Modelling the utilization of cloud health information systems in the Iraqi public healthcare sector
...Show More Authors
ولاء طارق حميد, Mustansiriyah Journal of Sports Science, 2021
Background: COVID-19 is an ongoing disease that caused, and still causes, many challenges for humanity. In fact, COVID-19 death cases reached more than 4.5 million by the end of August 2021, although an improvement in the medical treatments and pharmaceutical protocols was obtained, and many vaccines were released. Objective: To, statistically, analyze the data of COVID-19 patients at Alshifaa Healthcare Center (Baghdad, Iraq). Methods: In this work, a statistical analysis was conducted on data included the total number, positive cases, and negative cases of people tested for COVID-19 at the Alshifaa Healthcare Center/Baghdad for the period 1 September – 31 December 2020. The number of people who got the test was 1080, where 424 w
... Show MoreInvestment Bases directly and closely to an environment characterized by political, social and economic stability, and through a range of policies and institutions and economic laws that affect investor confidence and convince him directing investments to country without the other, where inter conditions and circumstances affecting the trends of capital and settle in, and political situation of the country and what is characterized of stability or disorder as well as economic conditions that are affected by what is distinguishes the country from geographic and demographic characteristics are reflected on availability of production elements and country's infrastructure.
... Show MoreThe main aim of this research is to introduce financing cost optimization and different financing alternatives. There are many studies about financing cost optimization. All previous studies considering the cost of financing have many shortcomings, some considered only one source of financing as a credit line without taking into account different financing alternatives. Having only one funding alternative powers, restricts contractors and leads to a very specific financing model. Although it is beneficial for the contractor to use a long-term loan to minimize interest charges and prevent a substantial withdrawal from his credit line, none of the existing financial-based planning models have considered long-term loans in
... Show MoreAbstract
The goal of the research is to diagnose some of the negative phenomena which was discovered through the period from (2010 to 2014) as determined by the national strategy to eliminate the corruption which was set out by the joint council of the corruption elimination in Iraq. And to measure the gap in applying the legal rules by the administration, concerning the misconducts and felonies upon the state employments made by the state employee and how far they are applied in the studied sample and to show the nature of the rules and their importance and their role when they are applied in scientific and expertise manner. And to encourage the offices of the general supervisors to adhere to them which will lead t
... Show MoreEmployee Stealing or internal theft is considered from the passive practices that can’t be denied or be hidden, In spite of the hospital privacy as a serving organization that works 24\7 and deleing with human lives, they weren’t infallible from that kind of practice. To prevent or reduce this practice, it was important to search for the organizational and behavioral factors influencing internal thefts. The study problem briefly is to reach the most organizational and behavioral factors influencing internal theft, in governmental hospitals in Baghdad Rusafa Health district, this was done by analyzing (20) administrative cases of thefts occurred in the District, also a sample of (60) specialist Doctor’s opinion work, in (3) hospital
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThis study aims to clarify areas of using information technology in accounting and its impact on the profession of auditors by reviewing the concept, types, areas and the importance of information technology and its implications on the audit profession as well as to clarify the extent of contribution of information technology in developing of procedures of the audit profession and what its requirement, also this study aims to enhance the theoretical side by identifying the views of a sample of auditors in Arab countries selected (Iraq, Syria, Jordan), for the extent of using of information technology in their work and level of their perception for the importance of that
She noted most of the results of research conducted on the use of computers and the Internet in the areas of administrative, economic, agricultural and educational to a significant improvement in learning outcomes of these groups in the development of mechanisms of action, has increased rates of computer use and applications in various spheres of life at very fast pace so that the computer and the Internet is a vital part of any activity, whether administrative or research or the media, hence it can be said that the use of computers and the Internet in the management of public relations activities in any organization can accelerate the pace of echo positive goals and purposes of public relations, this study comes to looking at us
... Show More