The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
This study aimed at recognizing the impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan, the axes of the strategy were: informative sharing, free and independence, working teams, and organizational power. To achieve the objective of the study, a questionnaire is designed and distributed on the sample of the study, which represented 60 employees of Banks. After analyzing the data by using SPSS, the study resulted that there is positive impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan. It suggested that the working banks in Jordan should establish database, and to create working teams.
... Show MoreThe integration of nanomaterials in asphalt modification has emerged as a promising approach to enhance the performance of asphalt pavements, particularly under high-temperature conditions. Nanomaterials, due to their unique properties such as high surface area, exceptional mechanical strength, and thermal stability, offer significant improvements in the rheological properties, durability, and resistance to deformation of asphalt binders. This research reviewed the application of various nanomaterials, including nano silica, nano alumina, nano titanium, nano zinc, and carbon nanotubes in asphalt modification. The incorporation of these nanomaterials into asphalt mixtures has shown potential to increase the stiffness and high-tempera
... Show More
Abstract
Due to the momentum of winning in the streets of the city of Baghdad as a result of the large number of checkpoints so felt researcher to conduct a field visit to find out the main reasons that led to this congestion and to find practical solutions to mitigate wastage winning the arrival time citizen to where you want the least possible time.
This research aims to overcome the difficulties experienced by citizens to reach their places of work and reduce waste at the time of service and waiting time as well as reduce the cost of waiting.
Has emerged study a set of conclusions, including the use of model queue (G / G / C) and the mome
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More
Background: Diabetes mellitus is a chronic disease with an increasing prevalence worldwide and characterized by an increase in oxidative stress and inflammation. The most important factor that is responsible for oxidative stress and production of reactive oxygen species (ROS) is hyperglycemia. The major targets of ROS are proteins. The most common and widely used biomarker of severe oxidative protein damage is protein carbonyl content.
The study was designed to assess the serum level of protein carbonyl as a marker of protein oxidation in patients with type 2 diabetes mellitus and to evaluate the effect of age, body weight, waist circumference, diabetic control and disease duration on the level
... Show MoreThe purpose of the research is to study the impact of knowledge management (personalization and coding strategy) in achieving strategic excellence in the environment of Iraqi private banks, and the descriptive and analytical research approach has been adopted, so the researcher adopted positive philosophy according to the deductive approach for the purpose of deriving the first research hypothesis from the theoretical side and the research reached a group of The most important results are that the personalization strategy has made great progress in its ability to influence strategic superiority as a responsive variable, as the civil bank departments were successful in employing the changes that occurred in the personalization str
... Show MoreIn this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process, where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliab
... Show MoreMoney laundering is consider a crime in legal perspective and aphenomenon of negative effects in economic and Social perspective for thevarious countries of the world by the diversity of their economies to make thebadly damaged in the banking service and its reputation in some cases may leadto bankruptcy of banks, and the fact that banks is one of the most importantcircles that revolve the illicit funds, Due to its branched the banking operations,speed and overlap and increase it's complicated with the progress of bankingoperations and the use of electronic services modern here's challenges atvarious levels between the application of the legislation to combat moneylaundering and between actual fact it must find ways and means of legislat
... Show MoreA recent study compared experimentally the hydraulic and thermal activity of twisted tape inserts for two types, metal foam twisted tape (MFTT) and traditional twisted tape (TTT), in a double pipe heat exchanger. The investigation goal of the innovatively designed MFTT is to enhance the heat transfer process, which provides a higher thermal enhancement factor over those of TTT under the same conditions. Heat transfer activity in terms of Nusselt number (