The aim of this research is to demonstrate the nature of the interactive relationship between the dimensions of the requirements of economic intelligence Represented by(Administrative and regulatory requirements, human requirements, and technical requirements) The strategic success of banks is represented by (Customer satisfaction, customer confidence, quality of service, growth) In three of the Iraqi banks own bank(Middle East Iraqi Investment, Al Ahli Iraqi, Gulf Commercial), The questionnaire was adopted as a tool for collecting data and information Of the sample (85) Who are they(Director of the Commissioner, M. Director Plenipotentiary, Director of Department, Director of Section, M. Section Manager, Division Officer, Unit Officer),
... Show MoreThe research aims to identify the future teachers' attitudes toward cloud computing in the Kingdom of Saudi Arabia from their point of view. The research adopted the descriptive approach, and a questionnaire was applied to a random sample of (370) male and female teachers in governmental and private general education schools in the Al-Jouf region, Saudi Arabia. The results of the research concluded that the reality of future teachers' attitudes towards cloud computing in the Kingdom of Saudi Arabia from their point of view is very high and that most areas of using computing are in the field of assessment, then teaching, and activities. The challenges of future teachers' attitudes toward cloud computing are recorded at a high level, parti
... Show Moreيهدف البحث إلى تقييم الكفاءة الوظيفية لمؤسسات التعليم الأهلي في أداء وظيفتها بمستوى عالٍ لتشبع حاجة سكان المدينة الذين فضّلوا التعليم الأهلي على التعليم داخل المؤسسات الحكومية مما أدى إلى انتشارها، وصولا إلى أهم الآثار المترتبة على ذلك الانتشار إذ نافست فيه مؤسسات التعليم الحكومي، بل وتنافست المؤسسات الأهلية فيما بينها لتقديم أفضل خدمة تعليمية للصراع من أجل البقاء، وتهدف أيضا إلى إظهار الوجه السلبي ا
... Show MoreThe research aims to get acquainted with the evaluation of the reality of the application of the curriculum axis from among the eight Iraqi academic accreditation standards in a sample of governmental and private universities and colleges in Iraq and to identify the main and secondary reasons for it as well as to provide proposed mechanisms and procedures to help reduce gaps, If the research problem is represented in the weak availability of the requirements of the curriculum axis in universities and colleges (the study sample) due to the weak documentation and successful implementation of them and interest in them is still below the level of ambition, In order to arrive at scientific facts, the researchers adopted the comparativ
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThis research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreThe research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show More