Investment in Human is one of the best and most important investments as it is renewed and developed resource over time in comparison with depleted material resources. Human resources is considered the part of the population that could be employed economically to contribute in increasing production energies as it is the support pillar of the society and have great energies that construct the society and raise of nations as well as he is distinguished with characteristics of ambitions to freedom.
Iraq is one of the countries that has large number of population in age of work and production and reduce in age dependent classes (children and old people).This dynamic in population led to step
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MorePurpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreDatabase is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r
... Show MoreThis study sheds light on female entrepreneurship in Palestine, and explores the reasons behind its relative weakness as compared with men, and with female entrepreneurship in other countries. This study aims at proposing effective policies and doable measures to enhance female entrepreneurship. Achieving this objective will carry significant impact on employment and economic growth at large, and increase women’s economic participation, scaling up their independence, and demonstrating their skills and abilities, and putting women on an equal footing with men. Furthermore, entrepreneurial activity has increasingly become one of the key drivers of economic development. An increased rate of entrepreneurial activities among women,
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our Prophet Muhammad and his family and companions. And after:
For one of the greatest blessings of God Almighty upon us is the blessing of Islam, which brought people from darkness to light and from injustice and fear to security, justice, stability, and the preservation of blood, symptoms, rights, and sacrifices, because pride, strength, and dignity are what God chose and pleases His servants - namely - adherence to the Islamic religion, and in light of This must be said that the private legal defense (pushing the person) with its Islamic provisions and legislations is one of the great aspects that guarantees the establishment of a safe