The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Sewer system plays an indispensable task in urban cities by protecting public health and the environment. The operation, maintenance, and rehabilitation of this network have to be in a sustainable and scientific manner. For this purpose, it is important to support operators, decision makers and municipalities with performance evaluation procedure that is based on operational factors. In this paper, serviceability and performance indicator (PI) principles are employed to propose methodology comprising two enhanced PI curves that can be used to evaluate the individual sewers depending on operational factors such as flowing velocity and wastewater level in the sewers. In order to test this methodology; a case study of al-Ru
... Show MoreWhile many educators are highly focused on state test, it is important to consider that
over the course of a year, instructors can build in many opportunities to assess how learners
are learning. Therefore, assessment techniques are considered a good method to get benefit
for both instructors and learners in the process of teaching and learning. The sample consists
of 27 learners who participated in TOEFL training course in the Development and Continuous
Education Centre. Validity and reliability were verified.
To fulfill the aims and verify the hypothesis which reads as follows” It is hypothesized
that the TOEFL learners' scores will not be increased after TOEFL course training.” T-test
for two dependent samp
Crises affect the economic growth of the country in general and the banking sector in particular. Given the importance of this sector, it is necessary to evaluate the performance of banks from time to time and monitor the liquidity of each bank and how to organize its management to overcome any crisis or emergency situation that may befall it. The research seeks to diagnose the level of impact of crisis management. In the liquidity of Iraqi private banks, using liquidity indicators, as the research community represents the banks listed in the Iraq Stock Exchange As for the research sample, it is represented by (10) pri
... Show MoreThis research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show Moreيهدف هذا العمل الى بيان طبيعة العلاقة بين الادارة بالتجوال والتجديد الاستراتيجي ، ومدى تأثير المتغير المستقل في المتغير التابع. تضمنت فقرات الاستبانة بوصفه الأداة الرئيسة لجمع البيانات ثلاث جوانب اساسية، تضمن الاول البيانات الشخصية للمستجيبين، فيما تضمن الجانب الثاني الفقرات الخاصة بمتغير الادارة بالتجوال من خلال خمسة ابعاد، فيما اشتمل الجانب الثالث على فقرات التجديد الاستراتيجي عبر تناول اربعة ابعاد. ي
... Show Moreإن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى
... Show MoreThis research seeked to create frame work for audit ISO as one class of investigation for special purpose. The suggestion frame work depend on five basic ingredients, there were nature of ISO audit, the people interested requirements to do this audit who process the audit and the problems effect this audit. Already discussed and study the requirements and recommendations from International Standardization Organization.
The researcher suggested the basic sup
... Show Moreيعد الاقتصاد الياباني احد اكبر الاقتصادات الرأسمالية المتقدمة ويحتل المرتبة الثالثة بعد الاقتصاد الأمريكي واقتصاد الاتحاد الاوربي من حيث حجم الناتج المحلي الإجمالي والذي يكاد يقترب من (5) تريليون دولار سنويا.
لقد ادت التطورات المتلاحقة التي شهدها الاقتصاد العالمي وخاصة في حقل التمويل الدولي خلال العشرين سنة الاخيرة الى تصاعد وارتفاع في حجم وحركه رؤوس الاموال الدولية على اوسع نطاق بحيث ا
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More