The goal of this study is to build an application that can be used in difficult cases and sudden circumstances during the pandemic and post-disaster state, which can be the development of digital risk management and mitigating the difficult impact of the epidemic through the improvement of IT and IoT that can be fine by finding initial solutions and make the world like a digital city that could be managed by the network. We provide this study to gain an overview of reasons for delayed and exceeded costs in a select of thirty Iraqi case projects by controlling the time and cost. The drivers of delay have been investigated in multiple countries/contexts. however, there is little country data available under the conditions that have ch
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreDumping policy considered as one of the policies occurs severe damages to the developing countries apparently this is happens due to the potential weakness in (productive, technical, legislative, legal institutions) comparing with other developed countries who are members in WTO.
Iraq consider as one of the developing countries that has been effected by the dumping policy, the events in Iraq since downfall of the formal regime, and the allied forces domination of Iraq have all together accelerated in the apace of deterioration , particularly , after the temporary coalition authority has forced Iraq to adopt a free foreign trade policy& exclusion of the state from the market mechanism & to consolidate import and deac
... Show MoreThe liability limit liability limit and reinsurance re factors insurance are important in influencing the achievement of company's competitive goals and achieve success and excellence in the market and because the limit of liability and reinsurance aimed to increase output with the stability of inputs leading to increased insurance business and increase profits. The study was based on two variables presidents interact with each other to form the intellectual and philosophical framework has two ( the limit of liability and reinsurance ) . The study was launched from a problem expressed by a number of targeted questions answered from the elucidation of theoretical philosophy and intellectual goals of these variables and highlight the impor
... Show MoreTHE ROLE OF ELECTRONIC-PAYMENT SERVICE PROVIDERS IN THE DEVELOPMENT OF E-BANKING IN IRAQ - AN APPLIED RESEARCH IN CENTRAL BANK OF IRAQ
The figure of personality modes determines its privileged style in the use of modern and advanced technological tools in the process of changing and developing in order to keep up with that. The proses of selection and choosing administrators in the appropriate places are the most important functions of senior management because it is easy to adopt factory buildings or establishments But this is a human world as that of machines world. So it is required to have people in the process of changing those who have a time, Knowledge, skill, ability and strong administrative personal skills, those people (leaders) should to put a clear vision for the selection and application of the change efforts and to create the necessary climate and
... Show MoreThis research aims to determine the importance of the role that agile leadership plays in supporting programs and areas of investment in human capital, as it is the most important type of capital that the organization possesses and achieves returns that are many times the cost it bears, due to its rare and valuable characteristics. Through six behaviours: (humility behaviour, calm behaviour, wisdom behaviour, patience behaviour, objectivity behaviour, trust behaviour). As for investment in human capital, it was measured through its four elements (skills, knowledge, capabilities, experiences). Despite this, the researched organizations suffer from a decrease in awareness of the importance of this type of investment and the role of
... Show More