Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
This research aims at studying the websites of Iraqi ministries to determine the extent of the use of electronic communication in the practice of public relations' activities through these sites, which represent a formal means of communication between the ministry and its people.
The research consists of three chapters: chapter one studies the methodological framework of the research; chapter two includes three units: unit one studies technologies of electronic communication including its concept, features and types; unit two studies electronic publications i.e. its concept and features; and unit three deals with designing the electronic websites .it ends with chapter three which is divided into two sections: section one studies the
It is an analytical study carried out at university of Basra using a sample included the dean ,assistants and managers of scientific dept. in the university for about(63)managers .The study aimed at discovering a model of crises management in the university.The researcher adopted the descriptive survey methodology.To achieve the objective of the study ,a questionnaire of (41)statements was developed covering five main variables like ,signal detection, prevention and preparedness, response, recovery and learning .The validity of the questionnaire was done by a group of referees .Its stability was determined by Cronbach,s Alfa .The questionnair,s stability coefficient was(0.
... Show MoreThe topic area of that’s research dealing with values which adopted by Iraqi people since 1980, many changes and variables which make many situations and skills which the life is suitable in war and conflicts times. That’s values like traditional and ordering, traditionalism mean the conservation about values s and tradition which society adopted its. The Iraqi society suffering from many changes since 1980-2003, the consequently of that’s changes make Iraqi citizen more interested about luxury needs like clothes, while decreasing the interested about liberty of thought, beauty, show evidence of identity, and openness of mind. The processing of values changes associated with political behavior of Iraqi people which lead to weaken o
... Show MoreA computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values
... Show MoreBlastocystis is a ubiquitous human and animal protozoa that inhabit the gastrointestinal tract. Metronidazole is considered the standard drug for the treatment of Blastocystis infection; however, there is growing evidence of treatment failure, hazardous side effects, and appearance of strains resistant to metronidazole. In the last era, many studies have been implicated in the quest for new treatments for Blastocystis infection, especially natural products. Attention has been focused on the effect of Amygdalin (B17) and pumpkin seed on eradicating parasitic infections. The current work was built up to explore the in vitro efficacy of two natural compounds, Amygdalin (B17) and pumpkin seeds against
... Show MoreForm of investment in infrastructure important factor to drive economic growth in any country, with the dwindling ability of governments to provide the necessary funds for such investments, emerged as a rising trend for private sector involvement in public projects and infrastructure, and one of these trends is the build-operate-transfer system (BOT), which commonly used in various developed and developing countries as one of the tools used in the implementation of these investments, as the private sector under this system design, finance, build and operate the project, and are re-administration of the state after a certain period under a contractual agreement between the parties of the contract. As this system provides majo
... Show MoreSeeking pharmacist advice about minor ailments is a common practice among Iraqi patients because such advice is free and quick. Unfortunately, the assessment and management of minor ailments by Iraqi pharmacists were inappropriate. Therefore, this study aimed to develop a model for a mobile application that can assist community pharmacists in the diagnosis and management of minor ailments.
The scientific content of the application was based on the information in the symptoms in the pharmacy and British Nati
The importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i
... Show MoreBusiness organizations strive to reach organizational excellence, in instruction to maintain their position in the market, so the research started from the problem of the weakness of the senior leaders in the two companies investigated in the management and sustainability of work, as well as their inability to face challenges that could affect the work of the two companies in the future, especially the lack of organizational of the future and the prediction of those events, so the two companies seek to explore and invest opportunities to achieve organizational excellence. The research aims to know the role of Ambidexterity leadership behaviors in organizational excellence in my company .and create ideas that will achieve organizati
... Show MoreAchieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno