The objective Effect of Internal and External Environment and its Psychological & Practical Reflection on the Political Decision-Making Process
The research problem is that the traditional methods of internal auditing are somewhat heavy with long and rigid procedures for the members of the audit process team, especially in light of the current developments that are reflected in the business environment and internal audit reports, so it is necessary to reconsider the traditional internal audit work method and assess the extent of its development by agile methods to reduce the time of the audit process on the activities and elements that add value and direct the effort and time to the activities and elements that add value to the work of the economic unit and the report of the internal auditor.
The research aims to study the possibility of applying agile internal auditing
... Show MoreAbstract
Objectives: The main objective of this study is to find the influence level of nursing incivility on psychological well-being among nurses in southeastern Iraq.
Methods: In this descriptive correlational study, a convenience sample of 250 nurses working in three government hospitals in Missan province in the south of Iraq were surveyed using the nursing incivility scale (NIS) and Ryff's psychological well-being scale (PWB) from November 2021, to July 2022. A multivariate multiple regression analysis was done to analyze the multivariate effect of workplace incivility on the psychological well-being of nurses.
Results: The study results show a
... Show MoreThe research aims to demonstrate the impact of internal audit in Iraqi economic units on enhancing social performance reports, through the statistical models used, as a survey list (for the independent variant) of the search, which contains five axes of each axis, contains a set of The questions were prepared on the basis of the standards issued by the Institute of Internal Auditors (IIA) and were distributed to a sample of internal auditors, as for (for the approved variable) the researcher obtained numerical data represented by the financial statements of the research sample and used statistical models such as model (Kolmakrov-Smirnov) is a good match (goodness of fit) which assumes that the data is distributed naturally as wel
... Show MoreAbstract: This study aims to identify mainly the experience of development of the state of Zimbabwe. The purpose of this study is to explain African studies in our Arab countries . The approach followed in this study is analytical description using also the comparative method as needed. This research division an introduction ,fourth topics and conclusions .The first dealt with the geographical location of the state of the Zimbabwe and explain of the main cities and a general introduction to the Republic of the state of Zimbabwe . The second section reviewed the historical development since the advent of colonial British colonialism and the declaration of Rhodesia Nyasaland in 1953 . As well as to clarify the position of stats and interna
... Show MoreRMK Al-Zaid, AT Al-Musawi, SJ Mohammad
Abstract:
The aim of the research is to demonstrate the impact of the salary localization service in enhancing banking competitive advantage. In order to achieve this goal, salary localization was chosen as an independent variable and its impact was studied on the dependent variable, which is the competitive advantage. The research problem lies in the fluctuation of the salary localization service from one bank to another and the impact of this on the competitive advantage. The study sample included five private Iraqi banks, namely (the National Bank of Iraq, the International Development Bank, Assyria International Bank, Al Khaleej Commercial Ban
... Show More
This present work adopts the analytic and descriptive methodology to recognize and analyze the major challenges faced by the Iraqi government. The study focuses on the press and national partiers’ cabipility of changing and unifying the opinions of the public in a way that serves the Iraqi interest, taking into account the fact that the press is the fourth authority after the three major authorities, (Executive, Legislation and Judicial). The researcher has concluded that the Iraqi press and parties initiated a national front with the Iraqi people against the government’s signature of the treaty of (1930). The national front illustrated that signing the treaty strengthens the authority of the British occupation u
... Show MoreThe aim of this study to conduct the effects of fimbrial and lipopolysacchride (LPS) immunization is on the pathohistological changes in rabbits, Fifteen rabbits of both sexes (Weight 1500-2000 gm) divided into three groups (5 animals of each group). The first group was immunized by 1ml (200µg /animal) of fimbrial subcutaneously the second group gave 1 ml ( 200 µg /animal) LPS while the third group was left as negative control group that injected 1 ml phosphate buffer control subcutaneously. First and second groups recived the same dose after two weeks give as booster dose. All animals challenged after 5 weeks of immunization by5X107CFU/ml Proteus vulgaris intra peritoneally .After 7 days from challenge all the animals, sacrificed for hi
... Show Moreالخلاصة
تتناول هذه الورقة مخططات وسياسات الاستيطان في الضفة الغربية والقدس الشرقية منذ العام 1967، عبر سياسات قادها حزب العمل وأكملها حزب الليكود وكاديما وبقية الأحزاب الإسرائيلية، تلك السياسات التي استهدفت فرض السيطرة السياسية الكاملة على الأرض، وما نتج عن ذلك من سيطرة حصرية على الأرضوتقييد استخداماتها، ومحاصرة الوجود الفلسطيني والتضييق عليه، وتحويل مراكز ال
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More