The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use of artificial intelligence in the growth of modern applications have led to the acceleration of the digital transformation process and the utilization of its services. To adopt straightforward programs and strategies to establish cybersecurity governance that can be trusted and practical in completing tasks without hacking and tampering with data and information. In this article, the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.
Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronicall
... Show MoreInvestment Bases directly and closely to an environment characterized by political, social and economic stability, and through a range of policies and institutions and economic laws that affect investor confidence and convince him directing investments to country without the other, where inter conditions and circumstances affecting the trends of capital and settle in, and political situation of the country and what is characterized of stability or disorder as well as economic conditions that are affected by what is distinguishes the country from geographic and demographic characteristics are reflected on availability of production elements and country's infrastructure.
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreFuture generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr
... Show MoreThe Importance of Effort and its Impact in Building the Society in the Light of
the Holy Book and Sunna.
Thank for God and peace be upon Prophet Muhammad, His hose hold and
Companions.
This research is to refute a fault : that Islam as a religioncalls for laziness and
dependence and this in first, Second, to show the originality of the Islamic method in
building and construction.
This research Starts with an introduction in which I refer to the nature of the
Islamic method and its way of work in life: that it is a divine method that is achieved
by the effort of the people them selfves and not through a divine extraordinary power:
The research explains the shift in the peoples life who were addressed by this<
The study aimed to identify the effect of the ethical perception of a sample of managers in public organizations on responsible behavior in light of the rapid changes taking place in the external environment. To achieve this, the researcher followed the descriptive analytical approach by applying a questionnaire of two parts. The first part dealt with the ethical perception according to the scale of Johnson (2015), which consisted of (22) items. The second part dealt with measuring responsible behavior, which consisted of (20) items based on the scale of Development of Ethical Behavior (Narvaez, 2006) for a sample of (125) respondents randomly chosen. The results showed that the estimation degree of managers in public governmental o
... Show MoreAim of the Study: The paper aims at identifying the extent of the role of strategic leadership represented by its four dimensions (administrative, transformational, political, moral) in fulfilling the requirements of university governance (Context, message and Goal, Management orientation, Independence, Issue, Sharing)
Methodology: A survey is applied to (107) members of the teaching staff at the college of Administration and Economics/ University of Mosul. To achieve the goals of the study, the researcher makes use of a number of tools such as: questionnaire, statistical tools and methods (repetitions, perce
... Show MoreAbstract:
The research aims to monitor the image of the man in the group (The Cart and the Rain) by the storyteller (Badiaa Amin); With the aim of highlighting an aspect of feminist writing, especially with regard to the relationship of women to men, and determining the form adopted by the storyteller in drawing the features of men.
The research used the descriptive-analytical method in the space of its textual formation, which aims to stand on the text and deconstruct its narrative significance. To provide a comprehensive picture of it.
Three images of the man appeared in the group's stories, represented by (the authoritarian, the negative, and the positive), and the image of the authoritarian ma
... Show MoreAbstract:
The great expansion of teaching skills requires finding ways and methods to help teachers acquire experiences of all kinds. The researcher found in the subject of the teaching skills for teachers in public and private schools a fertile field for conducting a study that enables the measurement of these skills. Thus, the study aims to identify the skills of teaching lessons for teachers, the difference in teaching lesson skills for teachers according to the years of service, the differences in teaching lesson skills for teachers according to the specialized teachers and non-specialized teachers, the differences in teaching lesson skills for teachers according to the public and private school. The
... Show MoreThe present study aimed at identifying the role of supervisory and training practices in the field education program in achieving course objectives from the perspective of the student teachers in the Faculty of Science and Arts in sharourah, and its relationship to some variables (gender, specialization,estimation). To achieve this, the researcher used the descriptive-analytical method, and the study tool was designed, which consists of (24) items distributed on two axes: the objectives of field education and supervisory and training practices.Then, the study tool was applied to the research sample represented in the entire study community, which consists of (65) male and female students in the Faculty of Sciences and Arts in
... Show More