The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreThe study aims to investigate the degree of student teachers at Sultan Qaboos University acquired skills in teaching Arabic via a virtual micro-teaching lab, as well as to reveal the difficulties they faced and their development proposals. To do this, the researchers developed a questionnaire divided into four dimensions: planning, implementation, evaluation, and
ethical values for the teaching profession, in addition to two open-ended questions to identify difficulties and suggestions. It was administered to (30) student teachers. The results revealed that the average degree of student-teacher acquisition of skills was high in its four dimensions. It ranged between (39.2) to (82.2), while the overall average was (56.2).
... Show MoreArtificial intelligence (AI) offers significant benefits to biomedical research and academic writing. Nevertheless, using AI-powered writing aid tools has prompted worries about excessive dependence on these tools and their possible influence on writing proficiency. The current study aimed to explore the academic staff’s perspectives on the impact of AI on academic writing. This qualitative study incorporated in-person interviews with academic faculty members. The interviews were conducted in a semi-structured manner, using a predetermined interview guide consisting of open-ended questions. The interviews were done in person with the participants from May to November 2023. The data was analyzed using thematic analysis. Ten academics aged
... Show MoreThe objectives of this study revolve around identifying the extent of funding impact on the future of the printed Iraqi press, and whether it threatens their chances of survival, stating the extent of technological development on the income of the printed newspaper, and identifying the causes of the financial crisis on the newspaper. This research is classified as descriptive research, and the researcher used the survey method, and adopted the questionnaire of the views of the contactors, in five Iraqi newspapers (morning - extent - time - the way of the people - the call). The research community included (68) respondents, whereby the comprehensive inventory method was used to define the research community, and the researcher used t
... Show MoreThe objectives of this study revolve around identifying the extent of funding impact on the future of the printed Iraqi press, and whether it threatens their chances of survival, stating the extent of technological development on the income of the printed newspaper, and identifying the causes of the financial crisis on the newspaper.
This research is classified as descriptive research, and the researcher used the survey method, and adopted the questionnaire of the views of the contactors, in five Iraqi newspapers (morning - extent - time - the way of the people - the call).
The research community included (68) respondents, whereby the comprehensive inventory method was used to define the research community, and the researcher used
This paper examined accounting information systems (AIS) as a mediator between small and medium-sized enterprises (SMEs) strategies, including (finance source, administrative innovation, organizational culture, developing capabilities levels of SMEs, information source, development of business managers, and technological innovation) and organizational performance. In this quantitative study, 450 self-administered questionnaires were distributed to the managers and owners of SMEs using purposive sampling. Data were analyzed using the structural equation modeling (SEM) method via SmartPLS3 Software. The study offers empirical findings on the importance of AIS as a mediator, considers various factors, a
In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T
Brainstorming has been a common approach in many industries where the result is not always accurate, especially when procuring automobile spare parts. This approach was replaced with a scientific and optimized method that is highly reliable, hence the decision to optimize the inventory inflation budget based on spare parts and miscellaneous costs of the typical automobile industry. Some factors required to achieve this goal were investigated. Through this investigation, spare parts (consumables and non-consumables) were found to be mostly used in Innoson Vehicle Manufacturing (IVM), Nigeria but incorporated miscellaneous costs to augment the cost of spare parts. The inflation rate was considered first due to the market's
... Show MoreUrban Development refers to many topics such as: increased population density, city size, and individual’s production, distribution of technology and the growth of commercial, industrial and service professions. Such development is linked to the coordination of social and cultural trends in order to achieve social progress and economical prosperity. Knowledge as a topic now is known as intellectual capital wich led to upgrae the concept of urban development to be extended into many fields of knowledge, for example, cultural, social and human development to move the level of community culture into a new better standard.
The research adopted the urban transformation based on knowledge as an important factor in gr
... Show MoreIn this work, oral lesions belong to 17 patients, 7 males and 10 females. Their ages range between 15 and 45 years. Follow up was conducted after one day, 7 days, 14 days, one month, and finally 3 months postoperatively. The study lasted for 1.5 year. Surgical diode laser with wavelength of 810 ± 20 nm, with two power levels of 10 and 15 W were used in contact and in non-contact mode via optical fiber. The postoperative outcome revealed; greater haemostatic capability, dry, sealed wound and noticeable lack in pain sensation