the company out of (308) employees, thus the proportion of the sample (14%). After collecting the samples from the sample, there are (6) incomplete forms that have been retri
... Show MoreAcute appendicitis is one of the commonest causes of acute abdomen. There is a wide discussion and controversy on the surgical and nonsurgical treatment of acute uncomplicated appendicitis. The aim of this study was to evaluate the efficacy and outcomes of the conservative management of selected cases of acute appendicitis with an antibiotic first plan.
This was a single hospital-based prospective study with a durat
Experience the Islamic financial industry faces many challenges, most notably the lack of proper risk management tools that meet the requirements of legality and economic efficiency advantage from another side, so it requires the search for innovative ways to manage the risk of Islamic banking, Islamic finance industry is manufacture up-to-date, if compared with the financial industry (traditional), which increases the problematic of risk management in the Islamic financial industry nature of treatment which should be compatible with Islamic law, as well as economic efficiency, thereby Progress came the importance of research to highlight the entrance to Islamic financial engineering and the goals sought to be achieved through the use of
... Show MoreThis research attempts to evaluate the role of the information system by highlighting its importance in providing date and information to the tax administration the process of tax accounting for those who are subject to income tax whether they are individuals or companies where the effective information system provides accurate and reliable information in a timely manner.
At the theoretical part of the research, the research approaches the problem of the research represented in that whether the information system, applied in the General Commission for Taxes, is capable of achieving its role in reducing the phenomenon of tax evasion. The existence of a set of things which in the Commission may lead to increase tax evasion by taxpa
... Show MoreIT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditio
... Show MoreThe success of any institution must be based on means to protect its resources and assets from the waste, loss, misuse and the availability of accurate and reliable data by accounting reports to increase its operational efficiency, namely, that the internal control system is considered as a safety valve for top management in any economic unit. The problem is represented by the need for an efficient system, so to ensure its success, there must exist external parties which monitor and evaluate the performance because of its importance by following clear criteria. So, the research problem came to address performance evaluation indicators which are set by the Federal Board of Supreme Audit (FBSA) and identify the extent of its contribution t
... Show MoreReliable estimation of critical parameters such as hydrocarbon pore volume, water saturation, and recovery factor are essential for accurate reserve assessment. The inherent uncertainties associated with these parameters encompass a reasonable range of estimated recoverable volumes for single accumulations or projects. Incorporating this uncertainty range allows for a comprehensive understanding of potential outcomes and associated risks. In this study, we focus on the oil field located in the northern part of Iraq and employ a Monte Carlo based petrophysical uncertainty modeling approach. This method systematically considers various sources of error and utilizes effective interpretation techniques. Leveraging the current state of a
... Show More