Preferred Language
Articles
/
8xeuM5IBVTCNdQwCHqes
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and setting appropriate controls to manage or get rid of them, flexibility in setting controls at work and gaining the confidence of stakeholders and customers that Their data is protected. Compliance with controls gives the organization the confidence of customers that it is the best supplier and raises the level of ability to meet the requirements of tenders and then get new job opportunities, which encouraged addressing this topic by focusing on the basic standards of this specification and trying to study these standards and identify the most critical problems that This prevents its application in the commission understudy in particular. The Independent High Electoral Commission/National Office in Baghdad was chosen as a site to conduct the research, and the approach of the case study and applied research was followed and through field coexistence, observations, interviews, access to documents and information extracted from records and documents in order to determine the extent of the gap Between the Information Security Department of the commission in question and the system that the specification came with, analyzing the causes of the gaps and developing solutions, and considering The research was extended to the checklists prepared by the International Standardization Organization, and for the purpose of data analysis, the heptagonal scale was used in the checklists to measure the extent to which the implementation and actual documentation conform to the requirements of the specification, while determining the weights for the answers to the questions contained in the checklists by allocating a specific weight to each paragraph of the scale. The research used two statistical methods, the percentage and the weighted mean to express the extent of application and documentation of the specification paragraphs above and relied on the statement of the main reasons for surgery in the emergence of those gaps. The results that were reached showed several reasons that prevented the application of information security risk management, in the light of which treatments were developed that would reduce the gaps that appeared, the most important of which are: that the Commission did not adopt a clear and documented strategy to address risks, and that information security risk management Ineffective and completely secured from external and internal threats. There was also interest in documenting fixed Hardware and portable Hardware represented by computers used at the headquarters of the directorate, servers and small computers used as workstations in divisions and departments and their connection to senior management, as well as laptops and personal digital assistants, which showed a gap attributed to the total undocumented application of Hardware (automatic data processing), processing accessories, and electronic media), while the application was partially and undocumented for other electronic media, including disk drives, printers, paper, and documents.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Estimation of Water and Energy Saving by Rainwater Harvesting: Sulaimani City as a Case Study
...Show More Authors

Rainwater harvesting could be a possible solution to decrease the consequences of water scarcity and energy deficiency in Iraq and the Kurdistan Region of Iraq (KRI). This study aims to calculate the water and energy (electricity) saved by rainwater harvesting for rooftops and green areas in Sulaimani city, KR, Iraq. Various data were acquired from different formal entities in Sulaimani city. Moreover, Google Earth and ArcMap 10.4 software were used for digitizing and calculating the total rooftop and green areas. The results showed that for the used runoff coefficients (0.8 and 0.95), the harvested rainwater volumes were 2901563 and 12197131 m³ during the study period (2005 – 2006) and (2019-2020). Moreover, by compa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 02 2019
Journal Name
The Fifth Conference On Smart Monitoring, Assessment And Rehabilitation Of Civil Structures Smar 2019
Rehabilitation of Mohammed Al-Qassim Bridge after Fire Attack Using CFRP Sheets: A Case Study
...Show More Authors

View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Arpn Journal Of Engineering And Applied Sciences
Implementation And Evaluation Of Apm 2.6 - Controlled Quadcopter With Aerial Imagery As A Case Study
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Feb 26 2022
Journal Name
Iraqi Journal Of Science
Uncertainty Analysis to Assess Depth Conversion Accuracy: A Case Study of Subba Oilfield, Southern Iraq
...Show More Authors

    The depth conversion process is a significant task in seismic interpretation to establish the link between the seismic data in the time domain and the drilled wells in the depth domain. To promote the exploration and development of the Subba oilfield, more accurate depth conversion is required. In this paper, three approaches of depth conversions: Models 1, 2, and 3 are applied from the simplest to the most complex on Nahr Umr Reservoir in Suba oilfield. This is to obtain the best approach, giving less mistakes with the actual depth at well locations and good inter/extrapolation between or away from well controls. The results of these approaches, together with the uncertainty analysis provide a reliable velocity model

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Integrated Information Technology System in Organizations “Exploratory Comparative Search for opinions of sample of Workers in the Faculties of Science & Education AL- Asma'I at the University of Diyala
...Show More Authors

       The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Proposing an Analysis System to Monitoring Weightlifting Based on Training (Snatch and Clean and Jerk)
...Show More Authors

Analysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
The impact of the internet of things on information institutions from the perspective of library employees
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Economics And Finance Studies
THE ROLE OF TARGET COST MANAGEMENT APPROACH IN REDUCING COSTS FOR THE ACHIEVEMENT OF COMPETITIVE ADVANTAGE AS A MEDIATOR: AN APPLIED STUDY OF THE IRAQI ELECTRICAL INDUSTRY
...Show More Authors

Scopus (15)
Scopus
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
  Positional Accuracy Assessment for Updating Authoritative Geospatial Datasets Based on Open Source Data and Remotely Sensed Images
...Show More Authors

OpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain

... Show More
View Publication Preview PDF
Crossref (2)
Crossref