The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Infrastructure projects take a long time, are complex, multidisciplinary, use different materials and products, and have high risk. These characteristics affect the process of supplying materials. The current paper studies the ability to improve the supply chain process and decrease its cost by identifying the factors that affect it. These factors are used as variables in the mathematical model, which is working under uncertain conditions when the consumption rate of materials is not constant. The information used in this model is obtained from Building Information Modeling (BIM) and Geographical Information System (GIS) techniques and the genetic algorithm is utilized to determine the optimal supplier and the quantities of supplies
... Show MoreObjectives: To evaluate the effect of non-pharmacological pain relief methods on duration of labor stage.Methodology: A quasi-experimental study design was conducted during the period of (4th July 2018 through 24th October 2018) on non-probability of (60) women (30) of them were a control group and (30) were the study group whom admitted to Al-Elwyia Maternity Teaching Hospital suffering from labor pain. A questionnaire was used as a tool of data collection Descriptive& Inferential statistical analyses were used to analyze the data.Result: The highest percentages of study and control groups were in age group (< 20) years old, primary schools graduates, housewife, from "urban area", within low category of socioeconomic scale,
... Show MoreKnowing the Messengers, peace and blessings be upon them, and explaining their obligatory, impossible, and permissible qualities is a legal necessity. It is a rooting of the faith, a means of understanding the Sharia, and a preventer from falling into the scourge of denial and bad manners against them. Therefore, sound belief in their presence is a major reason for the validity of the faith in the aspect of divinity and unseen hearing. Studying the status of prophethood is an urgent necessity in a time in which knowledge is scarce and attachment to the Messenger, may God Almighty’s prayers and peace be upon him, his family, and his companions, is weak, and suspicions and ideas hostile to the faith abound until we begin to hear - unfort
... Show MoreThe role of the ABC system in determining the costs of services in Iraqi banks
The current research aims to prepare a proposed Programmebased sensory integration theory for remediating some developmental learning disabilities among children, researchers prepared a Programme based on sensory integration through reviewing studies related to the research topic that can be practicedby some active teaching strategies (cooperative learning, peer learning, Role-playing, and educational stories). The Finalformat consists of(39) training sessions.
"The aim of the research is to identify the availability of the dimensions of the research variables represented by organizational symmetry and the quality of work-life at the University of Information and Communications Technology, which is one of the formations of the Ministry of Higher Education and Scientific Research in Baghdad, in addition to knowing the relationship and influence between them. The research relied on the descriptive analytical approach based on peer description. The research was analyzed and the research sample consisted of (148) individuals, the sample was chosen using the comprehensive inventory method, data was obtained by relying on the questionnaire which was prepared from ready-made m
... Show MoreKnowledge management contribute to the overall private university libraries to develop libraries for the purpose of creating human and technological resources by investing research and development, as well as education and training for life.
This study followed the methodology of the descriptive and historical pillars of knowledge management for the years 1990 to the present day in 2017, depending on statistical figures obtained by the researchers from the General Secretariat of the Central Library at the University of Baghdad, and the Human Resources Division, which specialized human resources training after 2004 (and before those years from 1982 until 2002, where the continuing education was committee of the fixed committees are wor