The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.
The research problem revolves around the Iraqi public's use of digital television and cinematic websites، and their importance to the academic study and society، as it examines the public's relationship with these websites، usage habits، and the reasons for their interaction with them. And for the prevalence of this phenomenon of use، it was necessary to address the intensity، intentionality، and timing of use to theoretically root the subject of the study، which is one of the modern studies in Iraq and the Arab world. The survey approach، where the research was based on the theory of uses and gratifications that confer positivity and activity on the mass media audience.
The researchers designed
... Show MoreWhen the digital technologies entered the world of cinema production, they boosted the ability of the cinematographic medium to implement various subjects with great accuracy, as the development included all the joints and stages of the cinematic film production whether it is a feature film or an animation. Therefore, the process of film manufacturing by the digital technologies reflects the spirit of the age and the development that humanity has attained. What motivated the researcher to determine the topic of the research, which combines between the sound effects and the animated films under the title (aesthetics of employing digital sound effects in animated films), is the work of the digital technologies. The researcher divide
... Show MoreVideogames are currently one of the most widespread means of digital communication and entertainment; their releases are attracting considerable interest with growing number of audience and revenues each year. Videogames are examined by a variety of disciplines and fields. Nevertheless, scholarly attention concerned with the discourse of videogames from a linguistic perspective is relatively scarce, especially from a pragma-stylistic standpoint. This book addresses this vital issue by providing a pragma-stylistic analysis of the digital discourse of two well-known action videogames (First Person Shooter Games). It explores the role of the digital discourse of action videogames in maintaining real-like interactivity between the game and the
... Show MoreWith the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show MoreAbstract: In accordance with contemporary Western thinking, power is an organized force with a high ability to achieve stability and social security because it possesses tools based on rational organization, which helps it to control the behavior of the individual and society and prevent them from practicing the processes of exclusion and discrimination against others in pursuit of their interests and needs. Vision The philosophers and thinkers of the theory of social contract can consolidate it, which changed the form and nature of power from the traditional heritage to the constructionWhich has contributed to the development and development of civil society - Western political, and despite the success of this experiment, especially aft
... Show MoreThis research aims to identify the nature effect of some mechanisms governance in the Accounting Conservatism for a sample of the practices of companies (banks) in the Iraq Stock Exchange and identify any of this mechanics most effects in the accounting Conservatism. To achieve this objective the use of all of it (the size of the board of directors, management ownership, ownership concentration, the auditor's report) as independent variables was used model Basu revised to measure the Accounting Conservatism , which was considered a variable follower with taking into account the effect of the control variables represented by the (company size and leverage) of a sample of listed on the Iraq Stock Exchange companies for the pe
... Show MoreA multidimensional systolic arrays realization of LMS algorithm by a method of mapping regular algorithm onto processor array, are designed. They are based on appropriately selected 1-D systolic array filter that depends on the inner product sum systolic implementation. Various arrays may be derived that exhibit a regular arrangement of the cells (processors) and local interconnection pattern, which are important for VLSI implementation. It reduces latency time and increases the throughput rate in comparison to classical 1-D systolic arrays. The 3-D multilayered array consists of 2-D layers, which are connected with each other only by edges. Such arrays for LMS-based adaptive (FIR) filter may be opposed the fundamental requirements of fa
... Show MoreThe research aims to identify the availability of some basic competencies that are required to be available to workers in digital agricultural Extension from the point of view of senior management, middle management, and, employees with Post-graduate education degrees, represented by the following: Transition to digital agricultural Extension for sustainable and smart family farms, benefiting from international expertise and experiences in applying for Digital agricultural Extension, preparing and implementing Extension messages through platforms, factors affecting the effectiveness of digital agricultural Extension and its platforms, following up and evaluating the activities and programs of the digital Extension platform. The research pop
... Show More