The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.
Background: Optimal root canal retreatment was required safe and efficient removal of filling material from root canal. The aim of this in vitro study was to compare the efficacy of reciprocating and continuous motion of four retreatment systems in removal of root canal filling material. Materials and Methods: Forty distal roots of the mandibular first molars teeth were used in this study, these roots were embedded in cold clear acrylic,roots were instrumented using crown down technique and rotary ProTaper systemize Sx to size F2 ,instrumentation were done with copiousirrigation of 2.5% sodium hypochlorite and 17% buffered solution of EDTA was used as final irrigant followed by distilledwater, roots were obturated with AH26 sealer and Prota
... Show MoreThe food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simu
... Show MorePredicting weather by numerical models have been used extensively in research works for Middle East, mostly for dust storms, rain showers, and flash floods with a less deal of interest on snow precipitation. In this study, the Global/Regional Integrated Model System (GRIMs) that was developed in South Korea was used to predict a rare snowfall event occurred in three countries in Middle East (Syria, Jordan and Iraq) located between (25-65 oE; 12-42 oN) in year 2008. The main aim of this study was to test GRIMs efficiency, which would be used for the first time in Middle East, to make predictions of weather parameters such as pressure, temperature, and relative humidity especially in the selected ar
... Show MoreAbstract
The aim of the research is to demonstrate the role of uncertainty in adopting the general requirements for the strategic environmental assessment of service departments in Babil Governorate and the Environment Department. By focusing on a range of environmental problems, despite the efforts exerted to deal with the environme
... Show MoreThe question asked by all researchers is when solar panels will replace the national grid, especially in the domestic sector. In this study, a rooftop stand-alone solar electric system is designed to provide all the electrical power to a house in Baghdad-Iraq, using a (How to design PV system) simulation program. The feasibility of this system compared to the performance of the national electric grid and the system of private diesel generators is determined. The proposed solar system capacity is (25 kW), and the space required and the energy payback time are (360 m2 and 7.82 years), respectively. By using the current system, the net CO2 mitigation amount is 499,518.2 tons for 30-year. The kilowatt-hour cost
... Show MoreDespite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving
... Show More Despite the availability of information technology banking features and benefits of the banking sector, they involve many risks and challenges and put in the face of the administrative authorities and regulatory institutions in the banking system, organizational matters and control sensitive and bear direct responsibility for conducting independent assessments of their regulatory and information and determine the degree of its durability and its ability to confront problems imposed by the technical challenges and technological .
And the success of the administrative authorities and regulatory institutions in achieving its objectives in the management of risks and threats oversight resulting from the act
The research aims to statement the main obstacles that prevent the application of total quality management (TQM) in a number of Iraqi service organizations, and by one organization in each of the sectors (health, finance, education, higher education, tourism), which are, (Al-Yarmouk Teaching Hospital, Rafidain Bank/ Branch of Hay Al-Arabi Al-Jadid, Al-Karkh/1 Directorate of Education, College of administration and Economics/ Baghdad University, International Palestine Hotel). The research also, tries to classify the priority of the obstacles depending on the type of service organization surveyed. And diagnoses the extent to which or the difference of the research sample members views on the order of obstacles of TQM, and also proposes a
... Show MoreThis research study examines the impact of information technology on firm profitability and stock returns. Using a comprehensive dataset of firms across various industries, this research employs rigorous statistical analysis techniques to investigate the relationship between IT investments, firm profitability metrics, and stock returns. The study focuses at how IT investments affect financial performance measures including return on assets (ROA) and return on equity (ROE), with P-values of 0.34 and 0.12, respectively. Furthermore, the study investigates the influence of IT on stock returns, taking into account market capitalization, industry trends, and macroeconomic variables. This study's conclusions center on the beneficial assoc
... Show More