Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreToday, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o
... Show MoreThis research deals with a problem of a large degree of importance. As globalization
has caused the emergence of global market for education. And it began the spread of
information technology leaves its impact on the attainment within the school in more than
field.
Therefore, it is necessary to find effective educational leadership could keep up with
developments in the field of education. Therefore this research interested in recognition the
foundations of effective educational leadership in terms of functions, and the preparation of
educational leaders. Accordingly, research has included three chapters, the first chapter
discusses the general frame work of the study contains the problem of the research, its
i
The concept of civil society is one of the relatively recent concepts that have emerged clearly on the political and social arena especially in European countries, where it effectively contributes to the process of democratic transformation through the multiple roles and functions that it exercises, and acts as mediator between the state and the individual. Civil society in essence works to bring about change in society whether it is political, economic, social or cultural .The civil society appeared in Iraq after 2003, as is the case with many concepts that entered Iraq and took upon themselves the building of a democratic Iraq .Accordingly civil society institutions are the entity capable of rebuilding the Iraqi personal
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThe organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve inte
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThe current research aims to identify the Vocational Self of the educational counselors as well as to identify the significant difference in the professional self according to the gender variable (male-female). The researcher adopted the scale of al-hasani (2015), which consisted of (34) items. It was applied to a sample of (300) school counselors (male-female) who were randomly selected from the six directorates in the Baghdad governorate for the academic year 2020/2021. The results showed that the research sample of educational counselors has a vocational self-concept. There are no statistically significant differences in the vocational self-concept between males and females among the educational counselors.
The present research aims at identifying the educational problems and psychological problems of distinguished students at the intermediate level. The research sample consists of (246) students who are randomly selected from four distinguished schools (2) in the Karkh\1 and (2) in the Rusafa\2.
The researcher has constructed two scales for measuring the educational and psychological problems. She ensures the psychometric characteristics of the two scales. Alph-Cronbach and test-retest methodsare used to ensure reliability. Some statistical treatments are used to find out the aims of research. These treatments include the one-sample T-test, two independent samples T-test, and the Pearson correlation coefficient. The results show th
... Show More