Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Mediating Role of Managing the High Involvement Management Between Organizational Power and Negotiation StrategiesAnalytical Research of the Views of a Sample of Leaders of the Iraqi Ministry of Industry and Minerals
...Show More Authors

The research aims to test the relationship and impact of High Involvement Management as an independent variable in negotiation strategies as a response variable, at the headquarters of the Iraqi Ministry of Industry and Minerals in Baghdad Governorate, and then trying to come up with a set of recommendations that contribute to strengthening the negotiations carried out by the ministry’s leaders and based on the importance of the topic of research in public organizations and the importance of the surveyed organizations to the society. The descriptive-analytical approach was adopted in the completion of this research, and the research included a sample of (180) leaders of the Iraqi Ministry of Industry and Minerals, and data was

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jan 21 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Environmental parameters drive the phytoplankton community structure: a case study in Baghdad Tourist Island Lake, Iraq
...Show More Authors

Phytoplankton community is a model for of monitoring  aquatic systems and interpreting the environmental change in aquatic systems. The present study aimed to forecast environmental parameters that drive the change of phytoplankton community structure in the lake. The present study was carried out in Baghdad Tourist Island Lake (BTIL) for the period From October 2021 to May 2022. The study included the quality and quantity of phytoplankton, moreover, the highest and lowest value of the physical and chemical parameters were (Water temperature (13-30 °C), Light penetration (94-275cm), electric conductivity (837-1128 µS/cm), salinity (0.5-0.7 ‰), pH (7-8.2), total alkalinity (126-226 mg CaCO3/L), total Hardness (297-395 mg CaCO3/L

... Show More
Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
A Linear Programming Method Based Optimal Power Flow Problem for Iraqi Extra High Voltage Grid (EHV)
...Show More Authors

The objective of an Optimal Power Flow (OPF) algorithm is to find steady state operation point which minimizes generation cost, loss etc. while maintaining an acceptable system performance in terms of limits on generators real and reactive powers, line flow limits etc. The OPF solution includes an objective function. A common objective function concerns the active power generation cost. A Linear programming method is proposed to solve the OPF problem. The Linear Programming (LP) approach transforms the nonlinear optimization problem into an iterative algorithm that in each iteration solves a linear optimization problem resulting from linearization both the objective function and constrains. A computer program, written in MATLAB environme

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Ability of the Independent Auditor to Audit the Application Requirements of Electronic Commerce
...Show More Authors

The purpose of this research is to determine the extent to which independent auditors can audit the requirements of e-commerce related to (infrastructure requirements, legislation and regulations, tax laws, and finally human cadres). To achieve this, a questionnaire was designed for auditors. Numerous statistical methods, namely arithmetic mean and standard deviation, have been used through the implementation of the Statistical Packages for Social Sciences (SPSS) program.

The research has reached several results, the most important of which are: There are noobstacles to enabling the auditor to audit the application of the e-commerce requirements as well as the respective(infrastructure requirements, legislation and regulations, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protec

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Effect of Dam Height on The Stability of Earth Dam (Case Study: Karolinka Dam)
...Show More Authors

The Karolinka earth-fill dam was constructed between 1977 and 1984 on the Stanovnice river above the town of Karolinka in the region of Vsetínsko in Czech Republic. Because of leakage on the downstream dam face due to technological indiscipline when filling dam layers during the dam construction stage, there were some steps to improve state dam safety. The final rehabilitation is to construct the diaphragm walls from self-hardening cement-bentonite suspension along the length of the dam. In addition to connecting the gallery and abutment (2 × 25 m long) by using jet piles. The article presents numerical modeling of safety factor evaluation associated with the state of the dam body and foundation; before, and after seal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Openness and the Degree of Impact on Engagement Learner Department of Architecture Case Study
...Show More Authors

        This paper concerns with openness concept in contemporary learning environment, which ranges from physical characters to its relation with learning efficiency and its output. Previous literatures differ to clear the effect of openness on the engagement between learner within themselves, and with this kind of spaces. Engagement means: active participation, the ability of making dialogue, self-reflection and the ability to explore and communicate with them and
within learning space. Research roblem was: The lack of knowledge about the effect of Openness on learner engagement with learning spaces. The two concepts were applied on three types of learning spaces in the Department of the Architectu

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 22 2025
Journal Name
Bulgarian Journal Of Agricultural Science
The economic impacts of the post-harvest losses of tangerines and Seville oranges crops in Iraq (Baghdad Governorate: As a case study)
...Show More Authors

This study aims to calculate the percentage of loss and its causes of the horticultural crops tangerines and Seville oranges in Baghdad governorate for the 2020 agricultural season and estimate the economic impacts of losses both crops tangerines and Seville oranges at the study samples level. The research followed both methods descriptive and the quantitative mathematical in estimating the loss of horticultural crops from tangerines and Seville oranges trees and calculating the economic impact of this loss. The results showed that the percentage of losses of tangerines and Seville oranges crops on the level of wholesalers was about 12% and 13% respectively; causing economic losses estimated at about 3184.41 Euro. The results also displayed

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate