Preferred Language
Articles
/
6hjKbZYBVTCNdQwCnINw
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and international issues and positions, as well as the collapse of political infrastructure and the emergence of many challenges that threaten Iraqi societal security and civil peace.

View Publication
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
TO WHAT EXTENT THE APPLICATION OF MALCOLM BALDRIGE OF THE COMPREHENSIVE QUALITY STANDARDS IN THE AFTER- SALES SERVICES/ APPLIED RESEARCH IN ONE OF THE PRIVATE SECTOR COMPANIES: TO WHAT EXTENT THE APPLICATION OF MALCOLM BALDRIGE OF THE COMPREHENSIVE QUALITY STANDARDS IN THE AFTER- SALES SERVICES/ APPLIED RESEARCH IN ONE OF THE PRIVATE SECTOR COMPANIES
...Show More Authors

The aim of the research is to identify to what extent to which Malcolm Baldrige standards of total quality are applied in the after-sales services of a private sector company for electrical appliances, from the point of view of administrative leaders, in it. To achieve this aim a questionnaire has been used to measure the degree of application of Malcolm’s seven criteria for total quality, namely: (leadership, strategic planning, focus on the customer, measurement and analysis and knowledge management, focus in human resource and operation management and results of the company’s management), the research found that the company achieved a good level of the standard from the de

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Intellectual Security and Its Relation to Psychological Resilience of Secondary School Students
...Show More Authors

The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security

The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:

  1. The members of the sample have an intellectual Security.
  2. The members of the sample have

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Instructional Program Concerning Healthy Lifestyle on Patients’ Attitudes after Percutaneous Coronary Intervention at Cardiac Centers in Baghdad City
...Show More Authors

Abstract:

Objective: The study’s aim to evaluate the effectiveness of instructional program about healthy lifestyle on patients’ attitudes after undergoing percutaneous coronary intervention.

Methodology: Quasi-experimental design/ has been utilized for the current study starting from December 2018 to March 2020 to achieve the objectives of the study. Non-probability (purposive) sample of 60 patients was divided into intervention and control groups. Data were analyzed by the application of descriptive and inferential statistical methods.

Results: findings reported that before intervention both study and control groups demonstrated low total mean of score relat

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Morals Strategies from Sunnah Depending
...Show More Authors

The study aims at elicitation the morals strategies from sunnah depending on the analytic-qualitative method. It revealed a comprehensive integrated system of creative strategies to improve morals. It was categorized into three areas: cognitive strategies, affective strategies, and some strategies based on self-initiative and practice. The researcher recommended that teachers and educators should employ these effective strategies in the process of moral guidance for the Muslim generation. He also recommended that researchers should put more effort to do more In-depth qualitative studies, which must be directed to establish the origin of different education strategies from the Holy Qur’an, the Sunnah, and Muslim scholars’ legacy.

View Publication Preview PDF