The research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of the administrative and clear in his work to receive it ambiguity in the roles Except Exclusive entrusted to him, which contributed to achieving the basic goals of the organization in which it operates, and recommended the researcher: the establishment of multi-tasking administrative leadership in the administrative organization of training courses at the Higher Institute of security and administrative development. The leader of the administrative and clear in his work to receive it ambiguity in the administrative roles assigned to it, contributing to the achievement of the basic goals of the organization in which it operates, the need for attention to the organization of time and administrative leadership because time is an important resource should be exploited in assisted to complete its work within the timings required from him.
The current research aimed to identify the level of moral identity and social affiliation among students exposed to shock pressures, as well as to reveal the relationship between these variables. To achieve these objectives, the researcher adopted the diagnostic tool for the measure of post-traumatic stress disorder (PDS-5) scale (Foa, 2013) translated to Arabic language by (Imran, 2017). The researcher also adopted the moral identity scale built by (Al-Bayati, 2015) and the measure of social affiliation built by (Al-Jashami, 2013), which were applied to a random sample of (200) male and female students chose from al Anbar University. They were exposed to shock pressures. The results of the research showed that the sample has an average
... Show MoreThe aim of the research is to shed light on identifying the extent of the university professor's competencies and their roles in managing and training participants in e-training workshops as a pedagogical point view. The research sample consisted of a group of (30) university professors (lecturers) in the training workshops, in scientific,humanitarian and social disciplines, including (12) a university professor (holding a trainer certificate), , the research methodology is descriptive, and the community is a group of trained participants. (115) participated in (40) e-training workshops organized by the Center for Continuing Education at the University of Baghdad (and the selection of workshops within the researcher's specialization in the
... Show MorePurpose: the purpose of study is estimate the Risk premium, Interest rate, Inflation and FDI in the through of Coronavirus in the MENA countries. Theoretical framework: The theoretical framework included the study of the main variables, which are risk premium, interest rate, inflation, and foreign direct investment during the Corona virus pandemic. Design/methodology/approach: Concentrating on “COVID-19”, as an effective factor on the Foreign direct investment (FDI), I employ data of “MENA (Middle East and Northern Africa)” countries from 2000 to 2021 to investigate the impact of COVID-19, financial and macroeconomic indicators on FDI relying on the analytic research approach of Static panel data regression, includ
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show Moreيهدف البحث الحالي الى اختبار علاقة الارتباط والتأثير بين إدارة الاحتواء العالي وسلوك العمل الاستباقي ، ومن اجل تحقيق ذلك تم اختيار مجلس محافظة بغداد ميداناً لتطبيق البحث، وشمل البحث متغيرين إدارة الاحتواء العالي عبر ابعاده الفرعية )ممارسات التطوير، المكافآت، مشاركة المعلومات، التمكين(، وسلوك العمل الاستباقي عبر ابعاده )تولي المسؤولية، صوت الموظف، المبادرة الشخصية(، وضمت عينة البحث ) 97 ( فرداً من الموظفين ا
... Show More
The research handles the prominent books of The Weak and Unknown Narrators , which is written by Imam Abu Al-Hasan Al-Daraqutni. It contains a brief introduction about the book and about Abu Bakr Al-Barqani, as well as Abi Mansour Ibn Hamkan.
The research handles the issue of unknown narrators and their relationship to the abandonment stipulated in the preamble to the book.
The research dealt with the identification and comparison between the sayings of Al-Daraqutni and his students - especially Al-Burqani, the publisher of his knowledge, as he is the one who narrated the sayings of Al-Daraqutni. The study concluded that the principle is to abandon the me
... Show More
Abstract
The resources-based introduction in the study of business organizations is increasingly dealing in the study of the human capacities and the best ways to develop them and changing the resources of the organization to be essential and competent to face the business challenges. Today’s organizations need crucial practices to face those challenges and the influences of those practices which take into consideration the importance of developing the entrepreneurship inside the organization. Those practices are called “High Performance Work Systems” which is denoted by “HPWS” and defined as the practices of human resources management which help in acquiring func
... Show More