The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
This study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is
... Show MoreThe current research aims to analyze the extent of the adoption of the standards of ISO 45001: 2018 for occupational safety and health management by the General Establishment of Civil Aviation. The research problem was the extent to which the General Establishment of Civil Aviation approved ISO 45001: 2018 for occupational safety and health management. The questionnaire was used as a primary data collection tool, the sample was distributed (50) form, they were selected from the category of employees of the establishment at different levels to represent the research community. Data were analyzed using the statistical package (SPSS), a number of vector statistical methods were used as well as arithmetic mean, standard deviation, an
... Show MorePortable and stationary electrical generators became quite popular in Iraq soon after the shortage in national electrical
energy after 2003. Multi step risk assessment process is used in this study in the assessment of risks caused by
contamination of indoor air by lead particles emitted from domestic electrical generators. Two portable electrical
generators are tested under controlled indoor conditions (Radial LG (0.9 keV) fueled with benzene and oil and TigMax
(3 keV), fueled with benzene only). Lead particles in air were sampled by using portable dust sampler (Sniffer, L-30).
The atmospheric particulate sampling process is carried out in a flat located in the first floor of a three stories building
located in Baghdad
The role of the green areas lies in being one of the systems that plays the vital role in achieving the environmental dimension besides the socio-cultural body and the economic dimension in the hidden value of ecosystem services. However, many developing countries are characterized by a state of low community environmental awareness, which coincides with the basic need for land for housing and other uses, to take precedence over nature protection strategies. In the absence of clear planning and long-term planning strategies, all this led to abuses and violations of urban land use. In Iraq, the situation became more apparent due to the political, security and social conditions that followed the year 2003. Hence, the resea
... Show MoreEach sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show More