The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.
Praise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p
A vector in a separable infinite dimensional Hilbert space is called disk-cyclic for bounded operator if the orbit α : 0, α∈;|∝| 1is dense in. The useful tool used to discover codisk-cyclic operation is called the disk-cyclic Criterion. In this paper we will show that some equivalent conditions of the
This study examines the dynamic relationship between stock market and economic activity in the United States to verify the possibility of using financial indicators to monitor the turning points in the expected path of future economic activity. Has been used methodology (Johansen - Juselius) for the Co-integration and causal (Granger) to test the relationship between the (S & P 500 , DJ) index and gross domestic product (GDP) in the United States for the period
(1960-2009). The results of the analysis revealed the existence of a causal relationship duplex (two-way) between the variables mentioned. which means the possibility of the use stock market indicators to pre
Abstract
All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t
... Show MoreI often read in Islamic jurisprudence in all chapters as much as possible from divine success, time and health, and everything I read in any of the chapters of jurisprudence, I see divine light, eternal wisdom, and a constitution that does not accept error and alteration, as I looked at the great jurisprudential treasures and this enormous wealth, A person finds in himself helplessness in front of this law, how clear, easy, and accurate it is, and it contains permanent good for man, as it is a religion of mercy, benevolence, and goodness, and among these chapters of jurisprudence is the jurisprudence of the commandment. Of the reasons, in the will, the person has had the opportunity to make up for what he missed of doing good that a pers
... Show MoreThe method of Similarity of important topics in Arabic Rhetoric has ample evidence in the Qur'an and the Hadith and the words of the Arabs and this study is limited to only the Koran.
There have been Similarity in the Holy Quran on both types : investigative and discretion , but the verses are more Similarity investigative and in verse 49 Similarity investigative and in verse 25.
The rush of Albulageyen and many other examples of Quranic Vmtheloa on Similarity , with a linguistic analysis and return to the origins of the meanings are not properly counted Similarity , Kolvaz cunning , deception , and maliciousness , the bad and ridicule.
This study seeks as much as possible to the statement of this phenomenon and stand on these t
There is an association between the signifier and the signifier. This association shows the eyeball, which acquires a direct presence and whose presence influences the level of production of the hidden connotation. Because the theatrical presentation is a series of auditory-visual functions, these signs are looking for the exploration of their meanings and their evocation to form a complete loop to achieve the association of the above. This is what made the researcher to monitor the abundance of semantic shifts in theatrical presentation as long as the implications of the strategy continue in the game of semantic production with multiple horizons, and the idea in theatrical presentation tolerates multiple readings according to the refere
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreThe subject of education, and since time immemorial, gripe the attention of the religious, intellectual, political, social and economic elites. This attention not only in Iraq, but in different countries in the world. There is a close correlation between the educational level of the societies and the edginess of its rising and advancement in all fields.
In order to achieve the research objectives, the research has been divided into three sections: section I include the historical, scientific, humanitarian evolution of education, starting from the first economic revolution (The Agricultural revolution) through the second economic revolution (The Industrial Revolution) and till the Third Economi
... Show More