Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show MoreThe aim of this research is to identify the extent to which the Conventional and Islamic banks are committed to implement the requirements of the corporate governance in its financial reports. In addition to its commitment to transparency and clarity in dealing with the shareholders and stockholders to protect their interests and to determine the impact of the commitment of the corporate governance on assessing the financial performance of the conventional and Islamic banks that participate in Bahrain Stock Exchange.
"The aim of the research is to identify the availability of the dimensions of the research variables represented by organizational symmetry and the quality of work-life at the University of Information and Communications Technology, which is one of the formations of the Ministry of Higher Education and Scientific Research in Baghdad, in addition to knowing the relationship and influence between them. The research relied on the descriptive analytical approach based on peer description. The research was analyzed and the research sample consisted of (148) individuals, the sample was chosen using the comprehensive inventory method, data was obtained by relying on the questionnaire which was prepared from ready-made m
... Show MoreThe purpose of this study is testing the effect of orgnizational learning in orgnizational Effectivness an applied study in Al-hiqma Jordinan Medecine Company . study sosiety 88 manegers sleect 80 of them .study used SPSS to test the hypothesis.study reachs to significant conculctions
Childhood is characterized by ahigh privacy in the life of the child overall educational institutions in the world. Based on this specificity, modern education begins with a holistic vision of the child through all developmental aspects (moral, religious, emotional, social, linguistic, physical, health, and mental). This integration could be achieved through taking into consideration the needs and rights of children and developing curricula that consider these needs and capacities to provide opportunities for developing and supporting the developmental aspects of the child. The contemporary technological developments in the field of computer and the Internet have brought with it new forms, ideas, and problems for children in recent years
... Show MoreWith the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored
... Show MoreBackground: Vitamin D improves innate immunity by enhancing the expression of antimicrobial peptides. The antimicrobial action of cathelicidin is widespread and effective against cariogenic bacteria. This research aimed to investigate the effect of vitamin D deficiency on the level of salivary cathelicidin concerning dental caries experience.
Subjects and Methods: A case-control study was carried out, and the sample was composed of 80 females; the study group involved 40 females with a serum vitamin D concentration of less than 10 ng/ml. In addition to the control group involving 40 females wh
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreThe current research aims to identify the problems and needs for both college of political science and college of engineering’s students. The sample was (100) male and female student. The results showed bunch of problems which could be organized descendingly, the scientific domain ranged between (2 - 2.42), the mean of the psychological domain was (2.85), the moral domain ranged between (2.2 – 2.28)m the problems of study earned (2.30), the material domain got (1.95), the medical and social domain obtained (1.925), and finally, the family domain received (1.887).
God Almighty set out to build mosques, and he commanded to seek their architecture, and the competition for them, and allocate them with types of worship that are not valid in others, and to preserve their sanctity and not to be degraded and taken for mundane purposes and special benefits, because they are considered one of the most prominent features of Islam and the rituals of Islamic society, so this research came to show the rule Sharia in various and contemporary issues that are needed by the imams of the mosques, their rulers, and those responsible for them. Among the issues in which they have examined comparative juristic research and reached the most correct opinion are:
Building mosques over or under buildings and factories i