Abstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emphasizing the emergency of existential threat as it would affect both physical and moral existence of EU security reference whether at individual group, state or identity levels. That ‘s why exceptional arrangements of securing that reference under threat must be pursued which turned to be named in the political and security literature as securitization of clandestine immigration
The importance of this research is to clarify the nature and the relationship between the indicators of financial policy and banking stability in Iraq, as well as to find a composite index reflects the state of banking stability in Iraq in order to provide an appropriate means to help policymakers in making appropriate decisions before the occurrence of financial crises.
Hence, the problem of research is that the fiscal policy has implications for the macro economy and does not rule out its impact on banking stability. Moreover, the central bank does not possess a single indicator that reflects the stability of the banking system, rather than the scattered indicators that depend o
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThe entrance process re-engineering one of the main entrances of administrative and technology appropriate to keep pace with scientific progress and the continuing changes in business environment and for the purpose of achieving the goal sought by the organizations in the pursuit of rapid developments and renewable energy in the market competition by changing its operations and activities of the radical change which contributes to an effective contribution to reducing the cost of product or service taking into account the quality improvement in the management of change to keep the increase value and speed of placing on the market to meet customer needs and desires to achieve a
... Show MoreAbstract
The current research aims to examine the effect of the Adi and Shayer model on the achievement of fifth-grade students and their attitudes toward history. To achieve the research objective, the researcher has adopted two null hypotheses. 1) there is no statistically significant difference at the level of (0.05) between the average score of students of the experimental group who study the history of Europe and modern American history according to the model of Addie and Shayer, and the average scores of the students of the control group who study the same subjects according to the traditional method in the test of post-achievement. 2) There was no statistically significant difference at the level (
... Show MoreThe value of culture in its interaction is composed and formulated according to compatible and incompatible roles which view the identity that adopts that formation although it is in most cases perceived and declared. The attraction and difference characteristic might be implied within subjective and procedural meaning through which it seeks to make the identity mobile subject to identity- shaping cultural causes implying the conflicts that take the shape and culture of real time. As for the end of the twentieth century and afterward where the concepts of hegemony, globalization, cultural invasion, colonial and imperial culture, all these causes made the cultural identity concept appear on the surface of the critical studies as a
... Show MoreThe Transformation of environments surrounding human which called (place), formed an intermediate compresser in forming awareness pictures, human knowledge, culture and thought features, and changing the systems and contexts of human societies, which led to a change the rhythm of life as a whole. So according to that the place will be encodes according to these data for psychological connotations, lead to human sense of harmony with the place in different manner format, here the search problem lies when trying to detect how Iraqi artist deliberating with the place concept, wondering how to investing place in the contemporary Iraqi drawing within its reference dimension, and showing mechanisms from comparative study for the works of two a
... Show MoreThe study aims to identify the uses and the impact of social networking applications and websites on stock markets and their role in defining the details of dealing with stock movement and trading. The study also aims to highlight the role of these networks by increasing confidence in stock markets and companies as well as encouraging and inciting young people to invest in these markets, the study belongs to the descriptive analytical approach, the study population consisted of all current and potential investors in the stock and financial markets in the United Arab Emirates. The study used a questionnaire that was distributed to a number of followers of social networking pages and websites that deal with trading
... Show More