The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreFootball has progressed from being a ritual and a celebration to become an amateur sport, a professional sport, and now, increasingly, a commercial sport. In the analysis of football business model, the systemic approach should be adopted. If sport is regarded as one of the business sectors, then the application of business system methodology can be fully justified. The interest to create strong football business system calls for the search of the ways of popularizing football business model and boosting the economic potential of its participants. In the research literature tend to ignore the business processes within the sports business. Besides, the systemic approach in football business is usually limited to p
... Show MoreBackground:The demand for esthetic orthodontic appliances is increasing so that the esthetic orthodontic archwires were introduced. This in vitro study was designed to evaluate the surface roughness offiber-reinforced polymer composite (FRPC) archwires compared to coated nickel-titanium (NiTi) archwires immersed in artificial saliva. Materials and Methods:Three types of esthetic orthodontic archwires were used: FRPC (Dentaurum), Teflon coated NiTi (Dentaurum) and epoxy coated NiTi (Orthotechnology). They were round (0.018 inch) in cross section and cut into pieces of 15 mm in length.Forty pieces from each type were divided into four groups; one group was left at a dry condition and the other three groups were immersed in artificial saliva (
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreExogenous levothyroxine dose modulation and euthyroidism achievement is a persistent challenge in clinical settings. This study strives to assess the adequacy of treatment and identify the patients’ factors that can be used to estimate the euthyroid levothyroxine dose. A secondary objective was to assess vitamin D supplementation impact on thyroid status.
A review of a prospectively collected information from 142 female patients from Baghdad Center of Nuclear Medicine from June 2019 until March 2020 who were receiving levothyroxine for different causes was done. After a follow-up period, the patients’ thyroid tests were assessed and the euthyroid doses for each cause category were statistically analyzed. Thyroid function was
... Show MoreComplex and complex psychological processes are complexand are the result of convergence, convergence and interaction between variables, including the subject of mediation or group or individual and psychological processes involved in the variance, including - personal knowledge and emotional tone (Osman, 1987, p. 8 ). An emotionally balanced individual has the ability to endure and delay meeting needs and has the ability to endure as much as possible. Of the emotional balance of the individual is characterized by emotional stability, show some signs of emotional agitation toward any kind of opposition, anger and realism in self-life and discipline (Swift, 1996, p. 44) Van, et al. , Indicates that people with low emotional balance,
... Show MoreThis research dealt with the subject of auditing bank credit risks in accordance with international auditing standards and aims to develop procedures and design a credit risk audit program in accordance with international auditing standards and demonstrate their impact on the truth, truthfulness and fairness of financial statements and on their overall performance and continuity in the banking sector Its importance lies in relying on international auditing standards to assess and measure bank credit risk and its impact on the financial situation as well as the ability to predict financial failure. A set of conclusions have been reached, the most important of which is that the bank faces difficulties in measuring credit risk in accordance
... Show More