The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
This research investigates solid waste management in Al-Kut City. It included the collection of medical and general solid waste generated in five hospitals different in their specialization and capacity through one week, starting from 03/02/2012. Samples were collected and analyzed periodically to find their generation rate, composition, and physical properties. Analysis results indicated that generation rate ranged between (1102 – 212) kg / bed / day, moisture content and density were (19.0 % - 197 kg/ m3) respectively for medical waste and (41%-255 kg/ m3) respectively for general waste. Theoretically, medical solid waste generated in Al-Kut City (like any other city), affected by capacity, number of patients in a day, and hosp
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
The marketing of banking service is considered to be one of the impotent fields which showed a universal inebriates . He research showed the comparison between the application of marketing in ideas and application for loot government and private Iraqi bank. The research comets of four parts; Mythology / the concept and the importance of Banking Marketing / Research applichlion/ Conelnion and recommendation.
The purpose of the research is to study the impact of knowledge management (personalization and coding strategy) in achieving strategic excellence in the environment of Iraqi private banks, and the descriptive and analytical research approach has been adopted, so the researcher adopted positive philosophy according to the deductive approach for the purpose of deriving the first research hypothesis from the theoretical side and the research reached a group of The most important results are that the personalization strategy has made great progress in its ability to influence strategic superiority as a responsive variable, as the civil bank departments were successful in employing the changes that occurred in the personalization str
... Show Moreالغرض من البحث دراسة تأثير ادارة المعرفة (استراتيجية الشخصنة والترميز) في تحقيق التفوق الاستراتيجي في بيئة المصارف الاهلية العراقية ، وتم اعتماد منهج البحث الوصفي والتحليلي ، لذا اعتمد الباحث الفلسفة الوضعية وفق المنهج الاستنباطي لغرض اشتقاق فرضية البحث الاولى من الجانب النظري وتوصل البحث الى مجموعة من النتائج اهمها ان استراتيجية الشخصنة حققت تقدماً كبيراً في قدرتها على التأثير في التفوق الاستراتيجي بوصف
... Show MoreGeographical, economic, historical, environmental and security factors play a role in strengthening the drive towards union, as well as addressing the need to express regional and federal identity. This is a clear example of this tendency. One legal or one political system with the parts of this united personality retaining their privacy and identity, and there is a delegation to the central entity of the union with some of the common powers while retaining some powers for these parts or states, which means the availability of autonomy for the constituent states of the union and this is the most important characteristic of the federal states or federations It is the autonomy of each state or country participating in the union. Accordingly,
... Show MoreBackground : Bone infections is one of the most challenging orthopaedic complications, with considerable morbidity. There is significant impact on the life of the patients; socially, financially, physically, and mentally and it could be a limb-threatening complication. Osteomyelitis is a bone infection usually caused by bacteria, including mycobacteria, but mainly Staphylococcus aureus which is the most commonly responsible bacteria . Aim of study: To evaluate our management policy of chronic osteomylitis (C.O.M).
Methods : 32 patients presented with different types &forms of chronic osteomyelitis in many sites of long & flat bones such as tibia , femur, ,humerus ,iliac bones and knee joint , which are not response to previous
Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M
... Show More