Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Importance of S-point in the Management of Severe Epistaxis
...Show More Authors

Although severe epistaxis is uncommon, it is serious. The systematic endoscopic nasal examination is an essential step in identifying the bleeding point and aiding electrocauterization. Currently, the S-point, which is located in the superior part of the nasal septum behind the septal body and corresponding to the axilla of the middle concha, is identified in about 30% of cases with severe epistaxis. Cauterization of this point has an excellent rate of controlling the bleeding and preventing its recurrence. We aimed to highlight the significance of the S-point in the management of severe cases of epistaxis.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Effect of Fire Flame (High Temperature) on the Behaviour of Axially loaded Reinforced SCC Short Columns
...Show More Authors

Experimental research was carried out to investigate the effect of fire flame (high temperature) on specimens of short columns manufactured using SCC (Self compacted concrete). To simulate the real practical fire disasters, the specimens were exposed to high
temperature flame, using furnace manufactured for this purpose. The column specimens were cooled in two ways. In the first the specimens were left in the air and suddenly cooled using water, after that the specimens were loaded to study the effect of degree of
temperature, steel reinforcement ratio and cooling rate, on the load carrying capacity of the reinforced concrete column specimens. The results will be compared with behaviour of columns without burning (control specime

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Proposed Agent System for Network Monitoring
...Show More Authors

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
International Immunopharmacology
mRNA vaccination reduces the thrombotic possibility in COVID-19: Inflammation risk estimates
...Show More Authors

Thrombosis is a common clinical feature associated with morbidity and mortality in coronavirus disease-2019 (COVID-19) patients. Cytokine storm in COVID-19 increases patients' systemic inflammation, which can cause multiple health consequences. In this work, we aimed to indicate the effect of Pfizer-BioNTech vaccination on the modulation of monocyte chemoattractant protein-3 (MCP-3), matrix metalloproteinase 1 (MMP-1), and tumor necrosis factor-alpha (TNF-α) levels, and other systemic inflammatory biomarkers that associates with COVID-19 severity in patients who suffers from thrombosis consequences. For this purpose, ninety people were collected from Ibn Al-Nafees Hospital and divided into three groups each of which contained 30 people, 15

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Integration of e-commerce, information technology and its impact on reducing costs to make pricing decisions
...Show More Authors

   E-commerce is the most important result of information technology in this day and age, has resulted in the use of commercial transactions to changes in economic, social, and psychological, and produced a new type of shopping, jobs, and create new job opportunities, and changed the traditional work environment. The challenge currently facing economic units is how to transfer this technology and its integration within the community, especially after the massive developments that have occurred in the areas of commercial and congested markets units, the economic and the products and services the many and varied and intensified competition among these units to achieve a profit, leading to the emergence of e-commerce as on

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use the Style of the Activity Based Cost time Drivine (TDABC) and its Impact on the Untapped Resources: Empirical study in the General Company for Textile Industries - Wasit
...Show More Authors

   The research aims to identify the importance of using the style of the cost on the basis of activity -oriented in time TDABC and its role in determining the cost of products more equitably and thus its impact on the policy of allocation of resources through the reverse of the changes that occur on an ongoing basis in the specification of the products and thus the change in the nature and type of operations . The research was conducted at the General Company for Textile Industries Wasit / knitting socks factory was based on research into the hypothesis main of that ( possible to calculate the cost of activities that cause the production through the time it takes to run these activities can then be re- distributed product cost

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2014
Journal Name
American University Of Sharjah (aus) "second International Conference On Sustainable Systems And The Environmental (isse14)
Correlating BOD5 and COD of Sewage in Wastewater Treatment Plants; Case study Al- Diwaniyah WWTP in Iraq
...Show More Authors

This study aims to establish an empirical correlation between biochemical oxygen demand (BOD5) and chemical oxygen demand (COD) of the sewage flowing in Al-Diwaniyah wastewater treatment plant. The strength of the wastewater entering the plant varied from medium to high. High concentrations of BOD5 and COD in the effluent were obtained due to the poor performance of the plant. This was observed from the BOD5 /COD ratios that did not confirm with the typical ratios for the treated sewage. To improve the performance of this plant, regression equations for BOD5 and COD removal percentages were suggested which can be used to facilitate rapid effluent assessment or optimal process control. The equations relating the percentage removal of

... Show More
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Disc Battery-The escalating risk of ingestion by children in IraqAnd subsequent clinical events and complications.
...Show More Authors

Background: Disc battery ingestion is a common
serious problem in Iraq. It increase in the last years
because of the increase in number of electronic toys
that uses these batteries. These batteries contains
many types of irritant chemicals that increases the
risk of it's ingestion.
Methods:We reviewed the medical records of
children aged between 1year and 7 years
old admitted to Surgical Specialty Hospital/Baghdad
Medical City due to disc battery ingestion from
January 2007 through December 2010). The diagnosis
of disc battery ingestion was based upon history,
clinical symptoms, and results of imaging studies.
The clinical data reviewed included sex, age, clinical
manifestation and duration of sy

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
((The Mediator Role of Self Management on the RelationShip Between Work Stresses and Organizational Alienation))
...Show More Authors

   The study aims to test the relationship of work pressure to its dimensions (role conflict, ambiguity of role, workload and nature of work) as an independent variable and its effect on organizational alienation by its dimensions (disability, lack of power, indifference, animosity, social isolation and self-alienation) (Restraint and confidence in negation, initiative, adaptation and living conscience) as a mediator variable, in some faculties of Baghdad University of Science (Medicine and Engineering) and Humanity (Education and Literature). The data was collected on the practical side, which was applied randomly (306) of the teachers and teachers of the colleges (56) items, which included the main research variables

... Show More
View Publication Preview PDF
Crossref