The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.
The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show MoreThe research deals with the interchange of the sign transformed from the universal to the local in the theatrical show through the direction processing in the production of a communicative artistic discourse and message, thus making the process of reading the speech and recognizing it by taking into account the cultural differences, customs and local rituals of each country, region, or area. The problem of the research was focused on answering the following question: What are the requirements for the sign in terms of its transformation between the universality and locality in the read-out?
The importance of research is to determine the requiremen
... Show MoreAbstract:
The research aims to define the theoretical framework for corporate governance and its mechanisms and shed light on corporate governance in Iraq as well as the theoretical framework for the quality of financial reports and their relationship and the role of corporate governance in activating them. A commercial bank as a sample for the research, and a survey list was prepared to show the extent to which the research sample banks are committed to applying internal governance mechanisms. imposed on them by the local environment, which leads to improving the quality of financial reports for these banks.
Attitude is an important subject that has attracted researchers and thinkers in organizational theory and organizational behavior because of its great importance in various field studies. Field evidence suggests that individuals in their daily lives or careers respond to specific events through a set of internal tendencies Internal tendencies are negative or positive and systematic. These trends tend to be invisible, not limited to certain boundaries, and involve a significant number of individuals within organizations or society.
The research aims to identify the impact of trends in the ethics of public service workers for individuals, through a sample of (72) doctors and (60) administrative staff
... Show MoreThe GPS navigation measurements become more widely used in many civilian and scientific application. All GPS navigation data holds many errors, the main error sources arise from the geodetic Datum variation when user apply the GPS measurements with the map. Geodetic datums define the size and shape of the earth and the origin and orientation of the coordinate systems used to map the earth surface. In this paper, the Datum transformation was evaluated in two mathematical methods to overcome the errors due to the difference between the WGS-84 and our country Datum Clarck-1880. The results was evaluated and investigated using Carmin GPS device for GCPs comparison, topographic map for Hilla city, mid Iraq 1:100000 scale, and two georefrencing
... Show MoreImproving the environment is a mission that should be conducted by three associates; public authorities, environmentalists and the community. The ignorance of environmental education in Iraq has resulted to an almost environmentally illiterate community, demanding well planned programs to raise their environmental; awareness and education. On the other hand, the decision makers should be well informed about the citizens' environmental preferences to be able to set their priorities for the civil services. Merging the Iraqi citizens in listing their environmental priorities is one of many other approaches for "Environment Education" programs. Globally, such methods have proven to be effective and resulted to widespread understandin
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More