Atheists have spread in the modern era, so that atheism has become a bad phenomenon in the world in general and in Islamic societies in particular, so the research aims to study the individual and social effects left by atheism on the atheists themselves, and the research included multiple axes: atheism linguistically and idiomatically, atheism in the Qur’an Noble and Modern (and Contemporary) Atheism Statistics: and the reasons for atheism: Studying the phenomenon of atheism in Iraq as a model, then studying the effects of atheism: on the individual first, then atheism and its impact on society, then the conclusion, recommendations, sources and references
: Summary Iraq suffered under the British administration during the First World War and its entry into an occupation of economic backwardness, and this economic backwardness was linked to the phenomenon of linking Iraq economically to the capitalist world by keeping it as a source of raw materials and a market for capitalist goods, and that the occupation authorities controlled Iraq's economic goods and wealth and mocked them to serve its interests and achieve their political and economic goals that it drew before the war.
Most studies and research have tried to shed light on unemployment and employment in general, with less focus on the problems facing working women and the resulting social and economic consequences that threaten their human and professional lives. For women, working is one of the basic necessities for the sustainability of human life, and it constitutes an essential axis for both sexes and through it. It also gives a person the status and social status where the individual finds a ready opportunity to practice his intentions and desires, test his abilities and talents, and achieve his ambitions. The availability of full employment in general and the joining of women to the labor market is an important and fundamental factor in the sustai
... Show MoreABSTRACT
Threw this research to the following:
1 - Know the impact of strategy Puglia in the collection of the rules of the Arabic language
students at the Institute of preparation parameters .
2 - Know the impact of the retention strategy in Puglia collection rules Arabic language
students at the Institute of preparation parameters .
To verify the status Mmermaa Find researcher Elsafreeten following two hypotheses :
1 - There is no statistically significant difference between the average score for the collection
of the fourth grade students at the Institute for the preparation of material parameters who
were studying grammar strategy Puglia and average grades collectible fourth grade
students at the Institu
You Mohammed, you're prophet of God and I'm Gabriel)). With this heavenly call which Mohammed, the messenger of God (may God's mercies be on him), got and when he left Hiraa cave and after getting the aye ((read with your God's name)), a new period of mankind's history started. From that time, the greatest state was established. There was no public treasury and no public financial resources at that time. Abu Baker (God bless him) spent a lot of money to support the costs of the new mission. After Al-Hijra, the bases of establishing the Islamic state were available but it lacked administrative and financial organizing. Therefore the prophet was very keen to find Islamic system which ensures justice and availability of
... Show More The current research aims to highlight the role of human resource management with its practices (human resource planning, selection and placement, training and development, performance evaluation, compensation, and incentives) in raising the level of individuals' performance and its dimensions (task performance, contextual performance, unproductive work behavior, and adaptive performance) by explaining the research problem, which can be limited to the low level of performance of individuals, where the researchers use the descriptive analytical approach and the SPSS program in the practical aspect of the research community represented by the general manager and his assistant
In recent years, the attention of researchers, governments and international non-governmental organizations has focused on the aggressive practices adopted by companies with the aim of evading the tax burden or from paying the tax obligations imposed on them by law, as the results of these practices are negatively affected by tax revenues. And that companies are part of the society in which they work, and they have rights and obligations, including paying taxes. The research community is the Iraqi private shareholding companies, and the research sample was 4 companies within the private sector and in the field and finance - banking, insurance, industrial and service, which are Ashur Bank, Al-Ahlia Insurance Company, Baghdad Soft
... Show MoreIn recent years, the attention of researchers, governments and international non-governmental organizations has focused on the aggressive practices adopted by companies with the aim of evading the tax burden or from paying the tax obligations imposed on them by law, as the results of these practices are negatively affected by tax revenues. And that companies are part of the society in which they work, and they have rights and obligations, including paying taxes. The research community is the Iraqi private shareholding companies, and the research sample was 4 companies within the private sector and in the field and finance - banking, insurance, industrial and service, which are Ashur Bank, Al-Ahlia Insurance Company, Baghdad Soft
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More