The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Background: Although radiological diagnostic studies (RDS) are an important and acceptable part of medical practice, it is not without hazards. It is associated with increased risk of cancer. Unfortunately the typical and safe dose of each radiological examination is not known. Most of our knowledge of cancer risk comes from studies of survivors of those exposed to whole body radiation from atomic bomb in Hiroshima & Nagasaki, jobs associated with radiation exposure, Chernobyl survivors & patients treated with radiation therapy for cancer and other diseases.
Objectives To estimate radiation dose received by patients from diagnostic radiological examinations and lifetime
... Show MoreThe study aims at studying and analyzing the subject of marketing vigilance as it is one of the modern approaches in the marketing field that can be used to face changes in the competitive and strategic environment and that represents quick reactions on the part of the institution to ensure its survival and distinctiveness other aims are: Consolidating the strength of the marketing organization and its success continuously, represented by changes in the market share, awareness of the institution's position in the market and its relations with competing tourism companies, diversification of tourism services, as well as an analysis of the competitive strategic position of tourism institutions for the purpose of conducting a r
... Show Moreimportumt educational institution as (kindergartens) need teachers which qualified ownes modalities in their education for children , as Marzanu method in a way of learning and own methods of crisis management, because the teachers that own those styles of learning ginekindergarten children knowledge and the childrenIeaving based on theMeaing and knowledge and integration of their information, And teachers that earn methods of crisis management provide for the children of the kindergarten security within the educational institution which in turn affect the growth and development of the Child and then abilities, health physical, mental, psychological …etc.., The aims of the current research have identified to recognize: 1- the dimension
... Show MoreHuman Resources Management Practices (HRMP) and managerial control represent two academic fields that have been and still are the focus of many studies. However, merging both fields and studying the relationship that connects them and also the role that HRMP play in achieving the requirements of managerial control represents a new and novel study according to the available literature in these fields.
To achieve these goals, this study has been conducted, using the surveying questionnaire method, on a sample of ten general inspector offices in Iraq that work in the field of control for ministries and independent committees. A questionnaire has been used to collect the data which was analyzed with several s
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MorePersonal intelligence is thinking about an other person , understanding him, have sympathy and differentiation between people, and to appreciate their own point of view, with the sensitivity to their motives, behavior, and goals, so this intelligence involves dealing with a person or group of persons effectively and in normal or logical manner.
Emotions management is to achieve emotional balance by controlling the emotions continuously, self disciplining, keeping away from excitement sources, and dealing with bad situations in constructive way to achieve the psychological stability .
- the study aims
In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreAbstract: The aim of the research identify the effect of using the five-finger strategy in learning a movement chain on the balance beam apparatus for students in the third stage in the College of Physical Education and Sports Science, as well as to identify which groups (experimental and controlling) are better in learning the kinematic chain on the balance beam device, has been used The experimental approach is to design the experimental and control groups with pre-and post-test. The research sample was represented by third-graders, as the third division (j) was chosen by lot to represent the experimental group, and a division Third (i) to represent the control group, after which (10) students from each division were tested by lot to repr
... Show More
The process of soil classification in Iraq for industrial purposes is important topics that need to be extensive and specialized studies. In order for the advancement of reality service and industrial in our dear country, that a lot of scientific research touched upon the soil classification in the agricultural, commercial and other fields. No source and research can be found that touched upon the classification of land for industrial purposes directly. In this research specialized programs have been used such as geographic information system software The geographical information system permits the study of local distribution of phenomena, activities and the aims that can be determined in the loca