Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The researchers extracted the psychometric properties of the measure, including the virtual validity and reliability testing and re-testing in a way, andIt was then calculate the correlation coefficient between the scores of individuals in the first and second application using the correlation coefficient (Person) and the degree was (0.84) correlationcoefficient.The researchers used several statistical methods to process information, including the percentage equation Fisher and center-weighted and Pearson correlation coefficient and (t - test) for one sample, and (t - test) for two independent samples pouch Statistical Social Sciences (SPSS). The results showed that there are positive trends by university teachers around the security man in general. As for the differences between the sexes results showed that there were significant differences between the sexes (male and female) and the results were in favor of males. In light of the findings the researchers made a number of recommendations and proposals.
Samuel Beckett’s Happy Days (1961) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Samuel Beckett to use a lot of pauses and silences in all plays written instead of using words. To express the bewilderment of the modern man during the 20th century, Beckett adopts the use of no language strategy in the dramatic works. After World War II, people were without hope, religion, food, jobs, homes, or even countries. Beckett gave them a voice. He used a dramatic language out of everyday things, in which silence was part of the syntax as a poetic repetition. Language is no more important to the modern man; instead, he us
... Show MoreAll - Mighty Allah is beautiful and loves beauty and Man is the only living that is given by the gift of Almighty Allah the ability to awareness of beauty and the taste of everything which recognized by him around all aspects of life.
So the children have more ability than others towards feeling the sense of beauty and the distinction between the beautiful and the ugly understanding , as they are attracted to the beauty , so we should promote and encourage their sense of beauty in future the beauty in behavior , in psychology and in the community, as well.
This is definitely be done through all of
... Show MoreThis study aims to identify the Israeli policies towards Palestinian refugees during the period 1999-2010 which had seen several Israeli governments, whether left or right, The researcher found that there is continuity in decision-making and legislation in Israeli governments, regardless of political or ideological orientation towards refugees and the Palestinians during the study, which focused on two main axis, The first: refugee issue in the permanent negotiations where the researcher found that the Israeli position is fixed of the non-return of Palestinian refugees, and Increased the power of the Israeli position by U.S. The seconds axis: deals with Israeli legislation and the views taken by Israel which prevent the right of return f
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe aim of the study was to find out the correlations and impact between the variable of ethical leadership behavior and university performance at Sumer University. Use the descriptive analytical method by adopting the questionnaire tool to collect data. The questionnaire was distributed electronically to 113 teachers at Sumer University and the response was from 105 teachers. The research results showed that there is a correlation and effect relationship between the search variables. In addition, the responding university does not have ethically defined standards in terms of performance of the work of the cadres working there. Finally, the research presented a set of recommendations aimed at tackling problems in the ethical lead
... Show MoreThe current study aims at identifying of the differences of life quality level for the academic instructors at Omar Al-Mukhtar University / Libya according to the city variable that the instructor belong to ( Libya, Iraq, Egypt ), and also according to gender Variable (Male - Female),To achieve the aims of study ,the researcher chose a sample consists of (210) instructors ( 170 males and 40 females) from four colleges at Omar Al- Mukhtar University/ Darna . The researcher built the scale of life quality which consists of (42) items in last version . The researcher has conducted the validity and reliability of the scale. and by using Analysis of Variance via (SPSS program). The research reaches the following results : 1-The life quality o
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More