Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educational system, indeed, is closely connected with the culture of society. The study also gives an in-depth look at some concepts, mainly education, security, educational security, and sources of threat such as novelties, alternative religions, ethical system destruction, and curriculum distortion. It also attempts to provide a cursory account of the different effects of educational threat and presents some suggestions.
The mediation system is based on settling the dispute amicably through the intervention of a third party by bringing views closer away from the judiciary, which is an amicable way to settle disputes, which disputants resort to voluntarily, but some Western legislation has begun to impose resorting to mediation to settle disputes compulsorily, to take advantage of its advantages, get rid of the disadvantages of resorting to the judiciary in some disputes, and relieve pressure on the courts.
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreObjective: The aim of this study is to determine the means and the difficulties faced by students of
nursing maternal and child health nursing / College of Nursing / University of Baghdad in obtaining scientific
information in practical training.
Methodology: A purposive sample of (100) Nursing college student - Maternal and Child Health Nursing
Department were selected. Data were collected through the use of the questionnaire form during the
period from the November 2010 to April 2011. Descriptive statistical procedures were used to analyze the
data.
Results: The results showed that the highest percentage of members of the study sample aged between
(20-21 years), females are the most inhabitants of the city of Ba
The study aimed to highlight the reality of the functional pressures with its dimensions (role ambiguity, role conflict, role burden, glass ceiling, and discrimination in composition). The researchers also relied on the questionnaire as a essential tool for data collection. The field study was conducted at the University of Mohammed Khiedr - Biskra -, the study was conducted on the basis of the total survey, which included all the workers of the 6 faculties of Biskra University (523 female employees).
After the analyzing of the data using the version 21 of the statistical program Spss, The study reached a number of results, the most of them is the low level of the functiona
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
1- The degree of self-control of the educational counselors.
2- The level of work pressures that educational counselors are exposed to from their point of view.
3- The significance of the differences in the degree of self-control and work pressures according to the gender variable (male / female).
4- The relationship between self-control and work stress for the sample as a whole.
The current research was limited to educational counselors of both sexes in Anbar Governorate, Ramadi District, affiliated to the Anbar Education Directorate. The researcher adopted the steps of the relational descriptive approach to achieve the research objectives. The current research community consists of (100) m
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More