Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 31 2018
On the Use of 6th-Order Tunable Complementary Metal-Oxide-Semiconductor Varactor based Filter in Ultra-Wideband Low Noise Amplifier
...Show More Authors
Background:

The plethora of the emerged radio frequency applications makes the frequency spectrum crowded by many applications and hence the ability to detect specific application’s frequency without distortion is a difficult task to achieve.

Objective:

The goal is to achieve a method to mitigate the highest interferer power in the frequency spectrum in order to eliminate the distortion.

Method:

This paper presents the application of the proposed tunable 6th-order notch filter on Ultra-Wideband (UWB) Complementary Metal-Oxide-Semiconductor (CMOS) Low Noise

... Show More
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Strategic orientation and its reflection on the Learning organization: Survey study of a sample of Makers decision the Iraqi Ministry of Communications
...Show More Authors

The current research focuses on the extent to which the strategic orientation(entrepreneurial orientation, customer orientation, technology orientation, learning orientation, and investment orientation) affects the learning organization (building common vision, systemic thinking, personal dominance, mental models, team learning)The first hypothesis to test the connection relation between research variables and The second hypothesis was to test the relationship between these variables. In order to ascertain the validity of the hypotheses, the research was based on a questionnaire questionnaire prepared according to a number of In addition to building a fifth sub-variable for the strategic orientation (investment orientation) based

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Banking Governance According to the principles of the Basel Committee and its impact on the achievement of the strategic objectives of banks Study in a sample of private commercial banks Iraqi
...Show More Authors

     This study aims to impact statement played by banking governance according to the decisions of the Basel Committee in achieving the strategic objectives of the banks, But order to achieve the this goal has been the adoption of two hypotheses in addition to the two main hypotheses as sub answered preliminary The study seeks to verify their health and two (no correlation relationship and impact between Banking  governance and achieve strategic objectives), has been tested hypotheses. Study has reached

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Extra-Anatomic prosthetic bypass grafts in management of Sub-inguinal vascular infections
...Show More Authors

Infection at the site of vascular anastomosis is a serious complication of vascular surgery and is associated with a high limb loss and mortality rate. The classical method of management is ligation of the injured artery, adequate wound debridement and restoration of circulation. The latter is achieved by either in situ or extra-anatomic bypass. If the distal circulation is not maintained, subsequent amputation is most likely.
Objectives: In this study we tried to assess the efficacy of extra-anatomic synthetic bypass grafts in the treatment of vascular infection in the groin to save the limb and avoid the inevitable amputation.
Methods: Between January 2006 and December 2007, ten male patients aged twenty to thirty five years (mea

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Self-Evaluation of Nurses and Midwives Practices Using SBAR (Situation, Background, Assessment, Recommendation) Communication Tool on Maternal Health Documentation
...Show More Authors

Abstract:
Objective: To self-evaluate the effect of SBAR (Situation, Background, Assessment, and Recommendation) educational program on nurse and midwives practices in maternal health report documentation accuracy.
Methods: A quasi- experimental design was carried with the application of pre- post test for nurses and midwives’ knowledge and practices regarding SBAR communication tool. The study was held in Al-Elwia maternity teaching hospital, Al –Karckh maternity hospital and Al-Yarmouk teaching Hospital. purposive sample as it was convenient with inclusion criteria consisted of (84) nurse and midwives. The questionnaire comprised of demographic data, nurses- midwives practices of SBAR using (5) level Likert scale for assessme

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2017
Journal Name
Arabian Journal For Science And Engineering
A New Method to Tune a Fractional-Order PID Controller for a Twin Rotor Aerodynamic System
...Show More Authors

View Publication
Scopus (34)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values
...Show More Authors

Wireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Academic Problems of Family Counseling Diploma Students At Saudi Universities based on some Variables
...Show More Authors

The research aims to identify the academic problems of family counseling diploma students at Saudi Universities. In addition, to identify the differences in these problems according to gender, marital status, place of study, academic specialization, and GPA. The sample consisted of (491) students. The researcher has used one questionnaire for academic problems prepared by the researcher.  The research revealed the following results: There were academic problems among family counseling diploma students at Saudi Universities, the most problems were related to the systems and administrations of the university, then the field training, the buildings, classrooms and campus facilities, then the academic courses, after that the exams, then

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref