Preferred Language
Articles
/
jcopolicy-525
Security Intellectual Proposals of the Paris and the Wales Schools
...Show More Authors

The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties  of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The role of the academic institution” depending on its intellectual origins on the ideas of Renaissance and Enlightenment philosophers such as Hobbes, Locke, Rousseau and Kant, after mixing it with the critical style of the Frankfurt School. While the Paris School deals with “globalization of security”, “collection and analysis”, and “The link between internal and external security”. Its intellectual origins are based on the approaches of Michel Foucault and Pierre Bourdieu.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Rawal Medical Journal
Prevalence of bullying in primary schools of Baghdad, Iraq
...Show More Authors

Objective: To determine the prevalence of bullying among primary schools’ children with some associated factors, and resultant effects. Methodology: This cross-sectional study with analytic elements was carried out from February through April 2022. It included a sample of 410 students from six governmental primary schools from both sides of Baghdad city. A self-constructed questionnaire was used. It comprised the following parts: Part (1): socio-demographic data, Part (2): questions that review the students’ exposure to bullying, and Part (3) entails the effects of bullying on those children. Results: The total sample was composed of 410 students; their mean age was 9.51±1.94 years. The prevalence of bullying was 56.34%. Studen

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Measure the effectiveness of the Balanced Scorecard strategic performance management in public institutions of Jordan )An Empirical Study on the Social Security Corporation – Irbid(
...Show More Authors

The goal of this research to identify a set of criteria that can be measured on the basis of which the effectiveness of the application of the Balanced Scorecard in the Jordanian Public Institutions in order to identify the basic requirements to ensure the application of balanced performance measures. The study population consisted of the staff of the Public Institution for Social Security - Irbid of directors of departments and heads of departments and administrative staff, was the use of a random sample of (50) an employee and the employee. The questionnaire was used as a tool to collect data, and as a result of subjecting these standards for the field test and the use of statistical analysis tools to the results of the study c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Administrative Empowerment and Its Relationship to Remote Supervision at Public Schools
...Show More Authors

The study aims to identify the extent of the availability of administrative empowerment and the implementation of remote supervision in relation to two variables with respect to the employees of the Saudi Ministry of Education. The study included (456) male and female supervisors. The questionnaire has been administrated to collected data related to the research aims. The results indicated that both the extent of the availability of administrative empowerment and the implementation of remote supervision is of an average degree. There is a significant correlation relationship (p<0.05) between administrative empowerment and remote supervision of the educational supervisors of the Saudi Ministry of Education. The research recommends that

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of Using Social Media upon the Mental Health of Adolescent Students of preparatory Schools in Al-Diwanyah City
...Show More Authors

Objective: To know the impact of social networks on the mental health of adolescents in the city of Diwaniyah.
Methodology: A descriptive cross-sectional study was conducted on adolescents in preparatory schools in ALDiwaniyah
City Center, for the period from Jun 26, 2015 through to October 20, 2015. The schools were
selected from using Probability sampling (240 random samples) six schools were selected from 32 schools (20 %
from total number) the schools were chosen by writing the names of all schools on a pieces of paper and put in
bags. Then, selected six schools random, three boys schools (2 preparatory and 1 secondary) three girls schools
(2 preparatory and 1 secondary), then I chose the sample the students in grad

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sun Sep 01 2019
Journal Name
مجلة رسالة الحقوق
إساءة استعمال حقوق الملكية الفكرية
...Show More Authors

إساءة استعمال حقوق الملكية الفكرية

Publication Date
Mon Nov 19 2018
Journal Name
Arab Science Heritage Journal
الجذور الجذور الفكرية للتصوف الإسلامي
...Show More Authors

Islamic mysticism is one of Islamic philosophy fields, which originated and evolved in the light of Islam and civilization; It has received numerous and extensive studies, academic or specialized research, diversified approach and style and mixed up the views and numerous sects and all of them tried to clarify various aspects of the truth, and we discussed this; One of these Studies that have tried to deal with an important aspect of it and the ideology roots of this aspect; some theory was believed to be an Islamic experience which has pure introduced ideas, direction and morality of the essence of Islam itself

View Publication Preview PDF