Preferred Language
Articles
/
jcopolicy-666
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is based on the literature of behavioral economics, with a focus on three basic and recent theories: nudges, fast and slow thinking, and chaos bias. All of them confirm that the ordinary person acts spontaneously, and makes his daily decisions according to what is available, without thinking and contemplation. Thus, they bear characteristics that the security researcher can employ in preventing crime and designing security policies.

Many of the results of studies using poke and behavioral economics theories in crime prevention emphasized the reduction of crime rates, and yielded positive results in preventing crime, rather than combating it, especially in the field of urban planning, shop design, afforestation, lighting, and paving of streets, which encourages the turnout of individuals to it and causes a natural social interaction that prevents the criminal from being motivated to commit his crime.

The study recommends giving more attention to studies about uses of the nudge theory, developing the design of security policies in crime prevention, and supporting modern security studies and security policy studies.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Extent of application the principles of total quality management in Improving health services in hospitals exploratory study at Al-kindi hospital / Baghdad health department Rusafa
...Show More Authors

Abstract :

The purpose of the subject of Total quality management is an important management style in organizations including hospitals through the achievement of this method of success in the administration to include        this approach describes the provision of health services and make adjustment and suggestions that  help to improve the quality of health care on an ongoing basis . Hence the idea of the study to shed light on the reality of the application of principles of  Total quality management and to highlight the quality of health services provided in al-kindi hospital / Baghdad health department rusafa and the staff at the hospital were included to find out the appl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Development and innovation in the theory of singing   In the Umayyad era
...Show More Authors

The Umayyad era is characterized by the diversity of the subjects and their multiplicity in the literary phenomena. These phenomena are singing phenomena, although they were known in previous eras, they took a distinctive form in the era.
  In this light, the researcher tried to prove that singing theory in the Umayyad period was characterized by development and renewal. The research was entitled (evolution and renewal in the theory of singing in the Umayyad era).

View Publication Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
The Warning Messages of Jeanne DuPrau’sThe City of Ember to the World with Reference to Gil Kenan’s Film Adaptation: The Theory of Conspiracy
...Show More Authors

The City of Ember is a very interesting novel that is although intended for young readers, have so many layers and messages that are misunderstood. In this research, both the novel and the film adaptation are studied with the intent to decode the warning messages that the novelist and the director tried to introduce to the audience. The research studies four vital messages; the first message is that history repeats itself for the novel has many allusions to the history of Jews and their painful holocaust and even goes back in history the days of Moses and the Exodus, the second message tackles the conspiracy theory that states nothing happens by accident and that everything is planned and connected hence comes the third message

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
International Journal Of Applied Mathematics & Statistical Sciences
Topological Structures Using Mixed Degree Systems in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.

View Publication Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Journal Of Engineering
Comparative Analysis of The Combined Model (Spatial and Temporal) and Regression Models for Predicting Murder Crime
...Show More Authors

This research dealt with the analysis of murder crime data in Iraq in its temporal and spatial dimensions, then it focused on building a new model with an algorithm that combines the characteristics associated with time and spatial series so that this model can predict more accurately than other models by comparing them with this model, which we called the Combined Regression model (CR), which consists of merging two models, the time series regression model with the spatial regression model, and making them one model that can analyze data in its temporal and spatial dimensions. Several models were used for comparison with the integrated model, namely Multiple Linear Regression (MLR), Decision Tree Regression (DTR), Random Forest Reg

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Using of Coating Technique by Inorganic Flame Retardants to Protect Civil and Industrial Foundations from Fires
...Show More Authors

   In the present research the flame retardancy to  buildings and industrial foundations which are manufacturing from advanced polymeric  composite material was increased by coating it with surface layer included flame retardant material.  A(3mm) thick antimony tetroxide was used as a coated layer to retard and prevent the flame spread to the coating surface of polyester resin (SIROPOL 8340-PI) reinforced with hybrid fibers as a woven roving (°45-°0) consist of carbon and kevlar (49) fibers, and exposed it to direct flame generated from gas torch at temperature of (2000ºC), at  different exposed distance (10,15,20mm)and study the rang of resistance for this layer and its ability to protec

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Local policy and its impact on the performance of the province of Baghdad.
...Show More Authors

Abstract

The current research aims to clarify the role of local policies on the performance of the province of Baghdad, after studies proved practical experience what those policies of the major role and effect on the lives of citizens, as well as alleviate the burden on central government, which make a lot of states give local governments broad powers and her specialty funds for the exercise of its vital role and actor in various joints of local development, research has indentified a problem in a number of questions such as: do you have the policy of the provincial council of local qualified and able to influence the performance of the province? What are the main forces of powerful and implementation of policies at all

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref