Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The researchers extracted the psychometric properties of the measure, including the virtual validity and reliability testing and re-testing in a way, andIt was then calculate the correlation coefficient between the scores of individuals in the first and second application using the correlation coefficient (Person) and the degree was (0.84) correlationcoefficient.The researchers used several statistical methods to process information, including the percentage equation Fisher and center-weighted and Pearson correlation coefficient and (t - test) for one sample, and (t - test) for two independent samples pouch Statistical Social Sciences (SPSS). The results showed that there are positive trends by university teachers around the security man in general. As for the differences between the sexes results showed that there were significant differences between the sexes (male and female) and the results were in favor of males. In light of the findings the researchers made a number of recommendations and proposals.
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThe research aims to determine the role of knowledge management to measure performance on a sample of faculties of Administration and Economics the University of Kufa, and to achieve this goal through a researcher from the theoretical literature and research and studies related to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted by the independent variable knowledge management, distributed four variables are: (knowledge generation, knowledge storage, knowledge dissemination, the application of knowledge), as well as four variables representing the variables adopted for the performance of the university are:
(to reduce costs and increase profits, improve quality, scie
Abstract
This study aims to identify the social and psychological abuse towards elderly people by others, to identify the difference of social and psychological abuse towards elderly by others according to the variable of gender (male and female). Additionally, to identify the difference of social and psychological abuse towards elderly by determining the one who is responsible of abusing (son, daughter, spouse, etc.). To achieve this aim, the researcher designed a scale to identify the social and psychological abuse towards elderly by others. The results showed that this sample exposed to psychological abuse by different sides due to lacking of powers. Besides, the result showed that there are no signifi
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreOne of the most effective systems for managing water is subsurface trickle irrigation. Finding empirical formulas and studying the effect of soil texture are the main purposes of this paper. In order to reach an ideal irrigation system as a modern technique to save water, especially in arid regions, soil textures of loam, silt, and silt loam were studied on a subsurface trickle irrigation system by utilizing HYDRUS/2D. The trickle system is usually operated at low pressure, in this paper the used pressure is 30 cm with an emitter buried at 10, 15, and 20 cm at different diameters. Patterns of wetting fronts in both directions at various times depending on soil texture are gathered to
Lung cancer is one of the most serious and prevalent diseases, causing many deaths each year. Though CT scan images are mostly used in the diagnosis of cancer, the assessment of scans is an error-prone and time-consuming task. Machine learning and AI-based models can identify and classify types of lung cancer quite accurately, which helps in the early-stage detection of lung cancer that can increase the survival rate. In this paper, Convolutional Neural Network is used to classify Adenocarcinoma, squamous cell carcinoma and normal case CT scan images from the Chest CT Scan Images Dataset using different combinations of hidden layers and parameters in CNN models. The proposed model was trained on 1000 CT Scan Images of cancerous and non-c
... Show MoreAbstract
The aim of the research is to develop specific skills of 21 century, one schedule, renewable: (sex, years of experience, academic degree) from the viewpoint of the research sample. The descriptive tool was used to collect information for research purposes. It was applied to a sample of (339) male and female teachers in Al-Ardhah governorate schools to teach Jazan. The application was carried out in the second semester of the year 1442 AH. The research concluded with a set of results, the most important of which are: the approval of the sample members to a large extent on the expressions of the role of school leaders in the practice of developing male and female teachers in acquiring these three skills fr
... Show MoreThis study aims to identify the role of electronic management in simplifying the work procedures at Imam Muhammad bin Saud Islamic University. The study was based on the random sample of (366) individuals. The data were collected through interviews and questionnaire. The statistical tests were applied according to the data and the study hypotheses: Cronbach’s Alpha, mean, standard deviation, Z test, ANOVA. The study concluded numbers of results: Imam Muhammad bin Saud Islamic University applies electronic management in its administrative processes (planning, organizing, directing, controlling) to a very high level. There are substantial differences in the views of the sample me
... Show More