Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
KE Sharquie, AA Noaimi, AG Al-Ghazzi, 2010 - Cited by 2
Background: Cervical ectopy advanced to erosion is one of the common conditions in gynecological and pathological study. It is considered as a physiologic condition resulting from columnar epithelium migration from the cervical canal into the vaginal portion of the cervix, in which no treatment for asymptomatic cervical ectropion can be given. Treatment can be accomplished via thermal cauterization (Electro cautery), Cryosurgery. CO2 laser therapy is another modality of treatment.
Objective: To study the effectiveness of CO2 laser therapy and evaluate it as a biomedical tool for the treatment of cervical ectropion. The study was done at Laser Medicine Research Clinic at the
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show More
Abstract
Personality is one of the most important elements that should be developed in university student. Thus, we have to develop the positive traits and neutralize the negative traits of students as well as we have to pay attention to the level of student achievement at the same time, the researcher designed a scale to measure the traits of study sample. The research come out with a number of recommendations and proposals, the most important of which Enhancing the positive characteristics of university students in order to reach them to the level of mature personality with mental health. Enhancing the positive role of the high level of achievement by motivating the stude
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The research aimed to identify the level of reality of administrative values of sports activities in the Faculties of the university of Baghdad from the point of view of the leaders and those related to the divisions and units of student's activities and the case study method was adopted from the descriptive approach.
Abstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreBackground: Thalassemias are a group of heterogeneous genetic disorders, in which the rate of production of hemoglobin is partially or completely suppressed due to reduced rate of synthesis of α or β- chain
Objectives: to estimate the prevalence of Hepatitis C infection among B thalassemia patients attending Ibn-AL-Baladi center of blood diseases in AL-Sader city, in AL-Resafa Quarter of Baghdad and to determine the possible risk factors.
Type of the study: Cross- sectional study.
Methods: A cross sectional study conducted on B Thalassemia patients attending the blood diseases center in Ibn-AL-Baladi hospital during the period from 1st
... Show MoreThe advancement of science and technology in recent years has led to heavy and diversified production and thus market congestion in various goods and services; which led to an increase of competition among advertisers in order to meet the needs and wishes and to upgrade to the level of consumers. These upgrades have imposed an increase in the usage of the promotions, including advertising in terms of quantity and quality, to influence and persuade customers innovatively and creatively using all available mass media.
The research aims to identify the attitudes of residents of poor areas towards television advertisements for medicines, and the impact of those advertisements on them in terms of making purch
... Show MoreThe current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite
... Show More