Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 06 2014
Journal Name
2nd International Conference On Innovation And Entrepreneurship
Is the Organizational Performance of Small Businesses Influenced by HRM Practices and the Governmental Support? A Case of Small Manufacturing Businesses in Malaysia
...Show More Authors

YY Lazim, NAB Azizan, 2nd International Conference on Innovation and Entrepreneurship, 2014

View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Management Representations Effect on Auditor Responsibility: Applied Research in a sample of Companies under Control and Audit of BSA and private sector auditing offices
...Show More Authors

Management Representations Letter plays a significant role as an evidence to get conclusions the Auditor is looking for. These conclusions could show the professional opinion of auditor over the fairness and integrity of financial statements for many issues and numbers that management claims, Hereby, the research aims at highlighting the importance of Management Representations Letter and the way of using as an evidence with expressing its meaning and means of application in addition to identify the Responsibility of Auditor on that Letter, This research discusses also the effect of Management Representations Letter on the credibility of financial statement and enhancing the credibility of the submitted reports, From other side, in the t

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 04 2026
Journal Name
Journal Of Physical Education
Analytical Study of Goalkeeper Positioning Using MH System for Free Kick in Soccer
...Show More Authors

View Publication
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Evaluation of Maintenance Management in Iraqi Governmental Buildings
...Show More Authors

Impact of buildings in Iraq and other countries on the environment is obvious; this problem began to take scientific and humanitarian dimensions in order to reduce and eliminate this problem. This impact can be seen through the energy, water and raw materials consumed for the establishment, operation and maintenance of these buildings, as well as the emissions of hazardous gases and generations of solid wastes.

This work was conducted to assess the current maintenance managerial practice for the governmental buildings to stand on the main obstacle and extrapolation of measures by means of interviews with experts to determine the effective factors and closed questionnaire to state the features and the need for new

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The nature of financial system Is it an necessity or A selection?
...Show More Authors

   The Financial systems can be classified into two types. The first is the market–oriented, which is applied in United States and United Kingdom. While the second is bank-oriented as in Japan and Germany.

   This study tries to explain the reasons which make some countries adopt the first one instead of the second, and the contrary. So the study consists of three sections. The first deals with the concept of financial system and it are functions. The second displays the indicators which are used to classify the financial systems, while the third one is devoted to the factors that determine the type of financial system .These sections followed by some conclusions.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Conference
Identifying Causes of Variation in Construction Industry Based on Questionnaire
...Show More Authors

Publication Date
Sat Apr 29 2023
Journal Name
Research Journal Of Pharmacy And Technology
The Wound Healing effect of the Green Synthesized Iron Oxide Nanoparticles: A Study on Mice
...Show More Authors

The extract of fig fruit has shown significant medical usefulness in various fields. The entrance of nanotechnology into the field of medicinal and pharmacology has shown remarkable advantages. Plants contain diverse molecules thatcan reduce metals, and provide a safe, eco-friendly approach for synthesizing nanoparticles. Iron oxide nanoparticles (IONPs) have been reported to possess an antimicrobial effect against some strains of bacteria and moulds. We have aimed to synthesize IONPs from fig fruit extract and investigate the influence of fig extract and IONPs in wound healing of mice. UV-Vis spectroscopy, X-ray diffraction (XRD), and field emission scanning electron microscopy were used to characterize the IONPs that were produced

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref