Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Expand bandwidth high reflectivity of the far infrared region
...Show More Authors

Was expanded display high reflectivity of the spectral remote infrared (m j 14-8) adoption order Alcolmtin ????????? thickness optical northeastern quarter wavelength and compared with results of previous studies based Aldrashalhalah on Ndharah matrix distinctive amended and fall of light close to the vertical arrangement multilayer materials buffer and in thin films homogeneous and uniform properties deposited on germanium basis results showed that the best choice for governments and their kills to expand bandwidth high reflectivity is much easier for the infrared than the area visible in addition to the order of these stacks is the cornerstone of the filters other visual...

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Chemical Engineering Research And Design
Improvements in hydrogen evolution through a new design of coupling inexpensive nanocomposite electrocatalysts driven by high-voltage electrolysis
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Analysis on the Applicability of Meta-Heuristic Searching Techniques for Automated Test Data Generation in Automatic Programming Assessment
...Show More Authors

Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The impact of digital leadership in the effectiveness of organizational crisis management by mediating strategic vigilance
...Show More Authors

The current research aims to verify the impact of digital leadership as an independent variable, in the effectiveness of crisis management as a response  variable through centralizing strategic vigilance in the faculties of the University of Baghdad and its departments, and to investigate the level of interest of its leaders and subordinates in research variables, as well as coming up with recommendations that contribute to strengthening the practices of the three variables. In the university under study, and based on the researcher’s  interest  to diagnose the influence relationship between the variables, because of their importance in the university’s headquarters and its members on the one hand, and its refl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Causative Organisms and Risk Factors In Bacterial Meningitis in Al-Elwia Childhood Hospital - Baghdad
...Show More Authors

Background: Childhood meningitis is a major
cause of morbidity and mortality, Hemophilus
influenza b (Hib) is the most common cause in
many countries, especially below 5 years and
before the development of conjugated Hib vaccine,
it is followed by Streptococcus Pneumonia, and
then N. meningitides, in addition to other
microorganisms.
Objective: To identify the causative organisms
of bacterial meningitis and to identify the factors
predisposing significantly to the incidence of
bacterial meningitis.
Method: This cross sectional , study was done in
Al-Elwia Pediatric Hospital during the period 1st
of January 2007 to 30th of June 2007.Eighty four
patients with presumptive diagnosis of meningitis<

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sun Jun 24 2018
Journal Name
Journal Of Pharmacy Research
Transdermal drug delivery system: A review
...Show More Authors

Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 02 2021
Journal Name
Sustainability
Effect of Twisted Fin Array in a Triple-Tube Latent Heat Storage System during the Charging Mode
...Show More Authors

This study aims to assess the effect of adding twisted fins in a triple-tube heat exchanger used for latent heat storage compared with using straight fins and no fins. In the proposed heat exchanger, phase change material (PCM) is placed between the middle annulus while hot water is passed in the inner tube and outer annulus in a counter-current direction, as a superior method to melt the PCM and store the thermal energy. The behavior of the system was assessed regarding the liquid fraction and temperature distributions as well as charging time and energy storage rate. The results indicate the advantages of adding twisted fins compared with those of using straight fins. The effect of several twisted fins was also studied to discover

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Thu Dec 05 2024
Journal Name
Shifaa
Evaluating alveolar bone thickness in upper and lower incisors from orthodontic perspective. A Cone beam computed tomography-based retrospective study
...Show More Authors

Purpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palata

... Show More
View Publication
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Polar structure in the international system
...Show More Authors

Conclusion The observation of the phenomenon of structural evolution of the international system and its instability on a particular situation, by its transition from unipolar to polarity to bipolarism and then to unilateralism in the early 1990s led by the United States, and to the present moment, To say that the structure by which the hierarchy of superpowers or the regime is directed in terms of its various capacities that qualify it, and with the consent of the rest of the States directing the regime to lead and lead the world's first place, has no direct relation to the stability of this system, I hope other more influential in its stability. The structure of the new international order will be completely different in terms of the r

... Show More
View Publication Preview PDF
Crossref