Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
The research aims to show the dimensions of organizational trust represented by (administrative policies opportunities for innovation and self innovation and self- realization,availability of information,prevailing organizational values) and its reiationship to achieving the strategic position of banks represented by formation of expectations,buiiding networks,learning operations As the research was applied in each of the banks (middle east)Iraqi investment,Al-Ahly Iraqi, Business Bay, Al- Mansour investment bank),the qusestionnaire was adopted as a tool to collect data and information from the sample number (138)who are in the site (department director, division ,M.division director ,division officer, unit officer)the statistica
... Show MoreAbstracts:
The Central Bank is the backbone of the banking system as a whole, and in order to maintain the banking system, one of the most important functions that the Central Bank performs is the function of supervising and controlling banks, with several tools and methods, and one of the most important of these tools is its creation of the function of a compliance observer, which obligated commercial banks to appoint a person in A bank that performs this function according to certain conditions and granting it some powers that would build a sound and compliant banking system. The function of the compliance observer is to follow up on the bank’s compliance with the instructions and decisions issued by
... Show MoreThis research aims at clarifying the concept of social auditing, which is one of the most important reasons for its emergence is social responsibility accounting and its role in measuring the social performance of enterprises. The study also aimed to know how social auditing has an impact and its role in improving the social performance of business organizations, and the research refers to testing the hypotheses of an impact of social auditing on social performance through a commitment to social responsibility. The research sample consisted of 200 individuals from 20 Algerian business organizations and represented individuals who were researched in managers and em
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreCurrent Thesis has aimed to identify : The Psychological barriers for university students , Differences in psychological barriers depending on the variable sex (Males – Females) , Adjustment to College life for university students, Differences in Adjustment to College at university life depending on the variable sex (Males – Females), and finally, The correlation between psychological barriers and Adjustment to College life. The researcher has prepared a sample consisted of (100) male and female students who were randomly selected from university students, The researcher has adopted a measure of (2002) to measure the psychological barriers, also the researcher adjustment scale with university life.
The results showed that universi
The study included three topics, the definition of the personality of Imam al-Bazazi, his scientific biography, his elders, his writings, his students and his death, selected issues of his weightiness related to purity, and the Imam al-Bazazi is Muhammad ibn Muhammad ibnShihabibn Yusuf, known in al-Kardari al-Hanafi al-Balzazi. The other doctrines, the author relied in his book on the sources of the previous scholars of the Hanafis, and make them the basis in his book, the author did not adopt the definitions of language and terminology, and rarely mention the evidence Shariah adopted by scientists in their opinions, and limited to mention only opinions, In front of the first issue spotlessly water user, and the second issue that sleep l
... Show MoreThe research aims at the identity of the accounting information and its characteristics, and then to study the possibility of using accounting information in rationalizing the decisions of capital expenditure. The study relied upon the descriptive analytical approach it is suitable to the nature of this study, the hypotheses of the study were tested by using a number of statistical methods by relying on statistical package program (SPSS), and the research concluded that the companies listed in Khartoum Stock Exchange using accounting information in the comparison between investment alternatives available and estimating the number of years required to recover of the investment cost, the challenges that cause weakness in using the
... Show MoreThis study Studied Ministry of Hamdy Al-Buchachy(the first)and explain the features of
this Ministry in a critical time in the history of Iraq. The second world war had began and its
end had reached .The political situation in Iraq is so complicated. The Ministry had made
many things. The Ministry had situated in internal and external complicated time. The
situation in Iraq was so difficult, therefore the recommendor (Abdul-Ilah)asked Hamdy Al-
Bachachy to make be the head of the new governments Al-Bachachy had made irrelevant
government, thus it didn’t last more than three months and the British governorate and of
direct in terference in Iraq who worked to reduce the Iraqi army and the Minister of Defence
refus