The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.
النظام السياسي اليمني : دراسة في المتغيرات الداخلية
Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreThe research aims to verify the Role of Internal Auditing in Assessing the Risks of Strategic Operations (Acquisition) and then reflect on management decisions. Since all corporations wish to expand, growth and domination of the market may expose them to multiple risks that lead to failure. The research assumes two main hypotheses. First, there is no role for internal audit in evaluating the strategic operations (acquisition). Second, there is no relationship between internal auditing in assessing the risks of strategic operations (Acquisition) and management decisions. The data was collected by using a questionnaire distributed to a group of private bank employees. The statistical analysis regarding research rejected the two hyp
... Show MoreCrime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives
... Show MoreThe current research aims to reveal the impact of the strategy of cooperative integration of fragmented information in the acquisition of physical concepts and science processes among fourth scientific students through the null hypotheses:
1- There is no statistically significant difference at the level of significance (0.05) between the average grades of female students of the experimental group studying physics according to the strategy of cooperative integration of fragmented information and those who follow the traditional method in the test of acquiring physical concepts.
2-There is no statistically significant difference at the level of indication (0.05) between the average grades of female students of the experimen
... Show More
Abstract
The miraculous of al-Quran has been surrounded by the attention of scholars, as it is the one that has astonished the rhetoricians with its eloquence. So , they paid attention to every part of it and hugely they studied it with accuracy in respect to its Surah ad Ayahs. It is considered the most important source from which Arab scholars and early grammarians drew, given their unanimity that it is the highest degree of eloquence and the best record of the common literary language.
Among these sciences is the science of Grammar, and without Qur’an, this science would not have emerged, which later had control over every science of Arabic
... Show MoreThe research aims to know the impact of science, technology, engineering, and mathematics education on both creative thinking and mathematical achievement. To achieve it, the two researchers followed the quasi-experimental approach with an experimental design for two groups, one experimental and the other a control. The research sample consisted of (32) female students from the fourth scientific grade in Al-Intisar Preparatory School for Girls/ AlRasafa, First Directorate. The sample was chosen intentionally and was divided into two groups: a control group studying by the traditional method, their number (16), and an experimental group that applied the STEM approach, their number also (16). There was parity between the two research groups i
... Show MoreThe aim of this work is to study the correlation between the electrons for Li atom in ground state through the calculation of the inter-particle distribution function f (r12) and inter-particle expectation values . By using the f(r12) function for KL shell in both singlet and triplet state .The Fermi hole have been evaluated .In this work the Hartree-Fock wave function (1993) have been used.