In the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.
هدفت الدراسة لالقاء الضوء على وضع المرأة في التعليم العالي في العراق خلال الاعوام الدراسية: 2008 - 2009, 2010 – 2011 و2011- 2012. تتيح القوانين والتعليمات في التعليم العالي في العراق فرص متكافئة للاناث والذكور للتسجيل في الدراسات الاولية والعليا، وكذلك عدم التمييز في الرواتب الشهرية للمنتسبين وفقا لنوع الجنس (الجندر ). بلغ متوسط عدد الاناث في مرحلة الدراسة الاولية في مؤسسات التعليم العالي في العراق لثلا
... Show MoreThe purpose of this paper is to understand the best processes that are currently used in managing talent in Australian higher education (HE) and to examine the policies in terms of talent management processes (TMPs) that are derived from objective one. Pragmatic benefits for academic institutions focused on enhancing talent.
This study selects the mixed method as its research design. In the qualitative study, there were three methods: brainstorming, focus group and individual interviews, followed by the quantitative questionnaire
In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreThe purpose and goal of the research revolve around the diagnosis of intellectual capital as the logical indicator to study an effective human resource management practice and its influential role in determining the overall quality management of higher education institutions and scientific research in Baghdad.
To achieve the purpose of the research, an upgraded standard questionnaire was used to collect data and distribute it to the selected sample in a statistical manner from the study population of (5) institutions affiliated with the Ministry of Higher Education and Scientific Resear
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreABSTRACT
This study aimed to choose top stocks through technical analysis tools specially the indicator called (ratio of William index), and test the ability of technical analysis tools in building a portfolio of shares efficient in comparison with the market portfolio. These one technical tools were used for building one portfolios in 21 companies on specific preview conditions and choose 10 companies for the period from (March 2015) to (June 2017). Applied results of the research showed that Portfolio yield for companies selected according to the ratio of William index indicator (0.0406) that
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More