Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
The problem of informal settlements in Iraqi is one of the most serious problems due
to its economic, social and security impacts which jeopardize the society safety and stability.
This study investigates the present situation of informal settlements in the Baghdad
governorates as well as approaches followed in making decisions to either upgrade or remove
those areas. Requirements of each decision are also discussed.
Study methods relied on both office and field studies to collect data and information
needed. The study revealed important findings that would help take appropriate measures that
deal with the informal settlements in Iraqi. The study also proposes effective mechanisms to
preclude both an increase in c
The various properties of the ground and excited electronic states of coumarins 102 using density functional theory (DFT) and time-dependent density functional theory (TDDFT) was calculated by the B3LYP density functional model with 6-31G(d,p) basis set by Gaussian 09 W program. Spectral characteristics of coumarin102 have been probed into by methods of experimental UV-visible, and quantum chemistry. The UV spectrum was measured in methanol. The optimized structures, total energies, electronic states (HOMO- LUMO), energy gap, ionization potentials, electron affinities, chemical potential, global hardness, softness, global electrophilictity, and dipole moment were measured. We find good agreement between experimental data of UV spectrum and
... Show MoreKnowledge represents the foundation stone for the work of all organizations, are working who leads the thinking of individuals is the ability that leads to behavior based on rationality, it is the work that creates value to the organization and thus gain access to performance winning where that knowledge is a new type of capital based on the thought and experience and is the so-called intellectual capital, which is renewable and is constantly evolving. The study sought to explain the role of the climax knowledge in achieving the highest levels of performance Organizational and then access to the performance winning in educational organizations the study sample, was found to be a co
... Show MoreThis research paper attempts to explore problems facing the teaching of written expression among first-year female university students. The focal point behind conducting this research is to show the importance that writing is taking as a skill in learning the language. To achieve this goal, the researcher prepared a questionnaire consisting of 20 items. The sample, whose size is 60 participants, was selected randomly from the department of Arabic, College of Education for Women, University of Baghdad. Through the use of a set of statistical means including weighting means and percentage, the findings revealed that the students face many difficulties in learning writing. The researcher suggested some recommendations, mainly improving the
... Show MoreThe research acquires its importance by motivating the behavioural side of the employees to apply modern technology in the work, because of its great importance in increasing the efficiency of employees’ performance and excellence. The research was based on two main hypotheses to show the relationship and impact between the variables through the adoption of a questionnaire to collect data and information related to the research, which consisted of (50) people from administrators working at different levels, based on personal interviews and field visits to collect research data. The data collection process was subjected to statistical analysis using the statistical program (SPSS) (Statistical package for social science) to reach
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The use of legislation related to electronic contracting, through the adoption of the method of enactment of legislation and legislative intervention, and to be careful and cautious in the issuance of legislative texts that do not adversely affect the business activity, which is taking its steps for the first time on the path of electronic commerce in this new world by the new knowledge of the subject theoretically and practically , With the necessary assistance of legal expertise so that legislation does not constitute barriers and obstacles to the development of electronic commerce.