The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
This paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.
The samples were collected monthly crustaceans Mjmafah foot of two stations in tributary Zab down and two others in the Tigris River for one year with effect from November 2001 until October 2002 recorded during the study period the current 41 units taxonomic and were higher density of Mjmafah foot Guy Tigris River before the mouth of the tributary
DBN Rashid, Rimak International Journal of Humanities and Social Sciences, 2020
The present study cognitive aims to investigate the negation phenomenon in American political discourse under Critical Discourse Analysis (CDA) principles. The research sample includes two speeches given by Clinton and Trump in their election campaigns in 2016. Since the nature of the study follows the social-cognitive approach, the researcher adopted two models of analysis to achieve the study’s objectives: First, the theoretical framework of MST (developed by Fauconnier (1994), Fauconnier and Sweetser (1996) to examine meaning construction resulting from building different levels of negative mental spaces by two different genders the selected speeches. Second, pragmatic model to examine the role of gender from the functional per
... Show MoreThis study deals with strategic maneuvering in advertisement from a pragmatic point of view found in some commercial advertisements in order to investigate and analyze the pragmatic devices that are used in the strategic maneuvering and stages. The study attempts to shed light on the most fuzzy areas in advertisements that is probably how the language of advertisements employed by advertisers to affect consumers positively. The primary goal of strategic maneuvering is to discover how the pragmatic devices have persuasive techniques that are used to gain a competitive advantage and more sales. This study is a contribution to the field of research in the language used in advertising. In this research, the effectiveness of strategic man
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
Background:The effects of contraception on Trichomonas vaginalis have important implications for women who suffer from infections associated with disruptions in the vaginal ecology, such as bacterial vaginitis and urinary tract infections.
Objective: To find the association of the common types of contraceptions with the Trichomonasvaginalis infection in women admitted to the Al-BatoolTeaching Hospital for Maternity and Children in Baqubah city.
Type of study: Cross-sectional study
Methods: This study consist of 75 women with contraception use and71 apparently healthy non contraception user women admitted to outpatient in Al
... Show MoreIntroduction: Diabetic foot infections are one of the most severe complications of diabetes. This study was aimed to determine the common bacterial isolates of diabetic foot infections and the in vitro antibiotic susceptibility then treatment.
Methods: A swab was taken from the foot ulcer, and the aerobic bacteria were isolated and identified by cultural, microscopic and biochemical test, then by api-20E system. After that their antibiotic susceptibility pattern was determined. Then local and systemic treatment was used to treat the diabetic foot patients.
Results: Bacterial isolates belonging to twelve species were obtained from diabetic foot patients. Gram (-) bacteria were the predominant pathogens in the diabetic foot infection