Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Procurement Management of Power Plants Construction Projects in Iraq
...Show More Authors

The government of Iraq states that despite the massive amounts invested in the power generating sector, the country has been plagued by power outages for more than three decades; One of the most common sources of the problem and significant impact on the waste of public funds in contractual processes. The Ministry of Planning issued the sectorial
specialized standard bidding documents (SSBD) of Design, Supply, and Installation of the Electromechanical Works (DSIoEW), which is primarily designed to support the Ministry of Electricity (MoE) by developing economic projects to improve the contractual process that led to raisings Iraqi electricity generation field. The research evaluates the impact of
applying the SSBD-DSIoEW for

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Surgical Neurology International
Brown-Sequard syndrome associated with a spinal cord injury caused by a retained screwdriver: A case report and literature review
...Show More Authors
Background:

Nonmissile penetrating spine injury (NMPSI) represents a small percent of spinal cord injuries (SCIs), estimated at 0.8% in Western countries. Regarding the causes, an NMPSI injury caused by a screwdriver is rare. This study reports a case of a retained double-headed screwdriver in a 37-year-old man who sustained a stab injury to the back of the neck, leaving the patient with a C4 Brown-Sequard syndrome (BSS). We discuss the intricacies of the surgical management of such cases with a literature review.

Methods:

PubMed database was searched by the following combined formula of medical subjects headings,

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
A novel online coupling of ion selective electrode with the flow injection system for the determination of vitamin B1
...Show More Authors

A simple, fast, selective of a new flow injection analysis method coupled with potentiometric detection was used to determine vitamin B1 in pharmaceutical formulations via the prepared new selective membranes. Two electrodes were constructed for the determination of vitamin B1 based on the ion-pair vitamin B1-phosphotungestic acid (B1-PTA) in a poly (vinyl chloride) supported with a plasticized di-butyl phthalate (DBPH) and di-butyl phosphate (DBP). Applications of these ion selective electrodes for the determination of vitamin B1 in the pharmaceutical preparations for batch and flow injection systems were described. The ion selective membrane exhibited a near-Nernstian slope values 56.88 and 58.53 mV / decade, with the linear dy

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Agricult. Stat. Sci.
USE OF GEOGRAPHIC INFORMATION SYSTEMS IN PRODUCTION OF SALT MAPS PREVAILING IN AL-MAIMUNA PROJECT IN SOUTHERN Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Nov 06 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Nursing Management Education Program upon the Nurse Managers' Knowledge about Planning in Baghdad City Hospitals
...Show More Authors

Objective: To determine the effectiveness of the Nursing Management Education Program upon the Nurse
Managers' Knowledge about planning in Nursing Management at Baghdad City Hospitals.
Methodology: A Quasi-experimental study in which a purposive "non-probability" sample of (50) Nurse
Managers was selected from Baghdad City Hospitals. These Managers were divided into two equal groups of
(25) Nurse Managers for each (study and control ones). A questionnaire was developed as a tool for data
collection. A pilot study was carried out to test the reliability of the questionnaire for the period from April 2nd to
June 20th 2007. The pre-post test approach was applied to the study and control groups as mean for the quasiexperime

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Oct 14 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More