The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The role of the academic institution” depending on its intellectual origins on the ideas of Renaissance and Enlightenment philosophers such as Hobbes, Locke, Rousseau and Kant, after mixing it with the critical style of the Frankfurt School. While the Paris School deals with “globalization of security”, “collection and analysis”, and “The link between internal and external security”. Its intellectual origins are based on the approaches of Michel Foucault and Pierre Bourdieu.
Objective: To determine the prevalence of bullying among primary schools’ children with some associated factors, and resultant effects. Methodology: This cross-sectional study with analytic elements was carried out from February through April 2022. It included a sample of 410 students from six governmental primary schools from both sides of Baghdad city. A self-constructed questionnaire was used. It comprised the following parts: Part (1): socio-demographic data, Part (2): questions that review the students’ exposure to bullying, and Part (3) entails the effects of bullying on those children. Results: The total sample was composed of 410 students; their mean age was 9.51±1.94 years. The prevalence of bullying was 56.34%. Studen
... Show MoreThe goal of this research to identify a set of criteria that can be measured on the basis of which the effectiveness of the application of the Balanced Scorecard in the Jordanian Public Institutions in order to identify the basic requirements to ensure the application of balanced performance measures. The study population consisted of the staff of the Public Institution for Social Security - Irbid of directors of departments and heads of departments and administrative staff, was the use of a random sample of (50) an employee and the employee. The questionnaire was used as a tool to collect data, and as a result of subjecting these standards for the field test and the use of statistical analysis tools to the results of the study c
... Show MoreThe study aims to identify the extent of the availability of administrative empowerment and the implementation of remote supervision in relation to two variables with respect to the employees of the Saudi Ministry of Education. The study included (456) male and female supervisors. The questionnaire has been administrated to collected data related to the research aims. The results indicated that both the extent of the availability of administrative empowerment and the implementation of remote supervision is of an average degree. There is a significant correlation relationship (p<0.05) between administrative empowerment and remote supervision of the educational supervisors of the Saudi Ministry of Education. The research recommends that
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreObjective: To know the impact of social networks on the mental health of adolescents in the city of Diwaniyah.
Methodology: A descriptive cross-sectional study was conducted on adolescents in preparatory schools in ALDiwaniyah
City Center, for the period from Jun 26, 2015 through to October 20, 2015. The schools were
selected from using Probability sampling (240 random samples) six schools were selected from 32 schools (20 %
from total number) the schools were chosen by writing the names of all schools on a pieces of paper and put in
bags. Then, selected six schools random, three boys schools (2 preparatory and 1 secondary) three girls schools
(2 preparatory and 1 secondary), then I chose the sample the students in grad
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show Moreإساءة استعمال حقوق الملكية الفكرية
Islamic mysticism is one of Islamic philosophy fields, which originated and evolved in the light of Islam and civilization; It has received numerous and extensive studies, academic or specialized research, diversified approach and style and mixed up the views and numerous sects and all of them tried to clarify various aspects of the truth, and we discussed this; One of these Studies that have tried to deal with an important aspect of it and the ideology roots of this aspect; some theory was believed to be an Islamic experience which has pure introduced ideas, direction and morality of the essence of Islam itself