The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Iraqi bentonite is used as main material for preparing ceramic samples with the additions of alumina and magnesia. X-ray diffractions analyses were carried out for the raw material at room temperature. The sequence of mineral phase's transformations of the bentonite for temperatures 1000 ,1100 ,1200 and 1250 ºC reflects that it finally transformed in to mullite 39.18% and cristobalite 62.82%. Samples of different weight constituent were prepared. The effect of its constitutional change reveals through its heat treatments at 1000,1100,1200,1250and 1300ºC .The samples of additions less than 15% of alumina and magnesia could not stand up to 1300ºC while the samples of addition more than 15% are stable .That is shown by analy
... Show MoreThis study aims to assess the effect of adding twisted fins in a triple-tube heat exchanger used for latent heat storage compared with using straight fins and no fins. In the proposed heat exchanger, phase change material (PCM) is placed between the middle annulus while hot water is passed in the inner tube and outer annulus in a counter-current direction, as a superior method to melt the PCM and store the thermal energy. The behavior of the system was assessed regarding the liquid fraction and temperature distributions as well as charging time and energy storage rate. The results indicate the advantages of adding twisted fins compared with those of using straight fins. The effect of several twisted fins was also studied to discover
... Show MoreThis study aimed to evaluate the sustainable efficiency and calculate the sustainable value, opportunity cost and revenue to cost of potato production farms in Baghdad Governorate. Data were collected from a random sample of 102 spring potato producers in Baghdad governorate for the year 2022, the value-added function was estimated using three levels: economic (seeds and space), and social (education level), while environmental represented by (residual and volatile of nitrogen). Effective resources were calculated to extract the sustainability value- SV appeared on an average of 18023.15 thousand Iraqi dinars. Positive relationship with residual nitrogen and productivity, and Inverse relationship to the amount of volatile nitrogen.
... Show MoreThe avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels
... Show MoreObjectives: To assess the information of mothers regarding asthmatic child care, and to find out the relationship between information of mothers and some of demographic characteristic such as age of mothers, Level of education, and away of child feeding. Methodology: Quantitative design (a descriptive study) was conducted in pediatric hospital in Kirkuk city from the period of first of July 2011 to the end of March 2012. To achieve the objectives of the study, non probability sample of (50) mothers having asthmatic children who attend to the pediatric hospital. The data are collected through utilization
This study aimed to show the extent of compliance with the income taxpayer to provide tax returns and increase the speed of collection of these taxes in addition to increasing confidence in Income Tax department and reduce the number of cases transferred to the courts and promote taxpayer awareness in charge of the importance of self-assessment system, and study sought to investigate the effect of the existence of records documents, technical audit, and computational audit and documentary audit on income tax collections in Jordan, from the point of viewof Jordanian income tax auditors ,results shows there's a strong relation between these variables and Income Tax collections.
The aim of the research is to identify learning difficulties and their role in children's perception of self-concept. The researcher adopted the descriptive and analytical approach method in this study. A questionnaire was designed by the researcher to collect some related information such as biodata, family, health, diagnostic and behavioral patterns of the case. In addition, the researcher adopted the scale of learning difficulties for elementary school students prepared by Zaidan Ahmed Al-Sartawi (1995), the scale of student appreciation for the survey of learning difficulties for primary school students by Michael Best, which was translated to the Arabic language by (Saeed Abdullah Debis). The researcher adopted also the Self-Concept
... Show MoreResearch covers the uses the method of Quality Rating Evaluation to evaluate the
quality of production through which a determination of product quality of its production in
order to determine the amount of sales hence the profits for the company. The most important
function is to satisfy consumer at reasonable prices. Methods were applied to the product
(toothpaste) in the General Company for Vegetable Oil – Almaamoon Factory .
The company's has obtained ISO-certified (ISO 9001-2008). Random samples of
final product intended for sale were collected from the store during months (February, April ,
June , October and December) for the year 2011 to determine the "quality rating " through
the applicat