Preferred Language
Articles
/
jcoeduw-1331
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Analysis of Regional Development in Abu Ghraib Municipality within the Available Sources
...Show More Authors

The judgment enjoys many potential sources. If we look at these sources with analytical view that enable us to identify the potentials of strength in them which is the existence of features that distinct each place from the other one, which can be considered opportunities that provide the designer and the planner the possibility to design and planning which is based on subs taken from the reality of the available data of the location.
At this point outstands the role of development sources as one of the processes of re-configuring the place which appear as a result of a reality that requires setting new goals for the society and to achieve these goals it takes observations dealing with the place policies that should be taken, so this

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 04 2013
Journal Name
Jordan Journal Of Biological Sciences
Bacteriocin Typing of Staphylococcus aureus Isolated from Different Sources in Ibb City, Yemen
...Show More Authors

Abstract A total of 207 specimens were collected from different sources including patients, health care staff and hospital environment in Ibb city, Yemen. The study used the bacteriocin produced from active producer strains in typing of Staphylococcus aureus. Depending on the morphological, cultural and biochemical characteristics, 54 (26.09%) isolates of Staphylococcus aureus were identified. An antibiotic sensitivity test was done for the bacterial isolates, and the results showed that there were multiple resistant antibiotics. The Staphylococcin production of these isolates has been detected by using wells assay. Fifty one isolates were Staphylococcin producer. Four isolates (staph19, staph25, staph28 and staph43) were chosen as go

... Show More
Preview PDF
Scopus (2)
Scopus
Publication Date
Sun Jan 02 2011
Journal Name
Journal Of Educational And Psychological Researches
Educational Activities and Its Role in Affirm Teaching Subject At The Pupils of Primary Stage
...Show More Authors

The first chapter includes introduce the research and the problem of the research that there are negligence of some educational institutions and schools management  , some parents and supervisors .Also there are some educators who believes that school activities are obstacles means to learning and prevent pupils from studying and understanding the subjects. That may due to social , psychological and educational reasons

The purposes of the researches come from the reports of supervision visits which indicate a lot of difficulties faced by pupils and teachers related to education activities  and its influence on in education  and the necessity of indentify these difficulties and remedy them

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Educational values prevailing in small games for kindergarten
...Show More Authors

The research aims to identify the educational values prevailing in the small kinetic games for the children of Riyadh, and to categorize the educational values of the kinetic games small children Riyadh. The research analyzed the content of a number of small kinetic games that included studied physical education at the two pre-kindergarten and stipulated by the Platform for kindergartens, which is being applied. The content analysis was used by analysts agreement with themselves over time (21) days. The agreement between the external researcher and analyst. The researcher used the Cooper to extract equation lab agreement between the researcher and the outside analyst, has reached agreement on determining factor idea and label values (0.8

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2024
Journal Name
Journal Of Kufa Legal And Political Science
The Legal Regime of Mandatory Mediation as a Means of Dispute Resolution – A Comparative Analytical Study
...Show More Authors

The mediation system is based on settling the dispute amicably through the intervention of a third party by bringing views closer away from the judiciary, which is an amicable way to settle disputes, which disputants resort to voluntarily, but some Western legislation has begun to impose resorting to mediation to settle disputes compulsorily, to take advantage of its advantages, get rid of the disadvantages of resorting to the judiciary in some disputes, and relieve pressure on the courts.

Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
مجلة الباحث
"The Pinkerton Agency" and its security activities in the United States of America 1850-1899
...Show More Authors

Fast economical developments in the US. in second half of nineteenth century contained many social results, such as increasing of stealing and killing crimes and expand of Labor strikes, which resulted in violence actions, and presented acceptable reason for emergence specialist security agencies, first of them "Pinkerton Agency". which played important role in all of that, besides that .. its role in American Civil War such as discovering an attempt to kill elected republican president Abraham Lincoln. This research studied all that aspects, focused on period of 1850 - 1899 of agency's history.

View Publication