The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
The research aimed to study the role that the media play in shaping the public knowledge of human rights issues among the people of Kirkuk, which will be the focus of the study. The research was conducted by applying a survey panel to a random sample of the city's audience. The research dealt with the theoretical aspect of a theory that relied on the media, and the loans provided by the theory, on the basis of which the research was conducted and the research problem was determined based on a major question: What is the role that the mass media play in developing the knowledge of members of the public on human rights and the relationship between the intensity of view in that, as well as the identification of the effect of two variables G
... Show MoreThe Islamic architectural heritage constitutes a civilized fortune that has to be preserved and protected and work should be done to maintain its development to be more convenient for the circumstances of the age and the civilization transformations. Due to the fact that architecture represents the civilization pot and cultural identity, its originality has to be preserved and work has to be done to prevent the strange architectural invasion that changes its character and make it lose the identity and the character and detached from its roots and environment.
Decoration, in the interior design, as a concept is connected to ornamentation process of interior spaces, which is a process of adding certain items
... Show MoreSocial networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe objective of the study was to identify the effectiveness of a training program based on the employment of the educational portal in the development of the skills of the administrative body in the basic education schools in Dhofar Governorate. To achieve the goal, a training program was designed that includes the skills of the educational portal to be met by the administrative body and measuring its effectiveness. A questionnaire to identify training needs, and a notecard to evaluate performance. The study sample consisted of (70) individuals of the administrative staff. The researchers used the descriptive-analytical method to identify the training needs, design and build the training program and the experimental method for applying
... Show MoreAbstract
quality issue is the only issue the interesting in recent years of the last century, but also came out of sync with the other issue is the issue of environment, Where they have become represent two sides of one currency, challenges faced by the world and raised by the environmental problems have made industrial organizations pay great attention to the environment by improving their environmental performance, and that's where the oil industry is one of the most dangerous industries, influential and damaging to the environment due to the organizations move away from oil for adoption The application of EMS then a tool to improve environmental performance has been chosen sam
... Show MoreStick- slip is the continuous stopping& release of the Bit/BHA due to the irregular down-hole rotation prompted by the existing relationship between the friction torque and the torque applied from the surface to free the bit.
Friction coefficient between BHA and wellbore is the main player of stick slip amount, which can be mitigated by support a good lubricators as additives in drilling mud.
Mathematical (or empirical) solves should be done through adjusting all parameters which supposed to reduce stick- slip as low as possible using different models, one of the main parameters is drilling mud. As per Nanoparticles drilling fluid is a new technology that offers high performance
... Show MoreData mining is a data analysis process using software to find certain patterns or rules in a large amount of data, which is expected to provide knowledge to support decisions. However, missing value in data mining often leads to a loss of information. The purpose of this study is to improve the performance of data classification with missing values, precisely and accurately. The test method is carried out using the Car Evaluation dataset from the UCI Machine Learning Repository. RStudio and RapidMiner tools were used for testing the algorithm. This study will result in a data analysis of the tested parameters to measure the performance of the algorithm. Using test variations: performance at C5.0, C4.5, and k-NN at 0% missi
... Show More