Preferred Language
Articles
/
jcopolicy-525
Security Intellectual Proposals of the Paris and the Wales Schools
...Show More Authors

The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties  of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The role of the academic institution” depending on its intellectual origins on the ideas of Renaissance and Enlightenment philosophers such as Hobbes, Locke, Rousseau and Kant, after mixing it with the critical style of the Frankfurt School. While the Paris School deals with “globalization of security”, “collection and analysis”, and “The link between internal and external security”. Its intellectual origins are based on the approaches of Michel Foucault and Pierre Bourdieu.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
The impact of implementing the integrated education strategy on the academic achievement of the Arabic language curriculum for the seventh grade in the schools of Amman
...Show More Authors

The study aims to identify the impact of the implementation of the integrated education strategy in the curriculum of the Arabic language for the seventh grade on the academic achievement in the schools of the capital Amman. The researcher adopted the experimental method, where two divisions of the seventh grade students were chosen from the secondary school for girls. The sample of the study was 60 students divided into two equal groups: 30 students represented the experimental group (A) and (30) students represented the control group. To collect the needed data, a test of (40) Multiple Choices was used. The results showed statistically significant differences between the mean scores of the experimental group who were taught acc

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
" employees voices behaviors: Theoretical concepts and thinking approaches
...Show More Authors

The concept of employees voice has received a great deal of attention by researchers in the field of organizational behavior and human resources management especially in the last three decades of the twentieth century , this importance has deep ranges limits in terms of its discussion history, so it became a behavioral variable received a great attention and care in managerial and organizational studied and basic pillar in the success and excellence of organizations in maintaining its human resources, the research explain the concept and benefits of paying attention to the voice of employees in business organizations , and the theories interpreted to employees voicing and clearing the motivations behind employees voicing, and dis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
The Reality of Educational Guidance in the Schools of Baghdad Directorate of Education/Rusafa 3rd from the Point of View of Educational Counselors
...Show More Authors

A survey to show the reality of educational guidance in schools in Baghdad Rusafa 3\ from the point of view of educational guides. It used the analytical descriptive technique. The research community consists of () male and female advisors in schools of  Baghdad. The sample was haphazard( 51\.) The questionnaire was made and it consists (50) items. The research statistics have been analyzed by (SPSS), The questionnaires have been used in the first term in (2017-2018) and the results showed the relationship between the advisor and other teachers, the advisor and students fathers and the local society.  According to the results, the research made some recommendations and suggestions.

View Publication Preview PDF
Publication Date
Tue Aug 28 2018
Journal Name
مؤتمرات الآداب والعلوم الانسانية والطبيعية
Analyzing the Content of the Science Textbook for 7th Grade Iraqi Schools in Light of Educational Concepts of Sustainable Development
...Show More Authors

The aim of this research is to analyze the content of the science textbook for 7th grade Iraqi schools in the light of the educational concepts of sustainable development, the science textbook (1st edition), for the academic year 2017-2018. To this end, the researchers prepared list of issues in the light of the educational concepts of sustainable development, consisted of (13) issues, branched to (51) subissues, presented to a group of arbitrators and specialists in science curriculum and methods of teaching. The researchers analyzed the content of the 7th grade science textbook, in the light of the list that is built, the idea has been adopted as a unit of analysis. One of the most important findings is attention to neglected sub-issues o

... Show More
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Organizational cynicism in Job Engagement of Government Schools' teachers in Al Zubair district
...Show More Authors

The research aimed to investigate the level of Organizational Cynicism and Job Engagement of Government Schools teachers in Al Zubair district. To achieve this research was conducted on a random sample of (66) items. The statistical package for social sciences (SPSS) was used to analyze and examine the hypotheses. The researcher used many statistical methods to achieve the research objectives, such as simple, multi regression and the research results showed there is a significant impact to teacher's in the schools of the research sample between Organizational cynicism and Job  Engagement             

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Article Sources mutual complaint among the Directorates of Education staff and directors of Secondary schools in the province of Baghdad in light of some variables
...Show More Authors

A field study aimed at identifying the sources of mutual complaints among the Directorates of Education staff of their departments and management and run it in their daily dealings with principals in the province of Baghdad, and adopt approach. It was determined the research consists of (2357) male and female employees and 305 randomly stratified simple by the rate of (7%) from the research community as the number of sample reached (167) male and female employees, and selected sample was randomly stratified simple by the rate of (39.67%) of the research community, as the number of sample was (121) principals. It was constructed two questionnaires, the first included (28) items and the second contained (28) items. And the two researchers

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref