Preferred Language
Articles
/
jRdEpY4BVTCNdQwCTFbj
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.

View Publication
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
The Use of Social Networking sites in the Marketing of Values Analytical : Study of the Official Pages of the Ministry of Culture, Tourism and Antiquities and the Ministry of Labor and Social Affairs on Facebook
...Show More Authors

The social networking sites have brought about fundamental changes and a qualitative shift in the marketing industry and its strategies. The Iraqi ministries have used this site i.e. Facebook to spread and disseminate values in order to consolidate it in Iraqi society which has witnessed many changes in all aspects of life.

   The researcher studies the pages of both ministries to know the values contained in the publications of the pages of these two ministries, the quality of grooming as well as the forms in which these values are marketed.

     The researcher uses a survey method and content analysis for the publications of these two pages during the study period starting from January 1, 2

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Emotional Trends, and Emotional Exhaustion in organizations: (Developing foundations the philosophy and thinking in organizational behavior)
...Show More Authors

Emotional exhaustion considered one of the critical factors in the formation and composition of organizational behavior of individuals within organizations, as well as social behavior and psychological, and emotional exhaustion is one of the three components of burnout, as well as depersonalization (cynicism) and low achievement, the emergence of research relevant to this concept began at the beginning of the seventies of the twentieth century, then started to become clear features in the eighties it. This research aims to build intellectual framework for draining emotional exhaustion through highlight on most important philosophical contents, as well as review and analysis of some models associated with this concept, and then a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
THE IMPACT OF MANAGEMENT CONTROL SYSTEMS (MCS) ON ORGANIZATIONS PERFORMANCE A LITERATURE REVIEW
...Show More Authors

The impact of management control systems (MCS) on organizations performance empirical research has been the subject of numerous studies during the past decade in developed and emerging economies. In the contemporary competitive, complex and changing global business environment, firms are being challenged to adopt business models that enable them to address the strategic uncertainties and risks they face in their business environments. The main issue of this study is that management accounting researchers argue that one of the ways firms can continually rejuvenate themselves to survive and succeed in these complex and uncertain environments is to understand the role of management control systems in Formulating a b

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate
...Show More Authors

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Logic in the philosophy of ethical behavior in business organizations
...Show More Authors

Logic in the philosophy of ethical behavior in business organizations

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The American vision of the Non-governmental Organizations in Iraq
...Show More Authors

The American vision of the Non-governmental Organizations in Iraq the topic area of that’s paper dealing with Civil Society as concept and practice, its already consider as Western concept and associated with liberalism and political development, they are many definitions of its but most significantly is all organizations, agencies, trade unions and non-governmental institutions, that’s agencies were established after 2003 and received funds from United States and UN development agencies. The non- governments organizations played a significant role as support and develop many cultural, healthy, educational, and social projects, also that’s organizations try to reduction the effects of terrorists actions especially after ISI

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
The reality of Figure and content in the design of logos, civil society organizations
...Show More Authors

Civil society organizations in Iraq have become a community hard case dispensable as the link between the state institutions and their leaders, and between citizens of different orientations and age groups, as it represents the diversity of the terms of reference and understanding of the laws and standards of Universal Declaration of Human Rights, which requires governments to provide supplies president of its citizens to live in dignity, direct and Msasha in the life of society and the dictates we scientific our role in achieving scientific benefit and transfer of expertise to the community has become imperative for the researcher to campaign in the midst of the scientific research of the slogans of those or

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of banking Compliance in combating money laundering and terrorist financing: An applied research in a sample of Iraqi banks
...Show More Authors

       The purpose of this research is to demonstrate the impact of banking compliance in combating money laundering and terrorist financing through banks. The phenomenon of money laundering and terrorist financing has received wide attention in the countries of the world and international organizations because of the negative effects this phenomenon has on the global economy as a result of exploiting developments and modern banking operations to pass Money laundering and terrorist financing operations in order to legitimize illegal funds and obliterate their criminal sources, which obliged the banking sector to increase control measures in order to reduce these operations, which conceal money laundering thr

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref