The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This
... Show MoreSince the law is the tool for implementing the state’s public policies, it is natural that its provisions (or at least some of them) seek to preserve human dignity as the source on which all rights and freedoms are based. One of the examples of humanizing the provisions of the law in France is what is known as the winter truce. What is this truce, what are the justifications for granting it, what is its historical origin, how did the legislative treatment of it develop, what are the similarities and differences between it and other legal periods included in French law, what is the scope of its application, and what are the effects resulting from it. These questions and others are what we will try to answer through this research.
The study aims to know the nature of the expected relationship between market share management strategies and the variation in the performance of the shares of a number of Iraqi industrial companies listed in the Iraqi Stock Exchange. For the period (2005-2018) in the light of both the monthly closing prices and sales volume during the research period, the (Panel Data) method was relied on through a stylistic test (fixed effects model and random effects model), and the results determined the need to adopt the fixed effects model method for sample data and test Assumptions, the results showed the positive impact of market share according to its strategies on the performance of stocks according to its studied indicators (Treynor index
... Show MoreAn experiment was conducted to study the effect of the sprayer type according to the source of power and the size of the spray nozzle concerning the quality of the spray produced and fuel consumption.Two types of sprayers were used: a conventional boom sprayer (S1) and a modified (electrified) boom sprayer (S2), along with three sizes of the XR TeeJet 110 spray nozzle (N). The following technical performance indicators were examined: Density of coverage (drops/cm2) using ImageJ software, a 600dpi business card scanner, specifically the ScanShell 800N by CSSN, Inc, and water-sensitive paper (WSP), rate of spray nozzles discharge (ml/min), and fuel consumption (liters/hectare) using a c
HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020
Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show More