Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Brokerage Firms under Information Asymmetry and its Effect on Common Stock Trade : Applied Research in the Iraq Stock Exchange
...Show More Authors

The research aims to Applied Study in the nature of the impact of information asymmetry for brokerage firms in the common stock trading, The research included the theoretical concepts associated with each of the brokerage firms ,information asymmetry and common stock trading, It used the financial methods on the practical side of the information asymmetry for brokerage firms based in the sector as well as trading volume and spread for common stock , The community of the research included the Iraq Stock Exchange,the sample of research the companies listed which have been trading on its stock for the period August 2015 until December 2015 as well as brokerage firms

amounting to 47 brokerage firm. The resea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Popular Mobilization and human security In Local Society
...Show More Authors

The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions,  Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.

View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Well Performance Following Matrix Acidizing Treatment: Case Study of the Mi4 Unit in Ahdeb Oil Field
...Show More Authors

The productivity of oil wells may be improved by determining the value of enhancing well productivity and the likely reasons or sources of formation damage after the well has been recognized as underperforming. Oil well productivity may be improved, but the economics of this gradual improvement may be compromised. It is important to analyze the influence of the skin effect on the recovery of the reserve.    The acid treatment evaluated for the well AD-12, primarily for the zone Mi4;  using a license of Stimpro Stimulation Software to validate the experimental work to the field scale, this software is considered the most comprehensive instrument for planning and monitoring matrix acid treatments and utilizing actual data to provide a far

... Show More
Crossref (1)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Well Performance Following Matrix Acidizing Treatment: Case Study of the Mi4 Unit in Ahdeb Oil Field
...Show More Authors

The productivity of oil wells may be improved by determining the value of enhancing well productivity and the likely reasons or sources of formation damage after the well has been recognized as underperforming. Oil well productivity may be improved, but the economics of this gradual improvement may be compromised. It is important to analyze the influence of the skin effect on the recovery of the reserve.

   The acid treatment evaluated for the well AD-12, primarily for the zone Mi4;  using a license of Stimpro Stimulation Software to validate the experimental work to the field scale, this software is considered the most comprehensive instrument for planning and monitoring matrix acid treatments and utilizing actual data to prov

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of technical innovation on the human resources management ambidexterity through job emededdness
...Show More Authors

 

The current research aims to validate the Effect of technical innovation on human resources management ambidexterity through job embeddedness. The current research was done in  Al-Etihad Food Industries Co. Ltd. And within the industrial environment, the research was designed according to the descriptive research. And to achieve the main goal of the research above, the researcher used the questionnaire as a key instrument to collect data through the views of a sample of managers, and employees at the senior, middle and executive management level. The research sample reached (107) individuals, the data were analysed using the statistical packages (SPSS v. 26) and ( SMART PLS v 3. 3. 8) the group of statistical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 23 2018
Journal Name
International Journal Of Quantum Information
Key rate estimation of measurement-device-independent quantum key distribution protocol in satellite-earth and intersatellite links
...Show More Authors

In this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Gingival Enlargement Management using Diode Laser 940 nm and Conventional Scalpel Technique (A Comparative Study)
...Show More Authors

Diode lasers are becoming popular in periodontal surgery due to their highly absorption by pigments such as melanin and hemoglobin their weak absorption by water and hydroxyapatite makes them safe to be used around dental hard tissues. Objective: The aim of the present study was to evaluate the efficiency of diode laser in performing gingivectomy in comparison to conventional scalpel technique in patients with chronic inflammatory enlargement. Materials and methods: Thirty patients were selected for this study. All of them required surgical treatment of gingival enlargements and were randomly divided into two groups: Control group (treated by scalpel and include sixteen patients) and study group (treated with diode laser 940nm and includ

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Salivary mucoepidermoid carcinoma, auclair vs brandwein grading system: A histopathological comparative study
...Show More Authors

Background: The grading systems of salivary mucoepidermoid carcinoma depend on different histologic and morphologic features. The aim of this study was to compare between Auclair and Brandwein systems according to their histologic criteria, and the type of cell predominant. Materials and Methods: Twenty-one case included hematoxylin-eosin (H&E) stained tissue slides that were diagnosed as MEC, originally categorized into low and high grade type regardless of the grading system, have meticulously undergone histopathologic review. The sample was graded according to criteria owing to Auclair and Brandwein methods. The predominant type of cells was determined by microscopic examination according to grade of tumor. Results: Regarding the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Sep 01 2015
Journal Name
2015 Ieee International Circuits And Systems Symposium (icsys)
Investigating the impact of on-chip interconnection noise on Dynamic Thermal Management efficiency
...Show More Authors

Dynamic Thermal Management (DTM) emerged as a solution to address the reliability challenges with thermal hotspots and unbalanced temperatures. DTM efficiency is highly affected by the accuracy of the temperature information presented to the DTM manager. This work aims to investigate the effect of inaccuracy caused by the deep sub-micron (DSM) noise during the transmission of temperature information to the manager on DTM efficiency. A simulation framework has been developed and results show up to 38% DTM performance degradation and 18% unattended cycles in emergency temperature under DSM noise. The finding highlights the importance of further research in providing reliable on-chip data transmission in DTM application.

View Publication
Scopus (1)
Scopus Crossref