The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.
The international business environment faces many challenges, including the intensity of competition, the speed of expansion, and control of the market. This leads to its shadow on the local business environment, which prompted many economic units to adopt modern strategies, including mergers and acquisitions, for expansion and prosperity. The research was conducted to verify the role of internal audit in the governance of strategy operations (Mergers and acquisitions) and its reflection on management decisions and making them efficient and effective. Internal auditing is the independent variable related to the other variable, the governance of strategic operations and its impact on management decisions for strategic operations as a depende
... Show MoreThe sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show MoreBlood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant w
... Show MoreThe aim of this research is to identify the extent to which the Conventional and Islamic banks are committed to implement the requirements of the corporate governance in its financial reports. In addition to its commitment to transparency and clarity in dealing with the shareholders and stockholders to protect their interests and to determine the impact of the commitment of the corporate governance on assessing the financial performance of the conventional and Islamic banks that participate in Bahrain Stock Exchange.
This research aims to measure the impact of applying bank governance mechanisms in reducing the financial risks of banks listed on the Palestine Stock Exchange, and to answer research questions and test hypotheses for the study, researchers adopted the descriptive and analytical approach, and data were collected from the annual financial reports of the banks listed on the Palestine Exchange during the period between (2009-2018), as a time series for the purpose of finding, analyzing and measuring the effect between the study variables during this period by (60) views for each of the study variables, using the statistical analysis program views(9) to enter, process and analyze the data. The results of the study proved that there i
... Show MoreThis research came with the aim of showing the impact of governance mechanisms on tax avoidance practices, and in light of this, the financial data of the joint stock companies (industrial, service, agricultural, and hotels) listed in the Iraq Stock Exchange amounting to (35) companies were collected during the period (2009-2020). Through the financial reports published on the market website, multiple linear regression analysis was used as a tool to study the relationship between variables, and (Eviews 12) program was used for analysis and hypothesis testing. To achieve the objectives of the research,(administrative ownership, board size, board independence, women's membership) was adopted as an indicator of the dimensions of governance, an
... Show MoreThe objective of this research is to measure the training programs and identify the nature and then measure how it reflected on the quality of municipal services provided by the municipal departments investigated by measuring the quality of services based on quality standards, the researcher chose four municipal departments in the Rusafa / Baghdad (164 people) representing the directors and their assistants, officials of the municipal departments, the people and the engineering staff in charge of the task forces as well, including the survey of the views of the concerned persons in the management of the Vocational Training Institute in the Secretariat of the Republic, The quality of the municipal services
... Show More|
This research sheds light on how press advertising affects consumer behavior and draws attention to it by identifying the factors that influence the intellectual perception process or attention to it. The aim of the research was to identify the factors that help achieve the objectives of the press announcement. The aim of the research was to identify the factors that help to achieve the objectives of the press announcement. The research problem was identified in four questions that were answered through a questionnaire distributed to a sample of students of College of Mass Communication, University of Baghdad. Do newspaper advertisements meet the readers’ need to search for the req |
Chapter One : the importance of research and the need for it .
He has developed the concept of the curriculum has evolved as other educational concepts . Because the world has become a small village due to modern technology and are used in various aspects of life , and the rapid communication between the world can be accessed easily and conveniently . And that the purpose of education citizens who create social functions which ones to keep the culture , upgrade and repair flaws, and aims to develop the capacity of the individual and the preparations in the footsteps of scientific and technological development .
- The goal of research : The research aims to:
1 . What is the
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More