The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The role of the academic institution” depending on its intellectual origins on the ideas of Renaissance and Enlightenment philosophers such as Hobbes, Locke, Rousseau and Kant, after mixing it with the critical style of the Frankfurt School. While the Paris School deals with “globalization of security”, “collection and analysis”, and “The link between internal and external security”. Its intellectual origins are based on the approaches of Michel Foucault and Pierre Bourdieu.
Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has
This study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur
... Show MoreThe research aimed to investigate the level of Organizational Cynicism and Job Engagement of Government Schools teachers in Al Zubair district. To achieve this research was conducted on a random sample of (66) items. The statistical package for social sciences (SPSS) was used to analyze and examine the hypotheses. The researcher used many statistical methods to achieve the research objectives, such as simple, multi regression and the research results showed there is a significant impact to teacher's in the schools of the research sample between Organizational cynicism and Job Engagement
A field study aimed at identifying the sources of mutual complaints among the Directorates of Education staff of their departments and management and run it in their daily dealings with principals in the province of Baghdad, and adopt approach. It was determined the research consists of (2357) male and female employees and 305 randomly stratified simple by the rate of (7%) from the research community as the number of sample reached (167) male and female employees, and selected sample was randomly stratified simple by the rate of (39.67%) of the research community, as the number of sample was (121) principals. It was constructed two questionnaires, the first included (28) items and the second contained (28) items. And the two researchers
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreAbstract
The research aims to investigate the private sector attitudes toward operational contracting in special education schools. The research adopted the qualitative approach by using personal interviews with a sample of (45) private school owners and managers in Oman. The results of the research revealed that there is an agreement among the majority of respondents on the ability of the private sector to manage special education schools, the advantages of the partnership, as well as the need for guarantees to support this partnership. The government should fully assume it. The role of the private sector remains to raise the operational efficiency of schools. Opinions vary about the level of powers granted to t
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe concept of employees voice has received a great deal of attention by researchers in the field of organizational behavior and human resources management especially in the last three decades of the twentieth century , this importance has deep ranges limits in terms of its discussion history, so it became a behavioral variable received a great attention and care in managerial and organizational studied and basic pillar in the success and excellence of organizations in maintaining its human resources, the research explain the concept and benefits of paying attention to the voice of employees in business organizations , and the theories interpreted to employees voicing and clearing the motivations behind employees voicing, and dis
... Show MoreThe study aimed at identifying the level of administrative work quality of private Schools principals at Southern Governorates of Palestine from the teachers' point of view in their schools. To achieve the objectives of this research, a questionnaire was prepared by the researcher consisted of (28) items. It was applied to a sample of (350) teachers. The researcher adopted the descriptive-analytical approach. The results of the study showed that the degree to which principals of private schools in the southern governorates of Palestine practice Administrative Work Quality from the viewpoint of their teachers was very high, with relative weight (85.00%). The results also showed that there are statistically significant differences at the l
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.