Preferred Language
Articles
/
QkI1xZkBMeyNPGM3n7jF
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Role OF Human Resource managment Strategies In Enhancing Cognitive Skills.
...Show More Authors

Abstract:

 In its theoretical farm, the research adobet  the subject of human resource management strategies  and the cognitive skills. It comes as result of the rapid development which considers it human resource. as main axis in organization , the research in includes ,connective analysis  , between  human resource management strategies  and cognitive skills which is considers one of the new concept that should  be  studied widly so that the organization can be able recognize it as concept and type and its importance for people in the organization.The study method was descriptive and  analytics , it identified collation of hypothesis which were by statist too

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 26 2020
Journal Name
Clinical And Experimental Dental Research
The oral health and periodontal diseases awareness and knowledge in the Iraqi population: Online‐based survey
...Show More Authors
Abstract<sec><title>Objectives

This study aimed to evaluate oral health (OH) and periodontal diseases (PD) awareness in the Iraqi population.

Material and methods

This study was a questionnaire‐based online survey of two weeks duration. The questionnaire was built using a Google platform and was distributed randomly via social media (Facebook and Telegram). The questionnaire consisted of a demographic data section and two other main sections for the evaluation of OH and PD awareness. Each response was marked with “1” for a positive answer and “0” for the other answers. For each respondent, answers were summed to give

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Jun 10 2024
Journal Name
Humanities And Social Sciences Communications
The mediating role of accounting information systems in small and medium enterprise strategies and organizational performance in Iraq
...Show More Authors
Abstract<p>This paper examined accounting information systems (AIS) as a mediator between small and medium-sized enterprises (SMEs) strategies, including (finance source, administrative innovation, organizational culture, developing capabilities levels of SMEs, information source, development of business managers, and technological innovation) and organizational performance. In this quantitative study, 450 self-administered questionnaires were distributed to the managers and owners of SMEs using purposive sampling. Data were analyzed using the structural equation modeling (SEM) method via SmartPLS3 Software. The study offers empirical findings on the importance of AIS as a mediator, considers various factors, a</p> ... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Integrated Framework for technologies to reduce costs and reengineering processes to develop strategies companyes An Empirical Study In some companies affiliated to the Ministry of Oil
...Show More Authors

Began the process of re-engineering processes in the private sector as a way to assist organizations in re-thinking how to run the business in order to improve production processes and reduce operational cost, to get to compete on a global level. That was a major restructuring by further evolution in the use of technology to support innovative operations.

 Entered the technology in all areas of life and different regulations, This led to use as a change in all aspects The companies achieved success and progress today through the use of resources so as to ensure the wishes of the customers and their needs, and the requirements of the market primarily, Which is reflected on the basis of building strate

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Leadership ethics and transformational leadership to develop perceptions of organizational work supportA survey of a sample of the staff of the Ministry of Water Resources
...Show More Authors

The aim of organizational contemporary is development man power active, in spit-of there are littlie resources. But in the Iraqi environment there are too much resources with performance inhabiting. specially in the ministry of water resources (sample of this research), about dryness and lower levels of rivers. There for this study have some important variable, it is ethical leadership & transformational leadership as (independent variable), and Perceived organizational support(dependent variable). Over here to invest with authority on the problem of research, is weakness harmony between employed perception and the pattern of leadership. We find decline in of reaction of organ compound between the variable to weaken high perf

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 15 2021
Journal Name
Studies Of Applied Economics
The Role of Market-Share Management Strategies in Explaining the Stocks Performance Variance of a Number of Industrial Companies- An Analytical Research
...Show More Authors

The study aims to know the nature of the expected relationship between market share management strategies and the variation in the performance of the shares of a number of Iraqi industrial companies listed in the Iraqi Stock Exchange. For the period (2005-2018) in the light of both the monthly closing prices and sales volume during the research period, the (Panel Data) method was relied on through a stylistic test (fixed effects model and random effects model), and the results determined the need to adopt the fixed effects model method for sample data and test Assumptions, the results showed the positive impact of market share according to its strategies on the performance of stocks according to its studied indicators (Treynor index

... Show More
View Publication
Crossref
Publication Date
Fri Mar 18 2022
Journal Name
International Journal Of Health Sciences
Histological and Immunohistochemical Study of the Protective Effect of Virgin Coconut Oil on Cyclophosphamide-induced Immunotoxicity of the Spleen and Peyer’s Patches
...Show More Authors

Publication Date
Fri Sep 29 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Protective Effect of Cranberry Extract against Cisplatin-Induced Nephrotoxicity by Improving Oxidative Stress in Mice
...Show More Authors

   Cranberry (Vaccinium macrocarpon) is a North American natural fruit. consumed as food and used for health promotion and prevention of various diseases. Aim. The present study was designed to evaluate the protective effect of cranberry fruit extract on nephrotoxicity induced by cisplatin in mice by measuring selected oxidative stress markers. Methods. Twenty-eight male albino mice were used in this study. The animals were divided into 4 groups as follows: Group I [Negative Control]/orally-administered normal saline for 7 successive days; Group II [Orally-administered cranberry fruit extract alone (200 mg/kg) for 7 successive days; Group III/Mice IP injection with cisplatin (12mg/kg) on day 7 and; Group IV [Orally-administered cr

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 11 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Protective Effect of Ethanolic Extract of Mentha spicata Against Irinotecan-Induced Mucositis in mice
...Show More Authors

Irinotecan induced-mucositis is an inflammatory event of intestine caused by an increase in concentration of active metabolite 7­ethyl­10-hydroxycamptothecin (SN­38) in the intestine. Irinotecan must first be converted by a carboxylesterase (CES) to the active metabolite (SN­38), which is subsequently glucuronidated by the hepatic enzyme to SN38G. The SN-38G is deconjugated in the intestine to SN-38 via ?-glucuronidase produced by the intestinal bacterial flora, which accounts for SN-38 delayed intestinal mucositis of irinotecan. To study the protective effect of mentha in irinotecan-induced mucositis, intestinal mucositis induced by I.P injection of irinotecan (75mg/Kg/day) for 4 days. Mentha ethanolic extract orally administered to

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Bionatura
Immune-protective effect of topical paquinimod administration against imiquimod-induced psoriasis-like inflammation in mice
...Show More Authors

Psoriasis is a chronic, inflammatory condition that primarily affects the skin, hair, and joints and is associated with significant humanistic and economic consequences. This work induced psoriasis in mice using an imiquimod 5% cream, an immune response modifier that can cause psoriasis-like skin inflammation when given orally. Paquinimod is prepared as an ointment and has been topically given to mice before imiquimod application. In this study, albino mice were allocated into five groups and treated as follows: the control group received only a daily application of cream based on shaved back (62.5mg/2cm) with a daily topical dose of ointment for 14 consecutive days with the oral vehicle. The Imiquimod group received a daily topical

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref