The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Background: Type 2 diabetes mellitusand chronic periodontitis hold a close relationship that has been the focus of many researches. Currently there is an appreciation to the role of adipose tissue-derived substances "the adipokines" in immune-inflammatory responses; also, there is an interest in using the simple non-invasive saliva in diagnosing and linking oral and general health problems. The current study aims to determine the periodontal health status in the chronic periodontitis patients with and without poorly or well controlled type 2 diabetes mellitus, measure the salivary levels of two adipokines "leptin and resistin", pH and flow rate and then correlate between these clinical periodontal, biochemical and physical parameters in eac
... Show MoreCommunication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has p
The Early – Middle Miocene Ghar and Lower Fars sedimentary succession at the representative oil-well Nu-18 of the Nahr Umr oil field south Iraq; is taken by this study to investigate the sedimentological to reservoir rock facies buildups and related reservoir zonation; as first rock-typing attempt for the both formations. The sedimentological characterization of the Early Miocene Ghar formation is mainly comprised by successive buildups of sands-gravels and sandstones, whereas; the Middle Miocene Lower Fars formation is started by limestone, limestone-marly/marl anhydritic, upgraded into interbedded-series of marl and anhydrite facies, with less-common occurrences of thin-sandstone interlayers, terminated by marl-sandy-secti
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r
... Show MoreThe research aims to Applied Study in the nature of the impact of information asymmetry for brokerage firms in the common stock trading, The research included the theoretical concepts associated with each of the brokerage firms ,information asymmetry and common stock trading, It used the financial methods on the practical side of the information asymmetry for brokerage firms based in the sector as well as trading volume and spread for common stock , The community of the research included the Iraq Stock Exchange,the sample of research the companies listed which have been trading on its stock for the period August 2015 until December 2015 as well as brokerage firms
amounting to 47 brokerage firm. The resea
... Show MoreThe research deals with the important and modern two subjects, strategic leadership which have six demotions and knowledge management
(four demotions') . the gools & the research is to know the relation & the effect them in the oil ministry (project department) , the sample was (50) persons who works in the department the questionnaire was the tool of data gathering .
The research divided to four parties, the first to the theotical review of the research variables, the second to the research methrology, the third to analysis and discoed the empirical results the last to the conclusions and recommendations .
The importance of the accounting profession in creating data and accounting information for economic resources and their sources and changes therein , through the effectiveness of this information and the degree of suitability and providing accurate and timely manner and in a form that makes it able to rationalize decisions and performance reporting , and there are several elements and behaviors control how the effectiveness of these reports and these behaviors work ethic that govern the work of management accountant when preparing performance reports , which are the ethics of the work of professional control principles and rules of accounting , legal, such as objectivity and reliability , neutrality and timeliness that must be a
... Show More