The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of which is the need for management to increase investment in information technology and monitor the financial allocations required to implement the comprehensive system according to a specific plan and schedule and monitor deviations in the application, their causes and ways to address them, with the need for the auditor to adopt an audit program in line with the size of the client's internal and external risks and analyze them to determine the risks that threaten the continuity of the client's activity and the size of the material misrepresentations. The remaining ones that extend to the financial statements.
This study investigated three aims for the extent of effectiveness of the two systems in educational development of educators. To achieve this, statistical analysis was performed between the two groups that consisted of (26) participants of the electronic teaching method and (38) participants who underwent teaching by the conventional electronic lecture. The results indicated the effectiveness of the “electronic teaching method” and the “electronic lecture method” for learning of the participants in educational development. Also, it indicated the level of equivalence from the aspect of effectiveness of the two methods and at a confidence level of (0.05). This study reached several conclusions, recommendations, and suggestio
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThis research aims to know the reality of succession planning in the researched organization and how it occupies the important jobs in the organization and its readiness for sudden and urgent events that lead to the vacancy of these jobs, and the importance of this research is that it is one of the rare Arab and Iraqi studies and research in this field, as it is one of the first researches It deals with the reality of succession planning in light of the retirement law No. (26) of 2019, and the research problem was the absence of consecutive planning programs and the weak preparation of suitable candidates to face sudden and urgent conditions as replacements for current leaders who occupy the leading and key positions in the depar
... Show MoreThis thesis aims to show the effects of the development of the traditional manual system of the tax accounting process to the electronic system by the activation of the tax identification numbers (TINs) mechanism. The impact of this development is facilitating the tax accounting process, tax fraudand thus increasing the tax outcome.To prove the research hypothesis, an electronic system was designed based on income tax report, estimation note of individuals, in additional to using Adobe Dreamweaver application to write PHP, HTML, Javascript, and CSS web languages to implement the proposed system. The research reached a set of conclusions, the most important of which is; not enough the communication methods between the Genera
... Show MoreCloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications. This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit
... Show MoreThe research tried to show the importance of Administrative Control being one of the important means in administrative work; they work on the review and audit work done and error handling explored in the work and prevent the occurrence and ascertain the extent of implementation of the planned targets, and therefore this is reflected in raising the efficiency of the performance of the tax examiner and complete the work as soon as possible and the highest efficiency and reduce the gaps that may occur between the parties of the tax settling accounts and dealt with in the theoretical side of the search to the research problem, namely with whether operating management oversight to improve the performance and increase the efficiency of t
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe relative strength index (RSI) is one of the best known technical analysis indicators; it provides the speculators by prior signals about the future stock’s prices, and because the speculations in shares of companies which listed in the Iraq Stock Exchange have a high degree of risk, like risk of shares prices felling, so the speculators became committed to use some methods to reduce these risks, and one of these methods is the technical analysis by using the relative strength index (RSI) which enable the speculators of choosing the right time for buy and sell the stocks and the right time to enter or leave the market by using the historical rice data. And from here the problem of the research formulated as “Is the using of
... Show MoreThe aim of this research is to identify the impact of the effectiveness of digital transformation technology in improving the efficiency of the insurance service in the public insurance companies in Iraq through digital transformation technology in the insurance process "promotion of the insurance product, submission of insurance application, underwriting, settlement of losses" and to achieve this goal a questionnaire was designed A survey distributed in the surveyed community Which represents the decision makers in the researched companies under study, and one of the most important results of the research was the existence of a relationship between digital transformation and improving the efficiency of the insurance process, whether thr
... Show MoreThe research aims to identify the risks faced by projects and work on the administration, such as those risks by using professional Project Management System (Project Management Professional) by identifying those risks and their impact on the objectives of the project, if they occur and to provide appropriate responses to Ha.autam search application on the draft Law Faculty port by the General Mansour Construction Contracting company has been using a method personal interview with the heads of departments and project managers in the Al-Mansour and tools descriptive and quantitative analysis as was used (likelihood and impact of risk analysis, Ai_kaoa scheme Sbb- effect, analysis of probability and impact, risk matrix (probability
... Show More